An Ensemble Framework for Network Anomaly Detection Using Isolation Forest and Autoencoders

G Maheswari, A Vinith… - … on Advances in Data …, 2024 - ieeexplore.ieee.org
In today's digitally interconnected world, securing computer networks against potential
threats is of utmost importance integrity and confidentiality of sensitive information are some …

Enhancing IoT Security Through Anomaly Detection and Intrusion Prevention in Cyber-Physical System

R Tamilkodi, N Madhuri, N Pavansai… - International …, 2024 - atlantis-press.com
Cyber-attacks on cyber-physical systems can lead to severe consequences, jeopardizing
the integrity, availability, and functionality of interconnected physical and digital components …

Binary Classification for Attack Detection using Ensemble Machine Learning Models

P Nutipalli, SPK Gudla, PK Prasad… - … Approaches in Smart …, 2023 - ieeexplore.ieee.org
Now-a-Days Intrusion Detection System is highly being used for detecting the attacks over
the network. It usually depends on the signatures and rules provided for identifying the …

Enhancing iot network security through advanced data preprocessing and hybrid firefly-salp swarm optimized deep CNN-based intrusion detection

B Jayan, T Ganesan, BB Kurup - ITEGAM-JETIA, 2024 - itegam-jetia.org
This concept addresses the imperative need for robust Intrusion Detection system (IDs) in
Internet of Things (IoT) networks by presenting a comprehensive approach that integrates …

Original Research Article Network intrusion detection using ensemble weighted voting classifier based honeypot framework

P Pothumani, ES Reddy - Journal of Autonomous Intelligence, 2024 - jai.front-sci.com
Abstract The Internet of Things (IoT) is a new model that connects physical objects and the
Internet and has become one of the most important technological developments in …

Role of YARA Tool in Intrusion Detection Systems (IDS)

RH Mahdi, H Trabelsi - 2022 Fifth College of Science …, 2022 - ieeexplore.ieee.org
Computer scientists are studying intrusion detection systems due to rising network
throughput and security threatsthat the network may be exposed to as a result of external …

Abnormal Industrial Control Protocol Identification Based on Feature Boosting

S Wang, G Cao, J Wan, B Qi… - … Conference on Algorithms …, 2023 - ieeexplore.ieee.org
The development of the Internet has brought great convenience to people's life, but it has
also brought potential dangers, such as zero-day vulnerabilities and DoS attacks. Abnormal …

[PDF][PDF] Adversarial Defense: A GAN-IF Based Cyber-security Model for Intrusion Detection in Software Piracy

U Kumaran, S Thangam, TVN Prabhakar… - jowua.com
Software-piracy continues to be most critical distress, posing grave threats to digital-assets
and financial stability. Traditional Intrusion Detection systems (IDS) often battles hard to …

[PDF][PDF] Research Article A Deep Learning-Based Framework for Feature Extraction and Classification of Intrusion Detection in Networks

M Naveed, F Arif, SM Usman, A Anwar, M Hadjouni… - 2022 - academia.edu
An intrusion detection system, often known as an IDS, is extremely important for preventing
attacks on a network, violating network policies, and gaining unauthorized access to a …

[PDF][PDF] Internet of Things

SE Quincozes, JF Kazienko, VE Quincozes - researchgate.net
Despite the research efforts in the last years, Denial-of-Service (DoS) attacks detection still
represent a challenge for the Internet of Things (IoT) scenarios composed of hard …