A comparative evaluation of intrusion detection systems on the edge-IIoT-2022 dataset.
Taraf Al NuaimiSalama Al ZaabiMansor AlyilieliMohd AlMaskariSalim AlblooshiFahad AlhabsiMohd Faizal Bin YusofAhmad Al BadawiPublished in: Intell. Syst. Appl. (2023)
Keyphrases
- comparative evaluation
- intrusion detection system
- intrusion detection
- network security
- anomaly detection
- computer networks
- network traffic
- network intrusion detection
- network intrusion detection systems
- alert correlation
- distributed intrusion detection
- computer systems
- intrusion prevention
- computer security
- database
- attack detection
- misuse detection
- cyber attacks
- network intrusions
- cyber security
- security architecture
- network intrusion
- denial of service attacks
- normal behavior
- information systems
- machine learning