A study on current research and challenges in attribute-based access control model

K Vijayalakshmi, V Jayalakshmi - … and Internet of Things: Proceedings of …, 2022 - Springer
Access control models are used to identify and detect anonymous users or attacks when
sharing big data or other resources in the distributed environment such as cloud, edge, and …

Intrusion detection system techniques: a review

NS Sulaiman, A Nasir, WRW Othman… - Journal of Physics …, 2021 - iopscience.iop.org
Nowadays, Internet attacks are increasing rapidly. As a result, information security is a
serious global concern among Information Technology users. Intrusion Detection System …

Intrusion detection based on sequential information preserving log embedding methods and anomaly detection algorithms

C Kim, M Jang, S Seo, K Park, P Kang - IEEE Access, 2021 - ieeexplore.ieee.org
Previous methods for system intrusion detection have mainly consisted of those based on
pattern matching that employs prior knowledge extracted from experts' domain knowledge …

Efficient host based intrusion detection system using Partial Decision Tree and Correlation feature selection algorithm

FL Catherine, R Pathak… - … Conference on Recent …, 2014 - ieeexplore.ieee.org
System security has become significant issue in many organizations. The attacks like DoS,
U2R, R2L and Probing etc., creating a serious threat to the appropriate operation of internet …

IDS in telecommunication network using PCA

MF Elrawy, TK Abdelhamid, AM Mohamed - arXiv preprint arXiv …, 2013 - arxiv.org
Data Security has become a very serious part of any organizational information system.
Internet threats have become more intelligent so it can deceive the basic security solutions …

Intrusion Detection System Based on Support Vector Machine Optimised with Cat Swarm Optimization Algorithm

S Idris, OO Ishaq, NN Juliana - 2019 2nd International …, 2019 - ieeexplore.ieee.org
Intrusion detection system (IDS) like firewall, access control and encryption mechanisms no
longer provide the much-needed security for systems and computer networks. Current IDS …

An empirical internet protocol network intrusion detection using isolation forest and one-class support vector machines

G Shu Fuhnwi, V Adedoyin, JO Agbaje - 2023 - scholarworks.montana.edu
With the increasing reliance on web-based applications and services, network intrusion
detection has become a critical aspect of maintaining the security and integrity of computer …

Resolving rule redundancy error in ABA C policies using individual domain and subset detection method

K Vijayalakshmi, V Jayalakshmi - 2021 6th International …, 2021 - ieeexplore.ieee.org
Access control models play an important role in the security mechanism. The intrusion
detection and prevention system implements the access control models to identify whether …

[PDF][PDF] Banking Intrusion Detection Systems based on customers behavior using Machine Learning algorithms: Comprehensive study

WS Mahdi, AT Maolood - Journal of Al-Qadisiyah for computer science and …, 2020 - iasj.net
In recent years, The computer networks has tremendous growth and the Internet usage
became essential in many fields in real life, combined with the huge amount of data …

A Survey on Threat Intelligence Techniques for Constructing, Detecting, and Reacting to Advanced Intrusion Campaigns

A Anand, M Singhal, S Guduru… - … Conference on Data …, 2022 - Springer
The rise of intrusion has increased the need for cybersecurity in various organizations. A set
of these intrusions by an adversary against a particular organization are called intrusion …