Detecting cyber threats with a Graph-Based NIDPS

BOT Wen, N Syahriza, NCW Xian, NG Wei… - … Measures for Logistics …, 2024 - igi-global.com
This chapter explores the topic of a novel network-based intrusion detection system (NIDPS)
that utilises the concept of graph theory to detect and prevent incoming threats. With …

Research trends in network-based intrusion detection systems: A review

S Kumar, S Gupta, S Arora - Ieee Access, 2021 - ieeexplore.ieee.org
Network threats and hazards are evolving at a high-speed rate in recent years. Many
mechanisms (such as firewalls, anti-virus, anti-malware, and spam filters) are being used as …

A systematic literature review for network intrusion detection system (IDS)

OH Abdulganiyu, T Ait Tchakoucht… - International journal of …, 2023 - Springer
With the recent increase in internet usage, the number of important, sensitive, confidential
individual and corporate data passing through internet has increasingly grown. With gaps in …

A detailed analysis of benchmark datasets for network intrusion detection system

M Ghurab, G Gaphari, F Alshami… - Asian Journal of …, 2021 - papers.ssrn.com
The enormous increase in the use of the Internet in daily life has provided an opportunity for
the intruder attempt to compromise the security principles of availability, confidentiality, and …

[PDF][PDF] A survey on intrusion detection and prevention systems

I Ghafir, M Husak, V Prenosil - Proceedings of student conference …, 2014 - researchgate.net
The World Wide Web has evolved from a system for serving an interconnected set of static
documents to what is now a powerful, versatile, and large platform for application delivery …

[HTML][HTML] A study of network intrusion detection systems using artificial intelligence/machine learning

P Vanin, T Newe, LL Dhirani, E O'Connell, D O'Shea… - Applied Sciences, 2022 - mdpi.com
The rapid growth of the Internet and communications has resulted in a huge increase in
transmitted data. These data are coveted by attackers and they continuously create novel …

[PDF][PDF] Intrusion detection systems, tools and techniques–an overview

S Prasad, MV Srinath… - Indian Journal of …, 2015 - pdfs.semanticscholar.org
Organization's crucial data are highly endangered due to several security attacks and
threats. Intrusion is one among such type of threat. Intrusions are efforts that attempt to elude …

[PDF][PDF] A survey on secure network: intrusion detection & prevention approaches

M Bijone - American Journal of Information Systems, 2016 - academia.edu
With the growth of the Internet and its potential, more and more people are getting
connected to the Internet every day to take advantage of the e-Commerce. On one side, the …

Artificial intelligence for cyber security: Performance analysis of network intrusion detection

SU Khan, F Eusufzai, M Azharuddin Redwan… - … artificial intelligence for …, 2022 - Springer
Cybersecurity has become major progress in the digital era. Contraction is an important
component of the cyber analysts' management of information technology, as several …

Survey of network intrusion detection methods from the perspective of the knowledge discovery in databases process

B Molina-Coronado, U Mori… - … on Network and …, 2020 - ieeexplore.ieee.org
The identification of network attacks which target information and communication systems
has been a focus of the research community for years. Network intrusion detection is a …