Suchergebnisse - Anomaly detection and rules-based intrusion detection techniques

  1. 1

    A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks von Sedjelmaci, Hichem, Senouci, Sidi Mohammed, Ansari, Nirwan

    ISSN: 2168-2216, 2168-2232
    Veröffentlicht: New York IEEE 01.09.2018
    “… In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network …”
    Volltext
    Journal Article
  2. 2

    A ZigBee Intrusion Detection System for IoT using Secure and Efficient Data Collection von Sadikin, Fal, Deursen, Ton van, Kumar, Sandeep

    ISSN: 2542-6605, 2542-6605
    Veröffentlicht: Elsevier B.V 01.12.2020
    Veröffentlicht in Internet of things (Amsterdam. Online) (01.12.2020)
    “… We introduce a novel hybrid Intrusion Detection System (IDS) by merging rule-based intrusion detection and machine learning-based anomaly detection …”
    Volltext
    Journal Article
  3. 3

    A Combination Techniques of Intrusion Prevention and Detection for Cloud Computing von Alturfi, Sabah M., Muhsen, Dena Kadhim, Mohammed, Mohammed A., Aziz, Israa T., Aljshamee, Mustafa

    ISSN: 1742-6588, 1742-6596
    Veröffentlicht: Bristol IOP Publishing 01.02.2021
    Veröffentlicht in Journal of physics. Conference series (01.02.2021)
    “… To this end, we propose the Integrated Intrusion Prevention and Detection System (IIPDS) to prevent and detect different types of attacks to the infrastructure …”
    Volltext
    Journal Article
  4. 4

    A systematic literature review for network intrusion detection system (IDS) von Abdulganiyu, Oluwadamilare Harazeem, Ait Tchakoucht, Taha, Saheed, Yakub Kayode

    ISSN: 1615-5262, 1615-5270
    Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.10.2023
    Veröffentlicht in International journal of information security (01.10.2023)
    “… of the systems, and also affect the confidentiality of the data. To counter these possible attacks, intrusion detection systems (IDSs …”
    Volltext
    Journal Article
  5. 5

    Anomaly-based Network Intrusion Detection System using Deep Intelligent Technique von Hassan, Sardar KH, Daneshwar, Muhammadamin A.

    ISSN: 2313-5727, 2707-7799
    Veröffentlicht: Erbil Polytechnic University 01.09.2023
    Veröffentlicht in Polytechnic Journal (01.09.2023)
    “… Traditional signature-based intrusion detection systems and security solutions by matching rule-based mechanism and prior knowledge are insufficient of fully protecting computer networks against novel attacks …”
    Volltext
    Journal Article
  6. 6

    Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection von Tsang, Chi-Ho, Kwong, Sam, Wang, Hanli

    ISSN: 0031-3203, 1873-5142
    Veröffentlicht: Oxford Elsevier Ltd 01.09.2007
    Veröffentlicht in Pattern recognition (01.09.2007)
    “… In this paper, we present a novel intrusion detection approach to extract both accurate and interpretable fuzzy …”
    Volltext
    Journal Article
  7. 7

    ANOMALY DETECTION IN ZIGBEE-BASED IOT USING SECURE AND EFFICIENT DATA COLLECTION von Sadikin, Fal, Wiranda, Nuruddin

    ISSN: 2527-5399, 2528-2514
    Veröffentlicht: 30.04.2023
    “… The researchers introduced a hybrid Intrusion Detection System (IDS), combining rule-based intrusion detection and machine learning-based anomaly detection …”
    Volltext
    Journal Article
  8. 8

    Advanced AI-Powered Intrusion Detection Systems in Cybersecurity Protocols for Network Protection von Rai, Hari Mohan, Pal, Aditya, Ergash o’g’li, Rashidov Akbar, Kholmirzokhon Ugli, Bobokhonov Akhmadkhon, Shokirovich, Yarmatov Sherzojon

    ISSN: 1877-0509, 1877-0509
    Veröffentlicht: Elsevier B.V 2025
    Veröffentlicht in Procedia computer science (2025)
    “… Conventional rule-based network intrusion detection systems (NIDS) find it difficult to remain with the increasing complexity of cyber-attacks …”
    Volltext
    Journal Article
  9. 9

    Rule-Based System with Machine Learning Support for Detecting Anomalies in 5G WLANs von Uszko, Krzysztof, Kasprzyk, Maciej, Natkaniec, Marek, Chołda, Piotr

    ISSN: 2079-9292, 2079-9292
    Veröffentlicht: Basel MDPI AG 23.05.2023
    Veröffentlicht in Electronics (Basel) (23.05.2023)
    “… The use of rule-based detection establishes a strong basis for the identification of recognized threats, whereas the additional implementation of machine learning models enables the detection of new …”
    Volltext
    Journal Article
  10. 10

    Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications von Mitchell, Robert, Ing-Ray Chen

    ISSN: 1949-3053, 1949-3061
    Veröffentlicht: IEEE 01.09.2013
    Veröffentlicht in IEEE transactions on smart grid (01.09.2013)
    “… Using HEs, DAPs and SEMs as examples, it is demonstrated that a behavior-rule based intrusion detection technique can effectively trade false positives for a high detection probability to cope …”
    Volltext
    Journal Article
  11. 11

    Unveiling the IoT's dark corners: anomaly detection enhanced by ensemble modelling von Jose, Jisha, Judith, J. E.

    ISSN: 0005-1144, 1848-3380
    Veröffentlicht: Ljubljana Taylor & Francis Ltd 02.04.2024
    Veröffentlicht in Automatika (02.04.2024)
    “… The growing Internet of Things (IoT) landscape requires robust security; traditional rule-based systems are insufficient, driving the integration of machine learning (ML …”
    Volltext
    Journal Article Paper
  12. 12

    RuleBased Anomaly Detection Technique Using Roaming Honeypots for Wireless Sensor Networks von Gowri, Muthukrishnan, Paramasivan, Balasubramanian

    ISSN: 1225-6463, 2233-7326
    Veröffentlicht: Electronics and Telecommunications Research Institute (ETRI) 01.12.2016
    Veröffentlicht in ETRI journal (01.12.2016)
    “… To overcome these issues, in this paper, we propose a rulebased anomaly detection technique using roaming honeypots …”
    Volltext
    Journal Article
  13. 13

    A multinomial logistic regression modeling approach for anomaly intrusion detection von Wang, Yun

    ISSN: 0167-4048, 1872-6208
    Veröffentlicht: Elsevier Ltd 01.11.2005
    Veröffentlicht in Computers & security (01.11.2005)
    “… Although researchers have long studied using statistical modeling techniques to detect anomaly intrusion and profile user behavior, the feasibility of applying multinomial logistic regression modeling …”
    Volltext
    Journal Article
  14. 14

    Leveraging feature subset selection with deer hunting optimizer based deep learning for anomaly detection in secure cloud environment von Bai, V. Sujatha, Punithavalli, M.

    ISSN: 1573-7721, 1380-7501, 1573-7721
    Veröffentlicht: New York Springer US 01.07.2024
    Veröffentlicht in Multimedia tools and applications (01.07.2024)
    “… Firewalls and typical rule-based security protection approaches could not be adequate for protecting user information in cloud environments …”
    Volltext
    Journal Article
  15. 15

    A Deep Learning-Based Dual-Model Framework for Real-Time Malware and Network Anomaly Detection with MITRE ATT&CK Integration von S, Migara H. M., B, Sandakelum M. D., N, Maduranga D. B. W., C, Kumara D. D. K., Fernando, Harinda, Abeywardena, Kavinga

    ISSN: 2158-107X, 2156-5570
    Veröffentlicht: West Yorkshire Science and Information (SAI) Organization Limited 2025
    “… not be detected using traditional detection tools. Static cybersecurity tools, which are traditional, often fail to deal with dynamic and hitherto unseen attacks, including signature-based antivirus systems and rule-based intrusion detection …”
    Volltext
    Journal Article
  16. 16

    E-RXAI-IoT: A Systematic Evaluation Framework of Rule-Based XAI Methods for Anomaly Detection in IoT Systems von Namrita Gummadi, Anna, Abdelrahim, Elsaid Md, Gad, Ibrahim, Abdallah, Mustafa

    ISSN: 2169-3536, 2169-3536
    Veröffentlicht: Piscataway IEEE 01.01.2025
    Veröffentlicht in IEEE access (01.01.2025)
    “… ) methods, systematic studies evaluating rule-based XAI approaches for IoT anomaly detection remain limited …”
    Volltext
    Journal Article
  17. 17
  18. 18

    Anomaly-Based Network Intrusion Detection Using Hybrid CNN, Bi-LSTM Deep Learning Techniques von Akkepalli, Srinivas, Sagar, K

    Veröffentlicht: IEEE 16.05.2024
    “… While machine learning (ML) algorithms and conventional known rules-based or signaturebased methods for detecting anomalies have been employed, these approaches are only effective in detecting point anomalies, cannot recognize …”
    Volltext
    Tagungsbericht
  19. 19

    Enhancing Cybersecurity Through Artificial Intelligence: A Novel Approach to Intrusion Detection von Alzaylaee, Mohammed K.

    ISSN: 2158-107X, 2156-5570
    Veröffentlicht: West Yorkshire Science and Information (SAI) Organization Limited 2025
    “… ) to protect critical network infrastructure. Traditional signature-based and rule-based IDS face challenges in identifying new and evolving attacks, leading organizations to adopt AI-driven detection solutions …”
    Volltext
    Journal Article
  20. 20

    Rule-based detection technique for ICMPv6 anomalous behaviour von Saad, Redhwan M. A., Anbar, Mohammed, Manickam, Selvakumar

    ISSN: 0941-0643, 1433-3058
    Veröffentlicht: London Springer London 01.12.2018
    Veröffentlicht in Neural computing & applications (01.12.2018)
    “… Such vulnerabilities include the lack of exchange message authentication of NDP. Attacks targeting ICMPv6 protocol display ICMPv6 anomalies …”
    Volltext
    Journal Article