Nowadays, cloud computing provides easy access to a set of variable and configurable computing resources based on user demand through the network. Cloud computing …
Anomaly-based intrusion detection system have been consistently used in business organizations and military to detect a breach in network by identifying any activity that …
An administrator is employed to identify network security breaches in their organizations by using a Network Intrusion Detection and Prevention System (NIDPS), which is presented in …
M Zakariah, SA AlQahtani, AM Alawwad… - … , Materials & Continua, 2023 - cdn.techscience.cn
Modern networks are at risk from a variety of threats as a result of the enormous growth in internet-based traffic. By consuming time and resources, intrusive traffic hampers the …
A John, IFB Isnin… - IET Wireless Sensor …, 2024 - Wiley Online Library
Wireless sensor network (WSN) cluster‐based architecture is a system designed to control and monitor specific events or phenomena remotely, and one of the important concerns that …
L Narengbam, S Dey - Concurrency and Computation: Practice …, 2023 - Wiley Online Library
An integral part of security infrastructure is detecting and identifying malicious attacks commonly found in network environments. Despite its effectiveness at identifying anomalous …
L Narengbam, S Dey - International Journal of Information …, 2024 - inderscienceonline.com
This study introduces an innovative approach, merging Harris Hawks optimisation (HHO) with a sigmoid neuron network (SN), to enhance anomaly-based intrusion detection systems …
The failure of internet networking systems, which can happen in various methods, may negatively impact contemporary information and communication technologies. In these …
The heavy dependency on the internet, as well as other emerging technologies for access, storage, and sharing of information, has triggered a proportional increase in cyberattacks …