Results 21 to 30 of about 291,448 (281)
An overview to Software Architecture in Intrusion Detection System [PDF]
Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network.
Bahrami, Mehdi, Bahrami, Mohammad
core +1 more source
Research on Network Attack Traffic Detection HybridAlgorithm Based on UMAP-RF
Network attack traffic detection plays a crucial role in protecting network operations and services. To accurately detect malicious traffic on the internet, this paper designs a hybrid algorithm UMAP-RF for both binary and multiclassification network ...
Xiaoyu Du +3 more
doaj +1 more source
Securing smart home against sinkhole attack using weight‐based IDS placement strategy
Extensive use of the Internet of Things (IoT) in smart homes makes users' lives easy and comfortable. Yet, these resource‐constrained devices are prone to manifold security attacks.
Md. Shafiqul Islam +3 more
doaj +1 more source
SSHCure: a flow-based SSH intrusion detection system [PDF]
SSH attacks are a main area of concern for network managers, due to the danger associated with a successful compromise. Detecting these attacks, and possibly compromised victims, is therefore a crucial activity.
Hellemons, Laurens +6 more
core +5 more sources
Prior Networks for Detection of Adversarial Attacks
Adversarial examples are considered a serious issue for safety critical applications of AI, such as finance, autonomous vehicle control and medicinal applications. Though significant work has resulted in increased robustness of systems to these attacks, systems are still vulnerable to well-crafted attacks.
Andrey Malinin, Mark J. F. Gales
openaire +2 more sources
Detection Method of DDoS Attack Based on Software Defined Network and Its Application [PDF]
According to the characteristics of Distributed Denial of Service(DDoS) attack and OpenFlow technology,this paper proposes a novel DDoS attack detection method based on Software Defined Network(SDN).It gets flow-table item installed in OpenFlow switch ...
LI Hefei,HUANG Xinli,ZHENG Zhengqi
doaj +1 more source
A BiLSTM-Based DDoS Attack Detection Method for Edge Computing
With the rapid development of smart grids, the number of various types of power IoT terminal devices has grown by leaps and bounds. An attack on either of the difficult-to-protect end devices or any node in a large and complex network can put the grid at
Yiying Zhang +5 more
doaj +1 more source
Detection of advanced persistent threat using machine-learning correlation analysis [PDF]
As one of the most serious types of cyber attack, Advanced Persistent Threats (APT) have caused major concerns on a global scale. APT refers to a persistent, multi-stage attack with the intention to compromise the system and gain information from the ...
Aparicio-Navarro, F +6 more
core +6 more sources
Intrusion Detection for Routing Attacks in Sensor Networks [PDF]
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central base station. In this paper, we present a method for intrusion detection in wireless sensor networks.
Chong Eik Loo +3 more
openaire +3 more sources
An Improved Recurrent Neural Network for Industrial IoT Botnet Attack Detection
This research aims to improve the Industrial Internet of Things (IIoT) security, which fosters technological confidence and promotes expansion. The IIoT is mainly used in manufacturing, oil, and gas to avoid botnet attacks.
G. Suneetha, D.H. Priya
doaj +1 more source

