Results 131 to 140 of about 119,256 (176)
Some of the next articles are maybe not open access.

Network intrusion detection

Proceedings of the 26th Annual Computer Security Applications Conference, 2010
Research on network intrusion detection has produced a number of interesting results. In this paper, I look back to the NetSTAT system, which was presented at ACSAC in 1998. In addition to describing the original system, I discuss some historical context, with reference to well-known evaluation efforts and to the evolution of network intrusion ...
openaire   +1 more source

An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection

2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS), 2020
With the rapid development of Internet, the issue of cyber security has increasingly gained more attention. An intrusion Detection System (IDS) is an effective technique to defend cyber-attacks and reduce security losses. However, the challenge of IDS lies in the diversity of cyber-attackers and the frequently-changing data requiring a flexible and ...
Jiannan Liu   +4 more
openaire   +1 more source

Network Intrusion Detection

2015
With the developing of Internet, network intrusion has becoming more and more common.Extreme learning machine (ELM) is an efficient learning algorithm for generalized single hidden layer feed-forward networks. ELM can be used for network intrusion detection.This work introduces a method using extreme learning machine to detect network intrusion.
Zhifan Ye, Yuanlong Yu
openaire   +1 more source

Network-Based Intrusion Detection

2008
As an example of the application for non-conventional purposes a security system is presented in the article that utilizes just the network for protecting the operating system of the computers. The software maintains a database about the experienced intruding attempts.
Gábor Hosszú, Zoltán Czirkos
openaire   +1 more source

Network Traffic Intrusion Detection

2024 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)
The paper explores the application of machine learning algorithms for network traffic intrusion detection with the aim of enhancing the security of information systems. More specifically, it provides a comprehensive insight into the current state of the art in intrusion detection, and gives a review of relevant literature, research methodology ...
Frane Žada, Martina Antonić
openaire   +1 more source

Open-World Network Intrusion Detection

2022
Cyber ...
Rimmer, Vera (author)   +4 more
openaire   +3 more sources

Honeypot Utilization for Network Intrusion Detection

2018
For research purposes, a honeypot is a system that enables observing attacker’s actions in different phases of a cyberattack. In this study, a honeypot called Kippo was used to identify attack behavior in Finland. The gathered data consisted of dictionary attack login attempts, attacker location, and actions after successful login.
Simo Kemppainen, Tiina Kovanen
openaire   +1 more source

Counselors network for intrusion detection

International Journal of Network Management, 2020
SummaryIntrusion detection systems (IDSs) are a fundamental component of defense solutions. In particular, IDSs aim to detect malicious activities on computer systems and networks by relying on data classification models built from a training dataset. However, classifiers' performance can vary for each attack pattern.
Silvio E. Quincozes   +5 more
openaire   +1 more source

Subverting network intrusion detection

2020
Durch die stetig wachsenden Datenmengen die heutzutage im Internet verschicket werden ist der Bedarf an schnellen und zuverlässigen Network-based Intrusion Detection System (NIDS) gestiegen. Um dem nachzukommen sind Deep Learning (DL) Algorithmen in den Fokus der Wissenschaft gekommen, da diese akkurater und effzienter sind als andere Detektions ...
openaire   +1 more source

An efficient network intrusion detection

Computer Communications, 2010
Exploit code based on system vulnerability is often used by attacker. Such exploit program often sends attack packets in the first few packets. A Lightweight Network Intrusion Detection system (LNID) is proposed for detecting such attacks on Telnet traffic. It characterizes normal traffic behavior and computes the anomaly score of a packet based on the
Chia-Mei Chen   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy