Results 71 to 80 of about 119,256 (176)

A Hierarchical Machine Learning Method for Detection and Visualization of Network Intrusions from Big Data

open access: yesTechnologies
Machine learning is regarded as an effective approach in network intrusion detection, and has gained significant attention in recent studies. However, few intrusion detection methods have been successfully applied to detect anomalies in large-scale ...
Jinrong Wu   +3 more
doaj   +1 more source

Data Pre-Processing and Classification for Traffic Anomaly Intrusion Detection Using NSLKDD Dataset

open access: yesCybernetics and Information Technologies, 2018
Network security is essential in the Internet world. Intrusion Detection is one of the network security components. Anomaly Intrusion Detection is a type of intrusion detection that captures the intrinsic characteristics of normal data and uses it in the
Gnanaprasanambikai L.   +1 more
doaj   +1 more source

Bayesian Networks for Network Intrusion Detection

open access: yes, 2010
As the use of Internet grows beyond all boundaries, the number of menaces rises to become subject of concern and increasing research. Against this, Network Intrusion Detection Systems (NIDS) monitor local networks to separate legitimate from dangerous behaviours. According to their capabilities and goals, NIDS are divided into misuse detection systems (
G., Bringas, Pablo, Igor, Santos,
openaire   +3 more sources

Research on intrusion response strategy based on static Bayesian game in mobile edge computing network

open access: yesTongxin xuebao, 2023
In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion ...
Wei FAN   +3 more
doaj   +2 more sources

Network Intrusion Detection Based on Machine Learning Classification Algorithms: A Review

open access: yesJISA (Jurnal Informatika dan Sains)
The worldwide internet continues to spread, presenting numerous escalating hazards with significant potential. Existing static detection systems necessitate frequent updates to signature-based databases and solely detect known malicious threats.
Aqeel Hanash Younis   +1 more
doaj   +1 more source

Research on industrial control system intrusion detection method based on simulation modelling

open access: yesTongxin xuebao, 2017
At present,intrusion detection system over fieldbus network layer was a basic protection method in industrial control system.However,it has some weakness,such as poor generality,high false-positive rate,and unable to detect unknown anomaly.An industrial ...
Yi-wei GAO   +5 more
doaj   +2 more sources

Research on Virus Propagation Network Intrusion Detection Based on Graph Neural Network

open access: yesMathematics
The field of network security is highly concerned with intrusion detection, which safeguards the security of computer networks. The invention and application of intrusion detection technology play indispensable roles in network security, and it is ...
Xianer Ying   +7 more
doaj   +1 more source

Simulation of automatic intrusion detection in university networks by using neural network algorithms

open access: yesResults in Engineering
With the rapid development of computers and the Internet, university networks are facing more and more network intrusion threats, and it is necessary to develop an automatic detection method based on neural network algorithms.
Houdun Xu
doaj   +1 more source

Anomaly based network intrusion detection

open access: yes, 2023
Ao longo dos últimos anos, a segurança de hardware e software tornou-se uma grande preocupação. À medida que a complexidade dos sistemas aumenta, as suas vulnerabilidades a sofisticadas técnicas de ataque têm proporcionalmente escalado. Frequentemente o problema reside na heterogenidade de dispositivos conectados ao veículo, tornando difícil a ...
openaire   +1 more source

Network security & intrusion detection

open access: yes, 2002
The scope of this project is to focus on the common Internet Infrastructures flaws, discuss a number of attacking methods and provide simple solutions on the ways to defend the network. ​Master of Science (Communications Engineering)
openaire   +1 more source

Home - About - Disclaimer - Privacy