Overcoming the challenges of data lack, leakage, and dimensionality in intrusion detection systems: a comprehensive review
The Internet of Things (IoT) and cloud computing are rapidly gaining momentum as decentralized Internet-based technologies, leading to increased information in nearly every technical and commercial industry. However, ensuring the security of IoT systems is a pressing issue due to the complexities in...
| Main Authors: | Abdullah, Azizol, Bouke, Mohamed, Udzir, Nur, Samian, Normalia |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Brazilian Telecommunications Society
2024
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/116409/ http://psasir.upm.edu.my/id/eprint/116409/1/116409.pdf |
Similar Items
An empirical assessment of ML models for 5G network intrusion detection: a data leakage-free approach
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
by: Bouke, Mohamed Aly, et al.
Published: (2023)
by: Bouke, Mohamed Aly, et al.
Published: (2023)
Towards robust and efficient intrusion detection in IoMT: a deep learning approach addressing data leakage and enhancing model generalizability
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
A novel approach for handling missing data to enhance network intrusion detection system
by: Tahir, Mahjabeen, et al.
Published: (2025)
by: Tahir, Mahjabeen, et al.
Published: (2025)
An intrusion detection system for the internet of things based on machine learning: review and challenges
by: Adnan, Ahmed, et al.
Published: (2021)
by: Adnan, Ahmed, et al.
Published: (2021)
Signature-based anomaly intrusion detection using integrated data mining classifiers
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
by: Bouke, Mohamed Aly, et al.
Published: (2022)
by: Bouke, Mohamed Aly, et al.
Published: (2022)
A cloud-based intrusion detection service framework.
by: Yassin, Warusia, et al.
Published: (2012)
by: Yassin, Warusia, et al.
Published: (2012)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
A comprehensive analysis of intrusion detection system in internet of things
by: Teh, Boon Seong
Published: (2020)
by: Teh, Boon Seong
Published: (2020)
Overcoming challenges to data quality in the ASPREE clinical trial
by: Lockery, J.E., et al.
Published: (2019)
by: Lockery, J.E., et al.
Published: (2019)
Intrusion detection system with data mining approach: a review
by: Khalilian, Majdid, et al.
Published: (2011)
by: Khalilian, Majdid, et al.
Published: (2011)
Intrusion Detection Systems, Issues, Challenges, and Needs
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
A Review on feature selection and ensemble techniques for intrusion detection system
by: Torabi, Majid, et al.
Published: (2021)
by: Torabi, Majid, et al.
Published: (2021)
Compare and Measure Selfishness Detection (CMSD) mechanism: promptness and accuracy
by: Samian, Normalia, et al.
Published: (2015)
by: Samian, Normalia, et al.
Published: (2015)
A naturally inspired statistical intrusion detection model
by: Mahboubian, Mohammad, et al.
Published: (2013)
by: Mahboubian, Mohammad, et al.
Published: (2013)
Overcoming emerging challenges in biocatalysis
by: Roura Padrosa, David
Published: (2020)
by: Roura Padrosa, David
Published: (2020)
Overcoming challenges for the biorefineries of the future
by: Moirangthem, Kamaljit
Published: (2017)
by: Moirangthem, Kamaljit
Published: (2017)
Lack of data hampering early flood warning
by: Jalil, Haikal
Published: (2014)
by: Jalil, Haikal
Published: (2014)
Energy-efficient intrusion detection in wireless sensor network
by: Salehian, Solmaz, et al.
Published: (2012)
by: Salehian, Solmaz, et al.
Published: (2012)
Big data challenges in overcoming China’s water and air pollution: relevant data and indicators
by: Zhang, Bo, et al.
Published: (2021)
by: Zhang, Bo, et al.
Published: (2021)
Waspada taktik scammer elak jadi mangsa
by: Samian, Normalia
Published: (2022)
by: Samian, Normalia
Published: (2022)
Efficient node cooperation stimulation mechanism in wireless multihop networks
by: Samian, Normalia
Published: (2017)
by: Samian, Normalia
Published: (2017)
Effective mining on large databases for intrusion detection
by: Adinehnia, Reza, et al.
Published: (2014)
by: Adinehnia, Reza, et al.
Published: (2014)
A review on water leakage detection method in the water distribution network
by: Al Qahtani, Turki, et al.
Published: (2020)
by: Al Qahtani, Turki, et al.
Published: (2020)
Evaluating oversampling techniques for network intrusion detection data
by: Chan, Jia Lin
Published: (2022)
by: Chan, Jia Lin
Published: (2022)
Review on Intrusion Detection System Based on The Goal of The Detection System
by: Khaleel, M. K., et al.
Published: (2018)
by: Khaleel, M. K., et al.
Published: (2018)
Review on intrusion detection system based on the goal of the detection system
by: Khaleel, Mohammad Khamees, et al.
Published: (2018)
by: Khaleel, Mohammad Khamees, et al.
Published: (2018)
Investigating and analyzing simulation tools of wireless sensor networks: a comprehensive survey
by: Adday, Ghaihab Hassan, et al.
Published: (2024)
by: Adday, Ghaihab Hassan, et al.
Published: (2024)
KM-NEU: an efficient hybrid approach for intrusion detection system
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2014)
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2014)
Stay united to overcome challenges, urges PM
Published: (2009)
Published: (2009)
Congenital Vascular Ring: Overcoming Perioperative Challenges
by: Chong, Soon Eu, et al.
Published: (2016)
by: Chong, Soon Eu, et al.
Published: (2016)
Theory and development of magnetic flux leakage sensor for flaws detection: a review
by: Nor Afandi Sharif,, et al.
Published: (2020)
by: Nor Afandi Sharif,, et al.
Published: (2020)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
by: Udzir, Nur Izura, et al.
Published: (2019)
by: Udzir, Nur Izura, et al.
Published: (2019)
A systematic review of machine learning and deep learning techniques for anomaly detection in data mining
by: Tahir, Mahjabeen, et al.
Published: (2025)
by: Tahir, Mahjabeen, et al.
Published: (2025)
Similar Items
-
An empirical assessment of ML models for 5G network intrusion detection: a data leakage-free approach
by: Bouke, Mohamed Aly, et al.
Published: (2024) -
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
by: Bouke, Mohamed Aly, et al.
Published: (2023) -
Towards robust and efficient intrusion detection in IoMT: a deep learning approach addressing data leakage and enhancing model generalizability
by: Bouke, Mohamed Aly, et al.
Published: (2024) -
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems
by: Bouke, Mohamed Aly, et al.
Published: (2024) -
A novel approach for handling missing data to enhance network intrusion detection system
by: Tahir, Mahjabeen, et al.
Published: (2025)