Results 21 to 30 of about 199,623 (310)
Toward Network-based DDoS Detection in Software-defined Networks [PDF]
To combat susceptibility of modern computing systems to cyberattack, identifying and disrupting malicious traffic without human intervention is essential.
Chaves Luciano Jerez+4 more
core +1 more source
On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol [PDF]
Mobile ad hoc networks mostly operate over open, adverse, or even hostile environments and are, therefore, vulnerable to a large body of threats. Conventional ways of securing network relying on, for example, firewall and encryption, should henceforth be coupled with advanced intrusion detection. To meet this requirement, we first identify the attacks
Alattar, Mouhannad+2 more
openaire +4 more sources
Artificial Intelligence based Intrusion Detection System – A Detailed Survey [PDF]
The Internet and communications have rapidly expanded, leading to a significant rise in data generation and heterogeneity. Intrusion detection systems play a crucial role in ensuring the security and integrity of computer systems. These systems have been
Sharma Vishwas+3 more
doaj +1 more source
Research on Wireless Sensor Network Intrusion Detection Technology
With the development of science and technology, wireless sensor network (WSN) has been widely used in all walks of life. The security problem of WSN has become a research hotspot.
Fan Qing Gang+4 more
doaj +1 more source
Research on hybrid intrusion detection method based on the ADASYN and ID3 algorithms
Intrusion detection system plays an important role in network security. Early detection of the potential attacks can prevent the further network intrusion from adversaries. To improve the effectiveness of the intrusion detection rate, this paper proposes
Yue Li +4 more
doaj +1 more source
An improved bio-inspired based intrusion detection model for a cyberspace
Bio-inspired intrusion detection solutions provide better detection accuracy than conventional solutions in securing cyberspace. However, existing bio-inspired anomaly-based intrusion detection systems are still faced with challenges of high false ...
Samera Uga Otor+4 more
doaj +1 more source
As the range of security attacks increases across diverse network applications, intrusion detection systems are of central interest. Such detection systems are more crucial for the Internet of Things (IoT) due to the voluminous and sensitive data it ...
Shapla Khanam+3 more
doaj +1 more source
Deep Stacking Network for Intrusion Detection
Preventing network intrusion is the essential requirement of network security. In recent years, people have conducted a lot of research on network intrusion detection systems.
Yifan Tang, Lize Gu, Leiting Wang
doaj +1 more source
Intrusion Detection in SCADA Systems
The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI).
Leandros A. Maglaras, Jianmin Jiang
openaire +14 more sources
In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion ...
Wei FAN+3 more
doaj +2 more sources