BA Tama, M Comuzzi, KH Rhee - IEEE access, 2019 - ieeexplore.ieee.org
Intrusion detection systems (IDSs) play a pivotal role in computer security by discovering and repealing malicious activities in computer networks. Anomaly-based IDS, in particular …
W Yassin, NI Udzir, Z Muda, MN Sulaiman - 2013 - soc.uum.edu.my
Intrusion detection systems (IDSs) effectively balance extra security appliance by identifying intrusive activities on a computer system, and their enhancement is emerging at an …
Recently, with the technological and digital revolution, the security of data is very crucial as a massive amount of data is generated from various networks. Intrusion Detection System …
G Kim, S Lee, S Kim - Expert Systems with Applications, 2014 - Elsevier
In this paper, a new hybrid intrusion detection method that hierarchically integrates a misuse detection model and an anomaly detection model in a decomposition structure is proposed …
C Guo, Y Ping, N Liu, SS Luo - Neurocomputing, 2016 - Elsevier
To exploit the strengths of misuse detection and anomaly detection, an intensive focus on intrusion detection combines the two. From a novel perspective, in this paper, we proposed …
O Depren, M Topallar, E Anarim, MK Ciliz - Expert systems with …, 2005 - Elsevier
In this paper, we propose a novel Intrusion Detection System (IDS) architecture utilizing both anomaly and misuse detection approaches. This hybrid Intrusion Detection System …
The exponential growth of internet communications and increasing dependency of users upon software-based systems for most essential, everyday applications has raised the …
Conventional Network intrusion detection system (NIDS) mostly uses individual classification techniques, such system fails to provide the best possible attack detection rate …
M Mazini, B Shirazi, I Mahdavi - Journal of King Saud University-Computer …, 2019 - Elsevier
Intrusion detection systems (IDSs) has been considered as the main component of a safe network. One of the problems of these security systems is false alarm report of intrusion to …