Data mining techniques in intrusion detection systems: A systematic literature review

F Salo, M Injadat, AB Nassif, A Shami, A Essex - IEEE Access, 2018 - ieeexplore.ieee.org
The continued ability to detect malicious network intrusions has become an exercise in
scalability, in which data mining techniques are playing an increasingly important role. We …

Data collection for attack detection and security measurement in mobile ad hoc networks: A survey

G Liu, Z Yan, W Pedrycz - Journal of Network and Computer Applications, 2018 - Elsevier
Abstract Mobile Ad Hoc Network (MANET) is becoming one type of major next generation
wireless networks. Nevertheless, it easily suffers from various attacks due to its specific …

MPCE: a maximum probability based cross entropy loss function for neural network classification

Y Zhou, X Wang, M Zhang, J Zhu, R Zheng… - IEEE Access, 2019 - ieeexplore.ieee.org
In recent years, multi-classifier learning is of significant interest in industrial and economic
fields. Moreover, neural network is a popular approach in multi-classifier learning. However …

[PDF][PDF] 网络入侵检测技术综述

蹇诗婕, 卢志刚, 杜丹, 姜波, 刘宝旭 - 信息安全学报, 2020 - jcs.iie.ac.cn
摘要随着互联网时代的发展, 内部威胁, 零日漏洞和DoS 攻击等攻击行为日益增加,
网络安全变得越来越重要, 入侵检测已成为网络攻击检测的一种重要手段. 随着机器学习算法的 …

Trust-aware FuzzyClus-Fuzzy NB: intrusion detection scheme based on fuzzy clustering and Bayesian rule

N Veeraiah, BT Krishna - Wireless Networks, 2019 - Springer
The dynamic nature of the nodes on the mobile ad hoc network (MANET) imposes security
issues in the network and most of the Intrusion detection methods concentrated on the …

A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs

N Khanna, M Sachdeva - Computer Science Review, 2019 - Elsevier
Abstract Mobile Ad hoc Network due to its intrinsic properties of mobility, infrastructure-less
working and vulnerability of underlined standard routing protocols is exposed to various …

Information-aware secure routing in wireless sensor networks

Q Shi, L Qin, Y Ding, B Xie, J Zheng, L Song - Sensors, 2019 - mdpi.com
Secure routing is crucial for wireless sensor networks (WSNs) because they are vulnerable
to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the …

A suggested testbed to evaluate multicast network and threat prevention performance of Next Generation Firewalls

G Uçtu, M Alkan, İA Doğru, M Dörterler - Future Generation Computer …, 2021 - Elsevier
Although security have to be a key issue for systems carrying intelligence such as
surveillance system, it is still overshadowed by bandwidth utilization in multicast networks …

An enhanced detection system against routing attacks in mobile ad-hoc network

M Prasad, S Tripathi, K Dahal - Wireless Networks, 2022 - Springer
Mobile ad-hoc network is a dynamic wireless network that transfers information through
neighbor nodes with a temporary configuration. Due to its dynamic nature, it is exposed to …

A probability estimation-based feature reduction and Bayesian rough set approach for intrusion detection in mobile ad-hoc network

M Prasad, S Tripathi, K Dahal - Applied Intelligence, 2023 - Springer
A mobile ad-hoc network is a small and temporary network. This network has a different
working principle and structure than wired networks. A source node transfers data to the …