R Jindal, A Anwar - arXiv preprint arXiv:2110.00773, 2021 - arxiv.org
With the ubiquitous nature of information technology solutions that facilitate communication in the modern world, cyber attacks are increasing in volume and becoming more …
With the world moving towards being increasingly dependent on computers and automation, one of the main challenges in the current decade has been to build secure applications …
The state-of-the-art evaluation of an Intrusion Detection System (IDS) relies on benchmark datasets composed of the regular system's and potential attackers' behavior. The datasets …
Z Azam, MM Islam, MN Huda - IEEE Access, 2023 - ieeexplore.ieee.org
Cyber-attacks pose increasing challenges in precisely detecting intrusions, risking data confidentiality, integrity, and availability. This review paper presents recent IDS taxonomy, a …
V Hnamte, J Hussain - 2021 3rd International Conference on …, 2021 - ieeexplore.ieee.org
Cyberattacks are becoming more and more advanced, making it more difficult to identity suspicious activities on network traffic. Weaponizing the data in the line between network …
Abstract Machine learning algorithms efficiently trained on intrusion detection datasets can detect network traffic capable of jeopardizing an information system. In this study, we use the …
Contemporary culture presents a substantial obstacle for cyber security experts in the shape of software vulnerabilities, which, if taken advantage of, can jeopardize the Confidentiality …
As the world moves towards being increasingly dependent on computers and automation, building secure applications, systems and networks are some of the main challenges faced …
A Momand, SU Jan, N Ramzan - Journal of Sensors, 2023 - Wiley Online Library
Recently, intrusion detection systems (IDS) have become an essential part of most organisations' security architecture due to the rise in frequency and severity of network …