Sign Up to like & get
recommendations!
1
Published in 2018 at "Cluster Computing"
DOI: 10.1007/s10586-018-1847-2
Abstract: The open deployment environment and limited resources of the Internet of things (IoT) make it vulnerable to malicious attacks, while the traditional intrusion detection system is difficult to meet the heterogeneous and distributed features of…
read more here.
Keywords:
detection;
security;
intrusion;
network intrusion ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "ICT Express"
DOI: 10.1016/j.icte.2018.01.002
Abstract: Abstract This paper proposes an FPGA-based network intrusion detection system for the IEC 61850-based industrial network that is specially designed for substation automation. The proposed system uses the Shift-And algorithm for detecting malicious network packets…
read more here.
Keywords:
network;
network intrusion;
based network;
fpga based ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2899721
Abstract: The network intrusion detection system is an important tool for protecting computer networks against threats and malicious attacks. Many techniques have recently been proposed; however, these techniques face significant challenges due to the continuous emergence…
read more here.
Keywords:
network intrusion;
model;
intrusion detection;
stage ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2917299
Abstract: The diversification of wireless network traffic attack characteristics has led to the problems what traditional intrusion detection technology with high false positive rate, low detection efficiency, and poor generalization ability. In order to enhance the…
read more here.
Keywords:
network intrusion;
wireless network;
intrusion detection;
network ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2925639
Abstract: Network evasions can bypass network intrusion detection/prevention systems to deliver exploits, attacks, or malware to victims without being detected. This paper presents a novel method for the detection and recognition of atomic network evasions by…
read more here.
Keywords:
network intrusion;
intrusion detection;
detection prevention;
prevention systems ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2977007
Abstract: To explore the advantages of adversarial learning and deep learning, we propose a novel network intrusion detection model called SAVAER-DNN, which can not only detect known and unknown attacks but also improve the detection rate…
read more here.
Keywords:
network intrusion;
savaer dnn;
encoder;
intrusion detection ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3031892
Abstract: In the field of intrusion detection, there is often a problem of data imbalance, and more and more unknown types of attacks make detection difficult. To resolve above issues, this article proposes a network intrusion…
read more here.
Keywords:
network intrusion;
intrusion detection;
cost sensitive;
network ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3051074
Abstract: Deep learning has become a research hotspot in the field of network intrusion detection. In order to further improve the detection accuracy and performance, we proposed an intrusion detection model based on improved deep belief…
read more here.
Keywords:
network intrusion;
intrusion detection;
deep belief;
network ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3054688
Abstract: Network Intrusion Detection is one of the most researched topics in the field of computer security. Hacktivists use sophisticated tools to launch numerous attacks that hamper the confidentiality, integrity and availability of computer resources. There…
read more here.
Keywords:
towards effective;
intrusion detection;
network intrusion;
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3118573
Abstract: A pattern matching method (signature-based) is widely used in basic network intrusion detection systems (IDS). A more robust method is to use a machine learning classifier to detect anomalies and unseen attacks. However, a single…
read more here.
Keywords:
detection;
double layered;
hybrid approach;
network intrusion ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3145002
Abstract: Network Intrusion Detection Systems (NIDSs) using pattern matching have a fatal weakness in that they cannot detect new attacks because they only learn existing patterns and use them to detect those attacks. To solve this…
read more here.
Keywords:
intrusion;
detection;
machine learning;
network intrusion ... See more keywords