Search Results - Anomaly detection and rules-based intrusion detection techniques

Refine Results
  1. 1

    A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks by Sedjelmaci, Hichem, Senouci, Sidi Mohammed, Ansari, Nirwan

    ISSN: 2168-2216, 2168-2232
    Published: New York IEEE 01.09.2018
    “… In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network…”
    Get full text
    Journal Article
  2. 2

    A ZigBee Intrusion Detection System for IoT using Secure and Efficient Data Collection by Sadikin, Fal, Deursen, Ton van, Kumar, Sandeep

    ISSN: 2542-6605, 2542-6605
    Published: Elsevier B.V 01.12.2020
    Published in Internet of things (Amsterdam. Online) (01.12.2020)
    “… We introduce a novel hybrid Intrusion Detection System (IDS) by merging rule-based intrusion detection and machine learning-based anomaly detection…”
    Get full text
    Journal Article
  3. 3

    A Combination Techniques of Intrusion Prevention and Detection for Cloud Computing by Alturfi, Sabah M., Muhsen, Dena Kadhim, Mohammed, Mohammed A., Aziz, Israa T., Aljshamee, Mustafa

    ISSN: 1742-6588, 1742-6596
    Published: Bristol IOP Publishing 01.02.2021
    Published in Journal of physics. Conference series (01.02.2021)
    “… To this end, we propose the Integrated Intrusion Prevention and Detection System (IIPDS) to prevent and detect different types of attacks to the infrastructure…”
    Get full text
    Journal Article
  4. 4

    A systematic literature review for network intrusion detection system (IDS) by Abdulganiyu, Oluwadamilare Harazeem, Ait Tchakoucht, Taha, Saheed, Yakub Kayode

    ISSN: 1615-5262, 1615-5270
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.10.2023
    “… of the systems, and also affect the confidentiality of the data. To counter these possible attacks, intrusion detection systems (IDSs…”
    Get full text
    Journal Article
  5. 5

    Anomaly-based Network Intrusion Detection System using Deep Intelligent Technique by Hassan, Sardar KH, Daneshwar, Muhammadamin A.

    ISSN: 2313-5727, 2707-7799
    Published: Erbil Polytechnic University 01.09.2023
    Published in Polytechnic Journal (01.09.2023)
    “… Traditional signature-based intrusion detection systems and security solutions by matching rule-based mechanism and prior knowledge are insufficient of fully protecting computer networks against novel attacks…”
    Get full text
    Journal Article
  6. 6

    Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection by Tsang, Chi-Ho, Kwong, Sam, Wang, Hanli

    ISSN: 0031-3203, 1873-5142
    Published: Oxford Elsevier Ltd 01.09.2007
    Published in Pattern recognition (01.09.2007)
    “… In this paper, we present a novel intrusion detection approach to extract both accurate and interpretable fuzzy…”
    Get full text
    Journal Article
  7. 7

    ANOMALY DETECTION IN ZIGBEE-BASED IOT USING SECURE AND EFFICIENT DATA COLLECTION by Sadikin, Fal, Wiranda, Nuruddin

    ISSN: 2527-5399, 2528-2514
    Published: 30.04.2023
    “… The researchers introduced a hybrid Intrusion Detection System (IDS), combining rule-based intrusion detection and machine learning-based anomaly detection…”
    Get full text
    Journal Article
  8. 8

    Advanced AI-Powered Intrusion Detection Systems in Cybersecurity Protocols for Network Protection by Rai, Hari Mohan, Pal, Aditya, Ergash o’g’li, Rashidov Akbar, Kholmirzokhon Ugli, Bobokhonov Akhmadkhon, Shokirovich, Yarmatov Sherzojon

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2025
    Published in Procedia computer science (2025)
    “…Conventional rule-based network intrusion detection systems (NIDS) find it difficult to remain with the increasing complexity of cyber-attacks…”
    Get full text
    Journal Article
  9. 9

    Rule-Based System with Machine Learning Support for Detecting Anomalies in 5G WLANs by Uszko, Krzysztof, Kasprzyk, Maciej, Natkaniec, Marek, Chołda, Piotr

    ISSN: 2079-9292, 2079-9292
    Published: Basel MDPI AG 23.05.2023
    Published in Electronics (Basel) (23.05.2023)
    “… The use of rule-based detection establishes a strong basis for the identification of recognized threats, whereas the additional implementation of machine learning models enables the detection of new…”
    Get full text
    Journal Article
  10. 10

    Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications by Mitchell, Robert, Ing-Ray Chen

    ISSN: 1949-3053, 1949-3061
    Published: IEEE 01.09.2013
    Published in IEEE transactions on smart grid (01.09.2013)
    “… Using HEs, DAPs and SEMs as examples, it is demonstrated that a behavior-rule based intrusion detection technique can effectively trade false positives for a high detection probability to cope…”
    Get full text
    Journal Article
  11. 11

    Unveiling the IoT's dark corners: anomaly detection enhanced by ensemble modelling by Jose, Jisha, Judith, J. E.

    ISSN: 0005-1144, 1848-3380
    Published: Ljubljana Taylor & Francis Ltd 02.04.2024
    Published in Automatika (02.04.2024)
    “…The growing Internet of Things (IoT) landscape requires robust security; traditional rule-based systems are insufficient, driving the integration of machine learning (ML…”
    Get full text
    Journal Article Paper
  12. 12

    RuleBased Anomaly Detection Technique Using Roaming Honeypots for Wireless Sensor Networks by Gowri, Muthukrishnan, Paramasivan, Balasubramanian

    ISSN: 1225-6463, 2233-7326
    Published: Electronics and Telecommunications Research Institute (ETRI) 01.12.2016
    Published in ETRI journal (01.12.2016)
    “… To overcome these issues, in this paper, we propose a rulebased anomaly detection technique using roaming honeypots…”
    Get full text
    Journal Article
  13. 13

    A multinomial logistic regression modeling approach for anomaly intrusion detection by Wang, Yun

    ISSN: 0167-4048, 1872-6208
    Published: Elsevier Ltd 01.11.2005
    Published in Computers & security (01.11.2005)
    “…Although researchers have long studied using statistical modeling techniques to detect anomaly intrusion and profile user behavior, the feasibility of applying multinomial logistic regression modeling…”
    Get full text
    Journal Article
  14. 14

    Leveraging feature subset selection with deer hunting optimizer based deep learning for anomaly detection in secure cloud environment by Bai, V. Sujatha, Punithavalli, M.

    ISSN: 1573-7721, 1380-7501, 1573-7721
    Published: New York Springer US 01.07.2024
    Published in Multimedia tools and applications (01.07.2024)
    “… Firewalls and typical rule-based security protection approaches could not be adequate for protecting user information in cloud environments…”
    Get full text
    Journal Article
  15. 15

    A Deep Learning-Based Dual-Model Framework for Real-Time Malware and Network Anomaly Detection with MITRE ATT&CK Integration by S, Migara H. M., B, Sandakelum M. D., N, Maduranga D. B. W., C, Kumara D. D. K., Fernando, Harinda, Abeywardena, Kavinga

    ISSN: 2158-107X, 2156-5570
    Published: West Yorkshire Science and Information (SAI) Organization Limited 2025
    “… not be detected using traditional detection tools. Static cybersecurity tools, which are traditional, often fail to deal with dynamic and hitherto unseen attacks, including signature-based antivirus systems and rule-based intrusion detection…”
    Get full text
    Journal Article
  16. 16

    E-RXAI-IoT: A Systematic Evaluation Framework of Rule-Based XAI Methods for Anomaly Detection in IoT Systems by Namrita Gummadi, Anna, Abdelrahim, Elsaid Md, Gad, Ibrahim, Abdallah, Mustafa

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 01.01.2025
    Published in IEEE access (01.01.2025)
    “…) methods, systematic studies evaluating rule-based XAI approaches for IoT anomaly detection remain limited…”
    Get full text
    Journal Article
  17. 17
  18. 18

    Anomaly-Based Network Intrusion Detection Using Hybrid CNN, Bi-LSTM Deep Learning Techniques by Akkepalli, Srinivas, Sagar, K

    Published: IEEE 16.05.2024
    “… While machine learning (ML) algorithms and conventional known rules-based or signaturebased methods for detecting anomalies have been employed, these approaches are only effective in detecting point anomalies, cannot recognize…”
    Get full text
    Conference Proceeding
  19. 19

    Enhancing Cybersecurity Through Artificial Intelligence: A Novel Approach to Intrusion Detection by Alzaylaee, Mohammed K.

    ISSN: 2158-107X, 2156-5570
    Published: West Yorkshire Science and Information (SAI) Organization Limited 2025
    “…) to protect critical network infrastructure. Traditional signature-based and rule-based IDS face challenges in identifying new and evolving attacks, leading organizations to adopt AI-driven detection solutions…”
    Get full text
    Journal Article
  20. 20

    Rule-based detection technique for ICMPv6 anomalous behaviour by Saad, Redhwan M. A., Anbar, Mohammed, Manickam, Selvakumar

    ISSN: 0941-0643, 1433-3058
    Published: London Springer London 01.12.2018
    Published in Neural computing & applications (01.12.2018)
    “… Such vulnerabilities include the lack of exchange message authentication of NDP. Attacks targeting ICMPv6 protocol display ICMPv6 anomalies…”
    Get full text
    Journal Article