Results 21 to 30 of about 291,448 (281)

An overview to Software Architecture in Intrusion Detection System [PDF]

open access: yes, 2014
Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network.
Bahrami, Mehdi, Bahrami, Mohammad
core   +1 more source

Research on Network Attack Traffic Detection HybridAlgorithm Based on UMAP-RF

open access: yesAlgorithms, 2022
Network attack traffic detection plays a crucial role in protecting network operations and services. To accurately detect malicious traffic on the internet, this paper designs a hybrid algorithm UMAP-RF for both binary and multiclassification network ...
Xiaoyu Du   +3 more
doaj   +1 more source

Securing smart home against sinkhole attack using weight‐based IDS placement strategy

open access: yesIET Wireless Sensor Systems, 2023
Extensive use of the Internet of Things (IoT) in smart homes makes users' lives easy and comfortable. Yet, these resource‐constrained devices are prone to manifold security attacks.
Md. Shafiqul Islam   +3 more
doaj   +1 more source

SSHCure: a flow-based SSH intrusion detection system [PDF]

open access: yes, 2012
SSH attacks are a main area of concern for network managers, due to the danger associated with a successful compromise. Detecting these attacks, and possibly compromised victims, is therefore a crucial activity.
Hellemons, Laurens   +6 more
core   +5 more sources

Prior Networks for Detection of Adversarial Attacks

open access: yesCoRR, 2018
Adversarial examples are considered a serious issue for safety critical applications of AI, such as finance, autonomous vehicle control and medicinal applications. Though significant work has resulted in increased robustness of systems to these attacks, systems are still vulnerable to well-crafted attacks.
Andrey Malinin, Mark J. F. Gales
openaire   +2 more sources

Detection Method of DDoS Attack Based on Software Defined Network and Its Application [PDF]

open access: yesJisuanji gongcheng, 2016
According to the characteristics of Distributed Denial of Service(DDoS) attack and OpenFlow technology,this paper proposes a novel DDoS attack detection method based on Software Defined Network(SDN).It gets flow-table item installed in OpenFlow switch ...
LI Hefei,HUANG Xinli,ZHENG Zhengqi
doaj   +1 more source

A BiLSTM-Based DDoS Attack Detection Method for Edge Computing

open access: yesEnergies, 2022
With the rapid development of smart grids, the number of various types of power IoT terminal devices has grown by leaps and bounds. An attack on either of the difficult-to-protect end devices or any node in a large and complex network can put the grid at
Yiying Zhang   +5 more
doaj   +1 more source

Detection of advanced persistent threat using machine-learning correlation analysis [PDF]

open access: yes, 2018
As one of the most serious types of cyber attack, Advanced Persistent Threats (APT) have caused major concerns on a global scale. APT refers to a persistent, multi-stage attack with the intention to compromise the system and gain information from the ...
Aparicio-Navarro, F   +6 more
core   +6 more sources

Intrusion Detection for Routing Attacks in Sensor Networks [PDF]

open access: yesInternational Journal of Distributed Sensor Networks, 2006
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central base station. In this paper, we present a method for intrusion detection in wireless sensor networks.
Chong Eik Loo   +3 more
openaire   +3 more sources

An Improved Recurrent Neural Network for Industrial IoT Botnet Attack Detection

open access: yesЖурнал інженерних наук
This research aims to improve the Industrial Internet of Things (IIoT) security, which fosters technological confidence and promotes expansion. The IIoT is mainly used in manufacturing, oil, and gas to avoid botnet attacks.
G. Suneetha, D.H. Priya
doaj   +1 more source

Home - About - Disclaimer - Privacy