Results 1 to 10 of about 156,609 (316)

Enhanced Network Intrusion Detection System [PDF]

open access: yesSensors, 2021
A reasonably good network intrusion detection system generally requires a high detection rate and a low false alarm rate in order to predict anomalies more accurately.
Ketan Kotecha   +8 more
doaj   +4 more sources

Intrusion detection system episteme

open access: yesOpen Computer Science, 2012
Abstract In our paper we investigate the possibilities of modal logics in coalgebras of program systems. We deal with a simplified model of an intrusion detection system. We model an intrusion detection system as a coalgebra and construct its Kripke model of coalgebraic modal linear logic using powerset endofunctor.
Mihályi Daniel   +2 more
doaj   +3 more sources

Intrusion Detection System [PDF]

open access: yesInternational Journal of Scientific Research in Science, Engineering and Technology, 2020
Intrusion Detection System (IDS) is well-defined as a Device or software application which monitors the system activities and finds if there is any malevolent activity that has occured. Unresolved growth and traditional use of internet raises anxieties about how to connect and protect the digital information securely.
Sangram Nevse   +4 more
openaire   +2 more sources

Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study [PDF]

open access: yes, 2012
Anomaly-based intrusion detection systems classify network traffic instances by comparing them with a model of the normal network behavior. To be effective, such systems are expected to precisely detect intrusions (high true positive rate) while limiting
Boer, Pieter-Tjerk de   +4 more
core   +15 more sources

HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System

open access: yesApplied Sciences, 2023
Attacks on networks are currently the most pressing issue confronting modern society. Network risks affect all networks, from small to large. An intrusion detection system must be present for detecting and mitigating hostile attacks inside networks ...
Emad Ul Haq Qazi   +2 more
doaj   +1 more source

Towards an effective deep learning-based intrusion detection system in the internet of things

open access: yesTelematics and Informatics Reports, 2022
Distributed Sensor Networks play a vital role in the day-to-day world of computing applications, from the cloud to the Internet of Things (IoT). These computing applications devices are normally attached with the microcontrollers like Sensors, actuators,
Pampapathi B M   +2 more
doaj   +1 more source

A Cloud Based Network Intrusion Detection System

open access: yesTehnički Vjesnik, 2022
Along with the development of intrusion detection systems so far, remarkable results have been achieved in aspects of dynamic monitoring and network defense.
Li You, Zhanyong Wang
doaj   +1 more source

An Intrusion Detection Approach based on the Combination of Oversampling and Undersampling Algorithms

open access: yesActa Infologica, 2023
The threat of network intrusion has become much more severe due to the increasing network flow. Therefore, network intrusion detection is one of the most concerned areas of network security.
Ahmet Okan Arık   +1 more
doaj   +1 more source

Evaluation of intrusion detection systems [PDF]

open access: yesJournal of Research of the National Institute of Standards and Technology, 2003
This paper presents a comprehensive method for evaluating intrusion detection systems (IDSs). It integrates and extends ROC (receiver operating characteristic) and cost analysis methods to provide an expected cost metric. Results are given for determining the optimal operation of an IDS based on this expected cost metric.
John E. Gaffney, Jacob W. Ulvila
openaire   +2 more sources

An improved bio-inspired based intrusion detection model for a cyberspace

open access: yesCogent Engineering, 2021
Bio-inspired intrusion detection solutions provide better detection accuracy than conventional solutions in securing cyberspace. However, existing bio-inspired anomaly-based intrusion detection systems are still faced with challenges of high false ...
Samera Uga Otor   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy