Results 261 to 270 of about 716,322 (331)
Some of the next articles are maybe not open access.

A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks

IEEE Internet of Things Journal, 2021
There has been significant research in incorporating both blockchain and intrusion detection to improve data privacy and detect existing and emerging cyberattacks, respectively.
Osama Alkadi   +3 more
semanticscholar   +1 more source

CGAN-Based Collaborative Intrusion Detection for UAV Networks: A Blockchain-Empowered Distributed Federated Learning Approach

IEEE Internet of Things Journal, 2023
Numerous resource-constrained Internet of Things (IoT) devices make the edge IoT consisting of unmanned aerial vehicles (UAVs) vulnerable to network intrusion. Therefore, it is critical to design an effective intrusion detection system (IDS).
Xiaoqiang He   +4 more
semanticscholar   +1 more source

Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues

Knowledge-Based Systems, 2020
The massive growth of data that are transmitted through a variety of devices and communication protocols have raised serious security concerns, which have increased the importance of developing advanced intrusion detection systems (IDSs).
Arwa Aldweesh, A. Derhab, Ahmed Z. Emam
semanticscholar   +1 more source

DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber–Physical Systems

IEEE Transactions on Industrial Informatics, 2020
The rapid convergence of legacy industrial infrastructures with intelligent networking and computing technologies (e.g., 5G, software-defined networking, and artificial intelligence), have dramatically increased the attack surface of industrial cyber ...
Beibei Li   +5 more
semanticscholar   +1 more source

Backtracking intrusions

Proceedings of the nineteenth ACM symposium on Operating systems principles - SOSP '03, 2003
Analyzing intrusions today is an arduous, largely manual task because system administrators lack the information and tools needed to understand easily the sequence of steps that occurred in an attack. The goal of BackTracker is to identify automatically potential sequences of steps that occurred in an intrusion.
Samuel T. King, Peter M. Chen
openaire   +1 more source

An Intrusion-Tolerant Mechanism for Intrusion Detection Systems

2008 Third International Conference on Availability, Reliability and Security, 2008
In accordance with the increasing importance of intrusion detection systems (IDS), users justifiably demand the trustworthiness of the IDS. However, sophisticated attackers attempt to disable the IDS before they launch a thorough attack. Therefore, to accomplish its function, an IDS should have some mechanism to guarantee uninterrupted detection ...
Liwei Kuang, Mohammad Zulkernine
openaire   +1 more source

X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things

IEEE Internet of Things Journal, 2022
Industrial Internet of Things (IIoT) is a high-value cyber target due to the nature of the devices and connectivity protocols they deploy. They are easy to compromise and, as they are connected on a large scale with high-value data content, the ...
Muna Al-Hawawreh   +2 more
semanticscholar   +1 more source

Intrusion-Tolerant Intrusion Detection System

2004
Recently, numerous studies have focused on multi-agentbased intrusion detection systems (IDSs) in order to detect intrusion behavior more efficiently. However, since an agent is easily subverted by a process that is faulty, a multi-agent based intrusion detection system must be fault tolerant by being able to recover from system crashes, caused either ...
Myung-Kyu Yi, Chong-Sun Hwang
openaire   +1 more source

Anatomy of an Intrusion

IT Professional, 2010
This insider's look at a real, sustained attack against a major, multinational corporation offers lessons learned about how to recognize an attack early, how to respond, and what to do to prevent future attacks.
openaire   +1 more source

Network Intrusion Detection for IoT Security Based on Learning Techniques

IEEE Communications Surveys and Tutorials, 2019
Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn cyberattack exposed the critical fault-lines among smart networks. Security of IoT has become a critical concern.
Nadia Chaabouni   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy