Results 21 to 30 of about 988,120 (358)

Research on intrusion response strategy based on static Bayesian game in mobile edge computing network

open access: yesTongxin xuebao, 2023
In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion ...
Wei FAN   +3 more
doaj   +2 more sources

Efficient intrusion detection scheme based on SVM [PDF]

open access: yes, 2013
The network intrusion detection problem is the focus of current academic research. In this paper, we propose to use Support Vector Machine (SVM) model to identify and detect the network intrusion problem, and simultaneously introduce a new optimization ...
Shrestha, Anup, Zhou, Guangping
core   +1 more source

Towards an effective deep learning-based intrusion detection system in the internet of things

open access: yesTelematics and Informatics Reports, 2022
Distributed Sensor Networks play a vital role in the day-to-day world of computing applications, from the cloud to the Internet of Things (IoT). These computing applications devices are normally attached with the microcontrollers like Sensors, actuators,
Pampapathi B M   +2 more
doaj  

An overview to Software Architecture in Intrusion Detection System [PDF]

open access: yes, 2014
Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network.
Bahrami, Mehdi, Bahrami, Mohammad
core   +1 more source

Intrusion Detection in SCADA Systems

open access: yes, 2014
The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI).
Leandros A. Maglaras, Jianmin Jiang
openaire   +14 more sources

Portable Intrusion Detection System

open access: yesInternational Journal of Engineering and Advanced Technology, 2020
Every network connection made is exposed to a security threat. Due to this, crucial, confidential, important information can be lost or even exploited by an intruder. Hence an intrusion detection system (IDS) is needed to detect and notify the network administrators if such an event occurs.
Harshitha Prasad Rao   +3 more
openaire   +1 more source

Toward Network-based DDoS Detection in Software-defined Networks [PDF]

open access: yes, 2018
To combat susceptibility of modern computing systems to cyberattack, identifying and disrupting malicious traffic without human intervention is essential.
Chaves Luciano Jerez   +4 more
core   +1 more source

Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection

open access: yesIEEE Access, 2018
Intrusion detection is a fundamental part of security tools, such as adaptive security appliances, intrusion detection systems, intrusion prevention systems, and firewalls.
Iftikhar Ahmad   +3 more
doaj   +1 more source

Intrusion detection systems

open access: yes, 2010
Intrusion Detection Systems (IDSs) play an important role in the defense strategy of site security officers. An IDS can act as a second line of defense to provide security analysts with the necessary insights into the nature of hostile activities. Therefore, a good understanding of IDSs helps administrators make informed decisions when it comes to ...
Bazara I. A. Barry, H. Anthony Chan
openaire   +4 more sources

Research on Wireless Sensor Network Intrusion Detection Technology

open access: yesMATEC Web of Conferences, 2016
With the development of science and technology, wireless sensor network (WSN) has been widely used in all walks of life. The security problem of WSN has become a research hotspot.
Fan Qing Gang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy