Shallow and deep networks intrusion detection system: A taxonomy and survey

E Hodo, X Bellekens, A Hamilton, C Tachtatzis… - arXiv preprint arXiv …, 2017 - arxiv.org
Intrusion detection has attracted a considerable interest from researchers and industries.
The community, after many years of research, still faces the problem of building reliable and …

A survey of intrusion detection techniques in cloud

C Modi, D Patel, B Borisaniya, H Patel, A Patel… - Journal of network and …, 2013 - Elsevier
In this paper, we survey different intrusions affecting availability, confidentiality and integrity
of Cloud resources and services. Proposals incorporating Intrusion Detection Systems (IDS) …

An implementation of intrusion detection system using genetic algorithm

MS Hoque, MA Mukit, MAN Bikas - arXiv preprint arXiv:1204.1336, 2012 - arxiv.org
Nowadays it is very important to maintain a high level security to ensure safe and trusted
communication of information between various organizations. But secured data …

The use of computational intelligence in intrusion detection systems: A review

SX Wu, W Banzhaf - Applied soft computing, 2010 - Elsevier
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …

Illicit Events Evaluation Using NSGA-2 Algorithms Based on Energy Consumption

R Rawat, A Rajavat - Informatica, 2024 - informatica.si
The proposed work objective is to adopt the non-dominated sorting genetic algorithm II
(NSGA-II), a type of MOEA (multi-objective evolutionary algorithms), to reduce the …

An edge based hybrid intrusion detection framework for mobile edge computing

A Singh, K Chatterjee, SC Satapathy - Complex & Intelligent Systems, 2022 - Springer
Abstract The Mobile Edge Computing (MEC) model attracts more users to its services due to
its characteristics and rapid delivery approach. This network architecture capability enables …

A software implementation of a genetic algorithm based approach to network intrusion detection

RH Gong, M Zulkernine… - … Conference on Software …, 2005 - ieeexplore.ieee.org
With the rapid expansion of Internet in recent years, computer systems are facing increased
number of security threats. Despite numerous technological innovations for information …

[PDF][PDF] Denial-of-service, probing & remote to user (R2L) attack detection using genetic algorithm

S Paliwal, R Gupta - International Journal of Computer Applications, 2012 - Citeseer
Nowadays it is very important to maintain a high level security to ensure safe and trusted
communication of information between various organizations. But secured data …

A review of detection approaches for distributed denial of service attacks

P Kaur, M Kumar, A Bhandari - Systems Science & Control …, 2017 - Taylor & Francis
ABSTRACT Distributed Denial of Service (DDoS) attacks are the intimidation trials on the
Internet that depletes the network bandwidth or exhausts the victim's resources …

A survey of cloud-based network intrusion detection analysis

N Keegan, SY Ji, A Chaudhary, C Concolato… - … -centric Computing and …, 2016 - Springer
As network traffic grows and attacks become more prevalent and complex, we must find
creative new ways to enhance intrusion detection systems (IDSes). Recently, researchers …