Results 61 to 70 of about 119,256 (176)

Network intrusion detection system using supervised learning paradigm

open access: yesScientific African, 2020
Internet has positively changed social, political and economic structures and in many ways obviating geographical boundaries. The enormous contributions of Internet to business transactions coupled with its ease of use has resulted in increased number of
J. Olamantanmi Mebawondu   +3 more
doaj   +1 more source

Modified Apriori Approach for Evade Network Intrusion Detection System

open access: yes, 2014
Intrusion Detection System or IDS is a software or hardware tool that repeatedly scans and monitors events that took place in a computer or a network.
Chandankhede, Chaitali   +2 more
core   +1 more source

Unsupervised Anomaly Detection with Unlabeled Data Using Clustering [PDF]

open access: yes, 2005
Intrusions pose a serious security risk in a network environment. New intrusion types, of which detection systems are unaware, are the most difficult to detect.
Abdullah, Abdul Hanan   +2 more
core  

Network Intrusion Detection System

open access: yesInternational Research Journal of Modernization in Engineering Technology & Science
Network intrusion detection systems (NIDS) play a crucial role in safeguarding network infrastructures against unauthorized access and malicious activities. This abstract explores the fundamental concepts, methodologies, and challenges associated with NIDS.
openaire   +2 more sources

Network Intrusion Detection and Prevention

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2022
Abstract: Intrusion Detection systems are now increasingly significant in network security. As the number of people using the internet grows, so does the chance of a cyberattack. People are adopting signature-based intrusion detection systems. Snort is a popular open-source signature-based intrusion detection system.
Saloni Anand, Kshitij Patne
openaire   +1 more source

Analysis of Network Intrusion Detection Based on Semi-Supervised and SS-DGM

open access: yesIEEE Access
The rapid advancement of technology has made network security a hot topic of concern for researchers worldwide. Therefore, to improve the accuracy and real-time response capability of network intrusion detection systems, and to effectively detect and ...
Xiao Yu   +5 more
doaj   +1 more source

Wireless Network Intrusion Detection Based on Improved Convolutional Neural Network

open access: yesIEEE Access, 2019
The diversification of wireless network traffic attack characteristics has led to the problems what traditional intrusion detection technology with high false positive rate, low detection efficiency, and poor generalization ability.
Hongyu Yang, Fengyan Wang
doaj   +1 more source

Intrusion Detection in SCADA Networks [PDF]

open access: yes, 2010
Supervisory Control and Data Acquisition (SCADA) systems are a critical part of large industrial facilities, such as water distribution infrastructures. With the goal of reducing costs and increasing efficiency, these systems are becoming increasingly interconnected. However, this has also exposed them to a wide range of network security problems.
Barbosa, Rafael Ramos Regis, Pras, Aiko
openaire   +1 more source

A Study on Data Mining Based Intrusion Detection System [PDF]

open access: yes, 2014
In recent years security has remained unsecured for computers as well as data network systems. Intrusion detecting system used to safeguard the data confidentiality, integrity and system availability from various types of attacks.
Anthony Raj, A.
core  

A Novel Network Intrusion Detection Based on Variational Long Short-Term Memory and Federated Learning Under Cloud Computing Environment

open access: yesJournal of Applied Science and Engineering
This paper proposes a novel network intrusion detection method based on Variational Long Short-Term Memory (VLSTM) and Federated Learning (FL), aiming to effectively enhance the performance of network intrusion detection in cloud computing environments ...
Lu Fang
doaj   +1 more source

Home - About - Disclaimer - Privacy