Results 21 to 30 of about 230,799 (122)

Deep Learning Approach for Intelligent Intrusion Detection System

open access: yesIEEE Access, 2019
Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyberattacks at the network-level and the host-level in a timely and automatic manner.
R. Vinayakumar   +5 more
semanticscholar   +1 more source

Performance Analysis of Intrusion Detection Systems Using a Feature Selection Method on the UNSW-NB15 Dataset

open access: yesJournal of Big Data, 2020
Computer networks intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) are critical aspects that contribute to the success of an organization.
S. M. Kasongo, Yanxia Sun
semanticscholar   +1 more source

Survey of intrusion detection systems: techniques, datasets and challenges

open access: yesCybersecurity, 2019
Cyber-attacks are becoming more sophisticated and thereby presenting increasing challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade the credibility of security services, e.g. data confidentiality, integrity, and
Ansam Khraisat   +3 more
semanticscholar   +1 more source

A Deep Learning Approach to Network Intrusion Detection

open access: yesIEEE Transactions on Emerging Topics in Computational Intelligence, 2018
Network intrusion detection systems (NIDSs) play a crucial role in defending computer networks. However, there are concerns regarding the feasibility and sustainability of current approaches when faced with the demands of modern networks.
Nathan Shone   +3 more
semanticscholar   +1 more source

Intrusion Detection for Secure Social Internet of Things Based on Collaborative Edge Computing: A Generative Adversarial Network-Based Approach

open access: yesIEEE Transactions on Computational Social Systems, 2022
The Social Internet of Things (SIoT) now penetrates our daily lives. As a strategy to alleviate the escalation of resource congestion, collaborative edge computing (CEC) has become a new paradigm for solving the needs of the Internet of Things (IoT). CEC
Laisen Nie   +6 more
semanticscholar   +1 more source

Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey

open access: yesApplied Sciences, 2019
Networks play important roles in modern life, and cyber security has become a vital research area. An intrusion detection system (IDS) which is an important cyber security technique, monitors the state of software and hardware running in the network ...
Hongyu Liu, Bo Lang
semanticscholar   +1 more source

Intrusion detection systems using long short-term memory (LSTM)

open access: yesJournal of Big Data, 2021
An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. It scans a network or a system for a harmful activity or security breaching. IDS protects networks (Network-based
FatimaEzzahra Laghrissi   +3 more
semanticscholar   +1 more source

Innovative Machine Learning Algorithms for Classification and Intrusion Detectionv By IJISRT

open access: yesInternational Journal of Innovative Science and Research Technology
With the escalating sophistication of cyber threats, the need for robust intrusion detection systems has become paramount in safeguarding information systems.
Pankaj Malik   +4 more
semanticscholar   +1 more source

Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: A Systematic Review

open access: yesIEEE Access, 2021
Internet of Things (IoT) technology is prospering and entering every part of our lives, be it education, home, vehicles, or healthcare. With the increase in the number of connected devices, several challenges are also coming up with IoT technology ...
Nivedita Mishra, Sharnil Pandya
semanticscholar   +1 more source

A Deep Learning Approach for Network Intrusion Detection System

open access: yesEAI Endorsed Trans. Security Safety, 2016
A Network Intrusion Detection System (NIDS) helps system administrators to detect network security breaches in their organizations. However, many challenges arise while developing a flexible and efficient NIDS for unforeseen and unpredictable ...
A. Javaid   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy