Results 1 to 10 of about 404,854 (339)
Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks [PDF]
Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes ...
Barborak+24 more
arxiv +8 more sources
Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network [PDF]
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system ...
A. F. M. Sultanul Kabir+2 more
arxiv +4 more sources
Fuzzy intrusion detection [PDF]
The Fuzzy Intrusion Recognition Engine (FIRE) is a network intrusion detection system that uses fuzzy systems to assess malicious activity against computer networks. The system uses an agent-based approach to separate monitoring tasks. Individual agents perform their own fuzzification of input data sources.
J.E. Dickerson+3 more
openalex +3 more sources
Research on Intrusion Detection Based on User Portrait Technology [PDF]
Under the big data scene, the intrusion detection technology has some problems, such as weak data processing ability, difficulty of precise location and so on.
Wang Zhenduo
doaj +1 more source
Intrusion Detection Systems for Community Wireless Mesh Networks [PDF]
Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive.
D. Eppstein+8 more
core +19 more sources
Wireless Network Intrusion Detection Algorithm Based on Multiple Perspectives Hierarchical Clustering [PDF]
Aiming at the problems of high false detection rate, difficult to find unknown attack behavior and high cost of obtaining marked data in existing wireless network intrusion detection algorithms based on supervised learning, this paper proposes an ...
DONG Xinyu, XIE Bin, ZHAO Xusheng, GAO Xinbao
doaj +1 more source
Intrusion detection systems play a vital role in traffic flow monitoring on Internet of Things networks by providing a secure network traffic environment and blocking unwanted traffic packets.
Erman Özer+2 more
doaj +1 more source
Network intrusion detection is an important technology in national cyberspace security strategy and has become a research hotspot in various cyberspace security issues in recent years.
Li Zou+4 more
doaj +1 more source
Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [PDF]
Intrusion detection plays a vital role in computer network security.Intrusion detection is one of the key technologies of network security and needs to be kept under constant attention.As the network environment becomes more and more complex,network ...
ZHANG Shi-peng, LI Yong-zhong
doaj +1 more source
HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System
Attacks on networks are currently the most pressing issue confronting modern society. Network risks affect all networks, from small to large. An intrusion detection system must be present for detecting and mitigating hostile attacks inside networks ...
Emad Ul Haq Qazi+2 more
doaj +1 more source