Results 1 to 10 of about 290,193 (257)
Network attack detection at flow level [PDF]
In this paper, we propose a new method for detecting unauthorized network intrusions, based on a traffic flow model and Cisco NetFlow protocol application.
C. Douligeris +3 more
core +2 more sources
Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection. [PDF]
An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack.
Kaliappan J +2 more
europepmc +5 more sources
Network Attack Detection for Business Safety
In the technology age, the use of networks has hugely increased. this led to an increment in the number of attackers. A network attack is an try to achieve unauthorized access to personnel of an organization’s network, steal data or perform other ...
Fadia Abduljabbar Saeed +2 more
doaj +2 more sources
Network Inspection for Detecting Strategic Attacks [PDF]
Ensuring the security of critical infrastructures is crucial for the society’s welfare and prosperity. However, these infrastructure networks are inherently vulnerable to both intentional and unintentional threats. In “Network Inspection for Detecting Strategic Attacks,” Dahan, Sela, and Amin study a strategic network inspection problem, formulated as
Mathieu Dahan, Lina Sela, Saurabh Amin
openaire +2 more sources
Anomaly Detection Algorithm Based on SSC-BP Neural Network [PDF]
Aiming at the increasing number and complexity of new network attacks in the Internet of Things environment,the traditional anomaly detection algorithm has high false alarm rate,low detection rate and large amount of data,which cause calculation ...
SHI Lin-shan, MA Chuang, YANG Yun, JIN Min
doaj +1 more source
Network Attack Detection Method of the Cyber-Physical Power System Based on Ensemble Learning
With the rapid development of power grid informatization, the power system has evolved into a multi-dimensional heterogeneous complex system with high cyber-physical integration, denoting the Cyber-Physical Power System (CPPS).
Jie Cao +5 more
doaj +1 more source
LSTM-Based Collaborative Source-Side DDoS Attack Detection
As denial of service attacks become more sophisticated, the source-side detection techniques are being studied to solve the limitations of target-side detection techniques such as delayed detection and difficulty in tracking attackers.
Sungwoong Yeom +2 more
doaj +1 more source
DDoS Attack Detection Based on DBN in SDN Environment [PDF]
The main security threats to Software Defined Network(SDN),a new type of network architecture,are from DDoS attacks.Hence,theestablishment of an efficient DDoS attack detection system is importantt to network security management.In the SDN environment ...
ZHU Jing, WU Zhongdong, DING Longbin, WANG Yang
doaj +1 more source
Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System [PDF]
The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture.
Grzegorz Kolaczek, Krzysztof Juszczyszyn
doaj +1 more source
On Scalable Attack Detection in the Network [PDF]
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans)at network vantage points. Unfortunately, all the IDS systems we know of keep per-connection or per-flow state.
Ramana Rao Kompella +2 more
openaire +1 more source

