A survey of IT early warning systems: architectures, challenges, and solutions

AA Ramaki, RE Atani - Security and Communication Networks, 2016 - Wiley Online Library
With the advent of new technologies and various services provided in the context of
computer networks, a large volume of data is being generated. The main challenge in this …

A hybrid intrusion detection system: A review

A Garg, P Maheshwari - 2016 10th International Conference on …, 2016 - ieeexplore.ieee.org
The most important purpose of intrusion detection system is to identify attacks against
information systems. It is a security method attempting to identify various attacks. In this …

Ai-powered intrusion detection in large-scale traffic networks based on flow sensing strategy and parallel deep analysis

HV Vo, HP Du, HN Nguyen - Journal of Network and Computer …, 2023 - Elsevier
Current intrusion detection systems, which rely on signature-based detection using rules
derived from the inspection of past traffic flows and their signatures, are incapable of …

Performance analysis of snort-based intrusion detection system

A Garg, P Maheshwari - 2016 3rd international conference on …, 2016 - ieeexplore.ieee.org
The most important purpose of intrusion detection system is to identify attacks against
information systems. It is a security method attempting to identify various attacks. Snort is …

Intrusion detection system: A review

S Sharma, RK Gupta - International Journal of Security and Its …, 2015 - earticle.net
With the incredible expansion of network-based services and responsive information on
networks, network protection and security is getting more and more significance than ever …

[PDF][PDF] Intrusion detection system: classification, techniques and datasets to implement

RR Chaudhari, SP Patil - International Research Journal of …, 2017 - fardapaper.ir
With the escalation of the internet, Security of network traffic is becoming a major problem of
computer network system. As time is passing the number of attacks on the network are …

Classification and clustering based ensemble techniques for intrusion detection systems: A survey

NH Al-A'araji, SO Al-Mamory… - Journal of Physics …, 2021 - iopscience.iop.org
A huge amount of data is transmitted through the networks, which allowed the exchange of
knowledge and medical expertise, trade and banking facilities, etc. However, due to the …

Improving intrusion detection through training data augmentation

U Otokwala, A Petrovski… - 2021 14th International …, 2021 - ieeexplore.ieee.org
Imbalanced classes in datasets are common problems often found in security data.
Therefore, several strategies like class resampling and cost-sensitive training have been …

Cross site scripting (XSS) attack detection using intrustion detection system

K Gupta, RR Singh, M Dixit - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Everyone is now relying on the Internet for our innumerable kind of work; this has increased
the opportunity for attackers to corrupt data and make vulnerable. Nowadays diverse kind of …

An ensemble clustering method for intrusion detection

KK Wankhade, KC Jondhale - International Journal of …, 2019 - inderscienceonline.com
The amount of data in the field of computer networking is growing rapidly and this urges new
challenges in the field of an intrusion detection system (IDS). To handle such increasing …