Search
Search Results
-
Analysis and Implementation of Normalisation Techniques on KDD’99 Data Set for IDS and IPS
The rapid expansion of the Internet, numerous types of network attacks have emerged, making the ability to identify aberrant behaviour and accurately... -
Intrusion Classification and Detection System Using Machine Learning Models on NSL-KDD Dataset
Intrusion detection systems are crucial to cyberattack protection. This paper presents an intrusion detection system (IDS) architecture that uses... -
Enhancing Accuracy with Recursive Feature Selection Using Multiple Machine Learning and Deep Learning Techniques on NSL-KDD Dataset
The world has moved toward digital revolution and more and more services are now being available online. This has presented significant challenges in... -
A Statistical Analysis on KDD Cup’99 Dataset for the Network Intrusion Detection System
Knowledge Discovery and Data Mining Tools Competition (KDD Cup’99) has been used on prior choice by researchers for the purpose of research and... -
Toward support-vector machine-based ant colony optimization algorithms for intrusion detection
One of the major challenges of network traffic analysis is intrusion detection. Intrusion detection systems (IDSs) are designed to detect malicious...
-
An Optimal Cluster Based Intrusion Detection System for Defence Against Attack in Web and Cloud Computing Environments
In recent years, the rapid growth of information technology organizations causes ability to meet their demands such as scalability, mobility and...
-
HMS-IDS: Threat Intelligence Integration for Zero-Day Exploits and Advanced Persistent Threats in IIoT
Critical Industries such as Manufacturing, Power, and Intelligent Transportation are increasingly using IIoT systems, making them more susceptible to...
-
Intrusion Detection System Using Supervised Machine Learning
The whole world is joining the Internet because our world is moving toward digitalization. Internet/networks are significant today on the planet;... -
Optimization of BPN parameters using PSO for intrusion detection in cloud environment
The usage of internet is getting increased in all aspect, like from building various models that are fully connect with internet to the usage of...
-
Fog computing-based IoT-enabled system security for electrical vehicles in the smart grid
Wireless sensor networks (WSNs) face significant challenges related to dependability, integrity, and confidentiality due to their widespread...
-
Security and scalability issues in big data analytics in heterogeneous networks
Big data is most widely used in many applications to overcome the issues in various domains. The processing of huge and complicated data becomes more...
-
Comparative Analysis of Anomaly-Based Intrusion Detection System on Artificial Intelligence
Network security (NS) has now become critical in securing the computing infrastructure of government and industry. A current intrusion detection... -
Energy-aware ACO-DNN optimization model for intrusion detection of unmanned aerial vehicle (UAVs)
In modern militaries the Unmanned Aerial Vehicles (UAVs) are used for war fighting and also for certain civilian applications such as law...
-
Machine Learning Approach to the Internet of Things Threat Detection
The development in software, hardware and communication technologies has made the broadcasting of sensory data collected from various devices very... -
Real-Time Intrusion Detection in Connected Autonomous Vehicles
Connected autonomous vehicles (a.k.a CAVs) have shown a new paradigm in the transportation field by reducing cost, managing traffic and efficiently... -
Evaluating the Performance of Various SVM Kernel Functions Based on Basic Features Extracted from KDDCUP'99 Dataset by Random Forest Method for Detecting DDoS Attacks
The main goal of Denial of Service (DoS) attack is to restrict authorized users from gaining access to available services and resources or to prevent...
-
Designing a System Using Features Selection Based on Filter Methods and XGBoost Classifier for Detecting Intrusion in Cloud
Recently, with the accelerating growth of using cloud computing and its related services in various aspects, the difficulty of ensuring cybersecurity... -
Fusion-based anomaly detection system using modified isolation forest for internet of things
In recent years, advanced threat and zero day attacks are increasing significantly, but the traditional network intrusion detection system based on...
-
Intrusion Attack Detection Using Firefly Optimization Algorithm and Ensemble Classification Model
In recent decades, the Internet of Things (IoTs) based network intrusion detection (ID) remains a challenging research topic. Currently, several...
-
A distributed platform for intrusion detection system using data stream mining in a big data environment
With the growth of computer networks worldwide, there has been a greater need to protect local networks from malicious data that travel over the...