Network intrusion detection based on novel feature selection model and various recurrent neural networks

TTH Le, Y Kim, H Kim - Applied Sciences, 2019 - mdpi.com
The recent increase in hacks and computer network attacks around the world has intensified
the need to develop better intrusion detection and prevention systems. The intrusion …

Network intrusion detection system based on recursive feature addition and bigram technique

T Hamed, R Dara, SC Kremer - computers & security, 2018 - Elsevier
Network and Internet security is a critical universal issue. The increased rate of cyber
terrorism has put national security under risk. In addition, Internet attacks have caused …

[PDF][PDF] Deep Learning-Based Hybrid Intelligent Intrusion Detection System.

MA Khan, Y Kim - Computers, Materials & Continua, 2021 - cdn.techscience.cn
Machine learning (ML) algorithms are often used to design effective intrusion detection (ID)
systems for appropriate mitigation and effective detection of malicious cyber threats at the …

Mathematical Model for Heterogeneous Databases Parameters Estimation in Distributed Systems with Dynamic Structure

V Mukhin, Y Kornaga, V Bondarenko… - 2020 IEEE 2nd …, 2020 - ieeexplore.ieee.org
A model for information processing parameters estimation in distributed systems with a
dynamic structure that realize the heterogeneous distributed databases is suggested. The …

[PDF][PDF] The scheduler for the grid-system based on the parameters monitoring of the computer components

Z Hu, V Mukhin, Y Kornaga… - Восточно …, 2017 - irbis-nbuv.gov.ua
Розроблено структуру планувальника розподіленої комп'ютерної системи, яка
підтримує захищену обробку даних. Запропоновано структуру централізованого …

Selecting Scalable Network Features for Infiltration Detection

P Kendrick, A Hussain, N Criado… - 2017 10th International …, 2017 - ieeexplore.ieee.org
The objective of this study is to explore feature selection for the detection of internal intruders
within a local network during the early stages of an attack. As the sophistication of attackers …

Double-Circuit Organization of a Distributed Computer System for the Effective Control of ITS Functioning

V Mukhin, Y Kornaga, V Zavgorodnii… - COMPUTER AND …, 2021 - csitic.nure.ua
The ensuring of the continuous control and software updates in the control nodes of a
distributed data processing system requires the development of a network structure in such …

The Influences of Intrusion Detection System Information Assurance Challenges within the Large Organizations of Southern United States

M Fayyadh - 2019 - search.proquest.com
Intrusion detection system (IDS) represents a software or hardware appliance uses for
monitoring the network traffic to find any suspicious activities and threats. IDS have …

[PDF][PDF] Sistema de Detecçao de Intrusao em Redes de Computadores Utilizando Máquinas de Vetores de Suporte

HS Neto, WS Lacerda - 2019 - academia.edu
This paper presents a Network Intrusion Detection System (NIDS) with real-world traffic
using Support Vector Machine (SVM). Two databases were used for the experiments: the …

[图书][B] A Multi-Agent Approach to Advanced Persistent Threat Detection in Networked Systems

P Kendrick - 2018 - search.proquest.com
Advanced cyber threats that are well planned, funded and stealthy are an increasing issue
facing secure networked systems. As our reliance on protected networked systems …