Survey of intrusion detection systems: techniques, datasets and challenges

A Khraisat, I Gondal, P Vamplew, J Kamruzzaman - Cybersecurity, 2019 - Springer
Cyber-attacks are becoming more sophisticated and thereby presenting increasing
challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade …

False alarm minimization techniques in signature-based intrusion detection systems: A survey

N Hubballi, V Suryanarayanan - Computer Communications, 2014 - Elsevier
A network based Intrusion Detection System (IDS) gathers and analyzes network packets
and report possible low level security violations to a system administrator. In a large network …

Comparative analysis of intrusion detection systems and machine learning based model analysis through decision tree

Z Azam, MM Islam, MN Huda - IEEE Access, 2023 - ieeexplore.ieee.org
Cyber-attacks pose increasing challenges in precisely detecting intrusions, risking data
confidentiality, integrity, and availability. This review paper presents recent IDS taxonomy, a …

Research trends in network-based intrusion detection systems: A review

S Kumar, S Gupta, S Arora - Ieee Access, 2021 - ieeexplore.ieee.org
Network threats and hazards are evolving at a high-speed rate in recent years. Many
mechanisms (such as firewalls, anti-virus, anti-malware, and spam filters) are being used as …

Cyber-attack prediction based on network intrusion detection systems for alert correlation techniques: a survey

H Albasheer, M Md Siraj, A Mubarakali… - Sensors, 2022 - mdpi.com
Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of
enterprise networks against cyber-attacks. However, NIDS networks suffer from several …

Probability-guaranteed state estimation for nonlinear delayed systems under mixed attacks

X Yi, H Yu, Z Fang, L Ma - International Journal of Systems …, 2023 - Taylor & Francis
In this paper, the problem of the networked set-membership state estimation is discussed for
a class of nonlinear discrete time-varying systems subject to cyber attacks and time delays …

Architectural tactics for big data cybersecurity analytics systems: a review

F Ullah, MA Babar - Journal of Systems and Software, 2019 - Elsevier
Abstract Context Big Data Cybersecurity Analytics (BDCA) systems leverage big data
technologies for analyzing security events data to protect organizational networks …

Detection and defense of application-layer DDoS attacks in backbone web traffic

W Zhou, W Jia, S Wen, Y Xiang, W Zhou - Future Generation Computer …, 2014 - Elsevier
Web servers are usually located in a well-organized data center where these servers
connect with the outside Internet directly through backbones. Meanwhile, the application …

[PDF][PDF] High-level information fusion: an overview.

PH Foo, GW Ng - J. Adv. Inf. Fusion, 2013 - isif.org
In general, data and information fusion can provide enhancement to the outcomes of
processes for solving various application problems. Some advantages of carrying out DIF …

[HTML][HTML] Reducing false positives of network anomaly detection by local adaptive multivariate smoothing

M Grill, T Pevný, M Rehak - Journal of Computer and System Sciences, 2017 - Elsevier
Network intrusion detection systems based on the anomaly detection paradigm have high
false alarm rate making them difficult to use. To address this weakness, we propose to …