We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 34 results
  1. Denial-of-Service (DoS) Threat Detection Using Supervised Machine Learning Algorithms on CICIDS2018 Dataset

    Identification and protection against ever-growing cyber threats is a constantly evolving challenge for traditional Intrusion Detection Systems....
    Conference paper 2022
  2. Designing Intelligent Intrusion Detection System for Industry 4.0 Using Feature Learning Techniques

    Increase in connectivity and cost pressure has pushed Industry 4.0 to rely on the systems built over Internet of Things (IoT). These IoT devices are...
    Conference paper 2023
  3. Deep Convolutional Neural Network for Active Intrusion Detection and Protect data from Passive Intrusion by Pascal Triangle

    Active and passive intrusion are the two types of intrusion. The active intrusion attempts to modify the data and the passive intrusion observes the...

    Abdulrahman Saad Alqahtani in Wireless Personal Communications
    Article 30 January 2024
  4. Boosting Algorithms-Based Intrusion Detection System: A Performance Comparison Perspective

    An intrusion detection system (IDS) monitors the system’s behavior and network for suspicious activities. IDS was first proposed in 1980, and it has...
    Conference paper 2023
  5. Hybrid architecture for mitigating DDoS and other intrusions in SDN-IoT using MHDBN-W deep learning model

    The Internet of Things (IoT) connects billions of devices. However, because of its heterogeneous system and broad connectivity, it is vulnerable to...

    Article 13 May 2024
  6. Probability Boosted Regression for Intrusion Detection in Cyberactive Space

    Protecting cyber-physical infrastructure from random network attacks is critical in this age of widespread Internet connectivity. This will prevent...
    Conference paper 2024
  7. Performance and Complexity Tradeoffs of Feature Selection on Intrusion Detection System-Based Neural Network Classification with High-Dimensional Dataset

    In the realm of cyber security, particularly in the area of network security, IDS has recently attracted researchers’ attention since it has been...
    Conference paper 2023
  8. CoWrap: An Approach of Feature Selection for Network Anomaly Detection

    Feature Selection (FS) is a crucial technique that picks out the most significant features from an augmented and ambiguous feature set to increase...
    Anonnya Ghosh, Hussain Mohammed Ibrahim, ... Raqeebir Rab in Advanced Information Networking and Applications
    Conference paper 2022
  9. BotDefender: A Collaborative Defense Framework Against Botnet Attacks using Network Traffic Analysis and Machine Learning

    Botnets, an army of remotely controlled compromised devices called bots, routinely cause severe damage to infrastructures and organizations. Since...

    Arvind Prasad, Shalini Chandra in Arabian Journal for Science and Engineering
    Article 13 June 2023
  10. Ensemble Learning Based Big Data Classification for Intrusion Detection

    The growth of technology has made life much easier with its speed, but we cannot deny that it suers from multiple security problems. Therefore, the...
    Kamel Yasmine Kamel, Farah Jemili, Rahma Meddeb in Intelligent Systems Design and Applications
    Conference paper 2023
  11. A Comprehensive Analysis of Novel Intrusion Detection Systems for Internet of Things Networks

    In recent years, the Internet of Things (IoT) paradigm has shown massive embracing by various industries notably the medical sector, vehicle...
    Zouhair Chiba, Noreddine Abghour, ... Oumaima Lifandali in Artificial Intelligence and Smart Environment
    Conference paper 2023
  12. Study of Class Incremental Learning Strategies for Intrusion Detection System

    In today’s digital world, the Internet connects many apps and gadgets. This advancement is beneficial in many aspects, but on the other hand, it...
    Parvati Bhurani, Satyendra Singh Chouhan, Namita Mittal in Intelligent Data Engineering and Analytics
    Conference paper 2023
  13. Meta learning-based few-shot intrusion detection for 5G-enabled industrial internet

    With the formation and popularization of the 5G-enabled industrial internet, cybersecurity risks are increasing, and the limited number of attack...

    Yu Yan, Yu Yang, ... Yuheng Gu in Complex & Intelligent Systems
    Article Open access 25 March 2024
  14. Interpreting Intrusions - The Role of Explainability in AI-Based Intrusion Detection Systems

    Machine learning has become a key component of the effective detection of network intrusions. Yet, it comes with the lack of transparency - an issue...
    Marek Pawlicki, Aleksandra Pawlicka, ... Michał Choraś in Progress on Pattern Classification, Image Processing and Communications
    Conference paper 2023
  15. A Systematic Literature Review of Network Intrusion Detection System Models

    Rapid growth in the communication and Internet domains requires large network data and network size. Thereby, in such a network, several new attacks...
    Conference paper 2023
  16. Accuracy Improvement of Network Intrusion Detection System Using Bidirectional Long-Short Term Memory (Bi-LSTM)

    An intrusion detection system (IDS), sometimes known as an infiltration prevention system, is an active defensive mechanism deployed by the Internet...
    Salmi Salim, Oughdir Lahcen in Digital Technologies and Applications
    Conference paper 2023
  17. Multi-layer Intrusion Detection on the USB-IDS-1 Dataset

    Intrusion detection plays a key role in a modern cyber security system. In recent years, several research studies have utilized state-of-the-art...
    Quang-Vinh Dang in Hybrid Intelligent Systems
    Conference paper 2023
  18. Intrusion Detection in IoT Devices Using ML and DL Models with Fisher Score Feature Selection

    IoT devices are physical things that have sensors, network connectivity, and software built into them. This allows them to gather data and share it...
    Deeksha Rajput, Deepak Kumar Sharma, Megha Gupta in Cryptology and Network Security with Machine Learning
    Conference paper 2024
  19. Classification of Bruteforce Attacks Using Convolution Neural Network

    The computer technology is being advanced day by day such that it results in being subjected to various data breaches and network attacks that might...
    Srikakulapu Bhavitha, S. Kranthi, Adapaka Sai Kishore in Proceedings of International Conference on Network Security and Blockchain Technology
    Conference paper 2024
  20. Intrusion Detection System Using Big Data Based Hybrid Hierarchical Model (BDHHM) of Deep Learning

    The world interconnectivity for the Internet infrastructure has been increasing incredibly because of the enormous increase of data day by day. As...
    U. B. Mahadevaswamy, Meghana Nagaraju in Sustainable Communication Networks and Application
    Conference paper 2022
Did you find what you were looking for? Share feedback.