Suchergebnisse - Anomaly detection and rules-based intrusion detection techniques
-
1
A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks
ISSN: 2168-2216, 2168-2232Veröffentlicht: New York IEEE 01.09.2018Veröffentlicht in IEEE transactions on systems, man, and cybernetics. Systems (01.09.2018)“… In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network …”
Volltext
Journal Article -
2
A ZigBee Intrusion Detection System for IoT using Secure and Efficient Data Collection
ISSN: 2542-6605, 2542-6605Veröffentlicht: Elsevier B.V 01.12.2020Veröffentlicht in Internet of things (Amsterdam. Online) (01.12.2020)“… We introduce a novel hybrid Intrusion Detection System (IDS) by merging rule-based intrusion detection and machine learning-based anomaly detection …”
Volltext
Journal Article -
3
A Combination Techniques of Intrusion Prevention and Detection for Cloud Computing
ISSN: 1742-6588, 1742-6596Veröffentlicht: Bristol IOP Publishing 01.02.2021Veröffentlicht in Journal of physics. Conference series (01.02.2021)“… To this end, we propose the Integrated Intrusion Prevention and Detection System (IIPDS) to prevent and detect different types of attacks to the infrastructure …”
Volltext
Journal Article -
4
A systematic literature review for network intrusion detection system (IDS)
ISSN: 1615-5262, 1615-5270Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.10.2023Veröffentlicht in International journal of information security (01.10.2023)“… of the systems, and also affect the confidentiality of the data. To counter these possible attacks, intrusion detection systems (IDSs …”
Volltext
Journal Article -
5
Anomaly-based Network Intrusion Detection System using Deep Intelligent Technique
ISSN: 2313-5727, 2707-7799Veröffentlicht: Erbil Polytechnic University 01.09.2023Veröffentlicht in Polytechnic Journal (01.09.2023)“… Traditional signature-based intrusion detection systems and security solutions by matching rule-based mechanism and prior knowledge are insufficient of fully protecting computer networks against novel attacks …”
Volltext
Journal Article -
6
Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection
ISSN: 0031-3203, 1873-5142Veröffentlicht: Oxford Elsevier Ltd 01.09.2007Veröffentlicht in Pattern recognition (01.09.2007)“… In this paper, we present a novel intrusion detection approach to extract both accurate and interpretable fuzzy …”
Volltext
Journal Article -
7
ANOMALY DETECTION IN ZIGBEE-BASED IOT USING SECURE AND EFFICIENT DATA COLLECTION
ISSN: 2527-5399, 2528-2514Veröffentlicht: 30.04.2023Veröffentlicht in Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) (30.04.2023)“… The researchers introduced a hybrid Intrusion Detection System (IDS), combining rule-based intrusion detection and machine learning-based anomaly detection …”
Volltext
Journal Article -
8
Advanced AI-Powered Intrusion Detection Systems in Cybersecurity Protocols for Network Protection
ISSN: 1877-0509, 1877-0509Veröffentlicht: Elsevier B.V 2025Veröffentlicht in Procedia computer science (2025)“… Conventional rule-based network intrusion detection systems (NIDS) find it difficult to remain with the increasing complexity of cyber-attacks …”
Volltext
Journal Article -
9
Rule-Based System with Machine Learning Support for Detecting Anomalies in 5G WLANs
ISSN: 2079-9292, 2079-9292Veröffentlicht: Basel MDPI AG 23.05.2023Veröffentlicht in Electronics (Basel) (23.05.2023)“… The use of rule-based detection establishes a strong basis for the identification of recognized threats, whereas the additional implementation of machine learning models enables the detection of new …”
Volltext
Journal Article -
10
Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications
ISSN: 1949-3053, 1949-3061Veröffentlicht: IEEE 01.09.2013Veröffentlicht in IEEE transactions on smart grid (01.09.2013)“… Using HEs, DAPs and SEMs as examples, it is demonstrated that a behavior-rule based intrusion detection technique can effectively trade false positives for a high detection probability to cope …”
Volltext
Journal Article -
11
Unveiling the IoT's dark corners: anomaly detection enhanced by ensemble modelling
ISSN: 0005-1144, 1848-3380Veröffentlicht: Ljubljana Taylor & Francis Ltd 02.04.2024Veröffentlicht in Automatika (02.04.2024)“… The growing Internet of Things (IoT) landscape requires robust security; traditional rule-based systems are insufficient, driving the integration of machine learning (ML …”
Volltext
Journal Article Paper -
12
Rule‐Based Anomaly Detection Technique Using Roaming Honeypots for Wireless Sensor Networks
ISSN: 1225-6463, 2233-7326Veröffentlicht: Electronics and Telecommunications Research Institute (ETRI) 01.12.2016Veröffentlicht in ETRI journal (01.12.2016)“… To overcome these issues, in this paper, we propose a rule‐based anomaly detection technique using roaming honeypots …”
Volltext
Journal Article -
13
A multinomial logistic regression modeling approach for anomaly intrusion detection
ISSN: 0167-4048, 1872-6208Veröffentlicht: Elsevier Ltd 01.11.2005Veröffentlicht in Computers & security (01.11.2005)“… Although researchers have long studied using statistical modeling techniques to detect anomaly intrusion and profile user behavior, the feasibility of applying multinomial logistic regression modeling …”
Volltext
Journal Article -
14
Leveraging feature subset selection with deer hunting optimizer based deep learning for anomaly detection in secure cloud environment
ISSN: 1573-7721, 1380-7501, 1573-7721Veröffentlicht: New York Springer US 01.07.2024Veröffentlicht in Multimedia tools and applications (01.07.2024)“… Firewalls and typical rule-based security protection approaches could not be adequate for protecting user information in cloud environments …”
Volltext
Journal Article -
15
A Deep Learning-Based Dual-Model Framework for Real-Time Malware and Network Anomaly Detection with MITRE ATT&CK Integration
ISSN: 2158-107X, 2156-5570Veröffentlicht: West Yorkshire Science and Information (SAI) Organization Limited 2025Veröffentlicht in International journal of advanced computer science & applications (2025)“… not be detected using traditional detection tools. Static cybersecurity tools, which are traditional, often fail to deal with dynamic and hitherto unseen attacks, including signature-based antivirus systems and rule-based intrusion detection …”
Volltext
Journal Article -
16
E-RXAI-IoT: A Systematic Evaluation Framework of Rule-Based XAI Methods for Anomaly Detection in IoT Systems
ISSN: 2169-3536, 2169-3536Veröffentlicht: Piscataway IEEE 01.01.2025Veröffentlicht in IEEE access (01.01.2025)“… ) methods, systematic studies evaluating rule-based XAI approaches for IoT anomaly detection remain limited …”
Volltext
Journal Article -
17
Field Size-based Packet Header Anomaly Detection with Rule-Based Normal Profile Updating for Intrusion Detection
Veröffentlicht: IEEE 20.09.2024Veröffentlicht in 2024 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES) (20.09.2024)“… Packet Header Anomaly Detection, or PHAD, is a technique for detecting network intrusion …”
Volltext
Tagungsbericht -
18
Anomaly-Based Network Intrusion Detection Using Hybrid CNN, Bi-LSTM Deep Learning Techniques
Veröffentlicht: IEEE 16.05.2024Veröffentlicht in 2024 4th International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET) (16.05.2024)“… While machine learning (ML) algorithms and conventional known rules-based or signaturebased methods for detecting anomalies have been employed, these approaches are only effective in detecting point anomalies, cannot recognize …”
Volltext
Tagungsbericht -
19
Enhancing Cybersecurity Through Artificial Intelligence: A Novel Approach to Intrusion Detection
ISSN: 2158-107X, 2156-5570Veröffentlicht: West Yorkshire Science and Information (SAI) Organization Limited 2025Veröffentlicht in International journal of advanced computer science & applications (2025)“… ) to protect critical network infrastructure. Traditional signature-based and rule-based IDS face challenges in identifying new and evolving attacks, leading organizations to adopt AI-driven detection solutions …”
Volltext
Journal Article -
20
Rule-based detection technique for ICMPv6 anomalous behaviour
ISSN: 0941-0643, 1433-3058Veröffentlicht: London Springer London 01.12.2018Veröffentlicht in Neural computing & applications (01.12.2018)“… Such vulnerabilities include the lack of exchange message authentication of NDP. Attacks targeting ICMPv6 protocol display ICMPv6 anomalies …”
Volltext
Journal Article