Framework for threat analysis and attack modelling of network security protocols

N Athavale, S Deshpande, V Chaudhary… - International Journal of …, 2017 - igi-global.com
Nowadays everything is computerized including banking and personal records. Also, to
boost business profits, businessmen have changed their way of operations from physical …

[PDF][PDF] An Overview of Intrusion Detection System in Computer Networks

A Negi, H Saini - International Journal of Innovative Technology and …, 2014 - Citeseer
the world has seen an era of advanced changes in networking field. This has been results in
development of information exchange across all over the world. It leads to dependency on …

Network attacks and intrusion detection system: a brief

NV Sharma, G Agarwal - 2019 2nd International Conference …, 2019 - ieeexplore.ieee.org
Security of a network has got a major importance in a wide range of systems. These days
every place is connected to a network or via a network eg hospitals, offices, universities …

Cyber attacks on intrusion detection system

P Sharma, R Kunwar - Journal, IJIST, Cyber Attacks on Intrusion …, 2016 - papers.ssrn.com
Soft Computing techniques are fast growing technology used for problem solving,
Information security is of essence factor in the age of computer world. Protecting information …

[PDF][PDF] Intrusion detection system using SNORT

R Gupta, S Singh, S Verma, S Singhal - … Research Journal of …, 2017 - academia.edu
Nowadays corporate company's network can generate false alarms and are a major target of
exploits. They have lots of sensitive data which can be misused to leak information which …

Artificial intelligence-based cyber security applications

SR Potula, R Selvanambi, M Karuppiah… - Artificial Intelligence and …, 2023 - Springer
Artificial Intelligence occupies a major part in the end-to-end technology we use every day.
In order to ensure and enhance security, Artificial Intelligence techniques are used in cyber …

[PDF][PDF] Architecture for real time monitoring and modeling of network behavior for enhanced security

M Ambika, RV Nataraj - International Journal of Computer …, 2013 - researchgate.net
Network security is a rapidly growing and is the major area of concern for every network.
Firewalls are used as a security check point in network environment even then different …

Nature inspired approach for intrusion detection systems

MS Husain - Design and analysis of security protocol for …, 2020 - Wiley Online Library
Unauthorized access of network resources is one of the major security issues in
communication network. Intrusion detection systems are used to identify any intruder in a …

Analysis on protocol-based intrusion detection system using artificial intelligence

S Mandal, A Sai Sabitha, D Mehrotra - Machine Intelligence and Smart …, 2021 - Springer
One of the major challenges in every field is the network security, so for preventing system,
its data and sensitive information from any unauthorized access or harmful activity, intrusion …

[引用][C] Design of Alarm Based Network Intrusion Detection System

N Boskany - Journal of Zankoy Sulaimani-Part A, 2014