Network intrusion detection for cyber security on neuromorphic computing system

MZ Alom, TM Taha - 2017 International Joint Conference on …, 2017 - ieeexplore.ieee.org
In the paper, we demonstrate a neuromorphic cognitive computing approach for Network
Intrusion Detection System (IDS) for cyber security using Deep Learning (DL). The …

A distributed intrusion detection system with protection from an internal intruder

SI Shterenberg, MA Poltavtseva - Automatic Control and Computer …, 2018 - Springer
The protection of modern distributed information networks from external and internal
intruders continues to be of great importance due to the development of data transmission …

Artificial Bee Colony reinforced extended Kalman filter localization algorithm in internet of things with big data blending technique for finding the accurate position of …

RS Raghav, K Thirugnanasambandam, V Varadarajan… - Big Data, 2022 - liebertpub.com
In recent years, the growth of internet of things (IoT) is immense, and the observations of
their evolution need to be carried out effectively. The development of the IoT has been …

Aggregation of elastic stack instruments for collecting, storing and processing of security information and events

I Kotenko, A Kuleshov, I Ushakov - 2017 IEEE SmartWorld …, 2017 - ieeexplore.ieee.org
The paper suggests an approach to construction of the system for collecting, storing and
processing of data and security events on the basis of aggregation of instruments provided …

An enhanced network security using machine learning and behavioral analysis

MG Haricharan, SP Govind… - … for Advancement in …, 2023 - ieeexplore.ieee.org
With the advancement of the internet over the years, the number of attacks over the internet
has also increased. A powerful intrusion detection system (IDS) is required to ensure the …

A novel region adaptive SMOTE algorithm for intrusion detection on imbalanced problem

BH Yan, GD Han, MD Sun, SZ Ye - 2017 3rd IEEE international …, 2017 - ieeexplore.ieee.org
Machine learning techniques play a crucial part in intrusion detection and greatly change
the original intrusion detection methods. How to use machine learning technologies to …

Group-wise principal component analysis for exploratory intrusion detection

J Camacho, R Therón, JM García-Giménez… - IEEE …, 2019 - ieeexplore.ieee.org
Intrusion detection is a relevant layer of cybersecurity to prevent hacking and illegal activities
from happening on the assets of corporations. Anomaly-based Intrusion Detection Systems …

[PDF][PDF] 基于GSPN 的拟态DNS 构造策略研究

任权, 邬江兴, 贺磊 - Journal of Cyber Security 信息安全学报, 2019 - jcs.iie.ac.cn
摘要网络空间拟态防御系统(Cyberspace Mimic Defense System, CMDS)
采用动态异构冗余架构以及多模表决机制将不确定威胁转化为概率可控的事件 …

[PDF][PDF] A survey on feature selection for intrusion detection

R Zuech, TM Khoshgoftaar - … on reliability and quality in design, 2015 - researchgate.net
This study examines previous research works in applying feature selection to Intrusion
Detection. Feature selection has proven to improve or maintain similar classification …

Data-driven trust prediction in mobile edge computing-based iot systems

P Abeysekara, H Dong, AK Qin - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
We propose a data-driven distributed machine learning approach to scalably predict the
trustworthiness of homogeneous IoT services in heterogeneous Mobile Edge Computing …