References
- S. Rajasoundaran, S. V. N. Santhosh Kumar, M. Selvi, S. Ganapathy, R. Rakesh, A. Kannan, "Machine learning based volatile block chain construction for secure routing in decentralized military sensor networks," Wireless Networks, vol.27, no.7, pp.4513-4534, 2021.
- S. V. N. Santhosh Kumar, Y. Palanichamy, M. Selvi, S. Ganapathy, A. Kannan, S. P. Perumal, "Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks," Wireless Networks, vol.27, pp.3873-3894, 2021.
- M. Selvi, K. Thangaramya, S. Ganapathy, K. Kulothungan, H. K. Nehemiah, A. Kannan, "An Energy Aware Trust Based Secure Routing Algorithm for Effective Communication in Wireless Sensor Networks," Wireless Personal Communications, vol.105, pp.1475-1490, 2019.
- K. Thangaramya, K. Kulothungan, S. I. Gandhi, M. Selvi, S. V. N. Santhosh Kumar, K. Arputharaj, "Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN," Soft Computing, vol.24, pp.16483-16497, 2020.
- J. P. Anderson, "Computer Security threat monitoring and surveillance," Technical Report, James P. Anderson company, 1980.
- I. Martins, J. S. Resende, P. R. Sousa, S. Silva, L. Antunes, and J. Gama, "Host-based IDS: A review and open issues of an anomaly detection system in IoT," Future Generation Computer Systems, vol.133, pp.95-113, 2022.
- C.-M. Ou, "Host-based Intrusion Detection Systems inspired by Machine Learning of Agent-based Artificial Immune Systems," in Proc. of IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA), pp.1-5, 2019.
- S. Raj, K. N. Singh, N. K. Gupta, R. Nigam, B. Verma, S. Karsoliya, "High Accuracy of Hybrid IDS System using Evidence Theory and SVM ML Technique," in Proc. of 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), pp.1261-1264, 2021.
- W. T. Yue, M. Cakanyildirim, "A cost-based analysis of intrusion detection system configuration under active or passive response," Decision Support Systems, vol.50, no.1, pp.21-31, 2010.
- I. Dutt, S. Borah, and I. K. Maitra, "Immune System Based Intrusion Detection System (IS-IDS): A Proposed Model," IEEE Access, vol.8, pp.34929-34941, 2020.
- S. Ganapathy, K. Kulothungan, S. Muthurajkumar, M. Vijayalakshmi, P. Yogesh, A. Kannan, "Intelligent feature selection and classification techniques for intrusion detection in networks: a survey," EURASIP Journal on Wireless Communications and Networking, vol.2013, no.1, 2013.
- S. Murugesan, R. S. Bhuvaneswaran, H. Khanna Nehemiah, S. Keerthana Sankari, Y. Nancy Jane, "Feature Selection and Classification of Clinical Datasets Using Bioinspired Algorithms and Super Learner," Computational and Mathematical Methods in Medicine, vol.2021, pp.1-18, 2021.
- V. R. Elgin Christo, H. Khanna Nehemiah, B. Minu, and A. Kannan, "Correlation-Based Ensemble Feature Selection Using Bioinspired Algorithms and Classification Using Backpropagation Neural Network," Computational and Mathematical Methods in Medicine, vol. 2019, 2019.
- S. Sinha, A. Paul, "Neuro-Fuzzy Based Intrusion Detection System for Wireless Sensor Network," Wireless Personal Communications, vol.114, pp.835-851, 2020.
- M. Riecker, S. Biedermann, M. Hollick, "Lightweight energy consumption based intrusion detection system for wireless sensor networks," in Proc. of SAC '13: Proceedings of the 28th Annual ACM Symposium on Applied Computing, pp.1784-1791, 2013.
- P. Nancy, S. Muthurajkumar, S. Ganapathy, S.V.N. Santhosh Kumar, M. Selvi, K. Arputharaj, "Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks," IET Communications, vol.14, no.5, pp.888-895, 2020.
- F. A. Khan, A. Gumaei, A. Derhab, and A. Hussain, "A Novel Two-Stage Deep Learning Model for Efficient Network Intrusion Detection," IEEE Access, vol.7, pp.30373-30385, 2019.
- A. Khraisat, I. Gondal, P. Vamplew and J. Kamruzzaman, "Survey of intrusion detection systems: techniques, datasets and challenges," Cybersecurity, vol.2, 2019.
- H. S. Hota and A. K. Shrivas, "Decision Tree Techniques Applied on NSL-KDD Data and Its Comparison with Various Feature Selection Techniques," in Proc. of Advanced Computing, Networking and Informatics, Smart Innovation, Systems and Technologies, vol.27, pp.205-211, 2014.
- D. H. Deshmukh, T. Ghorpade, P. Padiya, "Intrusion detection system by improved preprocessing methods and Naive Bayes classifier using NSL-KDD 99 Dataset," in Proc. of 2014 International Conference on Electronics and Communication Systems (ICECS), pp.1-7, 2014.
- M. S. Pervez, and D. Md. Farid, "Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs," in Proc. of the 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014), pp.1-6, 2014.
- N. Paulauskas, J. Auskalnis, "Analysis of data pre-processing influence on intrusion detection using NSL-KDD dataset," in Proc. of 2017 Open Conference of Electrical, Electronic and Information Sciences (eStream), pp.1-5, 2017.
- C. Yin, Y. Zhu, J. Fei, and X. He, "A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks," IEEE Access, vol.5, pp.21954-21961, 2017.
- S. T. Ikram, A. K. Cherukuri, "Intrusion detection model using fusion of chi-square feature selection and multi class SVM," Journal of King Saud University - Computer and Information Sciences, vol.29, no.4, pp.462-472, 2017.
- E. Tufan, C. Tezcan, and C. Acarturk, "Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network," IEEE Access, vol.9, pp.50078-50092, 2021.
- L. Hakim, R. Fatma, Novriandi, "Influence Analysis of Feature Selection to Network Intrusion Detection System Performance Using NSL-KDD Dataset," in Proc. of 2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE), pp.217-220, 2019.