Results 41 to 50 of about 230,799 (122)

Hybrid Intrusion Detection System for Internet of Things (IoT)

open access: yesDecember, 2020
Internet of things (IoT) is a promising solution to connect and access every device through internet. Every day the device count increases with large diversity in shape, size, usage and complexity.
Dr. S. Smys   +2 more
semanticscholar   +1 more source

Intrusion Detection A Text Mining Based Approach [PDF]

open access: yesarXiv, 2016
Intrusion Detection is one of major threats for organization. The approach of intrusion detection using text processing has been one of research interests which is gaining significant importance from researchers. In text mining based approach for intrusion detection, system calls serve as source for mining and predicting possibility of intrusion or ...
arxiv  

Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks [PDF]

open access: yesarXiv, 2008
In this paper, we present an effective intrusion response engine combined with intrusion detection in ad hoc networks. The intrusion response engine is composed of a secure communication module, a local and a global response module. Its function is based on an innovative tree-based key agreement protocol while the intrusion detection engine is based on
arxiv  

Deep learning approach for Network Intrusion Detection in Software Defined Networking

open access: yesInternational Conference on Wireless Networks and Mobile Communications, 2016
Software Defined Networking (SDN) has recently emerged to become one of the promising solutions for the future Internet. With the logical centralization of controllers and a global network overview, SDN brings us a chance to strengthen our network ...
Tuan A. Tang   +4 more
semanticscholar   +1 more source

Provenance-based Intrusion Detection: Opportunities and Challenges [PDF]

open access: yesarXiv, 2018
Intrusion detection is an arms race; attackers evade intrusion detection systems by developing new attack vectors to sidestep known defense mechanisms. Provenance provides a detailed, structured history of the interactions of digital objects within a system.
arxiv  

When Intrusion Detection Meets Blockchain Technology: A Review

open access: yesIEEE Access, 2018
With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks.
W. Meng   +4 more
semanticscholar   +1 more source

An Adaptive Ensemble Machine Learning Model for Intrusion Detection

open access: yesIEEE Access, 2019
In recent years, advanced threat attacks are increasing, but the traditional network intrusion detection system based on feature filtering has some drawbacks which make it difficult to find new attacks in time.
Xianwei Gao   +4 more
semanticscholar   +1 more source

A Distributed Intrusion Detection System Using Cooperating Agents [PDF]

open access: yesarXiv, 2011
The current intrusion detection systems have a number of problems that limit their configurability, scalability and efficiency. There have been some propositions about distributed architectures based on multiple independent agents working collectively for intrusion detection.
arxiv  

Home - About - Disclaimer - Privacy