Results 311 to 320 of about 700,206 (362)

A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks

IEEE Internet of Things Journal, 2021
There has been significant research in incorporating both blockchain and intrusion detection to improve data privacy and detect existing and emerging cyberattacks, respectively.
Osama Alkadi   +3 more
semanticscholar   +1 more source

X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things

IEEE Internet of Things Journal, 2022
Industrial Internet of Things (IIoT) is a high-value cyber target due to the nature of the devices and connectivity protocols they deploy. They are easy to compromise and, as they are connected on a large scale with high-value data content, the ...
Muna Al-Hawawreh   +2 more
semanticscholar   +1 more source

DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber–Physical Systems

IEEE Transactions on Industrial Informatics, 2020
The rapid convergence of legacy industrial infrastructures with intelligent networking and computing technologies (e.g., 5G, software-defined networking, and artificial intelligence), have dramatically increased the attack surface of industrial cyber ...
Beibei Li   +5 more
semanticscholar   +1 more source

Overview of intrusion detection and intrusion prevention

Proceedings of the 5th annual conference on Information security curriculum development, 2008
This report provides an overview of IPS systems. In the first section a comparison of IDS and IPS is made, where an IPS system is defined as an integration of IDS and a firewall. The second section describes what is needed to set up an IPS system. In the third section, IPS alternatives are discussed for different types of organizations.
Meg Murray, Mario Guimaraes
openaire   +2 more sources

Intrusion-Tolerant Intrusion Detection System [PDF]

open access: possible, 2004
Recently, numerous studies have focused on multi-agentbased intrusion detection systems (IDSs) in order to detect intrusion behavior more efficiently. However, since an agent is easily subverted by a process that is faulty, a multi-agent based intrusion detection system must be fault tolerant by being able to recover from system crashes, caused either ...
Chong-Sun Hwang, Myung-Kyu Yi
openaire   +1 more source

Backtracking intrusions

Proceedings of the nineteenth ACM symposium on Operating systems principles - SOSP '03, 2003
Analyzing intrusions today is an arduous, largely manual task because system administrators lack the information and tools needed to understand easily the sequence of steps that occurred in an attack. The goal of BackTracker is to identify automatically potential sequences of steps that occurred in an intrusion.
Peter M. Chen, Samuel T. King
openaire   +3 more sources

ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets

IEEE Internet of Things Journal, 2021
The Internet of Things (IoT) is reshaping our connected world as the number of lightweight devices connected to the Internet is rapidly growing. Therefore, high-quality research on intrusion detection in the IoT domain is essential.
Tim M. Booij   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy