Network intrusion detection system: a survey on artificial intelligence‐based techniques

MS Habeeb, TR Babu - Expert Systems, 2022 - Wiley Online Library
High data rate requirements in recent years have resulted in the massive expansion of
communication systems, network size and the amount of data generated and processed …

A study of methodologies used in intrusion detection and prevention systems (IDPS)

D Mudzingwa, R Agrawal - 2012 Proceedings of IEEE …, 2012 - ieeexplore.ieee.org
Intrusion detection and prevention systems (IDPS) are security systems that are used to
detect and prevent security threats to computer systems and computer networks. These …

A survey on types of machine learning techniques in intrusion prevention systems

S Das, MJ Nene - 2017 International conference on wireless …, 2017 - ieeexplore.ieee.org
The computation technology is evolving. The data transmitted and generated using them are
growing exponentially. The traffic on these networks requires surveillance. Effective network …

[PDF][PDF] An overview of intrusion detection system (IDS) along with its commonly used techniques and classifications

HAM Uppal, M Javed, M Arshad - International Journal of Computer …, 2014 - Citeseer
The area of intrusion detection is the central concept in overall network and computer
security architecture. It is an important technology in business sector as well as in research …

Anomaly detector for computer networks

HJ Chang, JY Chen, Y Lin, L Ren - US Patent 9,009,825, 2015 - Google Patents
A computer system includes a data collector and an anomaly detector. The data collector
monitors network traffic/event log and sends monitoring data to the anomaly detector. The …

A survey on cyber security evolution and threats: biometric authentication solutions

L Benarous, B Kadri, A Bouridane - … Opportunities & Challenges in The Big …, 2017 - Springer
Cybersecurity threats are serious, costly and challenging because they are various,
evolutive and easily spread. This chapter is dedicated to brief these issues, its evolution and …

[PDF][PDF] A survey on intrusion detection and prevention systems

I Ghafir, M Husak, V Prenosil - Proceedings of student conference …, 2014 - researchgate.net
The World Wide Web has evolved from a system for serving an interconnected set of static
documents to what is now a powerful, versatile, and large platform for application delivery …

Internet of things intrusion detection: A deep learning approach

A Dawoud, OA Sianaki, S Shahristani… - 2020 IEEE Symposium …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a shifting paradigm that allows the integration of billions of
devices with the Internet. With its wide range of application domains, including smart cities …

Optimum-path forest stacking-based ensemble for intrusion detection

MA Bertoni, GH Rosa, JRF Brega - Evolutionary Intelligence, 2022 - Springer
Abstract Machine learning techniques have been extensively researched in the last years,
mainly due to their effectiveness when dealing with recognition or classification applications …

Detection and prevention cyber-attacks for smart buildings via private cloud environment

ZA Ali, SY Ameen - International Journal of Computing and …, 2018 - journal.uob.edu.bh
The paper investigate a major challenge of the protection of mutual and transmitted data that
exchanged between smart buildings and data centers that works through private cloud …