I-SiamIDS: an improved Siam-IDS for handling class imbalance in network-based intrusion detection systems

P Bedi, N Gupta, V Jindal - Applied Intelligence, 2021 - Springer
Abstract Network-based Intrusion Detection Systems (NIDSs) identify malicious activities by
analyzing network traffic. NIDSs are trained with the samples of benign and intrusive …

Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: present and future challenges

S Gupta, BB Gupta - International Journal of Cloud Applications and …, 2017 - igi-global.com
In this paper, we present comprehensive survey of secured web application by identifying
numerous serious threats faced by several-related organizations. Based on this, we have …

Effective defense strategies in network security using improved double dueling deep Q-network

Z Zhu, M Chen, C Zhu, Y Zhu - Computers & Security, 2024 - Elsevier
Network security is a critical discipline in the contemporary digital world, encompassing
diverse technologies and strategies aimed at safeguarding computer systems, networks …

A survey on network attacks and Intrusion detection systems

S Latha, SJ Prakash - 2017 4th International Conference on …, 2017 - ieeexplore.ieee.org
Network Security is playing a vital role in all types of networks. Nowadays the network is
implemented in all places like offices, schools, banks etc. and almost all the individuals are …

Active learning to detect DDoS attack using ranked features

RK Deka, DK Bhattacharyya, JK Kalita - Computer Communications, 2019 - Elsevier
Network traffic classification to detect DDoS attacks is challenging in the context of high-
speed networks. In this paper, we discuss the need for distributed feature selection in …

C SVM Classification and KNN Techniques for Cyber Crime Detection

K Veena, K Meena, Y Teekaraman… - Wireless …, 2022 - Wiley Online Library
In the digital age, cybercrime is spreading its root widely. Internet evolution has turned out to
a boon as well as curse for those confronting the issues of privacy, national security, social …

A survey of intrusion detection system

P Wanda, HJ Jie - International Journal of Informatics and …, 2020 - ijicom.respati.ac.id
Nowadays, the evolution of the internet and the use of computer systems has resulted in the
huge electronic transformation of data that experienced multiple problems such as security …

A comparative experimental design and performance analysis of snort-based intrusion detection system in practical computer networks

I Karim, QT Vien, TA Le, G Mapp - Computers, 2017 - mdpi.com
As one of the most reliable technologies, network intrusion detection system (NIDS) allows
the monitoring of incoming and outgoing traffic to identify unauthorised usage and …

Clustering of unknown protocol messages based on format comparison

F Sun, S Wang, C Zhang, H Zhang - Computer Networks, 2020 - Elsevier
As a solution to detect and analyse unknown or proprietary protocols, Protocol Reverse
Engineering (PRE) has been developed swiftly in recent years. In this field, message …

Unsupervised field segmentation of unknown protocol messages

F Sun, S Wang, C Zhang, H Zhang - Computer Communications, 2019 - Elsevier
In network security systems working on intrusion detection, deep packet inspection, and
protocol fuzzing, protocol specifications analyzed by Protocol Reverse Engineering (PRE) …