Results 1 to 10 of about 4,480,568 (384)

HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System

open access: yesApplied Sciences, 2023
Attacks on networks are currently the most pressing issue confronting modern society. Network risks affect all networks, from small to large. An intrusion detection system must be present for detecting and mitigating hostile attacks inside networks ...
Emad Ul Haq Qazi   +2 more
doaj   +2 more sources

Fuzzy intrusion detection [PDF]

open access: greenProceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569), 2002
The Fuzzy Intrusion Recognition Engine (FIRE) is a network intrusion detection system that uses fuzzy systems to assess malicious activity against computer networks. The system uses an agent-based approach to separate monitoring tasks. Individual agents perform their own fuzzification of input data sources.
J.E. Dickerson   +3 more
openalex   +3 more sources

Research on Intrusion Detection Based on User Portrait Technology [PDF]

open access: yesMATEC Web of Conferences, 2022
Under the big data scene, the intrusion detection technology has some problems, such as weak data processing ability, difficulty of precise location and so on.
Wang Zhenduo
doaj   +1 more source

E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT [PDF]

open access: yesIEEE/IFIP Network Operations and Management Symposium, 2021
This paper presents a new Network Intrusion Detection System (NIDS) based on Graph Neural Networks (GNNs). GNNs are a relatively new sub-field of deep neural networks, which can leverage the inherent structure of graph-based data. Training and evaluation
Wai Weng Lo   +4 more
semanticscholar   +1 more source

A Novel Deep Learning-Based Intrusion Detection System for IoT Networks

open access: yesDe Computis, 2023
The impressive growth rate of the Internet of Things (IoT) has drawn the attention of cybercriminals more than ever. The growing number of cyber-attacks on IoT devices and intermediate communication media backs the claim.
A. Awajan
semanticscholar   +1 more source

Wireless Network Intrusion Detection Algorithm Based on Multiple Perspectives Hierarchical Clustering [PDF]

open access: yesJisuanji kexue yu tansuo, 2022
Aiming at the problems of high false detection rate, difficult to find unknown attack behavior and high cost of obtaining marked data in existing wireless network intrusion detection algorithms based on supervised learning, this paper proposes an ...
DONG Xinyu, XIE Bin, ZHAO Xusheng, GAO Xinbao
doaj   +1 more source

Toward lightweight intrusion detection systems using the optimal and efficient feature pairs of the Bot-IoT 2018 dataset

open access: yesInternational Journal of Distributed Sensor Networks, 2021
Intrusion detection systems play a vital role in traffic flow monitoring on Internet of Things networks by providing a secure network traffic environment and blocking unwanted traffic packets.
Erman Özer   +2 more
doaj   +1 more source

A Deep Learning Model for Network Intrusion Detection with Imbalanced Data

open access: yesElectronics, 2022
With an increase in the number and types of network attacks, traditional firewalls and data encryption methods can no longer meet the needs of current network security.
Yanfang Fu   +4 more
semanticscholar   +1 more source

HC-DTTSVM: A Network Intrusion Detection Method Based on Decision Tree Twin Support Vector Machine and Hierarchical Clustering

open access: yesIEEE Access, 2023
Network intrusion detection is an important technology in national cyberspace security strategy and has become a research hotspot in various cyberspace security issues in recent years.
Li Zou   +4 more
doaj   +1 more source

Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [PDF]

open access: yesJisuanji kexue, 2021
Intrusion detection plays a vital role in computer network security.Intrusion detection is one of the key technologies of network security and needs to be kept under constant attention.As the network environment becomes more and more complex,network ...
ZHANG Shi-peng, LI Yong-zhong
doaj   +1 more source

Home - About - Disclaimer - Privacy