2023
DOI: 10.3390/app131911067
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Feature Selection Approach to Classify Intrusion Attacks in Network Communications

Merve Ozkan-Okay,
Refik Samet,
Ömer Aslan
et al.

Abstract: The fast development of communication technologies and computer systems brings several challenges from a security point of view. The increasing number of IoT devices as well as other computing devices make network communications more challenging. The number, sophistication, and severity of network-related attacks are growing rapidly. There are a variety of different attacks including remote-to-user (R2L), user-to-remote (U2R), denial of service (DoS), distributed DDoS, and probing. Firewalls, antivirus scanner… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 50 publications
(48 reference statements)
0
4
0
Order By: Relevance
“…The VPP devised for this research is structured as a composite system, comprising both a physical layer and a cyber layer [4]. The physical layer, analogous to conventional VPP configurations, encompasses a variety of components, namely DER units, microgrids, ESSs, loads, conventional power plants, and electric vehicles, all interconnected through a communication network [14,15].…”
Section: System Modeling and Formulationmentioning
confidence: 99%
See 2 more Smart Citations
“…The VPP devised for this research is structured as a composite system, comprising both a physical layer and a cyber layer [4]. The physical layer, analogous to conventional VPP configurations, encompasses a variety of components, namely DER units, microgrids, ESSs, loads, conventional power plants, and electric vehicles, all interconnected through a communication network [14,15].…”
Section: System Modeling and Formulationmentioning
confidence: 99%
“…The parameters n Q i and m P i signify the reactive and active droop coefficients, respectively. In order to mitigate voltage and frequency deviations from their nominal values induced by the primary control, a distributed cooperative control strategy [4] is employed. The control protocols pertinent to this study are implemented through a distributed communication network.…”
Section: System Modeling and Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…In Section 2, NIDS covered various machine learning and deep learning models, as well as binary classification and multiclassification when measuring model performance [15][16][17]. Additionally, research has been conducted on diverse DNN structures and models with applied dropout [13], as well as the performance of models based on various feature selections [25,26]. As this study focuses on backdoor attacks in tabular data, a comparison of performance was conducted among fundamental machine learning models, DNN models, and AlertNet with batch normalization and dropout.…”
Section: Settingmentioning
confidence: 99%
“…With advanced security solutions capable of real-time detection and analysis driven by artificial intelligence, SDN-based SCADA networks can be continuously monitored for suspicious and abnormal activity [10]. By detecting a possible DDoS attack at an earlier stage, secu-rity measures that can reduce the impact of the attack can be taken immediately, and the likelihood of being a direct victim of the attack will be reduced [11].…”
Section: Introductionmentioning
confidence: 99%