Research trends in network-based intrusion detection systems: A review

S Kumar, S Gupta, S Arora - Ieee Access, 2021 - ieeexplore.ieee.org
Network threats and hazards are evolving at a high-speed rate in recent years. Many
mechanisms (such as firewalls, anti-virus, anti-malware, and spam filters) are being used as …

Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues

I Corona, G Giacinto, F Roli - Information sciences, 2013 - Elsevier
Intrusion Detection Systems (IDSs) are one of the key components for securing computing
infrastructures. Their objective is to protect against attempts to violate defense mechanisms …

Information fusion for computer security: State of the art and open issues

I Corona, G Giacinto, C Mazzariello, F Roli, C Sansone - Information Fusion, 2009 - Elsevier
In this paper, we critically review the issue of information fusion for computer security, both in
terms of problem formulation and in terms of state-of-the-art solutions. We also analyze main …

Alert correlation survey: framework and techniques

R Sadoddin, A Ghorbani - … of the 2006 international conference on …, 2006 - dl.acm.org
Managing raw alerts generated by various sensors are becoming of more significance to
intrusion detection systems as more sensors with different capabilities are distributed …

Detecting DDoS attacks in cloud computing environment

AM Lonea, DE Popescu, H Tianfield - International Journal of …, 2013 - univagora.ro
This paper is focused on detecting and analyzing the Distributed Denial of Service (DDoS)
attacks in cloud computing environments. This type of attacks is often the source of cloud …

A novel kill-chain framework for remote security log analysis with SIEM software

BD Bryant, H Saiedian - computers & security, 2017 - Elsevier
Network security investigations pose many challenges to security analysts attempting to
identify the root cause of security alarms or incidents. Analysts are often presented with …

Security event correlation approach for cloud computing

M Ficco - … Journal of High Performance Computing and …, 2013 - inderscienceonline.com
Cloud computing is a new business model, which represents an opportunity for users,
companies, and public organisations to reduce costs and increase efficiency, as well as an …

A hybrid intrusion detection system for virtual jamming attacks on wireless networks

D Santoro, G Escudero-Andreu, KG Kyriakopoulos… - Measurement, 2017 - Elsevier
Wireless communications are vulnerable to certain number of cyber-attacks and intrusion
attempts due to the intrinsic openness of the communication channel. Virtual jamming attack …

[HTML][HTML] Anomaly detection using a self-organizing map and particle swarm optimization

ML Shahreza, D Moazzami, B Moshiri, MR Delavar - Scientia Iranica, 2011 - Elsevier
Abstract Self-Organizing Maps (SOMs) are among the most well-known, unsupervised
neural network approaches to clustering, which are very efficient in handling large and high …

Prioritizing intrusion analysis using Dempster-Shafer theory

L Zomlot, SC Sundaramurthy, K Luo, X Ou… - Proceedings of the 4th …, 2011 - dl.acm.org
Intrusion analysis and incident management remains a difficult problem in practical network
security defense. The root cause of this problem is the large rate of false positives in the …