Results 21 to 30 of about 119,256 (176)

Borderline SMOTE Algorithm and Feature Selection-Based Network Anomalies Detection Strategy

open access: yesEnergies, 2022
This paper proposes a novel network anomaly detection framework based on data balance and feature selection. Different from the previous binary classification of network intrusion, the network anomaly detection strategy proposed in this paper solves the ...
Yong Sun   +6 more
doaj   +1 more source

A taxonomy of malicious traffic for intrusion detection systems [PDF]

open access: yes, 2018
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert   +5 more
core   +4 more sources

Tier-Based Optimization for Synthesized Network Intrusion Detection System

open access: yesIEEE Access, 2022
The innovation and evolution of hacking methodologies have led to a sharp rise in cyber attacks, highlighting the need for enhanced network security approaches.
Murtaza Ahmed Siddiqi, Wooguil Pak
doaj   +1 more source

An overview to Software Architecture in Intrusion Detection System [PDF]

open access: yes, 2014
Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network.
Bahrami, Mehdi, Bahrami, Mohammad
core   +1 more source

Artificial Intelligence based Intrusion Detection System – A Detailed Survey [PDF]

open access: yesITM Web of Conferences
The Internet and communications have rapidly expanded, leading to a significant rise in data generation and heterogeneity. Intrusion detection systems play a crucial role in ensuring the security and integrity of computer systems. These systems have been
Sharma Vishwas   +3 more
doaj   +1 more source

An Efficient Network Intrusion Detection and Classification System

open access: yesMathematics, 2022
Intrusion detection in computer networks is of great importance because of its effects on the different communication and security domains. The detection of network intrusion is a challenge.
Iftikhar Ahmad   +4 more
doaj   +1 more source

Intrusion Detection Systems for Community Wireless Mesh Networks [PDF]

open access: yes, 2008
Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive.
Hutchison, David   +3 more
core   +1 more source

Network intrusion detection leveraging multimodal features

open access: yesArray, 2023
Network Intrusion Detection Systems (NIDSes) are essential for safeguarding critical information systems. However, the lack of adaptability of Machine Learning (ML) based NIDSes to different environments could cause slow adoption. In this paper, we propose a multimodal NIDS that combines flow and payload features to detect cyber-attacks.
Aklil Kiflay   +3 more
openaire   +2 more sources

Toward Network-based DDoS Detection in Software-defined Networks [PDF]

open access: yes, 2018
To combat susceptibility of modern computing systems to cyberattack, identifying and disrupting malicious traffic without human intervention is essential.
Chaves Luciano Jerez   +4 more
core   +1 more source

Research on Key Technology of Network Intrusion Detection System Based on Improved GA-BPNN Algorithm

open access: yesChemical Engineering Transactions, 2016
In recent years, with the rapid development of information and network technology, computer and network infrastructure has become a popular target of hacker attacks.
H.F. Hu, W.N. He
doaj   +1 more source

Home - About - Disclaimer - Privacy