Results 11 to 20 of about 156,609 (316)

Study on Distributed Intrusion Detection System Based on Artificial Intelligence [PDF]

open access: yesJisuanji kexue, 2022
In order to solve the problems of data processing defects and low system intrusion accuracy existing in the current dynamic loading system,a distributed intrusion detection system with complete functions and strong practicability is designed by taking ...
WANG Lu, WEN Wu-song
doaj   +1 more source

Intrusion Detection Systems [PDF]

open access: yesComputer Fraud & Security, 2001
Abstract In order to answer the opening question, it may help to consider the following scenario. Once upon a time there were isolated villages where everyone trusted everyone else. Little by little, people started to travel from village to village to exchange goods, news and information and life generally got better.
Rebecca Bace, Peter Mell
openaire   +3 more sources

Weighted Multiclass Intrusion Detection System [PDF]

open access: yesITM Web of Conferences, 2023
Attackers are continuously coming up with new attack strategies since cyber security is a field that is continually changing. As a result, it’s important to update and enhance the system frequently to ensure its efficiency against fresh threats ...
Dange Varsha   +5 more
doaj   +1 more source

Application of data mining technology in detecting network intrusion and security maintenance

open access: yesJournal of Intelligent Systems, 2021
In order to correct the deficiencies of intrusion detection technology, the entire computer and network security system are needed to be more perfect.
Zhu Yongkuan   +4 more
doaj   +1 more source

A new intrusion detection and alarm correlation technology based on neural network

open access: yesEURASIP Journal on Wireless Communications and Networking, 2019
With the continuous development of computer networks, the security of the network has become increasingly prominent. A major threat to network security is the intrusion of information systems through the network.
Yansong Liu, Li Zhu
doaj   +1 more source

Toward Network-based DDoS Detection in Software-defined Networks [PDF]

open access: yes, 2018
To combat susceptibility of modern computing systems to cyberattack, identifying and disrupting malicious traffic without human intervention is essential.
Chaves Luciano Jerez   +4 more
core   +1 more source

Towards a Scalable and Adaptive Learning Approach for Network Intrusion Detection

open access: yesJournal of Computer Networks and Communications, 2021
This paper introduces a new integrated learning approach towards developing a new network intrusion detection model that is scalable and adaptive nature of learning. The approach can improve the existing trends and difficulties in intrusion detection. An
Alebachew Chiche, Million Meshesha
doaj   +1 more source

Intrusion Detection System Based on Integrated System Calls Graph and Neural Networks

open access: yesIEEE Access, 2021
Computer security is one of the main challenges of today's technological infrastructures, whereas intrusion detection systems are one of the most widely used technologies to secure computer systems.
F. J. Mora-Gimeno   +3 more
doaj   +1 more source

Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System

open access: yesIEEE Access, 2021
Cloud computing is considered to be the best technique for storing data online instead of using a hard drive. It includes three different types of computing services that are provided to remote users via the Internet. Cloud computing offers its end users
Muhammad Nadeem   +4 more
doaj   +1 more source

Proposed Hybrid Classifier to Improve Network Intrusion Detection System using Data Mining Techniques [PDF]

open access: yesEngineering and Technology Journal, 2020
Network intrusion detection system (NIDS) is a software system which plays an important role to protect network system and can be used to monitor network activities to detect different kinds of attacks from normal behavior in network traffics.
Sarah Shareef, Soukaena Hashim
doaj   +1 more source

Home - About - Disclaimer - Privacy