Results 31 to 40 of about 199,623 (310)

Towards a Scalable and Adaptive Learning Approach for Network Intrusion Detection

open access: yesJournal of Computer Networks and Communications, 2021
This paper introduces a new integrated learning approach towards developing a new network intrusion detection model that is scalable and adaptive nature of learning. The approach can improve the existing trends and difficulties in intrusion detection. An
Alebachew Chiche, Million Meshesha
doaj   +1 more source

An overview to Software Architecture in Intrusion Detection System [PDF]

open access: yes, 2014
Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network.
Bahrami, Mehdi, Bahrami, Mohammad
core   +1 more source

Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection

open access: yesIEEE Access, 2018
Intrusion detection is a fundamental part of security tools, such as adaptive security appliances, intrusion detection systems, intrusion prevention systems, and firewalls.
Iftikhar Ahmad   +3 more
doaj   +1 more source

Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review

open access: yesInternet of Things and Cyber-Physical Systems
The significance of intrusion detection systems in networks has grown because of the digital revolution and increased operations. The intrusion detection method classifies the network traffic as threat or normal based on the data features.
Shubhkirti Sharma   +2 more
doaj   +1 more source

CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network

open access: yesDiscrete Dynamics in Nature and Society, 2020
Network intrusion detection system can effectively detect network attack behaviour, which is very important to network security. In this paper, a multiclassification network intrusion detection model based on convolutional neural network is proposed, and
Guojie Liu, Jianbiao Zhang
doaj   +1 more source

A new unmanned aerial vehicle intrusion detection method based on belief rule base with evidential reasoning

open access: yesHeliyon, 2022
With the growing security demands in the public, civil and military fields, unmanned aerial vehicle (UAV) intrusion detection has attracted increasing attention.
Yawen Xie   +4 more
doaj   +1 more source

Intrusion Detection System [PDF]

open access: yesInternational Journal of Scientific Research in Science, Engineering and Technology, 2020
Intrusion Detection System (IDS) is well-defined as a Device or software application which monitors the system activities and finds if there is any malevolent activity that has occured. Unresolved growth and traditional use of internet raises anxieties about how to connect and protect the digital information securely.
Sangram Nevse   +4 more
openaire   +1 more source

Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network

open access: yes, 2010
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment.
A. F. M. Sultanul Kabir   +2 more
core   +2 more sources

Behavioral Intrusion Detection [PDF]

open access: yes, 2004
In this paper we describe anomaly-based intrusion detection as a specialized case of the more general behavior detection problem. We draw concepts from the field of ethology to help us describe and characterize behavior and interactions. We briefly introduce a general framework for behavior detection and an algorithm for building a Markov-based model ...
openaire   +3 more sources

A Cloud Based Network Intrusion Detection System

open access: yesTehnički Vjesnik, 2022
Along with the development of intrusion detection systems so far, remarkable results have been achieved in aspects of dynamic monitoring and network defense.
Li You, Zhanyong Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy