iNIDS: SWOT Analysis and TOWS Inferences of State-of-the-Art NIDS solutions for the development of Intelligent Network Intrusion Detection System
J Verma, A Bhandari, G Singh - Computer Communications, 2022 - Elsevier
Introduction: The growth of ubiquitous networked devices and the proliferation of
geographically dispersed 'Internet of Thing'devices have exponentially increased network …
geographically dispersed 'Internet of Thing'devices have exponentially increased network …
MLEsIDSs: machine learning-based ensembles for intrusion detection systems—a review
Network security plays an essential role in secure communication and avoids financial loss
and crippled services due to network intrusions. Intruders generally exploit the flaws of …
and crippled services due to network intrusions. Intruders generally exploit the flaws of …
Intrusion detection in cloud computing based on time series anomalies utilizing machine learning
The growth of cloud computing is hindered by concerns about privacy and security. Despite
the widespread use of network intrusion detection systems (NIDS), the issue of false …
the widespread use of network intrusion detection systems (NIDS), the issue of false …
An improved intrusion detection system based on KNN hyperparameter tuning and cross-validation
R Wazirali - Arabian Journal for Science and Engineering, 2020 - Springer
As security violations increase, cybersecurity is a critical issue for any area of cyberspace. A
large number of zero-day attacks are taking place on a continuous basis due to the inclusion …
large number of zero-day attacks are taking place on a continuous basis due to the inclusion …
Intrusion detection systems in the cloud computing: A comprehensive and deep literature review
Z Liu, B Xu, B Cheng, X Hu… - … : Practice and Experience, 2022 - Wiley Online Library
Abrupt development of resources and rising expenses of infrastructure are leading
institutions to take on cloud computing. Albeit, the cloud environment is vulnerable to various …
institutions to take on cloud computing. Albeit, the cloud environment is vulnerable to various …
A distributed intrusion detection approach based on machine leaning techniques for a cloud security
Nowadays, the rapid evolution of computer network and large amount of data which are
generated by systems require an accurate monitoring and high security of data and …
generated by systems require an accurate monitoring and high security of data and …
New anomaly network intrusion detection system in cloud environment based on optimized back propagation neural network using improved genetic algorithm
Cloud computing is distributed architecture, providing computing facilities and storage
resource as a service over an open environment (Internet), this lead to different matters …
resource as a service over an open environment (Internet), this lead to different matters …
Integration of recurrent convolutional neural network and optimal encryption scheme for intrusion detection with secure data storage in the cloud
V Prabhakaran, A Kulandasamy - Computational Intelligence, 2021 - Wiley Online Library
Data communication security is growing day after day with the proliferation of cloud
computing. It is primarily because of the few security constraints and challenges occurring in …
computing. It is primarily because of the few security constraints and challenges occurring in …
A systematic literature review of intrusion detection systems in the cloud‐based IoT environments
G Luo, Z Chen, BO Mohammed - … and Computation: Practice …, 2022 - Wiley Online Library
As the number of Internet of Things (IoT) subscribers, services, and applications grows, there
is a pressing need for a reliable and lightweight security solution that can be used in IoT …
is a pressing need for a reliable and lightweight security solution that can be used in IoT …
Bayesian attack graphs for platform virtualized infrastructures in clouds
B Asvija, R Eswari, MB Bijoy - Journal of Information Security and …, 2020 - Elsevier
Virtualization security is an important aspect to be carefully addressed while provisioning
cloud services. In this paper, we propose a novel model using Bayesian Attack Graphs …
cloud services. In this paper, we propose a novel model using Bayesian Attack Graphs …