The International Arab Journal of Information Technology (IAJIT)

Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques

Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule

Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques

Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule

253

Preecha Somwang1, 2 and Woraphon Lilakiatsakun2 1Office of Academic Resources and Information Techno logy, Rajamangala University 

A Cross-Layer Based Intrusion Detection Technique for Wireless Networks

Abstract: In  this paper,  we propose  to design  a  cross-layer b ased  intrusion detection  technique for  wireless networks.  In  this 

A Cross-Layer Based Intrusion Detection Technique for Wireless Networks

Abstract: In  this paper,  we propose  to design  a  cross-layer b ased  intrusion detection  technique for  wireless networks.  In  this 

Intrusion Detection System using Fuzzy Rough Set Feature Selection and Modified KNN Classifier

Balakrishnan Senthilnayaki1, Krishnan Venkatalakshmi2, and Arpputharaj Kannan1 1Department of Information Science and Technology, College of Engineering, Anna University, Chennai 2Departemnt of Electronics and Communication Engineering, University College of Engineering

Parallel Scalable Approximate Matching Algorithm for Network Intrusion Detection Systems

Adnan Hnaif1, Khalid Jaber1, Mohammad Alia1, and Mohammed Daghbosheh2 1Faculty of Science and Information Technology, Al Zaytoonah University of Jordan, Jordan 2Faculty of Science and Information Technology, Irbid National University of Jordan, Jordan

A Lightweight Hybrid Intrusion Detection Framework using Machine Learning for Edge-

Based IIoT Security, Mourade Azrour, Said Benkirane, Mouaad Mohy-Eddine, Hanaa Attou, Maryam Douiba