Results 11 to 20 of about 2,065,929 (403)
Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network [PDF]
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system ...
A. F. M. Sultanul Kabir+2 more
arxiv +4 more sources
The Development of Agent Information for Intrusion Detection [PDF]
As the challenges and problems surround intrusion rises rapidly, the intrusion detection system has been gradually developed. Agent-based approach for intrusion detection system has developed from single to multi agent, and later developed mobile agents ...
Bambang Sugiantoro
doaj +2 more sources
Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study [PDF]
Anomaly-based intrusion detection systems classify network traffic instances by comparing them with a model of the normal network behavior. To be effective, such systems are expected to precisely detect intrusions (high true positive rate) while limiting
Boer, Pieter-Tjerk de+4 more
core +15 more sources
The threat of network intrusion has become much more severe due to the increasing network flow. Therefore, network intrusion detection is one of the most concerned areas of network security.
Ahmet Okan Arık+1 more
doaj +1 more source
A novel multi-module integrated intrusion detection system for high-dimensional imbalanced data
The high dimension, complexity, and imbalance of network data are hot issues in the field of intrusion detection. Nowadays, intrusion detection systems face some challenges in improving the accuracy of minority classes detection, detecting unknown ...
Jiyuan Cui+3 more
semanticscholar +1 more source
A Cloud Based Network Intrusion Detection System
Along with the development of intrusion detection systems so far, remarkable results have been achieved in aspects of dynamic monitoring and network defense.
Li You, Zhanyong Wang
doaj +1 more source
Explainable Artificial Intelligence for Intrusion Detection System
Intrusion detection systems are widely utilized in the cyber security field, to prevent and mitigate threats. Intrusion detection systems (IDS) help to keep threats and vulnerabilities out of computer networks.
S. Patil+8 more
semanticscholar +1 more source
Evaluation of intrusion detection systems [PDF]
This paper presents a comprehensive method for evaluating intrusion detection systems (IDSs). It integrates and extends ROC (receiver operating characteristic) and cost analysis methods to provide an expected cost metric. Results are given for determining the optimal operation of an IDS based on this expected cost metric.
John E. Gaffney, Jacob W. Ulvila
openaire +2 more sources
Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment
As a new paradigm, fog computing (FC) has several characteristics that set it apart from the cloud computing (CC) environment. Fog nodes and edge computing (EC) hosts have limited resources, exposing them to cyberattacks while processing large streams ...
Omar A. Alzubi+5 more
semanticscholar +1 more source
An improved bio-inspired based intrusion detection model for a cyberspace
Bio-inspired intrusion detection solutions provide better detection accuracy than conventional solutions in securing cyberspace. However, existing bio-inspired anomaly-based intrusion detection systems are still faced with challenges of high false ...
Samera Uga Otor+4 more
doaj +1 more source