Adaboost-based algorithm for network intrusion detection

W Hu, W Hu, S Maybank - IEEE Transactions on Systems, Man …, 2008 - ieeexplore.ieee.org
Network intrusion detection aims at distinguishing the attacks on the Internet from normal
use of the Internet. It is an indispensable part of the information security system. Due to the …

Online adaboost-based parameterized methods for dynamic distributed network intrusion detection

W Hu, J Gao, Y Wang, O Wu… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Current network intrusion detection systems lack adaptability to the frequently changing
network environments. Furthermore, intrusion detection in the new distributed architectures …

Network intrusion detection using clustering and gradient boosting

P Verma, S Anwar, S Khan… - 2018 9th International …, 2018 - ieeexplore.ieee.org
An unauthorized activity on the network is called network intrusion and device or software
application which monitors the network parameters in order to detect such an intrusion is …

Edge-detect: edge-centric network intrusion detection using deep neural network

P Singh, A Pankaj, R Mitra - 2021 IEEE 18th Annual …, 2021 - ieeexplore.ieee.org
Edge nodes are crucial for detection against multitudes of cyber attacks on Internet-of-
Things endpoints and is set to become part of a multi-billion industry. The resource …

An attack graph-based on-line multi-step attack detector

M Angelini, S Bonomi, E Borzi, AD Pozzo… - Proceedings of the 19th …, 2018 - dl.acm.org
Modern distributed systems are characterized by complex deployment designed to ensure
high availability through replication and diversity, to tolerate the presence of failures and to …

A survey on different machine learning algorithms and weak classifiers based on KDD and NSL-KDD datasets

RD Ravipati, M Abualkibash - International Journal of Artificial …, 2019 - papers.ssrn.com
Network intrusion detection often finds a difficulty in creating classifiers that could handle
unequal distributed attack categories. Generally, attacks such as Remote to Local (R2L) and …

[PDF][PDF] Two Semi-supervised Approaches to Malware Detection with Neural Networks.

J Koza, M Krcál, M Holena - ITAT, 2020 - ceur-ws.org
Semi-supervised learning is characterized by using the additional information from the
unlabeled data. In this paper, we compare two semi-supervised algorithms for deep neural …

DoSSEC: proposta de detecção e mitigação de ataques SYN Flood em redes SDN

RN Carvalho - 2020 - rlbea.unb.br
As redes definidas por software (SDN) representam uma nova arquitetura de rede que
fornece controle central sobre a rede. Ela é caracterizada pela separação entre o plano de …

Distributed detection of network intrusions based on a parametric model

Y Wang, X Li, W Hu - 2008 IEEE International Conference on …, 2008 - ieeexplore.ieee.org
With the increasing requirements of fast response and privacy protection, how to detect
network intrusions in a distributed architecture becomes a hot research area in the …

DISTRIBUTED ANOMALY INTRUSION DETECTION SYSTEM BASED ON MULTI-AGENTS

S KL - International Journal on Information sciences and …, 2011 - search.proquest.com
Networks have the problem of security attacks like denial of service attacks and others. The
firewalls and encrypted software's does not provide a complete security solution for those …