Articles with "intrusion detection" as a keyword



Photo from wikipedia

Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions

Sign Up to like & get
recommendations!
Published in 2019 at "Neural Computing and Applications"

DOI: 10.1007/s00521-019-04557-3

Abstract: This study reviews and analyses the research landscape for intrusion detection systems (IDSs) based on deep learning (DL) techniques into a coherent taxonomy and identifies the gap in this pivotal research area. The focus is… read more here.

Keywords: analysis; deep learning; detection systems; intrusion detection ... See more keywords
Photo from wikipedia

A stacked ensemble learning model for intrusion detection in wireless network

Sign Up to like & get
recommendations!
Published in 2020 at "Neural Computing and Applications"

DOI: 10.1007/s00521-020-04986-5

Abstract: Intrusion detection pretended to be a major technique for revealing the attacks and guarantee the security on the network. As the data increases tremendously every year on the Internet, a single algorithm is not sufficient… read more here.

Keywords: ensemble learning; intrusion detection; network; stacked ensemble ... See more keywords
Photo by strong18philip from unsplash

Contextual information fusion for intrusion detection: a survey and taxonomy

Sign Up to like & get
recommendations!
Published in 2017 at "Knowledge and Information Systems"

DOI: 10.1007/s10115-017-1027-3

Abstract: Research in cyber-security has demonstrated that dealing with cyber-attacks is by no means an easy task. One particular limitation of existing research originates from the uncertainty of information that is gathered to discover attacks. This… read more here.

Keywords: contextual information; intrusion detection; information; survey ... See more keywords
Photo by dtopkin1 from unsplash

Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts

Sign Up to like & get
recommendations!
Published in 2020 at "International Journal of Information Security"

DOI: 10.1007/s10207-020-00506-7

Abstract: Cyber-security attacks are becoming more frequent and more severe day by day. To detect the execution of such attacks, organizations install intrusion detection systems. It would be beneficial for such organizations to collaborate, to better… read more here.

Keywords: detection; privacy preserving; intrusion detection; detection alerts ... See more keywords
Photo from wikipedia

An intrusion detection approach based on improved deep belief network

Sign Up to like & get
recommendations!
Published in 2020 at "Applied Intelligence"

DOI: 10.1007/s10489-020-01694-4

Abstract: In today’s interconnected society, cyberattacks have become more frequent and sophisticated, and existing intrusion detection systems may not be adequate in the complex cyberthreat landscape. For instance, existing intrusion detection systems may have overfitting, low… read more here.

Keywords: approach based; network; intrusion; intrusion detection ... See more keywords
Photo from wikipedia

Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET

Sign Up to like & get
recommendations!
Published in 2017 at "Cluster Computing"

DOI: 10.1007/s10586-017-0927-z

Abstract: Mobile ad hoc networks (MANETs) are qualified by multi-hop wireless links and resource restrained nodes. Generally, mobile ad hoc networks (MANETs) are susceptible to various attacks like gray hole attack, black hole attack, selective packet… read more here.

Keywords: attack; detection system; detection; trust ... See more keywords
Photo from wikipedia

Intrusion detection of distributed denial of service attack in cloud

Sign Up to like & get
recommendations!
Published in 2017 at "Cluster Computing"

DOI: 10.1007/s10586-017-1149-0

Abstract: Security issue in cloud environment is one of the major obstacle in cloud implementation. Network attacks make use of the vulnerability in the network and the protocol to damage the data and application. Cloud follows… read more here.

Keywords: network; denial service; cloud; intrusion detection ... See more keywords
Photo from wikipedia

Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation

Sign Up to like & get
recommendations!
Published in 2017 at "Cluster Computing"

DOI: 10.1007/s10586-017-1187-7

Abstract: Cloud environment is an assembly of resources for furnishing on-demand services to cloud customers. Here access to cloud environment is via internet services in which data stored on cloud environment are easier to both internal… read more here.

Keywords: classification; system; cloud environment; intrusion detection ... See more keywords
Photo by scottwebb from unsplash

Mobile network intrusion detection for IoT system based on transfer learning algorithm

Sign Up to like & get
recommendations!
Published in 2018 at "Cluster Computing"

DOI: 10.1007/s10586-018-1847-2

Abstract: The open deployment environment and limited resources of the Internet of things (IoT) make it vulnerable to malicious attacks, while the traditional intrusion detection system is difficult to meet the heterogeneous and distributed features of… read more here.

Keywords: detection; security; intrusion; network intrusion ... See more keywords
Photo from wikipedia

HFFPNN classifier: a hybrid approach for intrusion detection based OPSO and hybridization of feed forward neural network (FFNN) and probabilistic neural network (PNN)

Sign Up to like & get
recommendations!
Published in 2021 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-020-09804-7

Abstract: Quick increase in web and system advancements has prompted significant increase in number of attacks and intrusions. Identification and prevention of these attacks has turned into an important part of security. Intrusion detection framework is… read more here.

Keywords: hybridization feed; neural network; intrusion detection; network ... See more keywords
Photo from wikipedia

A Neural Network-Based Learning Algorithm for Intrusion Detection Systems

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-017-4663-8

Abstract: Recently, intrusion detection systems (IDS) have been introduced to effectively secure networks. Using neural networks and machine learning in detecting and classifying intrusions are powerful alternative solutions. In this research paper, both of Gradient descent… read more here.

Keywords: based learning; detection systems; neural network; intrusion detection ... See more keywords