Results 11 to 20 of about 208,052 (306)
SSHCure: a flow-based SSH intrusion detection system [PDF]
SSH attacks are a main area of concern for network managers, due to the danger associated with a successful compromise. Detecting these attacks, and possibly compromised victims, is therefore a crucial activity.
Hellemons, Laurens +6 more
core +8 more sources
HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System
Attacks on networks are currently the most pressing issue confronting modern society. Network risks affect all networks, from small to large. An intrusion detection system must be present for detecting and mitigating hostile attacks inside networks ...
Emad Ul Haq Qazi +2 more
doaj +1 more source
A new intrusion detection and alarm correlation technology based on neural network
With the continuous development of computer networks, the security of the network has become increasingly prominent. A major threat to network security is the intrusion of information systems through the network.
Yansong Liu, Li Zhu
doaj +1 more source
In this paper, an intrusion detection system is introduced that uses data mining and machine learning concepts to detect network intrusion patterns. In the proposed method, an artificial neural network (ANN) is used as a learning technique in intrusion ...
Shadi Moghanian +3 more
doaj +1 more source
Intrusion and intrusion detection [PDF]
Summary: Assurance technologies for computer security have failed to have significant impacts in the marketplace, with the result that most of the computers connected to the internet are vulnerable to attack. This paper looks at the problem of malicious users from both a historical and practical standpoint.
openaire +2 more sources
A taxonomy of malicious traffic for intrusion detection systems [PDF]
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert +5 more
core +4 more sources
INTRUSION DETECTION AND PREVENTION FRAMEWORK USING DATA MINING TECHNIQUES FOR FINANCIAL SECTOR [PDF]
Security becomes the main concern when the resources are shared over a network for many purposes. For ease of use and time saving several services offered by banks and other financial companies are accessible over mobile apps and computers connected with
Gaurav Sharma, Anil Kumar Kapil
doaj +1 more source
Intrusion Detection Systems for Community Wireless Mesh Networks [PDF]
Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive.
Hutchison, David +3 more
core +1 more source
The threat of network intrusion has become much more severe due to the increasing network flow. Therefore, network intrusion detection is one of the most concerned areas of network security.
Ahmet Okan Arık +1 more
doaj +1 more source
Toward Network-based DDoS Detection in Software-defined Networks [PDF]
To combat susceptibility of modern computing systems to cyberattack, identifying and disrupting malicious traffic without human intervention is essential.
Chaves Luciano Jerez +4 more
core +1 more source

