Results 11 to 20 of about 199,623 (310)

Network Intrusion Detection [PDF]

open access: yes, 2011
Attacks against computers and the Internet are in the news every week. These primarily take the form of malicious code such as viruses and worms, or denial of service attacks. Less commonly reported are attacks which gain access to computers, either for the purpose of producing damage (such as defacing web sites or deleting data) or for the ...
Yong Shi   +5 more
openaire   +4 more sources

Intrusion and intrusion detection [PDF]

open access: yesInternational Journal of Information Security, 2001
Summary: Assurance technologies for computer security have failed to have significant impacts in the marketplace, with the result that most of the computers connected to the internet are vulnerable to attack. This paper looks at the problem of malicious users from both a historical and practical standpoint.
openaire   +3 more sources

A new intrusion detection and alarm correlation technology based on neural network

open access: yesEURASIP Journal on Wireless Communications and Networking, 2019
With the continuous development of computer networks, the security of the network has become increasingly prominent. A major threat to network security is the intrusion of information systems through the network.
Yansong Liu, Li Zhu
doaj   +1 more source

Fuzzy intrusion detection [PDF]

open access: greenProceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569), 2002
The Fuzzy Intrusion Recognition Engine (FIRE) is a network intrusion detection system that uses fuzzy systems to assess malicious activity against computer networks. The system uses an agent-based approach to separate monitoring tasks. Individual agents perform their own fuzzification of input data sources.
J.E. Dickerson   +3 more
openalex   +3 more sources

GOAMLP: Network Intrusion Detection With Multilayer Perceptron and Grasshopper Optimization Algorithm

open access: yesIEEE Access, 2020
In this paper, an intrusion detection system is introduced that uses data mining and machine learning concepts to detect network intrusion patterns. In the proposed method, an artificial neural network (ANN) is used as a learning technique in intrusion ...
Shadi Moghanian   +3 more
doaj   +1 more source

A taxonomy of malicious traffic for intrusion detection systems [PDF]

open access: yes, 2018
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert   +5 more
core   +3 more sources

INTRUSION DETECTION AND PREVENTION FRAMEWORK USING DATA MINING TECHNIQUES FOR FINANCIAL SECTOR [PDF]

open access: yesActa Informatica Malaysia, 2021
Security becomes the main concern when the resources are shared over a network for many purposes. For ease of use and time saving several services offered by banks and other financial companies are accessible over mobile apps and computers connected with
Gaurav Sharma, Anil Kumar Kapil
doaj   +1 more source

Evaluation of intrusion detection systems [PDF]

open access: yesJournal of Research of the National Institute of Standards and Technology, 2003
This paper presents a comprehensive method for evaluating intrusion detection systems (IDSs). It integrates and extends ROC (receiver operating characteristic) and cost analysis methods to provide an expected cost metric. Results are given for determining the optimal operation of an IDS based on this expected cost metric.
John E. Gaffney, Jacob W. Ulvila
openaire   +2 more sources

An Intrusion Detection Approach based on the Combination of Oversampling and Undersampling Algorithms

open access: yesActa Infologica, 2023
The threat of network intrusion has become much more severe due to the increasing network flow. Therefore, network intrusion detection is one of the most concerned areas of network security.
Ahmet Okan Arık   +1 more
doaj   +1 more source

Intrusion Detection Systems for Community Wireless Mesh Networks [PDF]

open access: yes, 2008
Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive.
Hutchison, David   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy