Results 11 to 20 of about 404,854 (339)
In this paper, an intrusion detection system is introduced that uses data mining and machine learning concepts to detect network intrusion patterns. In the proposed method, an artificial neural network (ANN) is used as a learning technique in intrusion ...
Shadi Moghanian+3 more
doaj +1 more source
Intrusion and intrusion detection [PDF]
Assurance technologies for computer security have failed to have significant impacts in the marketplace, with the result that most of the computers connected to the internet are vulnerable to attack. This paper looks at the problem of malicious users from both a historical and practical standpoint.
openaire +2 more sources
A new intrusion detection and alarm correlation technology based on neural network
With the continuous development of computer networks, the security of the network has become increasingly prominent. A major threat to network security is the intrusion of information systems through the network.
Yansong Liu, Li Zhu
doaj +1 more source
INTRUSION DETECTION AND PREVENTION FRAMEWORK USING DATA MINING TECHNIQUES FOR FINANCIAL SECTOR [PDF]
Security becomes the main concern when the resources are shared over a network for many purposes. For ease of use and time saving several services offered by banks and other financial companies are accessible over mobile apps and computers connected with
Gaurav Sharma, Anil Kumar Kapil
doaj +1 more source
An overview to Software Architecture in Intrusion Detection System [PDF]
Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network.
Bahrami, Mehdi, Bahrami, Mohammad
core +1 more source
Evaluation of intrusion detection systems [PDF]
This paper presents a comprehensive method for evaluating intrusion detection systems (IDSs). It integrates and extends ROC (receiver operating characteristic) and cost analysis methods to provide an expected cost metric. Results are given for determining the optimal operation of an IDS based on this expected cost metric.
John E. Gaffney, Jacob W. Ulvila
openaire +2 more sources
CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection [PDF]
Intrusion Detection Systems are an accepted and very useful option to monitor, and detect malicious activities. However, Intrusion Detection Systems have inherent limitations which lead to false positives and false negatives; we propose that combining ...
David J. Day+2 more
core +2 more sources
On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol [PDF]
Mobile ad hoc networks mostly operate over open, adverse, or even hostile environments and are, therefore, vulnerable to a large body of threats. Conventional ways of securing network relying on, for example, firewall and encryption, should henceforth be coupled with advanced intrusion detection. To meet this requirement, we first identify the attacks
Alattar, Mouhannad+2 more
openaire +5 more sources
Research on hybrid intrusion detection method based on the ADASYN and ID3 algorithms
Intrusion detection system plays an important role in network security. Early detection of the potential attacks can prevent the further network intrusion from adversaries. To improve the effectiveness of the intrusion detection rate, this paper proposes
Yue Li +4 more
doaj +1 more source
Artificial Intelligence based Intrusion Detection System – A Detailed Survey [PDF]
The Internet and communications have rapidly expanded, leading to a significant rise in data generation and heterogeneity. Intrusion detection systems play a crucial role in ensuring the security and integrity of computer systems. These systems have been
Sharma Vishwas+3 more
doaj +1 more source