Intrusion detection systems in the Internet of things: A comprehensive investigation

S Hajiheidari, K Wakil, M Badri, NJ Navimipour - Computer Networks, 2019 - Elsevier
Recently, a new dimension of intelligent objects has been provided by reducing the power
consumption of electrical appliances. Daily physical objects have been upgraded by …

Taxonomy and survey of collaborative intrusion detection

E Vasilomanolakis, S Karuppayah… - ACM computing …, 2015 - dl.acm.org
The dependency of our society on networked computers has become frightening: In the
economy, all-digital networks have turned from facilitators to drivers; as cyber-physical …

[图书][B] Computer security: principles and practice

W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …

Distributed intrusion detection system in a multi-layer network architecture of smart grids

Y Zhang, L Wang, W Sun, RC Green II… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
The advent of the smart grid promises to usher in an era that will bring intelligence,
efficiency, and optimality to the power grid. Most of these changes will occur as an Internet …

Mining network data for intrusion detection through combining SVMs with ant colony networks

W Feng, Q Zhang, G Hu, JX Huang - Future Generation Computer Systems, 2014 - Elsevier
In this paper, we introduce a new machine-learning-based data classification algorithm that
is applied to network intrusion detection. The basic task is to classify network activities (in the …

Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions

W Li, W Meng, LF Kwok - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
Owing to the swift growth in cyber attacks, intrusion detection systems (IDSs) have become a
necessity to help safeguard personal and organizational assets. However, with the …

Intrusion detection in wireless ad hoc networks

A Mishra, K Nadkarni, A Patcha - IEEE wireless …, 2004 - ieeexplore.ieee.org
Intrusion detection has, over the last few years, assumed paramount importance within the
broad realm of network security, more so in the case of wireless ad hoc networks. These are …

[PDF][PDF] {BotGrep}: Finding {P2P} Bots with Structured Graph Analysis

S Nagaraja, P Mittal, CY Hong, M Caesar… - 19th USENIX Security …, 2010 - usenix.org
A key feature that distinguishes modern botnets from earlier counterparts is their increasing
use of structured overlay topologies. This lets them carry out sophisticated coordinated …

A cooperative intrusion detection system framework for cloud computing networks

CC Lo, CC Huang, J Ku - 2010 39th International Conference …, 2010 - ieeexplore.ieee.org
Cloud computing provides a framework for supporting end users easily attaching powerful
services and applications through Internet. To provide secure and reliable services in cloud …

Intrusion detection: A survey

A Lazarevic, V Kumar, J Srivastava - Managing cyber threats: Issues …, 2005 - Springer
This chapter provides the overview of the state of the art in intrusion detection research.
Intrusion detection systems are software and/or hardware components that monitor …