A reliable network intrusion detection approach using decision tree with enhanced data quality

A Guezzaz, S Benkirane, M Azrour… - Security and …, 2021 - Wiley Online Library
Due to the recent advancements in the Internet of things (IoT) and cloud computing
technologies and growing number of devices connected to the Internet, the security and …

Hybrid Detection Technique for IP Packet Header Modifications Associated with Store-and-Forward Operations

A Munshi - Applied Sciences, 2023 - mdpi.com
The detection technique for IP packet header modifications associated with store-and-
forward operation pertains to a methodology or mechanism utilized for the identification and …

An integrated intrusion detection system using correlation‐based attribute selection and artificial neural network

I Sumaiya Thaseen, J Saira Banu… - Transactions on …, 2021 - Wiley Online Library
Serious concerns regarding vulnerability and security have been raised as a result of the
constant growth of computer networks. Intrusion detection systems (IDS) have been adopted …

[PDF][PDF] Intrusion detection model using naive bayes and deep learning technique.

M Tabash, M Abd Allah, B Tawfik - Int. Arab J. Inf. Technol., 2020 - iajit.org
The increase of security threats and hacking the computer networks are one of the most
dangerous issues should treat in these days. Intrusion Detection Systems (IDSs), are the …

[PDF][PDF] Network intrusion detection system: Machine learning approach

AS Jaradat, MM Barhoush, RB Easa - Indonesian Journal of …, 2022 - researchgate.net
The main goal of intrusion detection system (IDS) is to monitor the network performance and
to investigate any signs of any abnormalities over the network. Recently, intrusion detection …

Harnessing the power of decision trees to detect IoT malware

M Omar - arXiv preprint arXiv:2301.12039, 2023 - arxiv.org
Due to its simple installation and connectivity, the Internet of Things (IoT) is susceptible to
malware attacks. Being able to operate autonomously. As IoT devices have become more …

Performance comparison of intrusion detection system based anomaly detection using artificial neural network and support vector machine

AN Cahyo, R Hidayat, D Adhipta - AIP Conference Proceedings, 2016 - pubs.aip.org
This study presents a comparison of the detection accuracy of ANN and SVM on the
anomaly-based IDS and uses all the features in the dataset. The experiments were …

[PDF][PDF] An efficient intrusion detection framework based on embedding feature selection and ensemble learning technique.

FMM Mokbal, D Wang, M Osman, P Yang… - Int. Arab J. Inf …, 2022 - ccis2k.org
Network security has emerged as a crucial universal issue that affects enterprises,
governments, and individuals. The strategies utilized by the attackers are continuing to …

[PDF][PDF] Snort-based smart and swift intrusion detection system

RF Olanrewaju, BUI Khan, AR Najeeb… - Indian Journal of …, 2018 - academia.edu
Objectives: In this paper, a smart Intrusion Detection System (IDS) has been proposed that
detects network attacks in less time after monitoring incoming traffic thus maintaining better …

Hierarchical classification method for radio frequency interference recognition and characterization in satcom

S Ujan, N Navidi, RJ Landry - Applied Sciences, 2020 - mdpi.com
The Quality of Service (QoS) and security of Satellite Communication (Satcom) are crucial as
Satcom plays a significant role in a wide range of applications, such as direct broadcast …