Articles with "based intrusion" as a keyword



Photo by cokdewisnu from unsplash

Machine Learning Based Intrusion Detection Systems for IoT Applications

Sign Up to like & get
recommendations!
Published in 2020 at "Wireless Personal Communications"

DOI: 10.1007/s11277-019-06986-8

Abstract: Internet of Things (IoT) and its applications are the most popular research areas at present. The characteristics of IoT on one side make it easily applicable to real-life applications, whereas on the other side expose… read more here.

Keywords: machine learning; iot applications; detection systems; intrusion detection ... See more keywords
Photo by markusspiske from unsplash

An improved bio-inspired based intrusion detection model for a cyberspace

Sign Up to like & get
recommendations!
Published in 2021 at "Cogent engineering"

DOI: 10.1080/23311916.2020.1859667

Abstract: Bio-inspired intrusion detection solutions provide better detection accuracy than conventional solutions in securing cyberspace. However, existing bio-inspired anomaly-based intrusion detection sys... read more here.

Keywords: detection; bio inspired; cyberspace; intrusion detection ... See more keywords
Photo from wikipedia

Anomaly-Based Intrusion Detection From Network Flow Features Using Variational Autoencoder

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3001350

Abstract: The rapid increase in network traffic has recently led to the importance of flow-based intrusion detection systems processing a small amount of traffic data. Furthermore, anomaly-based methods, which can identify unknown attacks are also integrated… read more here.

Keywords: based intrusion; variational autoencoder; network; flow ... See more keywords
Photo by hajjidirir from unsplash

Semisupervised Federated-Learning-Based Intrusion Detection Method for Internet of Things

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3175918

Abstract: Federated learning (FL) has become an increasingly popular solution for intrusion detection to avoid data privacy leakage in Internet of Things (IoT) edge devices. Existing FL-based intrusion detection methods, however, suffer from three limitations: 1)… read more here.

Keywords: intrusion detection; based intrusion; federated learning; detection ... See more keywords
Photo by joshuafernandez from unsplash

Histogram-Based Intrusion Detection and Filtering Framework for Secure and Safe In-Vehicle Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Intelligent Transportation Systems"

DOI: 10.1109/tits.2021.3088998

Abstract: In this paper, we propose H-IDFS, a Histogram-based Intrusion Detection and Filtering framework, which assembles the CAN packets into windows, and computes their corresponding histograms. The latter are fed to a multi-class IDS classifier to… read more here.

Keywords: intrusion detection; based intrusion; histogram based; detection filtering ... See more keywords

The Evolution of Federated Learning-Based Intrusion Detection and Mitigation: A Survey

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Network and Service Management"

DOI: 10.1109/tnsm.2022.3177512

Abstract: In 2016, Google introduced the concept of Federated Learning (FL), enabling collaborative Machine Learning (ML). FL does not share local data but ML models, offering applications in diverse domains. This paper focuses on the application… read more here.

Keywords: intrusion detection; based intrusion; federated learning; survey ... See more keywords
Photo by joshuafernandez from unsplash

An Explainable AI-Based Intrusion Detection System for DNS Over HTTPS (DoH) Attacks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.36227/techrxiv.17696972

Abstract: Over the past few years, Domain Name Service (DNS) remained a prime target for hackers as it enables them to gain first entry into networks and gain access to data for exfiltration. Although the DNS… read more here.

Keywords: dns https; based intrusion; explainable based; https ... See more keywords