Results 11 to 20 of about 230,799 (122)

A Novel Deep Learning-Based Intrusion Detection System for IoT Networks

open access: yesDe Computis, 2023
The impressive growth rate of the Internet of Things (IoT) has drawn the attention of cybercriminals more than ever. The growing number of cyber-attacks on IoT devices and intermediate communication media backs the claim.
A. Awajan
semanticscholar   +1 more source

Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection [PDF]

open access: yesNetwork and Distributed System Security Symposium, 2018
Neural networks have become an increasingly popular solution for network intrusion detection systems (NIDS). Their capability of learning complex patterns and behaviors make them a suitable solution for differentiating between normal traffic and network ...
Yisroel Mirsky   +3 more
semanticscholar   +1 more source

A Deep Learning Model for Network Intrusion Detection with Imbalanced Data

open access: yesElectronics, 2022
With an increase in the number and types of network attacks, traditional firewalls and data encryption methods can no longer meet the needs of current network security.
Yanfang Fu   +4 more
semanticscholar   +1 more source

E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT [PDF]

open access: yesIEEE/IFIP Network Operations and Management Symposium, 2021
This paper presents a new Network Intrusion Detection System (NIDS) based on Graph Neural Networks (GNNs). GNNs are a relatively new sub-field of deep neural networks, which can leverage the inherent structure of graph-based data. Training and evaluation
Wai Weng Lo   +4 more
semanticscholar   +1 more source

An Enhanced Intrusion Detection Model Based on Improved kNN in WSNs

open access: yesItalian National Conference on Sensors, 2022
Aiming at the intrusion detection problem of the wireless sensor network (WSN), considering the combined characteristics of the wireless sensor network, we consider setting up a corresponding intrusion detection system on the edge side through edge ...
Gaoyuan Liu   +5 more
semanticscholar   +1 more source

Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization

open access: yesInternational Conference on Information Systems Security and Privacy, 2018
: With exponential growth in the size of computer networks and developed applications, the significant in-creasing of the potential damage that can be caused by launching attacks is becoming obvious.
Iman Sharafaldin   +2 more
semanticscholar   +1 more source

Network intrusion detection system: A systematic study of machine learning and deep learning approaches

open access: yesTransactions on Emerging Telecommunications Technologies, 2020
The rapid advances in the internet and communication fields have resulted in a huge increase in the network size and the corresponding data. As a result, many novel attacks are being generated and have posed challenges for network security to accurately ...
Zeeshan Ahmad   +4 more
semanticscholar   +1 more source

Cloud Intrusion Detection Method Based on Stacked Contractive Auto-Encoder and Support Vector Machine

open access: yesIEEE Transactions on Cloud Computing, 2022
Security issues have resulted in severe damage to the cloud computing environment, adversely affecting the healthy and sustainable development of cloud computing.
Wenjuan Wang   +4 more
semanticscholar   +1 more source

Deep Learning for Intrusion Detection and Security of Internet of Things (IoT): Current Analysis, Challenges, and Possible Solutions

open access: yesSecurity and Communication Networks, 2022
In the last decade, huge growth is recorded globally in computer networks and Internet of Things (IoT) networks due to the exponential data generation, approximately zettabyte to a petabyte.
Amjad Rehman Khan   +5 more
semanticscholar   +1 more source

A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks

open access: yesIEEE Access, 2017
Intrusion detection plays an important role in ensuring information security, and the key technology is to accurately identify various attacks in the network.
Chuanlong Yin   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy