Results 11 to 20 of about 2,065,929 (403)

Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network [PDF]

open access: yes, 2012
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system ...
A. F. M. Sultanul Kabir   +2 more
arxiv   +4 more sources

The Development of Agent Information for Intrusion Detection [PDF]

open access: yesQuery: Jurnal Sistem Informasi, 2017
As the challenges and problems surround intrusion rises rapidly, the intrusion detection system has been gradually developed. Agent-based approach for intrusion detection system has developed from single to multi agent, and later developed mobile agents ...
Bambang Sugiantoro
doaj   +2 more sources

Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study [PDF]

open access: yes, 2012
Anomaly-based intrusion detection systems classify network traffic instances by comparing them with a model of the normal network behavior. To be effective, such systems are expected to precisely detect intrusions (high true positive rate) while limiting
Boer, Pieter-Tjerk de   +4 more
core   +15 more sources

An Intrusion Detection Approach based on the Combination of Oversampling and Undersampling Algorithms

open access: yesActa Infologica, 2023
The threat of network intrusion has become much more severe due to the increasing network flow. Therefore, network intrusion detection is one of the most concerned areas of network security.
Ahmet Okan Arık   +1 more
doaj   +1 more source

A novel multi-module integrated intrusion detection system for high-dimensional imbalanced data

open access: yesApplied intelligence (Boston), 2022
The high dimension, complexity, and imbalance of network data are hot issues in the field of intrusion detection. Nowadays, intrusion detection systems face some challenges in improving the accuracy of minority classes detection, detecting unknown ...
Jiyuan Cui   +3 more
semanticscholar   +1 more source

A Cloud Based Network Intrusion Detection System

open access: yesTehnički Vjesnik, 2022
Along with the development of intrusion detection systems so far, remarkable results have been achieved in aspects of dynamic monitoring and network defense.
Li You, Zhanyong Wang
doaj   +1 more source

Explainable Artificial Intelligence for Intrusion Detection System

open access: yesElectronics, 2022
Intrusion detection systems are widely utilized in the cyber security field, to prevent and mitigate threats. Intrusion detection systems (IDS) help to keep threats and vulnerabilities out of computer networks.
S. Patil   +8 more
semanticscholar   +1 more source

Evaluation of intrusion detection systems [PDF]

open access: yesJournal of Research of the National Institute of Standards and Technology, 2003
This paper presents a comprehensive method for evaluating intrusion detection systems (IDSs). It integrates and extends ROC (receiver operating characteristic) and cost analysis methods to provide an expected cost metric. Results are given for determining the optimal operation of an IDS based on this expected cost metric.
John E. Gaffney, Jacob W. Ulvila
openaire   +2 more sources

Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment

open access: yesElectronics, 2022
As a new paradigm, fog computing (FC) has several characteristics that set it apart from the cloud computing (CC) environment. Fog nodes and edge computing (EC) hosts have limited resources, exposing them to cyberattacks while processing large streams ...
Omar A. Alzubi   +5 more
semanticscholar   +1 more source

An improved bio-inspired based intrusion detection model for a cyberspace

open access: yesCogent Engineering, 2021
Bio-inspired intrusion detection solutions provide better detection accuracy than conventional solutions in securing cyberspace. However, existing bio-inspired anomaly-based intrusion detection systems are still faced with challenges of high false ...
Samera Uga Otor   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy