From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods

A Nisioti, A Mylonas, PD Yoo… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last five years there has been an increase in the frequency and diversity of network
attacks. This holds true, as more and more organizations admit compromises on a daily …

An intrusion detection and prevention system in cloud computing: A systematic review

A Patel, M Taghavi, K Bakhtiyari, JC Júnior - Journal of network and …, 2013 - Elsevier
The distributed and open structure of cloud computing and services becomes an attractive
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …

Cyber intrusion detection by combined feature selection algorithm

S Mohammadi, H Mirvaziri… - Journal of information …, 2019 - Elsevier
Due to the widespread diffusion of network connectivity, the demand for network security
and protection against cyber-attacks is ever increasing. Intrusion detection systems (IDS) …

SVELTE: Real-time intrusion detection in the Internet of Things

S Raza, L Wallgren, T Voigt - Ad hoc networks, 2013 - Elsevier
Abstract In the Internet of Things (IoT), resource-constrained things are connected to the
unreliable and untrusted Internet via IPv6 and 6LoWPAN networks. Even when they are …

A novel hybrid intrusion detection method integrating anomaly detection with misuse detection

G Kim, S Lee, S Kim - Expert Systems with Applications, 2014 - Elsevier
In this paper, a new hybrid intrusion detection method that hierarchically integrates a misuse
detection model and an anomaly detection model in a decomposition structure is proposed …

[图书][B] Data mining and machine learning in cybersecurity

S Dua, X Du - 2016 - books.google.com
From basic concepts in machine learning and data mining to advanced problems in the
machine learning domain, this book provides a unified reference for specific machine …

[图书][B] Distributed and cloud computing: from parallel processing to the internet of things

K Hwang, J Dongarra, GC Fox - 2013 - books.google.com
Distributed and Cloud Computing: From Parallel Processing to the Internet of Things offers
complete coverage of modern distributed computing technology including clusters, the grid …

A novel statistical technique for intrusion detection systems

E Kabir, J Hu, H Wang, G Zhuo - Future Generation Computer Systems, 2018 - Elsevier
This paper proposes a novel approach for intrusion detection system based on sampling
with Least Square Support Vector Machine (LS-SVM). Decision making is performed in two …

A hybrid method consisting of GA and SVM for intrusion detection system

BM Aslahi-Shahri, R Rahmani, M Chizari… - Neural computing and …, 2016 - Springer
In this paper, a hybrid method of support vector machine and genetic algorithm (GA) is
proposed and its implementation in intrusion detection problem is explained. The proposed …

Collaborative detection of DDoS attacks over multiple network domains

Y Chen, K Hwang, WS Ku - IEEE Transactions on parallel and …, 2007 - ieeexplore.ieee.org
This paper presents a new distributed approach to detecting DDoS (distributed denial of
services) flooding attacks at the traffic-flow level The new defense system is suitable for …