2024
DOI: 10.3390/app14031044
|View full text |Cite
|
Sign up to set email alerts
|

Optimizing Cybersecurity Attack Detection in Computer Networks: A Comparative Analysis of Bio-Inspired Optimization Algorithms Using the CSE-CIC-IDS 2018 Dataset

Hadi Najafi Mohsenabad,
Mehmet Ali Tut

Abstract: In computer network security, the escalating use of computer networks and the corresponding increase in cyberattacks have propelled Intrusion Detection Systems (IDSs) to the forefront of research in computer science. IDSs are a crucial security technology that diligently monitor network traffic and host activities to identify unauthorized or malicious behavior. This study develops highly accurate models for detecting a diverse range of cyberattacks using the fewest possible features, achieved via a meticulous … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 50 publications
0
1
0
Order By: Relevance
“…The authors of the articles paid attention to many aspects of wireless communication, existing threats, and solutions whose application increases the level of information security. The issues discussed in detail showed how important elements are communication reliability [7][8][9], information security [10,11], and resistance to various types of external attackscyberattacks [12,13], cryptographic attacks [14,15], or electromagnetic attacks [16][17][18][19].…”
Section: The Present Issuementioning
confidence: 99%
“…The authors of the articles paid attention to many aspects of wireless communication, existing threats, and solutions whose application increases the level of information security. The issues discussed in detail showed how important elements are communication reliability [7][8][9], information security [10,11], and resistance to various types of external attackscyberattacks [12,13], cryptographic attacks [14,15], or electromagnetic attacks [16][17][18][19].…”
Section: The Present Issuementioning
confidence: 99%