Intrusion detection system based on fast hierarchical deep convolutional neural network

RV Mendonça, AAM Teodoro, RL Rosa, M Saadi… - IEEE …, 2021 - ieeexplore.ieee.org
Currently, with the increasing number of devices connected to the Internet, search for
network vulnerabilities to attackers has increased, and protection systems have become …

An analysis of various snort based techniques to detect and prevent intrusions in networks proposal with code refactoring snort tool in Kali Linux environment

RT Gaddam, M Nandhini - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Security and reliability are the major concern of our daily life usage of any network. But with
the swift advancements in network technology, attacks are becoming more sophisticated …

Maintainable log datasets for evaluation of intrusion detection systems

M Landauer, F Skopik, M Frank… - … on Dependable and …, 2022 - ieeexplore.ieee.org
Intrusion detection systems (IDS) monitor system logs and network traffic to recognize
malicious activities in computer networks. Evaluating and comparing IDSs with respect to …

A novel hybrid-based approach of snort automatic rule generator and security event correlation (SARG-SEC)

E Jaw, X Wang - PeerJ Computer Science, 2022 - peerj.com
The rapid advanced technological development alongside the Internet with its cutting-edge
applications has positively impacted human society in many aspects. Nevertheless, it …

NTLFlowLyzer: Towards generating an intrusion detection dataset and intruders behavior profiling through network and transport layers traffic analysis and pattern …

MM Shafi, AH Lashkari, AH Roudsari - Computers & Security, 2025 - Elsevier
Network security remains a critical concern in modern computing systems due to the
constant emergence of threats and attacks. This paper introduces a comprehensive …

A network-based intrusion detection and prevention system with multi-mode counteractions

RM Yousufi, P Lalwani… - … Conference on Innovations …, 2017 - ieeexplore.ieee.org
Recently, as result of dramatic connectivity between devices from a computer to mobile
systems, security of information and availability of the services become more and more …

A Snort-based secure edge router for smart home

ND Patel, BM Mehtre, R Wankar - International Journal of …, 2023 - inderscienceonline.com
Cybercrimes are rising rapidly with the increasing use of the internet of things (IoT)-based
gadgets at home. For instance, the Mirai-BotNet infected and compromised many IoT-based …

Integration of network intrusion detection systems and honeypot networks for cloud security

V Mahajan, SK Peddoju - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
With an aim of provisioning fast, reliable and low cost services to the users, the cloud-
computing technology has progressed leaps and bounds. But, adjacent to its development is …

A rule status monitoring algorithm for rule-based intrusion detection and prevention systems

C Turner, R Jeremiah, D Richards, A Joseph - Procedia Computer Science, 2016 - Elsevier
Since the time of Denning's 2 model for the intrusion detection system (IDS), the system that
laid the basis for most modern IDSes, intrusion detection technologies have grown in both …

Optimization of traditional Snort intrusion detection system

D Zhang, S Wang - IOP Conference Series: Materials Science …, 2019 - iopscience.iop.org
With the rapid development of the Internet, the following network security issues are
increasingly prominent and the increasing number of network attacks has also attracted the …