Bayesian based intrusion detection system

H Altwaijry - … on Engineering Technologies: Special Edition of the …, 2013 - Springer
In this paper intrusion detection using Bayesian probability is discussed. The systems
designed are trained a priori using a subset of the KDD dataset. The trained classifier is then …

Intrusion detection technique by using k-means, fuzzy neural network and SVM classifiers

AM Chandrasekhar… - … Conference on Computer …, 2013 - ieeexplore.ieee.org
With the impending era of internet, the network security has become the key foundation for
lot of financial and business web applications. Intrusion detection is one of the looms to …

Rule generation for signature based detection systems of cyber attacks in iot environments

YN Soe, Y Feng, PI Santosa, R Hartanto… - Bulletin of Networking …, 2019 - ww.bncss.org
Many modern attacks are targeting the IoT devices in recent year. Most of IoT attacks are
botnet attacks. Even though there are many detections and preventing systems for cyber …

Detecting SQL injection attacks using SNORT IDS

H Alnabulsi, MR Islam, Q Mamun - Asia-Pacific World Congress …, 2014 - ieeexplore.ieee.org
SQL injection attack poses a serious security threats among the Internet community
nowadays and it's continue to increase exploiting flaws found in the Web applications. In …

[HTML][HTML] A novel hybrid-based approach of snort automatic rule generator and security event correlation (SARG-SEC)

E Jaw, X Wang - PeerJ Computer Science, 2022 - peerj.com
The rapid advanced technological development alongside the Internet with its cutting-edge
applications has positively impacted human society in many aspects. Nevertheless, it …

Analysis of update delays in signature-based network intrusion detection systems

H Gascon, A Orfila, J Blasco - Computers & Security, 2011 - Elsevier
Network Intrusion Detection Systems (NIDS) play a fundamental role on security policy
deployment and help organizations in protecting their assets from network attacks. Signature …

Bridging the Last‐Mile Gap in Network Security via Generating Intrusion‐Specific Detection Patterns through Machine Learning

X Sun, D Zhang, H Qin, J Tang - Security and Communication …, 2022 - Wiley Online Library
With successful machine learning applications in many fields, researchers tried to introduce
machine learning into intrusion detection systems for building classification models …

Protecting code injection attacks in intelligent transportation system

H Alnabulsi, R Islam - … On Trust, Security And Privacy In …, 2019 - ieeexplore.ieee.org
TMC (traffic management system) is the vital unit of Intelligent Transport System (ITS) as it
provides complex services by interacting with other smart devices, objects and infrastructure …

Analyzing attack strategies against rule-based intrusion detection systems

P Parameshwarappa, Z Chen… - Proceedings of the …, 2018 - dl.acm.org
Intrusion Detection Systems (IDS) have been widely used to detect cyber attacks in Cyber-
Physical Systems (CPS). However, attackers can often adapt their attacking strategies to …

Amalgamation of K-means clustering algorithm with standard MLP and SVM based neural networks to implement network intrusion detection system

AM Chandrashekhar, K Raghuveer - Advanced Computing, Networking …, 2014 - Springer
Abstract Intrusion Detection Systems (IDS) are becoming an essential component usually in
network and data security weapon store. Since huge amount of existing off-line data and …