Results 21 to 30 of about 11,445 (258)
Borderline SMOTE Algorithm and Feature Selection-Based Network Anomalies Detection Strategy
This paper proposes a novel network anomaly detection framework based on data balance and feature selection. Different from the previous binary classification of network intrusion, the network anomaly detection strategy proposed in this paper solves the ...
Yong Sun +6 more
doaj +1 more source
An Efficient Network Intrusion Detection and Classification System
Intrusion detection in computer networks is of great importance because of its effects on the different communication and security domains. The detection of network intrusion is a challenge.
Iftikhar Ahmad +4 more
doaj +1 more source
Artificial Intelligence based Intrusion Detection System – A Detailed Survey [PDF]
The Internet and communications have rapidly expanded, leading to a significant rise in data generation and heterogeneity. Intrusion detection systems play a crucial role in ensuring the security and integrity of computer systems. These systems have been
Sharma Vishwas +3 more
doaj +1 more source
Tier-Based Optimization for Synthesized Network Intrusion Detection System
The innovation and evolution of hacking methodologies have led to a sharp rise in cyber attacks, highlighting the need for enhanced network security approaches.
Murtaza Ahmed Siddiqi, Wooguil Pak
doaj +1 more source
On intrusion detection in opportunistic networks
Opportunistic networks (oppnets) can be deployed in an ad hoc manner in order to cover large geographical areas. The main challenges in oppnets are interoperability, security and privacy issues. In this paper we concentrate on security issues and especially on intrusion detection.
Nicholas S. Samaras +3 more
openaire +1 more source
SoK - Network Intrusion Detection on FPGA
The amount of Internet traffic is ever increasing. With a well maintained network infrastructure, people find their way to Internet forums, video streaming services, social media and webshops on a day-to-day basis. With the growth of the online world, criminal activities have also spread out to the Internet.
Le Jeune, Laurens +5 more
openaire +3 more sources
Research on Key Technology of Network Intrusion Detection System Based on Improved GA-BPNN Algorithm
In recent years, with the rapid development of information and network technology, computer and network infrastructure has become a popular target of hacker attacks.
H.F. Hu, W.N. He
doaj +1 more source
Enhanced Network Intrusion Detection System [PDF]
A reasonably good network intrusion detection system generally requires a high detection rate and a low false alarm rate in order to predict anomalies more accurately. Older datasets cannot capture the schema of a set of modern attacks; therefore, modelling based on these datasets lacked sufficient generalizability. This paper operates on the UNSW-NB15
Ketan Kotecha +8 more
openaire +3 more sources
Intrusion Detection Algorithm for AMI Based on Improved Online Sequential Extreme Learning Machine [PDF]
To address the security threats in the communication between computer network and the Advanced Metering Infrastructure(AMI) for smart grid,this paper proposes an improved intrusion detection algorithm for AMI based on DBN-OS-RKELM.This algorithm uses ...
LIU Feifei, WU Zhongdong, DING Longbin, ZHANG Kai
doaj +1 more source
Towards Intrusion Detection for Encrypted Networks [PDF]
Traditionally, network-based Intrusion Detection Systems (NIDS) monitor network traffic for signs of malicious activities. However, with the growing use of Virtual Private Networks (VPNs) that encrypt network traffic, the NIDS can no longer analyse the encrypted data. This essentially negates any protection offered by the NIDS.
Vik Tor Goh, Jacob Zimmermann, Mark Looi
openaire +2 more sources

