Výsledky vyhledávání - Anomaly detection and rules-based intrusion detection techniques
-
1
A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks
ISSN: 2168-2216, 2168-2232Vydáno: New York IEEE 01.09.2018Vydáno v IEEE transactions on systems, man, and cybernetics. Systems (01.09.2018)“… In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network…”
Získat plný text
Journal Article -
2
A ZigBee Intrusion Detection System for IoT using Secure and Efficient Data Collection
ISSN: 2542-6605, 2542-6605Vydáno: Elsevier B.V 01.12.2020Vydáno v Internet of things (Amsterdam. Online) (01.12.2020)“… We introduce a novel hybrid Intrusion Detection System (IDS) by merging rule-based intrusion detection and machine learning-based anomaly detection…”
Získat plný text
Journal Article -
3
A Combination Techniques of Intrusion Prevention and Detection for Cloud Computing
ISSN: 1742-6588, 1742-6596Vydáno: Bristol IOP Publishing 01.02.2021Vydáno v Journal of physics. Conference series (01.02.2021)“… To this end, we propose the Integrated Intrusion Prevention and Detection System (IIPDS) to prevent and detect different types of attacks to the infrastructure…”
Získat plný text
Journal Article -
4
A systematic literature review for network intrusion detection system (IDS)
ISSN: 1615-5262, 1615-5270Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.10.2023Vydáno v International journal of information security (01.10.2023)“… of the systems, and also affect the confidentiality of the data. To counter these possible attacks, intrusion detection systems (IDSs…”
Získat plný text
Journal Article -
5
Anomaly-based Network Intrusion Detection System using Deep Intelligent Technique
ISSN: 2313-5727, 2707-7799Vydáno: Erbil Polytechnic University 01.09.2023Vydáno v Polytechnic Journal (01.09.2023)“… Traditional signature-based intrusion detection systems and security solutions by matching rule-based mechanism and prior knowledge are insufficient of fully protecting computer networks against novel attacks…”
Získat plný text
Journal Article -
6
Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection
ISSN: 0031-3203, 1873-5142Vydáno: Oxford Elsevier Ltd 01.09.2007Vydáno v Pattern recognition (01.09.2007)“… In this paper, we present a novel intrusion detection approach to extract both accurate and interpretable fuzzy…”
Získat plný text
Journal Article -
7
ANOMALY DETECTION IN ZIGBEE-BASED IOT USING SECURE AND EFFICIENT DATA COLLECTION
ISSN: 2527-5399, 2528-2514Vydáno: 30.04.2023Vydáno v Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) (30.04.2023)“… The researchers introduced a hybrid Intrusion Detection System (IDS), combining rule-based intrusion detection and machine learning-based anomaly detection…”
Získat plný text
Journal Article -
8
Advanced AI-Powered Intrusion Detection Systems in Cybersecurity Protocols for Network Protection
ISSN: 1877-0509, 1877-0509Vydáno: Elsevier B.V 2025Vydáno v Procedia computer science (2025)“…Conventional rule-based network intrusion detection systems (NIDS) find it difficult to remain with the increasing complexity of cyber-attacks…”
Získat plný text
Journal Article -
9
Rule-Based System with Machine Learning Support for Detecting Anomalies in 5G WLANs
ISSN: 2079-9292, 2079-9292Vydáno: Basel MDPI AG 23.05.2023Vydáno v Electronics (Basel) (23.05.2023)“… The use of rule-based detection establishes a strong basis for the identification of recognized threats, whereas the additional implementation of machine learning models enables the detection of new…”
Získat plný text
Journal Article -
10
Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications
ISSN: 1949-3053, 1949-3061Vydáno: IEEE 01.09.2013Vydáno v IEEE transactions on smart grid (01.09.2013)“… Using HEs, DAPs and SEMs as examples, it is demonstrated that a behavior-rule based intrusion detection technique can effectively trade false positives for a high detection probability to cope…”
Získat plný text
Journal Article -
11
Unveiling the IoT's dark corners: anomaly detection enhanced by ensemble modelling
ISSN: 0005-1144, 1848-3380Vydáno: Ljubljana Taylor & Francis Ltd 02.04.2024Vydáno v Automatika (02.04.2024)“…The growing Internet of Things (IoT) landscape requires robust security; traditional rule-based systems are insufficient, driving the integration of machine learning (ML…”
Získat plný text
Journal Article Paper -
12
Rule‐Based Anomaly Detection Technique Using Roaming Honeypots for Wireless Sensor Networks
ISSN: 1225-6463, 2233-7326Vydáno: Electronics and Telecommunications Research Institute (ETRI) 01.12.2016Vydáno v ETRI journal (01.12.2016)“… To overcome these issues, in this paper, we propose a rule‐based anomaly detection technique using roaming honeypots…”
Získat plný text
Journal Article -
13
A multinomial logistic regression modeling approach for anomaly intrusion detection
ISSN: 0167-4048, 1872-6208Vydáno: Elsevier Ltd 01.11.2005Vydáno v Computers & security (01.11.2005)“…Although researchers have long studied using statistical modeling techniques to detect anomaly intrusion and profile user behavior, the feasibility of applying multinomial logistic regression modeling…”
Získat plný text
Journal Article -
14
Leveraging feature subset selection with deer hunting optimizer based deep learning for anomaly detection in secure cloud environment
ISSN: 1573-7721, 1380-7501, 1573-7721Vydáno: New York Springer US 01.07.2024Vydáno v Multimedia tools and applications (01.07.2024)“… Firewalls and typical rule-based security protection approaches could not be adequate for protecting user information in cloud environments…”
Získat plný text
Journal Article -
15
A Deep Learning-Based Dual-Model Framework for Real-Time Malware and Network Anomaly Detection with MITRE ATT&CK Integration
ISSN: 2158-107X, 2156-5570“… not be detected using traditional detection tools. Static cybersecurity tools, which are traditional, often fail to deal with dynamic and hitherto unseen attacks, including signature-based antivirus systems and rule-based intrusion detection…”Vydáno: West Yorkshire Science and Information (SAI) Organization Limited 2025
Získat plný text
Journal Article -
16
E-RXAI-IoT: A Systematic Evaluation Framework of Rule-Based XAI Methods for Anomaly Detection in IoT Systems
ISSN: 2169-3536, 2169-3536Vydáno: Piscataway IEEE 01.01.2025Vydáno v IEEE access (01.01.2025)“…) methods, systematic studies evaluating rule-based XAI approaches for IoT anomaly detection remain limited…”
Získat plný text
Journal Article -
17
Field Size-based Packet Header Anomaly Detection with Rule-Based Normal Profile Updating for Intrusion Detection
Vydáno: IEEE 20.09.2024Vydáno v 2024 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES) (20.09.2024)“…Packet Header Anomaly Detection, or PHAD, is a technique for detecting network intrusion…”
Získat plný text
Konferenční příspěvek -
18
Anomaly-Based Network Intrusion Detection Using Hybrid CNN, Bi-LSTM Deep Learning Techniques
Vydáno: IEEE 16.05.2024Vydáno v 2024 4th International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET) (16.05.2024)“… While machine learning (ML) algorithms and conventional known rules-based or signaturebased methods for detecting anomalies have been employed, these approaches are only effective in detecting point anomalies, cannot recognize…”
Získat plný text
Konferenční příspěvek -
19
Enhancing Cybersecurity Through Artificial Intelligence: A Novel Approach to Intrusion Detection
ISSN: 2158-107X, 2156-5570“…) to protect critical network infrastructure. Traditional signature-based and rule-based IDS face challenges in identifying new and evolving attacks, leading organizations to adopt AI-driven detection solutions…”Vydáno: West Yorkshire Science and Information (SAI) Organization Limited 2025
Získat plný text
Journal Article -
20
Rule-based detection technique for ICMPv6 anomalous behaviour
ISSN: 0941-0643, 1433-3058Vydáno: London Springer London 01.12.2018Vydáno v Neural computing & applications (01.12.2018)“… Such vulnerabilities include the lack of exchange message authentication of NDP. Attacks targeting ICMPv6 protocol display ICMPv6 anomalies…”
Získat plný text
Journal Article