Results 1 to 10 of about 166,220 (207)

Enhanced Network Intrusion Detection System [PDF]

open access: yesSensors, 2021
A reasonably good network intrusion detection system generally requires a high detection rate and a low false alarm rate in order to predict anomalies more accurately.
Ketan Kotecha   +8 more
doaj   +3 more sources

Implementasi Intrusion Detection System (Ids)di Jaringan Universitas Bina Darma [PDF]

open access: green, 2012
Computer Security systems, in recent years has become a major focus in the world of computer networks, this is due to the high threat of suspicious (Suspicious Threat) and attacks from the internet.
Ulfa, M. (Maria)
core   +2 more sources

Oblivious network intrusion detection systems

open access: yesScientific Reports, 2023
Abstract A main function of network intrusion detection systems (NIDSs) is to monitor network traffic and match it against rules. Oblivious NIDSs (O-NIDS) perform the same tasks of NIDSs but they use encrypted rules and produce encrypted results without being able to decrypt the rules or the results.
Mahmoud AbdelHafeez Sayed, Mostafa Taha
openaire   +3 more sources

Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study [PDF]

open access: yes, 2012
Anomaly-based intrusion detection systems classify network traffic instances by comparing them with a model of the normal network behavior. To be effective, such systems are expected to precisely detect intrusions (high true positive rate) while limiting
Boer, Pieter-Tjerk de   +4 more
core   +16 more sources

HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System

open access: yesApplied Sciences, 2023
Attacks on networks are currently the most pressing issue confronting modern society. Network risks affect all networks, from small to large. An intrusion detection system must be present for detecting and mitigating hostile attacks inside networks ...
Emad Ul Haq Qazi   +2 more
doaj   +1 more source

Intrusion Detection System

open access: yesJournal of Database Management
The use of encrypted data, the diversity of new protocols, and the surge in the number of malicious activities worldwide have posed new challenges for intrusion detection systems (IDS). In this scenario, existing signature-based IDS are not performing well.
Amit Singh   +4 more
  +6 more sources

Towards an effective deep learning-based intrusion detection system in the internet of things

open access: yesTelematics and Informatics Reports, 2022
Distributed Sensor Networks play a vital role in the day-to-day world of computing applications, from the cloud to the Internet of Things (IoT). These computing applications devices are normally attached with the microcontrollers like Sensors, actuators,
Pampapathi B M   +2 more
doaj   +1 more source

Intrusion Detection System

open access: yesInternational Journal of Scientific Research in Science, Engineering and Technology, 2020
Intrusion Detection System (IDS) is well-defined as a Device or software application which monitors the system activities and finds if there is any malevolent activity that has occured. Unresolved growth and traditional use of internet raises anxieties about how to connect and protect the digital information securely.
Shivani Agrawal   +4 more
openaire   +2 more sources

An Intrusion Detection Approach based on the Combination of Oversampling and Undersampling Algorithms

open access: yesActa Infologica, 2023
The threat of network intrusion has become much more severe due to the increasing network flow. Therefore, network intrusion detection is one of the most concerned areas of network security.
Ahmet Okan Arık   +1 more
doaj   +1 more source

Study on Distributed Intrusion Detection System Based on Artificial Intelligence [PDF]

open access: yesJisuanji kexue, 2022
In order to solve the problems of data processing defects and low system intrusion accuracy existing in the current dynamic loading system,a distributed intrusion detection system with complete functions and strong practicability is designed by taking ...
WANG Lu, WEN Wu-song
doaj   +1 more source

Home - About - Disclaimer - Privacy