<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Politeknik Dergisi</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2147-9429</issn>
                                                                                            <publisher>
                    <publisher-name>Gazi Üniversitesi</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.2339/politeknik.1340515</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Deep Learning</subject>
                                                            <subject>Machine Learning (Other)</subject>
                                                            <subject>Knowledge Representation and Reasoning</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Derin Öğrenme</subject>
                                                            <subject>Makine Öğrenme (Diğer)</subject>
                                                            <subject>Bilgi Temsili ve Akıl Yürütme</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <article-title>Detecting the Cyber Attacks on IoT-Based Network Devices Using Machine Learning Algorithms</article-title>
                                                                                                                                                                                                <trans-title-group xml:lang="tr">
                                    <trans-title>Makine Öğrenimi Algoritmaları Kullanılarak IoT Tabanlı Ağ Cihazlarına Yönelik Siber Saldırıların Tespiti</trans-title>
                                </trans-title-group>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0001-7991-438X</contrib-id>
                                                                <name>
                                    <surname>Calp</surname>
                                    <given-names>M. Hanefi</given-names>
                                </name>
                                                                    <aff>ANKARA HACI BAYRAM VELİ ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-9778-2349</contrib-id>
                                                                <name>
                                    <surname>Bütüner</surname>
                                    <given-names>Resul</given-names>
                                </name>
                                                                    <aff>Ankara Beypazarı Fatih Vocational and Technical Anatolian High School</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20241002">
                    <day>10</day>
                    <month>02</month>
                    <year>2024</year>
                </pub-date>
                                        <volume>27</volume>
                                        <issue>5</issue>
                                        <fpage>1971</fpage>
                                        <lpage>1989</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20230810">
                        <day>08</day>
                        <month>10</month>
                        <year>2023</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20231006">
                        <day>10</day>
                        <month>06</month>
                        <year>2023</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 1998, Politeknik Dergisi</copyright-statement>
                    <copyright-year>1998</copyright-year>
                    <copyright-holder>Politeknik Dergisi</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>Today, the number and variety of cyber-attacks on all systems have increased with the widespread use of internet technology. Within these systems, Internet of Things (IoT)-based network devices are especially exposed to a lot of cyber-attacks and are vulnerable to these attacks. This adversely affects the operation of the devices in question, and the data is endangered due to security vulnerabilities. Therefore, in this study, a model that detects cyber-attacks to ensure security with machine learning (ML) algorithms were proposed by using the data obtained from the log records of an IoT-based system. For this, first, the dataset was created, and this dataset was preprocessed and prepared in accordance with the models. Then, Artificial Neural Network (ANN), Random Forest (RF), K-Nearest Neighbor (KNN), Naive Bayes (NB), and Logistic Regression (LR) algorithms were used to create the models. As a result, the best performance to detect cyber-attacks was obtained using the RF algorithm with a rate of 99.6%. Finally, the results obtained from all the models created were compared with other academic studies in the literature and it was seen that the proposed RF model produced very successful results compared to the others. Moreover, this study showed that RF was a promising method of attack detection.</p></abstract>
                                                                                                                                    <trans-abstract xml:lang="tr">
                            <p>Günümüzde internet teknolojisinin yaygınlaşmasıyla birlikte tüm sistemlere yönelik siber saldırıların sayısı ve çeşidi artmıştır. Bu sistemler içerisinde özellikle Nesnelerin İnterneti (IoT) tabanlı ağ cihazları çok sayıda siber saldırıya maruz kalmakta ve bu saldırılara karşı savunmasız kalmaktadır. Bu durum söz konusu cihazların çalışmasını olumsuz etkilemekte ve güvenlik açıkları nedeniyle veriler tehlikeye girmektedir. Bu nedenle bu çalışmada IoT tabanlı bir sistemin log kayıtlarından elde edilen veriler kullanılarak makine öğrenmesi (ML) algoritmaları ile güvenliği sağlamak için siber saldırıları tespit eden bir model önerilmiştir. Bunun için öncelikle veriseti oluşturulmuş ve bu veriseti ön işleme tabi tutularak modellere uygun olarak hazırlanmıştır. Ardından modelleri oluşturmak için Yapay Sinir Ağı (YSA), Rastgele Orman (RF), K-En Yakın Komşu (KNN), Naive Bayes (NB) ve Lojistik Regresyon (LR) algoritmaları kullanılmıştır. Sonuç olarak, siber saldırıları tespit etmede en iyi performans %99.6 ile RF algoritması kullanılarak elde edilmiştir. Son olarak oluşturulan tüm modellerden elde edilen sonuçlar literatürdeki diğer akademik çalışmalarla karşılaştırılmış ve önerilen RF modelinin diğerlerine göre oldukça başarılı sonuçlar ürettiği görülmüştür. Ayrıca, bu çalışma RF&#039;nin gelecek vaat eden bir saldırı tespit yöntemi olduğunu göstermiştir.</p></trans-abstract>
                                                            
            
                                                            <kwd-group>
                                                    <kwd>Internet of things</kwd>
                                                    <kwd>  network devices</kwd>
                                                    <kwd>  security</kwd>
                                                    <kwd>  cyber-attack</kwd>
                                                    <kwd>  machine learning</kwd>
                                            </kwd-group>
                                                        
                                                                            <kwd-group xml:lang="tr">
                                                    <kwd>Nesnelerin interneti</kwd>
                                                    <kwd>  ağ cihazları</kwd>
                                                    <kwd>  güvenlik</kwd>
                                                    <kwd>  siber saldırı</kwd>
                                                    <kwd>  makine öğrenimi</kwd>
                                            </kwd-group>
                                                                                                            </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1]	Scarfone, K., Mell P, “Guide to intrusion detection and prevention systems (IDPS)”, NIST, ABD, (2007).</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2]	Ganapathy, S., Kulothungan K., Muthurajkumar S.,Vijayalakshmi M., Yogesh P. &amp; Kannan A., “Intelligent feature selection and classification techniques for intrusion detection in networks: a survey”, EURASIP Journal on Wireless Communications and Networking, 1:273-289, (2013).</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3]	Kolias, C., Kambourakis G. &amp; Maragoudakis M, “Swarm Intelligence in Intrusion Detection: A Survey”, Computers and Security, 30 (8): 625-642, (2011).</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4]	Behera, S., Pradhan, A., &amp; Dash, R. “Deep neural network architecture for anomaly based intrusion detection system”. In 2018 5th International Conference on Signal Processing and Integrated Networks (SPIN) (pp. 270-274). IEEE, (2018, February).</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5]	Aksu, D., &amp; Aydin, M. A. “Detecting port scan attempts with comparative analysis of deep learning and support vector machine algorithms”. In 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT) (pp. 77-80). IEEE, (2018, December).</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6]	Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A., &amp; Venkatraman, S. “Deep learning approach for intelligent intrusion detection system”. IEEE Access, 7: 41525-41550, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7]	Hajisalem, V., Babaie, S., “A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection”, Computer Networks, 136: 37-50, (2018).</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8]	Inayat, Z., Gani, A., Anuar, N. B., Khan, M. K. &amp; Anwar, S., “Intrusion response systems: Foundations, design, and challenges”, Journal of Network and Computer Applications, 62: 53-74, (2016).</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9]	Ashoor, A. S., Gore, S., “Difference between intrusion detection system (IDS) and intrusion prevention system (IPS)”, In International Conference on Network Security and Applications, 497-501, Berlin, Heidelberg, (2011).</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10]	Jabez, J., Muthukumar, B., “Intrusion detection system (IDS): anomaly detection using outlier detection approach”, Procedia Computer Science, 48: 338-346, (2015).</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11]	Quepons, I., “Vulnerability and Trust”, PhaenEx, 13, 2: 1-10, (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12]	Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G. &amp; Vázquez, E., “Anomaly-based network intrusion detection: Techniques, systems and challenges”, Computers and Security, 28: 1-2, 18-28, (2009).</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13]	Iman Sharafaldin, Arash Habibi Lashkari, and Ali A. Ghorbani, “Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization”, in ICISSP, Prague, Czech Republic, pp. 108-116, (2018).</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14]	Ozgur, A., &amp; Erdem, H. “Feature selection and multiple classifier fusion using genetic algorithms in intrusion detection systems”, Journal of the Faculty of Engineering and Architecture of Gazi University, 3(1), (2018).</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15]	Demir, F. “Investigation of performance of ML methods for cyber-attack detection””, Journal of Balikesir University Institute of Science, 23(2): 782-791, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16]	Gazel, S. E. R., &amp; Bati, C. T. Determining the Best Model with Deep Neural Networks:  Keras Application on Mushroom Data”, YYU Journal of Agricultural Science, 29(3): 406-417, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17]	Pehlivanoglu, M. K., Remzi, A. T. A. Y., &amp; Odabas, D. E. “İki Seviyeli Hibrit Makine Öğrenmesi Yöntemi İle Saldırı Tespiti”, Gazi Mühendislik Bilimleri Dergisi (GMBD), 5(3): 258-272, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18]	Cakir, B., &amp; Angin, P. “Cyber Attack Detection Using Temporal Convolutional Networks: A Comparative Analysis”. European Journal of Science and Technology, 22: 204-211, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">[19]	Hatipoğlu, C., &amp; Tunacan, T. Hatipoglu, C., &amp; Tunacan, T. “Cyber Attacks and Detection Method in Turkey: A Literature Review”. BSEU Journal of Science, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">[20]	Aytan, B., &amp; Barisci, N. “Siber Savunma Alanında Yapay Zekâ Tabanlı Saldırı Tespiti ve Analizi”. In Proceeding of the 2nd International Symposium on Innovative Approaches in Scientific Studies, Samsun, (2018, December).</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">[21]	Gurmen, C. “Performance comparison of ML methods for attack Detection systems”, (Master&#039;s thesis, institute of science), (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">[22]	Karimipour, H., Dehghantanha, A., Parizi, R. M., Choo, K. K. R., &amp; Leung, H., “A deep and scalable unsupervised ML system for cyber-attack detection in large-scale smart grids”. IEEE Access, 7: 80778-80788, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">[23]	Kavousi-Fard, A., Su, W., &amp; Jin, T. “A machine-learning-based cyber attack detection model for wireless sensor networks in microgrids”. IEEE Transactions on Industrial Informatics, 17(1): 650-658, (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">[24]	Mousavinejad, E., Yang, F., Han, Q. L., &amp; Vlacic, L. “A novel cyber-attack detection method in networked control systems”, IEEE transactions on cybernetics, 48(11): 3254-3264, (2018).</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">[25]	AlZubi, A. A., Al-Maitah, M., &amp; Alarifi, A. “Cyber-attack detection in healthcare using cyber-physical system and ML techniques”. Soft Computing, 25(18):  12319-12332, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">[26]	Smys, S. “DDOS attack detection in telecommunication network using ML”. Journal of Ubiquitous Computing and Communication Technologies (UCCT), 1(01): 33-44, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">[27]	Asharf, J., Moustafa, N., Khurshid, H., Debie, E., Haider, W., &amp; Wahab, A. “A review of intrusion detection systems using machine and deep learning in internet of things: challenges, solutions and future directions”. Electronics, 9(7): 1177, (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">[28]	Rashid, M. M., Kamruzzaman, J., Hassan, M. M., Imam, T., &amp; Gordon, S. “Cyberattacks detection in IoT-based smart city applications using ML techniques”. International Journal of environmental research and public health, 17(24): 9347, (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">[29]	Alsamiri, J., &amp; Alsubhi, K. “Internet of things cyber-attacks detection using ML”. Int. J. Adv. Comput. Sci. Appl, 10(12): 627-634, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">[30]	Dutta, V., Choraś, M., Pawlicki, M., &amp; Kozik, R. “A deep learning ensemble for network anomaly and cyber-attack detection”. Sensors, 20(16): 4583, (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">[31]	Awan, M. J., Farooq, U., Babar, H. M. A., Yasin, A., Nobanee, H., Hussain, M., ... &amp; Zain, A. M. “Real-time DDoS attack detection system using big data approach”. Sustainability, 13(19): 10743, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">[32]	Wu, M., Song, Z., &amp; Moon, Y. B. “Detecting cyber-physical attacks in CyberManufacturing systems with ML methods”. Journal of intelligent manufacturing, 30(3): 1111-1123, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">[33]	Savaş, T. &amp; Savaş, S. “Tekdüzen Kaynak Bulucu Yoluyla Kimlik Avı Tespiti için Makine Öğrenmesi Algoritmalarının Özellik Tabanlı Performans Karşılaştırması”. Politeknik Dergisi , 25 (3): 1261-1270 . DOI: 10.2339/politeknik.1035286, (2022).</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">[34]	Catania C.A., Garino C.G., “Automatic network intrusion detection: Current techniques and open issues”, Computers &amp; Electrical Engineering, 38 (5): 1062-1072, (2012).</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">[35]	Hubballi N., Suryanarayanan V., “False alarm minimization techniques in signature-based intrusion detection systems: A survey”, Computer Communications, 49: 1-17, (2014).</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">[36]	Cunningham R.K., Lippmann R.P., Fried D.J., Garfinkel S.L., Graf I. , Kendall K., Wyschogrod D. &amp; Zissman M.A., “Evaluating intrusion detection systems without attacking your friends: The 1998 DARPA intrusion detection evaluation”, (1999).</mixed-citation>
                    </ref>
                                    <ref id="ref37">
                        <label>37</label>
                        <mixed-citation publication-type="journal">[37]	Tavallaee M., Bagheri E., Lu W. &amp; Ghorbani A.A., “A detailed analysis of the KDD CUP 99 dataset”, Proceedings of the Second IEEE international conference on Computational intelligence for security and defense applications, Piscataway, NJ, USA, (2009).</mixed-citation>
                    </ref>
                                    <ref id="ref38">
                        <label>38</label>
                        <mixed-citation publication-type="journal">[38]	NSL-KDD, “Download Link of NSL-KDD in Github”. https://github.com/ati-ozgur/NSL_KDD. January 17, (2017). Access Date: 02 February 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref39">
                        <label>39</label>
                        <mixed-citation publication-type="journal">[39]	Özgür A., Erdem H., “A Review of KDD99 Dataset Usage in Intrusion Detection and ML between 2010 and 2015”, PeerJ Preprints 4:e1954v1, (2016).</mixed-citation>
                    </ref>
                                    <ref id="ref40">
                        <label>40</label>
                        <mixed-citation publication-type="journal">[40]	Marquez-Viloria, D., Castano-Londono, L., &amp; Guerrero-Gonzalez, N., “A Modified KNN Algorithm for High-Performance Computing on FPGA of Real-Time m-QAM Demodulators”. Electronics, 10(5): 627., (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref41">
                        <label>41</label>
                        <mixed-citation publication-type="journal">[41]	Rottondi, C. Barletta, L. Giusti, A. Tornatore, M. “Machine-Learning Method for Quality of Transmission Prediction of Unestablished Lightpaths”. J. Opt. Commun. Netw., 10: A286–A297, (2018).</mixed-citation>
                    </ref>
                                    <ref id="ref42">
                        <label>42</label>
                        <mixed-citation publication-type="journal">[42]	Pérez, A.E., Torres, J.J.G., González, N.G. “KNN-based Demodulation in gridless Nyquist-WDM Systems affected by Interchannel Interference”. In Proceedings of the OSA Advanced Photonics Congress (AP) 2019 (IPR, Networks, NOMA, SPPCom, PVLED), Burlingame, CA, USA, 29 July–1 August 2019; p. SpTh1E.3, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref43">
                        <label>43</label>
                        <mixed-citation publication-type="journal">[43]	Han, J., Pei, J., Kamber, M. “Data mining: concepts and techniques. Massachusetts”, USA: Morgan Kaufmann Publishers. 978-0-12-381479-1, (2011).</mixed-citation>
                    </ref>
                                    <ref id="ref44">
                        <label>44</label>
                        <mixed-citation publication-type="journal">[44]	Breiman, L., “Random Forests”, ML, Kluwer Academic Publishers, 45(1): 5-32, (2001).</mixed-citation>
                    </ref>
                                    <ref id="ref45">
                        <label>45</label>
                        <mixed-citation publication-type="journal">[45]	Resende, P. A. A., &amp; Drummond, A. C. “A survey of random forest based methods for intrusion detection systems”. ACM Computing Surveys (CSUR), 51(3): 1-36, (2018).</mixed-citation>
                    </ref>
                                    <ref id="ref46">
                        <label>46</label>
                        <mixed-citation publication-type="journal">[46]	Akar, O., Gungor, O., “Classification of multispectral images using Random Forest algorithm”, Journal of Geodesy and Geoinformation. 1 (2): 139-146. DOI: 10.9733/jgg.241212.1t, (2012).</mixed-citation>
                    </ref>
                                    <ref id="ref47">
                        <label>47</label>
                        <mixed-citation publication-type="journal">[47]	Archer, K.J., “Empirical Characterization of Random Forest Variable Importance Measure, Computational Statistical Data Analysis”, Computational Statistics &amp; Data Analysis, 52(4): 2249-2260, (2008).</mixed-citation>
                    </ref>
                                    <ref id="ref48">
                        <label>48</label>
                        <mixed-citation publication-type="journal">[48]	Calp, M. H., &amp; Kose, U. “Estimation of burned areas in forest fires using artificial neural networks”. Ingeniería Solidaria, 16(3): 1-22, (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref49">
                        <label>49</label>
                        <mixed-citation publication-type="journal">[49]	Calp, M. H. “An estimation of personnel food demand quantity for businesses by using artificial neural networks”, Journal of Polytechnic, 22(3): 675-686, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref50">
                        <label>50</label>
                        <mixed-citation publication-type="journal">[50]	Bayram, S., Kaplan, K., Kuncan, M., Ertunç H. M.. “Ball Bearings space of time Statistical Feature Extraction and Neural Networks with Error Estimation Method Size”, Automatic Control National Meeting, TOK2013, Malatya, 26-28 September, (2013).</mixed-citation>
                    </ref>
                                    <ref id="ref51">
                        <label>51</label>
                        <mixed-citation publication-type="journal">[51]	Öztemel, E. “Yapay sinir ağları”, PapatyaYayincilik, Istanbul, (2003).</mixed-citation>
                    </ref>
                                    <ref id="ref52">
                        <label>52</label>
                        <mixed-citation publication-type="journal">[52]	Deng, H., Sun, Y., Chang, Y., Han, J., “Probabilistic Models for Classification”. C.C. Aggarwal (Eds.), Data Classification Algorithms and Applications (pp. 67-70), CRC Press, New York, USA, (2015).</mixed-citation>
                    </ref>
                                    <ref id="ref53">
                        <label>53</label>
                        <mixed-citation publication-type="journal">[53]	Bayes, T., LII. “An essay towards solving a problem in the doctrine of chances”. By the late Rev. Mr. Bayes, FRS communicated by Mr. Price, in a letter to John Canton, AMFR S. Philosophical transactions of the Royal Society of London, 1763(53): 370-418, (1958).</mixed-citation>
                    </ref>
                                    <ref id="ref54">
                        <label>54</label>
                        <mixed-citation publication-type="journal">[54]	Yildiz, H.K., et al. “A new feature extraction method for text classification”. in 2007 IEEE 15th Signal Processing and Communications Applications. June 2007. Eskisehir, Turkey: IEEE. DOI: 10.1109/SIU.2007.4298870, (2007).</mixed-citation>
                    </ref>
                                    <ref id="ref55">
                        <label>55</label>
                        <mixed-citation publication-type="journal">[55]	Hosmer, D. W., Lemeshow, S., “Applied Logistic Regression”, John Wiley &amp; Sons, New York, 5-50 (1989).</mixed-citation>
                    </ref>
                                    <ref id="ref56">
                        <label>56</label>
                        <mixed-citation publication-type="journal">[56]	Kleinbaum, G., D., “A Self-learning Text Logistic Regression”, Springer, Atlanta, (1994).</mixed-citation>
                    </ref>
                                    <ref id="ref57">
                        <label>57</label>
                        <mixed-citation publication-type="journal">[57]	Kaya, Y., “Predictive modeling in motor caravan insurance and comparison of methods applied”, (Master&#039;s thesis), Graduate School of Natural and Applied Sciences, Beykent University, Istanbul, (2017).</mixed-citation>
                    </ref>
                                    <ref id="ref58">
                        <label>58</label>
                        <mixed-citation publication-type="journal">[58]	Tunç, Ü., Atalar, E., Gargi, M. S., Ergül Aydin, Z. “Classification of Fake, Bot, and Real Accounts on Instagram Using Machine Learning”. Politeknik Dergisi, 1-1. https://doi.org/10.2339/politeknik.1136226, (2023).</mixed-citation>
                    </ref>
                                    <ref id="ref59">
                        <label>59</label>
                        <mixed-citation publication-type="journal">[59]	Pereira C.R., Nakamura R.Y.M., K., Costa A.P. &amp; Papa J.P., “An Optimum-Path Forest framework for intrusion detection in computer networks”, Engineering Applications of Artificial Intelligence, 25: 1226-1234, (2012).</mixed-citation>
                    </ref>
                                    <ref id="ref60">
                        <label>60</label>
                        <mixed-citation publication-type="journal">[60]	Mohammadi M., Raahemi B., Akbari A. &amp; Nassersharif B., “New class-dependent feature transformation for intrusion detection systems”, Security and Communication Networks, 5: 1296-1311, (2012).</mixed-citation>
                    </ref>
                                    <ref id="ref61">
                        <label>61</label>
                        <mixed-citation publication-type="journal">[61]	Seresht N.A., Azmi R., “MAIS-IDS: A distributed intrusion detection system using multi-agent AIS approach”, Engineering Applications of Artificial Intelligence, 35: 286-298, (2014).</mixed-citation>
                    </ref>
                                    <ref id="ref62">
                        <label>62</label>
                        <mixed-citation publication-type="journal">[62]	Farid D.M., Zhang L., Rahman C.M., Hossain M.A. &amp; Strachan R., “Hybrid decision tree and naïve Bayes classifiers for multi-class classification tasks”, Expert Systems with Applications, 41: 1937-1946, (2014).</mixed-citation>
                    </ref>
                                    <ref id="ref63">
                        <label>63</label>
                        <mixed-citation publication-type="journal">[63]	Rastegari S., Hingston P. &amp; Lam C.P., “Evolving statistical rulesets for network intrusion detection”, Applied Soft Computing, 33: 348-359, (2015).</mixed-citation>
                    </ref>
                                    <ref id="ref64">
                        <label>64</label>
                        <mixed-citation publication-type="journal">[64]	Singh R., Kumar H. &amp; Singla R. K., “An intrusion detection system using network traffic profiling and online sequential extreme learning machine”, Expert Systems with Applications, 42: 8609-8624, (2015).</mixed-citation>
                    </ref>
                                    <ref id="ref65">
                        <label>65</label>
                        <mixed-citation publication-type="journal">[65]	Bhattacharya S., Selvakumar S., “LAWRA: a layered wrapper feature selection approach for network attack detection”, Security and Communication Networks, 8: 3459-3468, (2015).</mixed-citation>
                    </ref>
                                    <ref id="ref66">
                        <label>66</label>
                        <mixed-citation publication-type="journal">[66]	Hoz L.E.D., Ortiz A., Ortega J. &amp; Prieto B., “PCA filtering and probabilistic SOM for network intrusion detection”, Neurocomputing, 164: 71-81, (2015).</mixed-citation>
                    </ref>
                                    <ref id="ref67">
                        <label>67</label>
                        <mixed-citation publication-type="journal">[67]	Kang S.H., Kim K.J., “A feature selection approach to find optimal feature subsets for the network intrusion detection system”, Cluster Computing, 19: 325-333, (2016).</mixed-citation>
                    </ref>
                                    <ref id="ref68">
                        <label>68</label>
                        <mixed-citation publication-type="journal">[68]	Liu Q., Yin J., Leung V.C.M., Zhai J.H., Cai Z. &amp; Lin J., “Applying a new localized generalization error model to design neural networks trained with extreme learning machine”, Neural Computing and Applications, 27: 59- 66, (2016).</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
