An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset

V Kumar, D Sinha, AK Das, SC Pandey, RT Goswami - Cluster Computing, 2020 - Springer
Intrusion detection system (IDS) has been developed to protect the resources in the network
from different types of threats. Existing IDS methods can be classified as either anomaly …

An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks

O Depren, M Topallar, E Anarim, MK Ciliz - Expert systems with …, 2005 - Elsevier
In this paper, we propose a novel Intrusion Detection System (IDS) architecture utilizing both
anomaly and misuse detection approaches. This hybrid Intrusion Detection System …

A two-stage hybrid classification technique for network intrusion detection system

J Hussain, S Lalmuanawma… - International journal of …, 2016 - Taylor & Francis
Conventional Network intrusion detection system (NIDS) mostly uses individual
classification techniques, such system fails to provide the best possible attack detection rate …

[PDF][PDF] Decision tree based algorithm for intrusion detection

K Rai, MS Devi, A Guleria - International Journal of Advanced …, 2016 - researchgate.net
-----------------------------------------------------ABSTRACT------------------------------------------------------
An Intrusion Detection System (IDS) is a defense measure that supervises activities of the …

An efficient network intrusion detection and classification system

I Ahmad, QE Ul Haq, M Imran, MO Alassafi… - Mathematics, 2022 - mdpi.com
Intrusion detection in computer networks is of great importance because of its effects on the
different communication and security domains. The detection of network intrusion is a …

Statistical analysis of CIDDS-001 dataset for network intrusion detection systems using distance-based machine learning

A Verma, V Ranga - Procedia Computer Science, 2018 - Elsevier
A lot of research is being done on the development of effective Network Intrusion Detection
Systems. Anomaly based Network Intrusion Detection Systems are preferred over Signature …

An enhanced J48 classification algorithm for the anomaly intrusion detection systems

S Aljawarneh, MB Yassein, M Aljundi - Cluster Computing, 2019 - Springer
In this paper, we have developed an enhanced J48 algorithm, which uses the J48 algorithm
for improving the detection accuracy and the performance of the novel IDS technique. This …

A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques

G Singh, N Khare - International Journal of Computers and …, 2022 - Taylor & Francis
The evolution in the attack scenarios has been such that finding efficient and optimal
Network Intrusion Detection Systems (NIDS) with frequent updates has become a big …

A detailed analysis of benchmark datasets for network intrusion detection system

M Ghurab, G Gaphari, F Alshami… - Asian Journal of …, 2021 - papers.ssrn.com
The enormous increase in the use of the Internet in daily life has provided an opportunity for
the intruder attempt to compromise the security principles of availability, confidentiality, and …

[HTML][HTML] A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework

SM Kasongo - Computer Communications, 2023 - Elsevier
In recent years, the spike in the amount of information transmitted through communication
infrastructures has increased due to the advances in technologies such as cloud computing …