Multistage N/W Intrusion-Detection system implementation through DL and Image Classification

K Raghuram, G Sethi, U Kumar… - 2023 3rd …, 2023 - ieeexplore.ieee.org
The current worldwide surge in hack and computer cluster attacks has heightened the
demand for stronger prevention and detection systems. The system that detects intrusions …

Detection of Cyber-attacks using Deep Convolution in Honeyed Framework

S Nath, D Pal, S Saha - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
A network-related environment called a “honeyed framework” served to defend official
network resources against harm. This framework creates a scenario that motivates the …

[PDF][PDF] HERA: Enhancing Network Security with a New Dataset Creation Tool

DAP Pinto - 2024 - repositorio-aberto.up.pt
In recent years, the surge in cybersecurity threats has highlighted the critical need for robust
network intrusion detection systems. These systems are essential for identifying anomalous …

Multi-Versioning and Microservices: A Strategy for Developing Reliable Software Systems

N Akhtarian - 2024 - yorkspace.library.yorku.ca
In the dynamic realm of software engineering, adaptability is key to sustaining system
performance and reliability. Software iterations often bring about challenges such as …

Détection d'attaques DDoS dans le contexte d'un fournisseur cloud de grande envergure

C Boin - 2023 - hal.science
L'objet de cette thèse est la conception et le développement d'un système de détection des
attaques DDoS volumétriques, intégré au sein d'une infrastructure en nuage (cloud). Cette …

Cross Model Verification of Intrusion Detection System on IoT Using Convolutional Neural Network

V Surya, C Shanthi - … IEEE International Conference on ICT in …, 2023 - ieeexplore.ieee.org
The IDS to secure IoT devices have become so important with the tremendous growth in the
field of IoT. The potential damage to the IoT network by different types of attacks is …

Simulator of Distributed Datasets for Pulse-wave DDoS Attacks

P Kiechl - 2023 - zora.uzh.ch
The ever increasing scale and frequency of Distributed Denial-of-Service (DDoS) attacks, as
well as the emergence of new forms of attacks, such as pulse-wave DDoS attacks, highlights …

JKSCI

HJ Yeo, JH Jeong, SH Kim - Journal of The Korea Society of Computer …, 2022 - dbpia.co.kr
This paper aims to find promising export items for market expansion of defense export items.
Germany, the UK, and France were selected as export target countries to obtain …

A review of neural networks for rare intrusions detection in wireless networks

VV Thang, DV Pantiukhin, BTT Quyen, VV Vu - Journal of Science and …, 2023 - isj.vn
Neural networks have become the most popular approach for detecting tasks. Currently,
neural networks have been strongly applied in the fields of image processing, text and …

[PDF][PDF] Telosian: a real-time anomaly detection algorithm optimized for concept drift

IAO Maldonado - 2023 - vu-business-analytics.github.io
The increasing amount of available data and new attacks appearing in the cyber security
sector require new methods to timely detect new threats. Additionally, the concept drift in the …