Years Ref. Publications Datasets Methods (Algorithm) Techniques
Years Ref. Publications Datasets Methods (Algorithm) Techniques
10.1016/j.jnca.2019.102422.
REFERENCES [16] Y. Al-Hadhrami and F. K. Hussain, “Real time dataset generation
framework for intrusion detection systems in IoT,” Futur. Gener.
[1] J. Gu, L. Wang, H. Wang, and S. Wang, “A novel approach to
Comput. Syst., vol. 108, pp. 414–423, Jul. 2020, doi:
intrusion detection using SVM ensemble with feature
10.1016/j.future.2020.02.051.
augmentation,” Comput. Secur., vol. 86, pp. 53–62, 2019, doi:
[17] C.-R. R. Wang, R.-F. F. Xu, S.-J. J. Lee, and C.-H. H. Lee,
10.1016/j.cose.2019.05.022.
“Network intrusion detection using equality constrained-
[2] S. Muller et al., “A training-resistant anomaly detection system,”
optimization-based extreme learning machines,” Knowledge-Based
Comput. Secur., vol. 76, pp. 1–11, 2018, doi:
Syst., vol. 147, pp. 68–80, 2018, doi: 10.1016/j.knosys.2018.02.015.
10.1016/j.cose.2018.02.015.
[18] W. Li, W. Meng, X. Luo, and L. F. Kwok, “MVPSys: Toward
[3] K. Wang, “Network data management model based on Naïve Bayes
practical multi-view based false alarm reduction system in network
classifier and deep neural networks in heterogeneous wireless
intrusion detection,” Comput. Secur., vol. 60, pp. 177–192, 2016,
networks,” Comput. Electr. Eng., vol. 75, pp. 135–145, 2019, doi:
doi: 10.1016/j.cose.2016.04.007.
10.1016/j.compeleceng.2019.02.015.
[19] P. Devan and N. Khare, “An efficient XGBoost–DNN-based
[4] R. Barnard, Intrusion Detection Systems, 2nd Edition. 1988.
classification model for network intrusion detection system,” Neural
[5] T. A. Alamiedy, M. Anbar, Z. N. M. Alqattan, and Q. M. Alzubi,
Comput. Appl., 2020, [Online]. Available:
“Anomaly-based intrusion detection system using multi-objective https://link.springer.com/content/pdf/10.1007/s00521-020-04708-
grey wolf optimisation algorithm,” J. Ambient Intell. Humaniz. x.pdf.
Comput., vol. 11, 2019, doi: 10.1007/s12652-019-01569-8. [20] S. Mohammadi, H. Mirvaziri, M. Ghazizadeh-Ahsaee, and H.
[6] H. Wang, J. Gu, and S. Wang, “An effective intrusion detection Karimipour, “Cyber intrusion detection by combined feature
framework based on SVM with feature augmentation,” Knowledge- selection algorithm,” J. Inf. Secur. Appl., vol. 44, pp. 80–88, 2019,
Based Syst., vol. 136, pp. 130–139, 2017, doi: doi: 10.1016/j.jisa.2018.11.007.
10.1016/j.knosys.2017.09.014. [21] A. Nisioti, A. Mylonas, P. D. Yoo, and V. Katos, “From intrusion
[7] P. Krishnan, S. Duttagupta, and K. Achuthan, “VARMAN: Multi- detection to attacker attribution: A comprehensive survey of
plane security framework for software defined networks,” Comput. unsupervised methods,” IEEE Commun. Surv. Tutorials Surv.
Commun., vol. 148, no. July, pp. 215–239, 2019, doi: Tutorials, vol. 20, no. 4, p. 3369, 2018, [Online]. Available:
10.1016/j.comcom.2019.09.014.
https://ieeexplore.ieee.org/abstract/document/8410366/.
[8] J. Liang, J. Chen, Y. Zhu, F. R. Yu, R. Yu, and F. R. Yu, “A novel [22] B. Kitchenham et al., Guidelines for performing Systematic
Intrusion Detection System for Vehicular Ad Hoc Networks Literature Reviews in Software Engineering. 2007.
(VANETs) based on differences of traffic flow and position,” Appl. [23] X. F. Chen and S. Z. Yu, “CIPA: A collaborative intrusion
Soft Comput. J., vol. 75, pp. 712–727, 2019, doi: prevention architecture for programmable network and SDN,”
10.1016/j.asoc.2018.12.001. Comput. Secur., vol. 58, pp. 1–19, 2016, doi:
[9] M. Gajewski et al., “Two-tier anomaly detection based on traffic 10.1016/j.cose.2015.11.008.
profiling of the home automation system,” Comput. Networks, vol. [24] M. M. Rathore, A. Ahmad, and A. Paul, “Real time intrusion
158, pp. 46–60, 2019, doi: 10.1016/j.comnet.2019.04.013. detection system for ultra-high-speed big data environments,” J.
[10] X. An, J. Su, X. Lü, and F. Lin, “Hypergraph clustering model-based Supercomput., 2016, [Online]. Available:
association analysis of DDOS attacks in fog computing intrusion https://link.springer.com/article/10.1007/s11227-015-1615-5.
detection system,” Eurasip J. Wirel. Commun. Netw., vol. 11, p. 249, [25] C. Azad and V. K. Jha, “Fuzzy min–max neural network and particle
2018, doi: 10.1186/s13638-018-1267-2.
swarm optimization based intrusion detection system,” Microsyst.
[11] E. M. Roopa Devi and R. C. Suganthe, “Improved Relevance Vector Technol., vol. 23, no. 4, pp. 907–918, 2016, doi: 10.1007/s00542-
Machine (IRVM) classifier for Intrusion Detection System,” Soft 016-2873-8.
Comput., vol. 23, no. 19, pp. 9111–9119, Oct. 2019, doi: [26] W. L. Al-Yaseen, Z. A. Othman, and M. Z. A. Nazri, “Multi-level
10.1007/s00500-018-3621-z. hybrid support vector machine and extreme learning machine based
[12] C. Callegari, S. Giordano, and M. Pagano, “An information-theoretic on modified K-means for intrusion detection system,” Expert Syst.
method for the detection of anomalies in network traffic,” Comput. Appl., vol. 67, pp. 296–303, 2017, doi: 10.1016/j.eswa.2016.09.041.
Secur., vol. 70, pp. 351–365, 2017, doi: 10.1016/j.cose.2017.07.004. [27] X. Zou, J. Cao, Q. Guo, and T. Wen, “A novel network security
[13] Y. Liu, L. Zhu, and F. Liu, “Design of Multimedia Education algorithm based on improved support vector machine from smart
Network Security and Intrusion Detection System,” Multimed. Tools city perspective,” Comput. Electr. Eng., vol. 65, no. 3, pp. 67–78,
Appl., 2020, doi: 10.1007/s11042-020-08724-w. 2018, doi: 10.1016/j.compeleceng.2017.09.028.
[14] I. Ghafir et al., “Detection of advanced persistent threat using [28] E. Kabir, J. Hu, H. Wang, G. Zhuo, H. Wang, and G. Zhuo, “A novel
machine-learning correlation analysis,” Futur. Gener. Comput. Syst., statistical technique for intrusion detection systems,” Futur. Gener.
vol. 89, pp. 349–359, 2018, doi: 10.1016/j.future.2018.06.055. Comput. Syst., vol. 79, pp. 303–318, 2018, doi:
[15] J. Manan, A. Ahmed, I. Ullah, L. Merghem-Boulahia, and D. Gaïti, 10.1016/j.future.2017.01.029.
“Distributed intrusion detection scheme for next generation [29] W. Ghanem and A. Jantan, “A new approach for intrusion detection
networks,” J. Netw. Comput. Appl., vol. 147, p. 102422, 2019, doi: