Results 1 to 10 of about 290,193 (257)

Network attack detection at flow level [PDF]

open access: yes, 2011
In this paper, we propose a new method for detecting unauthorized network intrusions, based on a traffic flow model and Cisco NetFlow protocol application.
C. Douligeris   +3 more
core   +2 more sources

Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection. [PDF]

open access: yesScientificWorldJournal, 2015
An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack.
Kaliappan J   +2 more
europepmc   +5 more sources

Network Attack Detection for Business Safety

open access: yesNTU Journal of Engineering and Technology
In the technology age, the use of networks has hugely increased. this led to an increment in the number of attackers.  A network attack is an try to achieve unauthorized access to personnel of an organization’s network, steal data or perform other ...
Fadia Abduljabbar Saeed   +2 more
doaj   +2 more sources

Network Inspection for Detecting Strategic Attacks [PDF]

open access: yesOperations Research, 2022
Ensuring the security of critical infrastructures is crucial for the society’s welfare and prosperity. However, these infrastructure networks are inherently vulnerable to both intentional and unintentional threats. In “Network Inspection for Detecting Strategic Attacks,” Dahan, Sela, and Amin study a strategic network inspection problem, formulated as
Mathieu Dahan, Lina Sela, Saurabh Amin
openaire   +2 more sources

Anomaly Detection Algorithm Based on SSC-BP Neural Network [PDF]

open access: yesJisuanji kexue, 2021
Aiming at the increasing number and complexity of new network attacks in the Internet of Things environment,the traditional anomaly detection algorithm has high false alarm rate,low detection rate and large amount of data,which cause calculation ...
SHI Lin-shan, MA Chuang, YANG Yun, JIN Min
doaj   +1 more source

Network Attack Detection Method of the Cyber-Physical Power System Based on Ensemble Learning

open access: yesApplied Sciences, 2022
With the rapid development of power grid informatization, the power system has evolved into a multi-dimensional heterogeneous complex system with high cyber-physical integration, denoting the Cyber-Physical Power System (CPPS).
Jie Cao   +5 more
doaj   +1 more source

LSTM-Based Collaborative Source-Side DDoS Attack Detection

open access: yesIEEE Access, 2022
As denial of service attacks become more sophisticated, the source-side detection techniques are being studied to solve the limitations of target-side detection techniques such as delayed detection and difficulty in tracking attackers.
Sungwoong Yeom   +2 more
doaj   +1 more source

DDoS Attack Detection Based on DBN in SDN Environment [PDF]

open access: yesJisuanji gongcheng, 2020
The main security threats to Software Defined Network(SDN),a new type of network architecture,are from DDoS attacks.Hence,theestablishment of an efficient DDoS attack detection system is importantt to network security management.In the SDN environment ...
ZHU Jing, WU Zhongdong, DING Longbin, WANG Yang
doaj   +1 more source

Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System [PDF]

open access: yesInternational Journal of Computational Intelligence Systems, 2008
The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture.
Grzegorz Kolaczek, Krzysztof Juszczyszyn
doaj   +1 more source

On Scalable Attack Detection in the Network [PDF]

open access: yesIEEE/ACM Transactions on Networking, 2004
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans)at network vantage points. Unfortunately, all the IDS systems we know of keep per-connection or per-flow state.
Ramana Rao Kompella   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy