Results 11 to 20 of about 119,256 (176)

HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System

open access: yesApplied Sciences, 2023
Attacks on networks are currently the most pressing issue confronting modern society. Network risks affect all networks, from small to large. An intrusion detection system must be present for detecting and mitigating hostile attacks inside networks ...
Emad Ul Haq Qazi   +2 more
doaj   +1 more source

Intrusion Detection Quantum Sensor Networks

open access: yesSensors, 2022
This paper proposes a perimeter detection scheme based on the quantum physical properties of photons. Existing perimeter intrusion detection schemes, if using light, rely on the classical properties of light only. Our quantum sensor network uses the quantum property of spatial superposition of photons, meaning that a photon can simultaneously follow ...
Marius Nagy, Naya Nagy
openaire   +3 more sources

An Intrusion Detection Approach based on the Combination of Oversampling and Undersampling Algorithms

open access: yesActa Infologica, 2023
The threat of network intrusion has become much more severe due to the increasing network flow. Therefore, network intrusion detection is one of the most concerned areas of network security.
Ahmet Okan Arık   +1 more
doaj   +1 more source

Towards an effective deep learning-based intrusion detection system in the internet of things

open access: yesTelematics and Informatics Reports, 2022
Distributed Sensor Networks play a vital role in the day-to-day world of computing applications, from the cloud to the Internet of Things (IoT). These computing applications devices are normally attached with the microcontrollers like Sensors, actuators,
Pampapathi B M   +2 more
doaj   +1 more source

SSHCure: a flow-based SSH intrusion detection system [PDF]

open access: yes, 2012
SSH attacks are a main area of concern for network managers, due to the danger associated with a successful compromise. Detecting these attacks, and possibly compromised victims, is therefore a crucial activity.
Hellemons, Laurens   +6 more
core   +9 more sources

A Bagging Strategy-Based Kernel Extreme Learning Machine for Complex Network Intrusion Detection [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2021
Network intrusion can enter the network through informal channels. Some illegal users utilize Trojans and self-programmed attack to change the network security system, so that the system loses the defense and alarm function and the Hacker ...
Shoulin Yin   +4 more
doaj   +1 more source

CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network

open access: yesDiscrete Dynamics in Nature and Society, 2020
Network intrusion detection system can effectively detect network attack behaviour, which is very important to network security. In this paper, a multiclassification network intrusion detection model based on convolutional neural network is proposed, and
Guojie Liu, Jianbiao Zhang
doaj   +1 more source

GOAMLP: Network Intrusion Detection With Multilayer Perceptron and Grasshopper Optimization Algorithm

open access: yesIEEE Access, 2020
In this paper, an intrusion detection system is introduced that uses data mining and machine learning concepts to detect network intrusion patterns. In the proposed method, an artificial neural network (ANN) is used as a learning technique in intrusion ...
Shadi Moghanian   +3 more
doaj   +1 more source

N-STGAT: Spatio-Temporal Graph Neural Network Based Network Intrusion Detection for Near-Earth Remote Sensing

open access: yesRemote Sensing, 2023
With the rapid development of the Internet of Things (IoT)-based near-Earth remote sensing technology, the problem of network intrusion for near-Earth remote sensing systems has become more complex and large-scale.
Yalu Wang   +6 more
doaj   +1 more source

A new intrusion detection and alarm correlation technology based on neural network

open access: yesEURASIP Journal on Wireless Communications and Networking, 2019
With the continuous development of computer networks, the security of the network has become increasingly prominent. A major threat to network security is the intrusion of information systems through the network.
Yansong Liu, Li Zhu
doaj   +1 more source

Home - About - Disclaimer - Privacy