Survey of intrusion detection systems: techniques, datasets and challenges
Cyber-attacks are becoming more sophisticated and thereby presenting increasing
challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade …
challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade …
False alarm minimization techniques in signature-based intrusion detection systems: A survey
N Hubballi, V Suryanarayanan - Computer Communications, 2014 - Elsevier
A network based Intrusion Detection System (IDS) gathers and analyzes network packets
and report possible low level security violations to a system administrator. In a large network …
and report possible low level security violations to a system administrator. In a large network …
Comparative analysis of intrusion detection systems and machine learning based model analysis through decision tree
Cyber-attacks pose increasing challenges in precisely detecting intrusions, risking data
confidentiality, integrity, and availability. This review paper presents recent IDS taxonomy, a …
confidentiality, integrity, and availability. This review paper presents recent IDS taxonomy, a …
Research trends in network-based intrusion detection systems: A review
Network threats and hazards are evolving at a high-speed rate in recent years. Many
mechanisms (such as firewalls, anti-virus, anti-malware, and spam filters) are being used as …
mechanisms (such as firewalls, anti-virus, anti-malware, and spam filters) are being used as …
Cyber-attack prediction based on network intrusion detection systems for alert correlation techniques: a survey
H Albasheer, M Md Siraj, A Mubarakali… - Sensors, 2022 - mdpi.com
Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of
enterprise networks against cyber-attacks. However, NIDS networks suffer from several …
enterprise networks against cyber-attacks. However, NIDS networks suffer from several …
Probability-guaranteed state estimation for nonlinear delayed systems under mixed attacks
X Yi, H Yu, Z Fang, L Ma - International Journal of Systems …, 2023 - Taylor & Francis
In this paper, the problem of the networked set-membership state estimation is discussed for
a class of nonlinear discrete time-varying systems subject to cyber attacks and time delays …
a class of nonlinear discrete time-varying systems subject to cyber attacks and time delays …
Architectural tactics for big data cybersecurity analytics systems: a review
Abstract Context Big Data Cybersecurity Analytics (BDCA) systems leverage big data
technologies for analyzing security events data to protect organizational networks …
technologies for analyzing security events data to protect organizational networks …
Detection and defense of application-layer DDoS attacks in backbone web traffic
Web servers are usually located in a well-organized data center where these servers
connect with the outside Internet directly through backbones. Meanwhile, the application …
connect with the outside Internet directly through backbones. Meanwhile, the application …
[PDF][PDF] High-level information fusion: an overview.
PH Foo, GW Ng - J. Adv. Inf. Fusion, 2013 - isif.org
In general, data and information fusion can provide enhancement to the outcomes of
processes for solving various application problems. Some advantages of carrying out DIF …
processes for solving various application problems. Some advantages of carrying out DIF …
[HTML][HTML] Reducing false positives of network anomaly detection by local adaptive multivariate smoothing
Network intrusion detection systems based on the anomaly detection paradigm have high
false alarm rate making them difficult to use. To address this weakness, we propose to …
false alarm rate making them difficult to use. To address this weakness, we propose to …