Results 1 to 10 of about 162,879 (307)
Pemanfaatan Intrusion Detection System (Ids) Sebagai Otomatisasi Konfigurasi Firewall Berbasis Web Service Menggunakan Arsitektur Representational State Transfer (Rest) [PDF]
Many things can destabilize a computer network connections, both with regard to hardware and software. Therefore, we need a technique for network security, one of them is firewall.
Astuti, Y. (Yenni) +2 more
core +3 more sources
Enhanced Network Intrusion Detection System [PDF]
A reasonably good network intrusion detection system generally requires a high detection rate and a low false alarm rate in order to predict anomalies more accurately.
Ketan Kotecha +8 more
doaj +3 more sources
Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study [PDF]
Anomaly-based intrusion detection systems classify network traffic instances by comparing them with a model of the normal network behavior. To be effective, such systems are expected to precisely detect intrusions (high true positive rate) while limiting
Boer, Pieter-Tjerk de +4 more
core +15 more sources
HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System
Attacks on networks are currently the most pressing issue confronting modern society. Network risks affect all networks, from small to large. An intrusion detection system must be present for detecting and mitigating hostile attacks inside networks ...
Emad Ul Haq Qazi +2 more
doaj +1 more source
Towards an effective deep learning-based intrusion detection system in the internet of things
Distributed Sensor Networks play a vital role in the day-to-day world of computing applications, from the cloud to the Internet of Things (IoT). These computing applications devices are normally attached with the microcontrollers like Sensors, actuators,
Pampapathi B M +2 more
doaj +1 more source
The use of encrypted data, the diversity of new protocols, and the surge in the number of malicious activities worldwide have posed new challenges for intrusion detection systems (IDS). In this scenario, existing signature-based IDS are not performing well.
Amit Singh +4 more
+6 more sources
The threat of network intrusion has become much more severe due to the increasing network flow. Therefore, network intrusion detection is one of the most concerned areas of network security.
Ahmet Okan Arık +1 more
doaj +1 more source
Intrusion Detection System (IDS) is well-defined as a Device or software application which monitors the system activities and finds if there is any malevolent activity that has occured. Unresolved growth and traditional use of internet raises anxieties about how to connect and protect the digital information securely.
Shivani Agrawal +4 more
openaire +2 more sources
Study on Distributed Intrusion Detection System Based on Artificial Intelligence [PDF]
In order to solve the problems of data processing defects and low system intrusion accuracy existing in the current dynamic loading system,a distributed intrusion detection system with complete functions and strong practicability is designed by taking ...
WANG Lu, WEN Wu-song
doaj +1 more source
An improved bio-inspired based intrusion detection model for a cyberspace
Bio-inspired intrusion detection solutions provide better detection accuracy than conventional solutions in securing cyberspace. However, existing bio-inspired anomaly-based intrusion detection systems are still faced with challenges of high false ...
Samera Uga Otor +4 more
doaj +1 more source

