A survey and taxonomy of the fuzzy signature-based intrusion detection systems

M Masdari, H Khezri - Applied Soft Computing, 2020 - Elsevier
Organizations that benefit from information technologies are vulnerable to various attacks
and malicious behaviors. Intrusion Detection Systems (IDS) are one of the main lines of …

[PDF][PDF] A survey on secure network: intrusion detection & prevention approaches

M Bijone - American Journal of Information Systems, 2016 - academia.edu
With the growth of the Internet and its potential, more and more people are getting
connected to the Internet every day to take advantage of the e-Commerce. On one side, the …

A survey paper on keystroke dynamics authentication for current applications

SFN Sadikan, AA Ramli, MFM Fudzee - AIP conference proceedings, 2019 - pubs.aip.org
Online learning is a common tool among university students that depends solely on the
Internet medium. However, the lack of monitoring during examination sessions has resulted …

Unsupervised learning with hierarchical feature selection for DDoS mitigation within the ISP domain

I Ko, D Chambers, E Barrett - ETRI Journal, 2019 - Wiley Online Library
A new Mirai variant found recently was equipped with a dynamic update ability, which
increases the level of difficulty for DDoS mitigation. Continuous development of 5G …

[PDF][PDF] Enhancing user-level security: performance analysis of machine learning algorithms for dynamic keystroke analysis

BR KRISHNA, MS VARMA - Journal of Theoretical and Applied Information …, 2023 - jatit.org
In today's computing and information-processing industry, security has become a paramount
concern. With the proliferation of internet-based devices and the exponential growth of data …

Hybrid Machine Learning based Shill Bidding Fraud Detection System using Recursive Feature Elimination Method

JK Amathi, LK Cherukuri, KP Ponnaganti… - … Analysis and Deep …, 2024 - ieeexplore.ieee.org
Due to the significant surge in internet traffic and the increasing complexity of networks,
manual monitoring of traffic flows and intrusion detection in large networks has become an …

Hybrid relabeled model for network intrusion detection

B Patel, Z Somani, SA Ajila… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
With growing web communications throughout the Internet, the need for better security
protection has been intensified. Intrusion detection is important for identifying malicious …

A genetic annealing based new approach for IDS

S Bajpai, A Gupta - 2017 International Conference on Intelligent …, 2017 - ieeexplore.ieee.org
In recent years many, due to modernization of the techniques, an unknown and unsaid
threat to the data has also been accompanied. This threat is the threat of various attacks that …

Intrusion detection system modeling based on learning from network traffic data

A Midzic, Z Avdagic, S Omanovic - KSII Transactions on Internet …, 2018 - koreascience.kr
This research uses artificial intelligence methods for computer network intrusion detection
system modeling. Primary classification is done using self-organized maps (SOM) in two …

A Comparative Study on Self-learning Techniques for Securing Digital Devices

D Kumar, S Kumar, V Khathuria - … : Proceedings of ICDMAI 2021, Volume 2, 2022 - Springer
In the present time, the use of technology in our daily activities is imperative as we employ
various technological solutions for activities like banking, communication, business and e …