2022
DOI: 10.1016/j.comnet.2021.108708
|View full text |Cite
|
Sign up to set email alerts
|

Swarm Intelligence inspired Intrusion Detection Systems — A systematic literature review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 47 publications
(22 citation statements)
references
References 113 publications
0
22
0
Order By: Relevance
“…The KDDCup 99 dataset is one of the popular datasets in IoT with cybersecurity [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47]. This dataset provides labelled and unlabeled training and testing data, and it originated from the evaluation program DARPA98 IDS with corresponds to seven and two weeks [33], [41], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60], [61], [62], [63], [64], [65], [66], [67], [68], [69], [70], [71], [72], [73], [74]. The UNSW-NB15 dataset was created by perfectStorm (IXIA) in collaboration with the UNSW Cyber Range Lab to generate moderately aggressive activities and attacks.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…The KDDCup 99 dataset is one of the popular datasets in IoT with cybersecurity [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47]. This dataset provides labelled and unlabeled training and testing data, and it originated from the evaluation program DARPA98 IDS with corresponds to seven and two weeks [33], [41], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60], [61], [62], [63], [64], [65], [66], [67], [68], [69], [70], [71], [72], [73], [74]. The UNSW-NB15 dataset was created by perfectStorm (IXIA) in collaboration with the UNSW Cyber Range Lab to generate moderately aggressive activities and attacks.…”
Section: Methodsmentioning
confidence: 99%
“…ML methods secure ICT on the network and physical levels by managing the information through packets and controlling anomalies [66]. The research on ML-AIDS identifies and efficiently implements the effective and efficient anomalies of networks and computers [70]. Recently, many researchers have been dedicated to developing ML with NIDs [41], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60], [61], [62], [63], [64], [65], [66], [67], [68], [69], [70].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…That is because the PSO finds the optimal subset features faster than the other algorithms. Moreover, the standard PSO suffers from the swarm's premature convergence, which causes stagnation during the iteration for the optimal features [19]. As a result, we consider the NSL-KDD benchmark dataset to evaluate the proposed solution.…”
Section: Introductionmentioning
confidence: 99%