[PDF][PDF] 网络入侵检测技术综述

蹇诗婕, 卢志刚, 杜丹, 姜波, 刘宝旭 - 信息安全学报, 2020 - jcs.iie.ac.cn
摘要随着互联网时代的发展, 内部威胁, 零日漏洞和DoS 攻击等攻击行为日益增加,
网络安全变得越来越重要, 入侵检测已成为网络攻击检测的一种重要手段. 随着机器学习算法的 …

MLEsIDSs: machine learning-based ensembles for intrusion detection systems—a review

G Kumar, K Thakur, MR Ayyagari - The Journal of Supercomputing, 2020 - Springer
Network security plays an essential role in secure communication and avoids financial loss
and crippled services due to network intrusions. Intruders generally exploit the flaws of …

[HTML][HTML] Network intrusion detection model based on CNN and GRU

B Cao, C Li, Y Song, Y Qin, C Chen - Applied Sciences, 2022 - mdpi.com
A network intrusion detection model that fuses a convolutional neural network and a gated
recurrent unit is proposed to address the problems associated with the low accuracy of …

Industrial security solution for virtual reality

Z Lv, D Chen, R Lou, H Song - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
In order to protect industrial safety, improve the operation stability of the industrial control
system, conduct the response measures for network environment attacked by the external …

Network intrusion detection technology based on convolutional neural network and BiGRU

B Cao, C Li, Y Song, X Fan - Computational Intelligence and …, 2022 - Wiley Online Library
To solve the problem of low accuracy and high false‐alarm rate of existing intrusion
detection models for multiple classifications of intrusion behaviors, a network intrusion …

HIDM: A hybrid intrusion detection model for cloud based systems

LK Vashishtha, AP Singh, K Chatterjee - Wireless Personal …, 2023 - Springer
The cloud computing model is very popular among the users in different sectors like
banking, healthcare, education etc due to its customized low-cost services with high level …

A novel anomaly detection approach based on ensemble semi-supervised active learning (ADESSA)

Z Niu, W Guo, J Xue, Y Wang, Z Kong, L Huang - Computers & Security, 2023 - Elsevier
As an industrial infrastructure, the safety and reliability of the Cyber-Physical System
requires the effective anomaly detection. However, the existing detection methods have …

An intrusion detection algorithm based on bag representation with ensemble support vector machine in cloud computing

J Wei, C Long, J Li, J Zhao - Concurrency and Computation …, 2020 - Wiley Online Library
The increase of security incidents brings a challenge to the cloud computing security.
Intrusion detection technologies have been applied to protect information in cloud from …

Feature selection‐integrated classifier optimisation algorithm for network intrusion detection

H Güney - Concurrency and Computation: Practice and …, 2023 - Wiley Online Library
In the era of technology, information security has gained significant importance, as intruders
constantly conduct attacks to breach information systems. Intelligent network intrusion …

Network anomalies detection approach based on weighted voting

S Sakulin, A Alfimtsev, K Kvitchenko… - International Journal of …, 2022 - igi-global.com
To avoid information systems malfunction, their integrity disruption, availability violation as
well as data confidentiality, it is necessary to detect anomalies in information system …