Anomaly-based Network Intrusion Detection Methods
The article deals with detection of network anomalies. Network anomalies include everything that is quite different from the normal operation. For detection of anomalies were used machine learning systems. Machine learning can be considered as a support or a limited type of artificial intelligence.
Nevlud, Pavel +3 more
openaire +3 more sources
As the range of security attacks increases across diverse network applications, intrusion detection systems are of central interest. Such detection systems are more crucial for the Internet of Things (IoT) due to the voluminous and sensitive data it ...
Shapla Khanam +3 more
doaj +1 more source
Perancangan Dan Analisis Sistem Pendeteksi Intrusi Berbasis Network Intrusion Detection System (Nids) Pada Sistem Keamanan Jaringan Komputer [PDF]
Network intrusion detection system is a system that can detect illegal accesses or intrusions happened in a computer network. Actually, there are many types of intrusion detection systems and the differences are based on how network administrators ...
Gozali, F. (Ferrianto) +1 more
core
VAE-WACGAN: An Improved Data Augmentation Method Based on VAEGAN for Intrusion Detection
To address the class imbalance issue in network intrusion detection, which degrades performance of intrusion detection models, this paper proposes a novel generative model called VAE-WACGAN to generate minority class samples and balance the dataset. This
Wuxin Tian +4 more
doaj +1 more source
Intelligent Processing of Intrusion Detection Data
Intrusion detection technology, as an active and effective dynamic network defense technology, has rapidly become a hot research topic in the field of network security since it was proposed.
Tao Duan +6 more
doaj +1 more source
Notifikasi Network Intrusion Detection System Menggunakan Media Aplikasi Telegram (Studi Kasus: Kantor Imigrasi Tasikmalaya) [PDF]
Pada jaringan local area network sering terdapat keluhan seperti sering terjadinya gangguan pada server dimana gangguan tersebut bisa berasal dari pihak-pihak yang tidak bertanggungjawab / penyusup (intruder) dengan memanfaatkan kelemahan sistem keamanan
Nuraeni, F. (Fitri) +1 more
core
An Implementation of Intrusion Detection System Using Genetic Algorithm
Nowadays it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions
Bikas, Md. Abu Naser +2 more
core +2 more sources
Threshold verification using statistical approach for fast attack detection [PDF]
Network has grows to a mammoth size and becoming more complex, thus exposing the services it offers towards multiple types of intrusion vulnerabilities.One method to overcome intrusion is by introducing Intrusion Detection System (IDS) for detecting the
Abdollah, Mohd Faizal +4 more
core +1 more source
A machine learning approach with verification of predictions and assisted supervision for a rule-based network intrusion detection system [PDF]
Network security is a branch of network management in which network intrusion detection systems provide attack detection features by monitorization of traffic data.
Fernández Villamor, José Ignacio +1 more
core +1 more source
LOGICAL TIME AND SPACE OF THE NETWORK INTRUSION
Nowadays, one of the biggest threats for modern computer networks are the cyber attacks. One of the possible ways how to increase the level of computer networks security is a deployment of a network intrusion detection system.
Daniel MIHÁLYI +2 more
doaj +1 more source

