encoding schemes. Moreover, the system could be
expanded to cover more intricate network topology
which will enhance the overall security of the system
in cyber security.
ACKNOWLEDGEMENTS
If any, should be placed before the references section
without numbering.
REFERENCES
Abdulboriy, A. J., Shin, S. (2024). An Incremental Majority
Voting Approach for Intrusion Detection System Based
on Machine Learning. in IEEE Access, vol. 12, pp.
18972-18986.
Azam, Z., Islam, M. M., Huda, M. N. (2023). Comparative
Analysis of Intrusion Detection Systems and Machine
Learning-Based Model Analysis Through Decision
Tree. in IEEE Access, vol. 11, pp. 80348-80391.
Bilot, T., Madhoun, N. E., Agha, K. A., Zouaoui, A. (2023).
Graph Neural Networks for Intrusion Detection: A
Survey. in IEEE Access, vol. 11, pp. 49114-49139.
Cengiz, K., Lipsa, S., Dash, R. K., Ivković, N., Konecki, M.
(2024). A Novel Intrusion Detection System Based on
Artificial Neural Network and Genetic Algorithm With
a New Dimensionality Reduction Technique for UAV
Communication. in IEEE Access, vol. 12, pp. 4925-
4937.
Du, L., Gu, Z., Wang, Y., Wang, L., Jia, Y. (2024). A Few-
Shot Class-Incremental Learning Method for Network
Intrusion Detection. in IEEE Transactions on Network
and Service Management, vol. 21, no. 2, pp. 2389-2401.
Eljialy, A. E. M., Uddin, M. Y., Ahmad, S. (2024). Novel
Framework for an Intrusion Detection System Using
Multiple Feature Selection Methods Based on Deep
Learning. Tsinghua Science and Technology, Vol. 29
Issue. 4. Page: 948 - 958.
Fouad, N., Hameed, S. M. (2022). Genetic Algorithm based
Clustering for Intrusion Detection Iraqi. Journal of
Science, 58(2B): 929-938.
Gupta, A., Kalra, M. (2020). Intrusion Detection and
Prevention system using Cuckoo search algorithm with
ANN in Cloud Computing. 2020 Sixth International
Conference on Parallel, Distributed and Grid
Computing (PDGC), Waknaghat, India, pp. 66-72.
Han, Y., Wang, Y., Cao, Y., Geng, Z., Zhu, Q. (2023). A
Novel Wrapped Feature Selection Framework for
Developing Power System Intrusion Detection Based on
Machine Learning Methods. in IEEE Transactions on
Systems, Man, and Cybernetics: Systems, vol. 53, no. 11,
pp. 7066-7076.
Jayalatchumy, D., Ramalingam, R., Balakrishnan, A.,
Safran, M., Alfarhood, S. (2024). Improved Crow
Search-Based Feature Selection and Ensemble Learning
for IoT Intrusion Detection. in IEEE Access, vol. 12, pp.
33218-33235.
Li, S., Cao, Y., Hadi, H. J., Hao, F., Hussain, F. B., Chen, L.
(2024). ECF-IDS: An Enhanced Cuckoo Filter-Based
Intrusion Detection System for In-Vehicle Network. in
IEEE Transactions on Network and Service
Management, vol. 21, no. 4, pp. 3846-3860.
Li, Z., Wang, P., Wang, Z. (2024). FlowGANAnomaly:
Flow-Based Anomaly Network Intrusion Detection with
Adversarial Learning. in Chinese. Journal of
Electronics, vol. 33, no. 1, pp. 58-71.
Nallakaruppan, M. K., Somayaji, S. R. K., Fuladi, S.,
Benedetto, F., Ulaganathan, S. K., Yenduri, G. (2024).
Enhancing Security of Host-Based Intrusion Detection
Systems for the Internet of Things. in IEEE Access, vol.
12, pp. 31788-31797.
Osa, E., Orukpe, P. E., Iruansi, U. (2024). Design and
implementation of a deep neural network approach for
intrusion detection systems. e-Prime Advances in
Electrical Engineering, Electronics and Energy,
Volume 7.
Pirozmand, P., Ghafary, M. A., Siadat, S., Ren, J. (2020).
Intrusion detection into cloud-fog-based iot networks
using game theory. Wireless Communications and
Mobile Computing, 1-9.
Rashid, O. F., Othman, Z. A., Zainudin, S. (2019). Features
Selection for Intrusion Detection System Based on DNA
Encoding. In: Piuri V., Balas V., Borah S., Syed Ahmad
S. (eds) Intelligent and Interactive Computing. Lecture
Notes in Networks and Systems, vol 67. Springer,
Singapore.
Saikam, J., Ch, K. (2024). EESNN: Hybrid Deep Learning
Empowered Spatial–Temporal Features for Network
Intrusion Detection System. in IEEE Access, vol. 12, pp.
15930-15945.
Shivhare, A., Singh, V. K., Kumar, M. (2020).
Anticomplementary triangles for efficient coverage in
sensor network-based IoT. IEEE Systems Journal,
14(4), 4854-4863.
Singh, V. K., Singh, C., Raza, H. (2022). Event
classification and intensity discrimination for forest fire
inference with IoT. IEEE Sensors Journal, 22(9), 8869-
8880.
Subhi, M. A., Rashid, O. F., Abdulsahib, S. A., Hussein, M.
K., Mohammed, S. M. (2024). Anomaly Intrusion
Detection Method based on RNA Encoding and
ResNet50 Model. Mesopotamian Journal of
CyberSecurity, 4 (2), pp. 120 - 128.
Tripathi, G., Singh, V. K., Sharma, V., Vinodbhai, M. V.
(2024). Weighted Feature Selection for Machine
Learning Based Accurate Intrusion Detection in
Communication Networks. in IEEE Access, vol. 12, pp.
20973-20982.
Xu, H., Sun, L., Fan, G., Li, W., Kuang, G. (023). A
Hierarchical Intrusion Detection Model Combining
Multiple Deep Learning Models With Attention
Mechanism. in IEEE Access, vol. 11, pp. 66212-66226.
Yang, X., Deb, S. (2010). Engineering Optimisation by
Cuckoo Search. International Journal of Mathematical
Modelling and Numerical Optimisation, vol. 1, no. 4.