Results 41 to 50 of about 230,799 (122)
Hybrid Intrusion Detection System for Internet of Things (IoT)
Internet of things (IoT) is a promising solution to connect and access every device through internet. Every day the device count increases with large diversity in shape, size, usage and complexity.
Dr. S. Smys+2 more
semanticscholar +1 more source
Intrusion Detection A Text Mining Based Approach [PDF]
Intrusion Detection is one of major threats for organization. The approach of intrusion detection using text processing has been one of research interests which is gaining significant importance from researchers. In text mining based approach for intrusion detection, system calls serve as source for mining and predicting possibility of intrusion or ...
arxiv
Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks [PDF]
In this paper, we present an effective intrusion response engine combined with intrusion detection in ad hoc networks. The intrusion response engine is composed of a secure communication module, a local and a global response module. Its function is based on an innovative tree-based key agreement protocol while the intrusion detection engine is based on
arxiv
Deep learning approach for Network Intrusion Detection in Software Defined Networking
Software Defined Networking (SDN) has recently emerged to become one of the promising solutions for the future Internet. With the logical centralization of controllers and a global network overview, SDN brings us a chance to strengthen our network ...
Tuan A. Tang+4 more
semanticscholar +1 more source
Provenance-based Intrusion Detection: Opportunities and Challenges [PDF]
Intrusion detection is an arms race; attackers evade intrusion detection systems by developing new attack vectors to sidestep known defense mechanisms. Provenance provides a detailed, structured history of the interactions of digital objects within a system.
arxiv
When Intrusion Detection Meets Blockchain Technology: A Review
With the purpose of identifying cyber threats and possible incidents, intrusion detection systems (IDSs) are widely deployed in various computer networks.
W. Meng+4 more
semanticscholar +1 more source
An Adaptive Ensemble Machine Learning Model for Intrusion Detection
In recent years, advanced threat attacks are increasing, but the traditional network intrusion detection system based on feature filtering has some drawbacks which make it difficult to find new attacks in time.
Xianwei Gao+4 more
semanticscholar +1 more source
A Distributed Intrusion Detection System Using Cooperating Agents [PDF]
The current intrusion detection systems have a number of problems that limit their configurability, scalability and efficiency. There have been some propositions about distributed architectures based on multiple independent agents working collectively for intrusion detection.
arxiv