Výsledky vyhľadávania - Anomaly detection and rules-based intrusion detection techniques
-
1
A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks
ISSN: 2168-2216, 2168-2232Vydavateľské údaje: New York IEEE 01.09.2018Vydané v IEEE transactions on systems, man, and cybernetics. Systems (01.09.2018)“… In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network…”
Získať plný text
Journal Article -
2
A ZigBee Intrusion Detection System for IoT using Secure and Efficient Data Collection
ISSN: 2542-6605, 2542-6605Vydavateľské údaje: Elsevier B.V 01.12.2020Vydané v Internet of things (Amsterdam. Online) (01.12.2020)“… We introduce a novel hybrid Intrusion Detection System (IDS) by merging rule-based intrusion detection and machine learning-based anomaly detection…”
Získať plný text
Journal Article -
3
A Combination Techniques of Intrusion Prevention and Detection for Cloud Computing
ISSN: 1742-6588, 1742-6596Vydavateľské údaje: Bristol IOP Publishing 01.02.2021Vydané v Journal of physics. Conference series (01.02.2021)“… To this end, we propose the Integrated Intrusion Prevention and Detection System (IIPDS) to prevent and detect different types of attacks to the infrastructure…”
Získať plný text
Journal Article -
4
A systematic literature review for network intrusion detection system (IDS)
ISSN: 1615-5262, 1615-5270Vydavateľské údaje: Berlin/Heidelberg Springer Berlin Heidelberg 01.10.2023Vydané v International journal of information security (01.10.2023)“… of the systems, and also affect the confidentiality of the data. To counter these possible attacks, intrusion detection systems (IDSs…”
Získať plný text
Journal Article -
5
Anomaly-based Network Intrusion Detection System using Deep Intelligent Technique
ISSN: 2313-5727, 2707-7799Vydavateľské údaje: Erbil Polytechnic University 01.09.2023Vydané v Polytechnic Journal (01.09.2023)“… Traditional signature-based intrusion detection systems and security solutions by matching rule-based mechanism and prior knowledge are insufficient of fully protecting computer networks against novel attacks…”
Získať plný text
Journal Article -
6
Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection
ISSN: 0031-3203, 1873-5142Vydavateľské údaje: Oxford Elsevier Ltd 01.09.2007Vydané v Pattern recognition (01.09.2007)“… In this paper, we present a novel intrusion detection approach to extract both accurate and interpretable fuzzy…”
Získať plný text
Journal Article -
7
ANOMALY DETECTION IN ZIGBEE-BASED IOT USING SECURE AND EFFICIENT DATA COLLECTION
ISSN: 2527-5399, 2528-2514Vydavateľské údaje: 30.04.2023Vydané v Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) (30.04.2023)“… The researchers introduced a hybrid Intrusion Detection System (IDS), combining rule-based intrusion detection and machine learning-based anomaly detection…”
Získať plný text
Journal Article -
8
Advanced AI-Powered Intrusion Detection Systems in Cybersecurity Protocols for Network Protection
ISSN: 1877-0509, 1877-0509Vydavateľské údaje: Elsevier B.V 2025Vydané v Procedia computer science (2025)“…Conventional rule-based network intrusion detection systems (NIDS) find it difficult to remain with the increasing complexity of cyber-attacks…”
Získať plný text
Journal Article -
9
Rule-Based System with Machine Learning Support for Detecting Anomalies in 5G WLANs
ISSN: 2079-9292, 2079-9292Vydavateľské údaje: Basel MDPI AG 23.05.2023Vydané v Electronics (Basel) (23.05.2023)“… The use of rule-based detection establishes a strong basis for the identification of recognized threats, whereas the additional implementation of machine learning models enables the detection of new…”
Získať plný text
Journal Article -
10
Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications
ISSN: 1949-3053, 1949-3061Vydavateľské údaje: IEEE 01.09.2013Vydané v IEEE transactions on smart grid (01.09.2013)“… Using HEs, DAPs and SEMs as examples, it is demonstrated that a behavior-rule based intrusion detection technique can effectively trade false positives for a high detection probability to cope…”
Získať plný text
Journal Article -
11
Unveiling the IoT's dark corners: anomaly detection enhanced by ensemble modelling
ISSN: 0005-1144, 1848-3380Vydavateľské údaje: Ljubljana Taylor & Francis Ltd 02.04.2024Vydané v Automatika (02.04.2024)“…The growing Internet of Things (IoT) landscape requires robust security; traditional rule-based systems are insufficient, driving the integration of machine learning (ML…”
Získať plný text
Journal Article Paper -
12
Rule‐Based Anomaly Detection Technique Using Roaming Honeypots for Wireless Sensor Networks
ISSN: 1225-6463, 2233-7326Vydavateľské údaje: Electronics and Telecommunications Research Institute (ETRI) 01.12.2016Vydané v ETRI journal (01.12.2016)“… To overcome these issues, in this paper, we propose a rule‐based anomaly detection technique using roaming honeypots…”
Získať plný text
Journal Article -
13
A multinomial logistic regression modeling approach for anomaly intrusion detection
ISSN: 0167-4048, 1872-6208Vydavateľské údaje: Elsevier Ltd 01.11.2005Vydané v Computers & security (01.11.2005)“…Although researchers have long studied using statistical modeling techniques to detect anomaly intrusion and profile user behavior, the feasibility of applying multinomial logistic regression modeling…”
Získať plný text
Journal Article -
14
Leveraging feature subset selection with deer hunting optimizer based deep learning for anomaly detection in secure cloud environment
ISSN: 1573-7721, 1380-7501, 1573-7721Vydavateľské údaje: New York Springer US 01.07.2024Vydané v Multimedia tools and applications (01.07.2024)“… Firewalls and typical rule-based security protection approaches could not be adequate for protecting user information in cloud environments…”
Získať plný text
Journal Article -
15
A Deep Learning-Based Dual-Model Framework for Real-Time Malware and Network Anomaly Detection with MITRE ATT&CK Integration
ISSN: 2158-107X, 2156-5570“… not be detected using traditional detection tools. Static cybersecurity tools, which are traditional, often fail to deal with dynamic and hitherto unseen attacks, including signature-based antivirus systems and rule-based intrusion detection…”Vydavateľské údaje: West Yorkshire Science and Information (SAI) Organization Limited 2025
Získať plný text
Journal Article -
16
E-RXAI-IoT: A Systematic Evaluation Framework of Rule-Based XAI Methods for Anomaly Detection in IoT Systems
ISSN: 2169-3536, 2169-3536Vydavateľské údaje: Piscataway IEEE 01.01.2025Vydané v IEEE access (01.01.2025)“…) methods, systematic studies evaluating rule-based XAI approaches for IoT anomaly detection remain limited…”
Získať plný text
Journal Article -
17
Field Size-based Packet Header Anomaly Detection with Rule-Based Normal Profile Updating for Intrusion Detection
Vydavateľské údaje: IEEE 20.09.2024Vydané v 2024 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES) (20.09.2024)“…Packet Header Anomaly Detection, or PHAD, is a technique for detecting network intrusion…”
Získať plný text
Konferenčný príspevok.. -
18
Anomaly-Based Network Intrusion Detection Using Hybrid CNN, Bi-LSTM Deep Learning Techniques
Vydavateľské údaje: IEEE 16.05.2024Vydané v 2024 4th International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET) (16.05.2024)“… While machine learning (ML) algorithms and conventional known rules-based or signaturebased methods for detecting anomalies have been employed, these approaches are only effective in detecting point anomalies, cannot recognize…”
Získať plný text
Konferenčný príspevok.. -
19
Enhancing Cybersecurity Through Artificial Intelligence: A Novel Approach to Intrusion Detection
ISSN: 2158-107X, 2156-5570“…) to protect critical network infrastructure. Traditional signature-based and rule-based IDS face challenges in identifying new and evolving attacks, leading organizations to adopt AI-driven detection solutions…”Vydavateľské údaje: West Yorkshire Science and Information (SAI) Organization Limited 2025
Získať plný text
Journal Article -
20
Rule-based detection technique for ICMPv6 anomalous behaviour
ISSN: 0941-0643, 1433-3058Vydavateľské údaje: London Springer London 01.12.2018Vydané v Neural computing & applications (01.12.2018)“… Such vulnerabilities include the lack of exchange message authentication of NDP. Attacks targeting ICMPv6 protocol display ICMPv6 anomalies…”
Získať plný text
Journal Article