We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,040 results
  1. Intrusion Classification and Detection System Using Machine Learning Models on NSL-KDD Dataset

    Intrusion detection systems are crucial to cyberattack protection. This paper presents an intrusion detection system (IDS) architecture that uses...
    Conference paper 2024
  2. Enhancing Accuracy with Recursive Feature Selection Using Multiple Machine Learning and Deep Learning Techniques on NSL-KDD Dataset

    The world has moved toward digital revolution and more and more services are now being available online. This has presented significant challenges in...
    Subrat Mohanty, Satendra Kumar, Mayank Agarwal in Advances in Data-Driven Computing and Intelligent Systems
    Conference paper 2024
  3. Comparative Analysis of CatBoost Against Machine Learning Algorithms for Classification of Altered NSL-KDD

    The importance of information security, especially in network environments, has increased as a result of the expanding volume of data stored in...
    Conference paper 2024
  4. Intrusion Detection Systems Using Support Vector Machines on the KDDCUP’99 and NSL-KDD Datasets: A Comprehensive Survey

    With the growing rates of cyber-attacks and cyber espionage, the need for better and more powerful intrusion detection systems (IDS) is even more...
    Mikel K. Ngueajio, Gloria Washington, ... Yolande Ngueabou in Intelligent Systems and Applications
    Conference paper 2023
  5. Comparison of Principle Component Analysis and Stacked Autoencoder on NSL-KDD Dataset

    In the traditional era, there was no concern of time and the memory space, the processing was the main issues to solve any problem. But in the modern...
    Kuldeep Singh, Lakhwinder Kaur, Raman Maini in Computational Methods and Data Engineering
    Conference paper 2021
  6. Structural Analysis of the NSL-KDD Data Sets for Solving the Problem of Attacks Detection Using ML/DL Methods

    The study explores the potential for network intrusion detection using the popular NSL-KDD dataset. Before applying ML/DL methods, various options...
    Aleksandr Krivchenkov, Boriss Misnevs, Alexander Grakovski in Reliability and Statistics in Transportation and Communication
    Conference paper 2022
  7. A Deep Learning Model for Intrusion Detection with Imbalanced Dataset

    The frequency of cyberattacks increases as network technology evolves and Internet services become more widely utilized. As more individuals and...
    Chadia El Asry, Samira Douzi, Bouabid El Ouahidi in Advances in Intelligent System and Smart Technologies
    Conference paper 2024
  8. Feature Extraction and Anomaly Detection Using Different Autoencoders for Modeling Intrusion Detection Systems

    Maintaining network security by preventing attacks is essential for a network intrusion detection system. Machine learning techniques heavily depend...

    Arrun Sivasubramanian, Mithil Devisetty, Premjith Bhavukam in Arabian Journal for Science and Engineering
    Article 17 April 2024
  9. An Intrusion Detection System on The Internet of Things Using Deep Learning and Multi-objective Enhanced Gorilla Troops Optimizer

    In recent years, developed Intrusion Detection Systems (IDSs) perform a vital function in improving security and anomaly detection. The effectiveness...

    Hossein Asgharzadeh, Ali Ghaffari, ... Farhad Soleimanian Gharehchopogh in Journal of Bionic Engineering
    Article Open access 09 July 2024
  10. A Novel Intelligent Intrusion Prevention Framework for Network Applications

    Nowadays, the intrusion prevention model in network applications is essential in protecting data from malicious users. The intrusion prevention model...

    Rekha Gangula, Sreenivas Pratapagiri, ... Swapna Saturi in Wireless Personal Communications
    Article 04 June 2023
  11. IoT intrusion detection model based on gated recurrent unit and residual network

    The sample data of the existing intrusion detection models of the Internet of Things has defects such as class imbalance and insufficient feature...

    Guosheng Zhao, Cai Ren, ... Huan Chen in Peer-to-Peer Networking and Applications
    Article 06 June 2023
  12. A distributed platform for intrusion detection system using data stream mining in a big data environment

    With the growth of computer networks worldwide, there has been a greater need to protect local networks from malicious data that travel over the...

    Fábio César Schuartz, Mauro Fonseca, Anelise Munaretto in Annals of Telecommunications
    Article 08 June 2024
  13. Analysis of Machine Learning Classification Techniques for Anomaly Detection with NSL-KDD Data Set

    Along with the high-speed growth of the Internet, cyber-attacks are becoming even more frequent, so detecting network intrusions is essential for...
    Ana Cholakoska, Martina Shushlevska, ... Danijela Efnusheva in Data Science and Intelligent Systems
    Conference paper 2021
  14. Enhancing intrusion detection recursive feature elimination with resampling in WSN

    With the proliferation of technologies such as the Internet of Things, Cloud computing, and Social Networking, large quantities of network traffic...

    Ashwini B. Abhale, Jayaram Reddy Avulapalli in International Journal of System Assurance Engineering and Management
    Article 19 October 2023
  15. CNN-GRU-FF: a double-layer feature fusion-based network intrusion detection system using convolutional neural network and gated recurrent units

    Identifying and preventing malicious network behavior is a challenge for establishing a secure network communication environment or system. Malicious...

    Yakubu Imrana, Yan** **ang, ... Muhammed Amin Abdullah in Complex & Intelligent Systems
    Article Open access 02 February 2024
  16. Toward support-vector machine-based ant colony optimization algorithms for intrusion detection

    One of the major challenges of network traffic analysis is intrusion detection. Intrusion detection systems (IDSs) are designed to detect malicious...

    Ahmed Abdullah Alqarni in Soft Computing
    Article 28 February 2023
  17. Cloud intrusion detection framework using variational auto encoder Wasserstein generative adversarial network optimized with archerfish hunting optimization algorithm

    The cloud computing environment has been severely harmed by security issues, which has a negative impact on the healthy and sustainable development...

    G. Senthilkumar, K. Tamilarasi, J. K. Periasamy in Wireless Networks
    Article 01 December 2023
  18. A Novel Cyber Security Model Using Deep Transfer Learning

    Preventing attackers from interrupting or totally stop** critical services in cloud systems is a vital and challenging task. Today, machine...

    Ünal Çavuşoğlu, Devrim Akgun, Selman Hizal in Arabian Journal for Science and Engineering
    Article 24 July 2023
  19. HIDM: A Hybrid Intrusion Detection Model for Cloud Based Systems

    The cloud computing model is very popular among the users in different sectors like banking, healthcare, education etc due to its customized low-cost...

    Lalit Kumar Vashishtha, Akhil Pratap Singh, Kakali Chatterjee in Wireless Personal Communications
    Article 25 October 2022
  20. Adapting deep learning-LSTM method using optimized dataset in SDN controller for secure IoT

    The Internet of Things (IoT) has grown into various enterprises. While the IoT ecosystem's extensive and open environment has many advantages, it can...

    Omer Elsier Tayfour, Azath Mubarakali, ... Ashraf M. Abdelrahman in Soft Computing
    Article 09 May 2023
Did you find what you were looking for? Share feedback.