Int J Performability Eng ›› 2024, Vol. 20 ›› Issue (1): 24-31.doi: 10.23940/ijpe.24.01.p4.2431
Previous Articles Next Articles
Rahul Bhandaria, Sanjay Singlaa, Purushottam Sharmab,*, and Sandeep Singh Kanga
Submitted on
;
Revised on
;
Accepted on
Contact:
* E-mail address: puru.mit2002@gmail.com
Rahul Bhandari, Sanjay Singla, Purushottam Sharma, and Sandeep Singh Kang. AINIS: An Intelligent Network Intrusion System [J]. Int J Performability Eng, 2024, 20(1): 24-31.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
[1] Latif S., Idrees Z., Zou Z., andAhmad, J. DRaNN: A Deep Random Neural Network Model for Intrusion Detection in Industrial IoT. In2020 international conference on UK-China emerging technologies (UCET), IEEE, pp. 1-4, 2020. [2] Alsaedi A., Moustafa N., Tari Z., Mahmood A., andAnwar A.TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems. IEEE Access, vol. 8, pp. 165130-165150, 2020. [3] Vaiyapuri, T. and Binbusayyis, A.Application of Deep Autoencoder as an One-Class Classifier for Unsupervised Network Intrusion Detection: A Comparative Evaluation. PeerJ Computer Science, vol. 6, pp. e327, 2020. [4] Binbusayyis, A. and Vaiyapuri, T.Identifying and Benchmarking Key Features for Cyber Intrusion Detection: An Ensemble Approach. IEEE Access, vol. 7, pp. 106495-106513, 2019. [5] Binbusayyis, A. and Vaiyapuri, T.Comprehensive Analysis and Recommendation of Feature Evaluation Measures for Intrusion Detection. Heliyon, vol. 6, no. 7, 2020. [6] Vaiyapuri T.Deep Learning Enabled Autoencoder Architecture for Collaborative Filtering Recommendation in IoT Environment. Computers, Materials & Continua, vol. 68, no. 1, 2021. [7] Binbusayyis, A. and Vaiyapuri, T.Unsupervised Deep Learning Approach for Network Intrusion Detection Combining Convolutional Autoencoder and One-Class SVM. Applied Intelligence, vol. 51, no. 10, pp. 7094-7108, 2021. [8] Vaiyapuri T., Binbusayyis A., andVaradarajan V. Security,Privacy and Trust in IoMT Enabled Smart Healthcare System: A Systematic Review of Current and Future Trends. International Journal of Advanced Computer Science and Applications, vol. 12, no. 2, 2021. [9] Christiansen P., Nielsen L.N., Steen K.A., Jørgensen R.N., andKarstoft H.DeepAnomaly: Combining Background Subtraction and Deep Learning for Detecting Obstacles and Anomalies in an Agricultural Field. Sensors, vol. 16, no. 11, pp. 1904, 2016. [10] Kang, M.J. and Kang, J.W.Intrusion Detection System using Deep Neural Network for in-Vehicle Network Security. PloS one, vol. 11, no. 6, pp. e0155781, 2016. [11] Jain, S. and Chandrasekaran, K.Industrial Automation using Internet of Things. In Research Anthology on Cross-Disciplinary Designs and Applications of Automation, IGI Global, pp. 355-383, 2022. [12] Susilo, B. and Sari, R.F.Intrusion Detection in IoT Networks using Deep Learning Algorithm. Information, vol. 11, no. 5, pp .279, 2020. [13] Abu Al-Haija, Q. and Zein-Sabatto, S. An Efficient Deep-Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks. Electronics, vol. 9, no. 12, pp. 2152, 2020. [14] Manimurugan S.,Al-Mutairi, S., Aborokbah, M.M., Chilamkurti, N., Ganesan, S., and Patan, R. Effective Attack Detection in Internet of Medical Things Smart Environment using a Deep Belief Neural Network. IEEE Access, vol. 8, pp. 77396-77404, 2020. [15] Alotaibi, B. and Alotaibi, M.A Stacked Deep Learning Approach for IoT Cyberattack Detection. Journal of Sensors, vol. 2020, pp. 1-10, 2020. [16] Liang W., Li K.C., Long J., Kui X., andZomaya A.Y.An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model. IEEE Transactions on Industrial Informatics, vol. 16, no. 3, pp. 2063-2071, 2019. [17] Tsang, C.H. and Kwong, S. Multi-Agent Intrusion Detection System in Industrial Network using Ant Colony Clustering Approach and Unsupervised Feature Extraction. In2005 IEEE international conference on industrial technology, IEEE, pp. 51-56, 2005. [18] Jin C., Valizadeh S., andvan Dijk, M. Snapshotter: Lightweight Intrusion Detection and Prevention System for Industrial Control Systems. In2018 IEEE Industrial Cyber-Physical Systems (ICPS), IEEE, pp. 824-829, 2018. [19] Butun I., Almgren M., Gulisano V., andPapatriantafilou M.Intrusion Detection in Industrial Networks via Data Streaming. Industrial IoT: Challenges, Design Principles, Applications, and Security, pp. 213-238, 2020. [20] Yang K., Li Q., Lin X., Chen X., andSun L.IFinger: Intrusion Detection in Industrial Control Systems via Register-Based Fingerprinting. IEEE Journal on Selected Areas in Communications, vol. 38, no. 5, pp. 955-967, 2020. [21] Akter M., Dip G.D., Mira M.S., Abdul Hamid M., andMridha, M.F. Construing Attacks of Internet of Things (IoT) anda Prehensile Intrusion Detection System for Anomaly Detection using Deep Learning Approach. In International Conference on Innovative Computing and Communications: Proceedings of ICICC2019, Springer Singapore, vol. 2, pp. 427-438, 2020. [22] Ge M., Syed N.F., Fu X., Baig Z., andRobles-Kelly, A. Towards a Deep Learning-Driven Intrusion Detection Approach for Internet of Things. Computer Networks, vol. 186, pp. 107784, 2021. [23] Saharkhizan M., Azmoodeh A., Dehghantanha A., Choo K.K.R., and Parizi, R.M. An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks using Network Traffic. IEEE Internet of Things Journal, vol. 7, no. 9, pp. 8852-8859, 2020. [24] Singla S., Sharma P., andSharma P.K.Enhanced Security using Proxy Signcryption Technique for Wireless Mesh Networks. International Journal of System Assurance Engineering and Management, vol. 14, no. 1, pp. 474-482, 2023. [25] Relan, N.G. and Patil, D.R. Implementation of Network Intrusion Detection System using Variant of Decision Tree Algorithm. In2015 International Conference on Nascent Technologies in the Engineering Field (ICNTE), IEEE, pp. 1-5, 2015. [26] Boyes H., Hallaq B., Cunningham J., andWatson T.The Industrial Internet of Things (IIoT): An Analysis Framework. Computers in industry, vol. 101, pp. 1-12, 2018. [27] Sharma P., Alshehri M., andSharma R.Activities Tracking by Smartphone and Smartwatch Biometric Sensors using Fuzzy Set Theory. Multimedia Tools and Applications, vol. 82, no. 2, pp. 2277-2302, 2023. [28] Qureshi A.U.H., Larijani, H., Mtetwa, N., Javed, A., and Ahmad, J. RNN-ABC: A New Swarm Optimization Based Technique for Anomaly Detection. Computers, vol. 8, no. 3, pp. 59, 2019. [29] Sheikhan M., Jadidi Z., andFarrokhi A.Intrusion Detection using Reduced-Size RNN Based on Feature Grouping. Neural Computing and Applications, vol. 21, pp. 1185-1190, 2012. [30] Agarwal A., Sharma P., Alshehri M., Mohamed A.A., andAlfarraj O.Classification Model for Accuracy and Intrusion Detection using Machine Learning Approach. PeerJ Computer Science, vol. 7, pp. e437, 2021. [31] Lee J., Kim J., Kim I., andHan K.Cyber Threat Detection Based on Artificial Neural Networks using Event Profiles. IEEE Access, vol. 7, pp. 165607-165626, 2019. [32] Masduki B.W., Ramli K., Saputra F.A., andSugiarto D. Study on Implementation of Machine Learning Methods Combination for Improving Attacks Detection Accuracy on Intrusion Detection System (IDS). In2015 International Conference on Quality in Research (QiR), IEEE, pp. 56-64, 2015. [33] Sharma P., Kapoor S., andSharma R.Ransomware Detection, Prevention and Protection in IoT Devices using ML Techniques Based on Dynamic Analysis Approach. International Journal of System Assurance Engineering and Management, vol. 14, no. 1, pp. 287-296, 2023. [34] Malik, A.J. and Khan, F.A.A Hybrid Technique using Binary Particle Swarm Optimization and Decision Tree Pruning for Network Intrusion Detection. Cluster Computing, vol. 21, pp. 667-680, 2018. [35] Gao Y., Wu H., Song B., Jin Y., Luo X., andZeng X.A Distributed Network Intrusion Detection System for Distributed Denial of Service Attacks in Vehicular Ad Hoc Network. IEEE Access, vol. 7, pp. 154560-154571, 2019. [36] Zhou Y., Cheng G., Jiang S., andDai M.Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble Classifier. Computer networks, vol. 174, pp. 107247, 2020. [37] Vinayakumar R., Alazab M., Soman K.P., Poornachandran P., Al-Nemrat, A., and Venkatraman, S. Deep Learning Approach for Intelligent Intrusion Detection System. IEEE Access, vol. 7, pp. 41525-41550, 2019. |
[1] | Ashu Mehta, Navdeep Kaur, and Amandeep Kaur. A Review of Software Fault Prediction Techniques in Class Imbalance Scenarios [J]. Int J Performability Eng, 2025, 21(3): 123-130. |
[2] | Vikas, Charu Wahi, Bharat Bhushan Sagar, and Manisha Manjul. Trust Management in WSN using ML for Detection of DDoS Attacks [J]. Int J Performability Eng, 2025, 21(3): 157-167. |
[3] | Pancham Singh, Updesh Kumar Jaiswal, Eshank Jain, Nikhil Kumar, and Vimlesh Mishra. A Novel Methodology Utilizing Modern CCTV Cameras and Software as a Service Model for Crime Detection and Prediction [J]. Int J Performability Eng, 2025, 21(2): 112-121. |
[4] | Arpna Saxena and Sangeeta Mittal. CluSHAPify: Synergizing Clustering and SHAP Value Interpretations for Improved Reconnaissance Attack Detection in IIoT Networks [J]. Int J Performability Eng, 2025, 21(1): 36-47. |
[5] | Seema Kalonia and Amrita Upadhyay. Comparative Analysis of Machine Learning Model and PSO Optimized CNN-RNN for Software Fault Prediction [J]. Int J Performability Eng, 2025, 21(1): 48-55. |
[6] | Manu Banga. Enhancing Software Fault Prediction using Machine Learning [J]. Int J Performability Eng, 2024, 20(9): 529-540. |
[7] | Vikas Kumar, Charu Wahi, Bharat Bhushan Sagar, and Manisha Manjul. Ensemble Learning Based Intrusion Detection for Wireless Sensor Network Environment [J]. Int J Performability Eng, 2024, 20(9): 541-551. |
[8] | Aditya Dayal Tyagi, and Krishna Asawa. Influence Maximization in Social Network using Community Detection and Node Modularity [J]. Int J Performability Eng, 2024, 20(9): 552-562. |
[9] | Ekta Singh, and Parma Nand. Efficient Multi-Class Facial Emotion Recognition using YOLOv9: A Deep Learning Approach for Real-Time Applications [J]. Int J Performability Eng, 2024, 20(9): 581-590. |
[10] | Manpreet Singh, Gauri Jindal, Akshita Oberoi, and Rohan Dhangar. Improving Crime Detection Through Geo-MDA: A Hybrid Linear Regression Approach in Data Mining [J]. Int J Performability Eng, 2024, 20(8): 469-477. |
[11] | Nilesh Shelke, Deepali Sale, Sagar Shinde, Atul Kathole, and Rachna Somkunwar. A Comprehensive Framework for Facial Emotion Detection using Deep Learning [J]. Int J Performability Eng, 2024, 20(8): 487-497. |
[12] | Kalyani H. Deshmukh, Gajendra R. Bamnote, and Pratik K Agrawal. A Novel Approach for Drought Monitoring and Evaluation using Time Series Analysis and Deep Learning [J]. Int J Performability Eng, 2024, 20(8): 498-509. |
[13] | Saurabh Saxena, and Chetna Gupta. Optimizing Bug Resolution: A Data-Driven Developer Recommendation System [J]. Int J Performability Eng, 2024, 20(8): 510-519. |
[14] | Lakshya Vaswani, Sai Sri Harsha, Subham Jaiswal, and Aju D. Unravelling Complexity: Investigating the Effectiveness of SHAP Algorithm for Improving Explainability in Network Intrusion System Across Machine and Deep Learning Models [J]. Int J Performability Eng, 2024, 20(7): 421-431. |
[15] | Meenakshi Chawla and Meenakshi Pareek. A Hybrid Deep Learning Perspective for Software Effort Estimation [J]. Int J Performability Eng, 2024, 20(7): 442-450. |
|