A reliable network intrusion detection approach using decision tree with enhanced data quality
Due to the recent advancements in the Internet of things (IoT) and cloud computing
technologies and growing number of devices connected to the Internet, the security and …
technologies and growing number of devices connected to the Internet, the security and …
Hybrid Detection Technique for IP Packet Header Modifications Associated with Store-and-Forward Operations
A Munshi - Applied Sciences, 2023 - mdpi.com
The detection technique for IP packet header modifications associated with store-and-
forward operation pertains to a methodology or mechanism utilized for the identification and …
forward operation pertains to a methodology or mechanism utilized for the identification and …
An integrated intrusion detection system using correlation‐based attribute selection and artificial neural network
I Sumaiya Thaseen, J Saira Banu… - Transactions on …, 2021 - Wiley Online Library
Serious concerns regarding vulnerability and security have been raised as a result of the
constant growth of computer networks. Intrusion detection systems (IDS) have been adopted …
constant growth of computer networks. Intrusion detection systems (IDS) have been adopted …
[PDF][PDF] Intrusion detection model using naive bayes and deep learning technique.
M Tabash, M Abd Allah, B Tawfik - Int. Arab J. Inf. Technol., 2020 - iajit.org
The increase of security threats and hacking the computer networks are one of the most
dangerous issues should treat in these days. Intrusion Detection Systems (IDSs), are the …
dangerous issues should treat in these days. Intrusion Detection Systems (IDSs), are the …
[PDF][PDF] Network intrusion detection system: Machine learning approach
AS Jaradat, MM Barhoush, RB Easa - Indonesian Journal of …, 2022 - researchgate.net
The main goal of intrusion detection system (IDS) is to monitor the network performance and
to investigate any signs of any abnormalities over the network. Recently, intrusion detection …
to investigate any signs of any abnormalities over the network. Recently, intrusion detection …
Harnessing the power of decision trees to detect IoT malware
M Omar - arXiv preprint arXiv:2301.12039, 2023 - arxiv.org
Due to its simple installation and connectivity, the Internet of Things (IoT) is susceptible to
malware attacks. Being able to operate autonomously. As IoT devices have become more …
malware attacks. Being able to operate autonomously. As IoT devices have become more …
Performance comparison of intrusion detection system based anomaly detection using artificial neural network and support vector machine
This study presents a comparison of the detection accuracy of ANN and SVM on the
anomaly-based IDS and uses all the features in the dataset. The experiments were …
anomaly-based IDS and uses all the features in the dataset. The experiments were …
[PDF][PDF] An efficient intrusion detection framework based on embedding feature selection and ensemble learning technique.
FMM Mokbal, D Wang, M Osman, P Yang… - Int. Arab J. Inf …, 2022 - ccis2k.org
Network security has emerged as a crucial universal issue that affects enterprises,
governments, and individuals. The strategies utilized by the attackers are continuing to …
governments, and individuals. The strategies utilized by the attackers are continuing to …
[PDF][PDF] Snort-based smart and swift intrusion detection system
Objectives: In this paper, a smart Intrusion Detection System (IDS) has been proposed that
detects network attacks in less time after monitoring incoming traffic thus maintaining better …
detects network attacks in less time after monitoring incoming traffic thus maintaining better …
Hierarchical classification method for radio frequency interference recognition and characterization in satcom
S Ujan, N Navidi, RJ Landry - Applied Sciences, 2020 - mdpi.com
The Quality of Service (QoS) and security of Satellite Communication (Satcom) are crucial as
Satcom plays a significant role in a wide range of applications, such as direct broadcast …
Satcom plays a significant role in a wide range of applications, such as direct broadcast …