Výsledky vyhľadávania - Anomaly detection and rules-based intrusion detection techniques*

  1. 1

    A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks Autor Sedjelmaci, Hichem, Senouci, Sidi Mohammed, Ansari, Nirwan

    ISSN: 2168-2216, 2168-2232
    Vydavateľské údaje: New York IEEE 01.09.2018
    “… In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network…”
    Získať plný text
    Journal Article
  2. 2

    A ZigBee Intrusion Detection System for IoT using Secure and Efficient Data Collection Autor Sadikin, Fal, Deursen, Ton van, Kumar, Sandeep

    ISSN: 2542-6605, 2542-6605
    Vydavateľské údaje: Elsevier B.V 01.12.2020
    “… We introduce a novel hybrid Intrusion Detection System (IDS) by merging rule-based intrusion detection and machine learning-based anomaly detection…”
    Získať plný text
    Journal Article
  3. 3

    DoS attack mitigation using rule based and anomaly based techniques in software defined networking Autor Ombase, Prajakta M., Kulkarni, Nayana P., Bagade, Sudhir T., Mhaisgawali, Amrapali V.

    Vydavateľské údaje: IEEE 01.11.2017
    “… For detection and mitigation of DoS attack we used two techniques-1) Rule based approach using Snort tool 2…”
    Získať plný text
    Konferenčný príspevok..
  4. 4

    A Combination Techniques of Intrusion Prevention and Detection for Cloud Computing Autor Alturfi, Sabah M., Muhsen, Dena Kadhim, Mohammed, Mohammed A., Aziz, Israa T., Aljshamee, Mustafa

    ISSN: 1742-6588, 1742-6596
    Vydavateľské údaje: Bristol IOP Publishing 01.02.2021
    Vydané v Journal of physics. Conference series (01.02.2021)
    “… To this end, we propose the Integrated Intrusion Prevention and Detection System (IIPDS) to prevent and detect different types of attacks to the infrastructure…”
    Získať plný text
    Journal Article
  5. 5

    ANOMALY DETECTION IN ZIGBEE-BASED IOT USING SECURE AND EFFICIENT DATA COLLECTION Autor Sadikin, Fal, Wiranda, Nuruddin

    ISSN: 2527-5399, 2528-2514
    Vydavateľské údaje: 30.04.2023
    “… The researchers introduced a hybrid Intrusion Detection System (IDS), combining rule-based intrusion detection and machine learning-based anomaly detection…”
    Získať plný text
    Journal Article
  6. 6

    Intrusion detection system based on new association rule mining model Autor Tian-rui Li, Wu-ming Pan

    ISBN: 0780390172, 9780780390171
    Vydavateľské údaje: IEEE 2005
    “… other. This research focuses on anomaly detection techniques for intrusion detection. Presently, several approaches based on classical association rule mining have been proposed for intrusion detection…”
    Získať plný text
    Konferenčný príspevok..
  7. 7

    Intrusion detection and attack classifier based on three techniques : a comparative study Autor Brifcani, Adnan Muhsin Abd al-Aziz, Isa, Adil Sabri

    ISSN: 1681-6900, 2412-0758
    Vydavateľské údaje: Baghdad, Iraq University of Technology 2011
    “… The purpose of this work is to development, implement and evaluate an anomaly off-line based intrusion detection system using three techniques…”
    Získať plný text
    Journal Article
  8. 8

    Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection Autor Salome, Jacinth, Ravishankar, Ramya

    ISSN: 0973-5151, 2230-7168
    Vydavateľské údaje: Nagercoil iManager Publications 01.04.2007
    “… This system combines both anomaly based intrusion detection using fuzzy data mining techniques and misuse detection using traditional rule-based expert system techniques…”
    Získať plný text
    Journal Article
  9. 9

    Network Intrusion Detection System Using Neural Networks Approach in Networked Biometrics System Autor Mgabile, Tinny

    ISBN: 9798738674730
    Vydavateľské údaje: ProQuest Dissertations & Theses 01.01.2014
    “… The research community has proposed various methods to build a reliable network intrusion detection system to detect unauthorised activities in networked systems…”
    Získať plný text
    Dissertation
  10. 10

    Contrast Mining in Large Class Imbalance Data Autor Li, Jinjiu

    ISBN: 9798383408483
    Vydavateľské údaje: ProQuest Dissertations & Theses 01.01.2013
    “… in applications such as fraud/intrusion detection, medical diagnosis/monitoring, and risk management…”
    Získať plný text
    Dissertation
  11. 11

    A Study on Distributed Learning for Attack Detection in Wireless Sensor Networks Autor Savage, Eric Noah, Popillo, Cameron, Zhou, Ruolin

    ISSN: 2166-5656
    Vydavateľské údaje: IEEE 09.06.2025
    “…Wireless Sensor Networks (WSNs) have become a cornerstone in the implementation of Structural Health Monitoring (SHM) systems due to their versatility, energy…”
    Získať plný text
    Konferenčný príspevok..
  12. 12

    Advanced AI-Powered Intrusion Detection Systems in Cybersecurity Protocols for Network Protection Autor Rai, Hari Mohan, Pal, Aditya, Ergash o’g’li, Rashidov Akbar, Kholmirzokhon Ugli, Bobokhonov Akhmadkhon, Shokirovich, Yarmatov Sherzojon

    ISSN: 1877-0509, 1877-0509
    Vydavateľské údaje: Elsevier B.V 2025
    Vydané v Procedia computer science (2025)
    “…Conventional rule-based network intrusion detection systems (NIDS) find it difficult to remain with the increasing complexity of cyber-attacks…”
    Získať plný text
    Journal Article
  13. 13

    Advancements in Machine Learning for Intrusion Detection in Cloud Environments Autor Sharma, Shashank

    ISSN: 2582-3930, 2582-3930
    Vydavateľské údaje: 09.07.2023
    “… Intrusion detection systems (IDS) are essential in identifying and mitigating potential threats in cloud environments…”
    Získať plný text
    Journal Article
  14. 14

    ENHANCING NETWORK INTRUSION DETECTION THROUGH AN EFFECTIVE COMBINATION OF TREE ALGORITHMS Autor Kumar, Avinash

    ISSN: 1303-5150
    Vydavateľské údaje: Bornova Izmir NeuroQuantology 01.01.2022
    Vydané v NeuroQuantology (01.01.2022)
    “… By combining the NB Tree and random trees techniques with the total rule program, 89.24% precision for detection was obtained…”
    Získať plný text
    Journal Article
  15. 15

    NIDS-Network Intrusion Detection System Based on Deep and Machine Learning Frameworks with CICIDS2018 using Cloud Computing Autor Bharati, Manisha Prakash, Tamane, Sharvari

    Vydavateľské údaje: IEEE 30.10.2020
    “… ML techniques enable us to develop IDS-Intrusion Detection Systems focused upon finding of anomalies rather than detection of misuse…”
    Získať plný text
    Konferenčný príspevok..
  16. 16

    Adaptive weighted kernel support vector machine-based circle search approach for intrusion detection in IoT environments Autor Geetha, C., Johnson, Shiny Duela, Oliver, A. Sheryl, Lekha, D.

    ISSN: 1863-1703, 1863-1711
    Vydavateľské údaje: London Springer London 01.07.2024
    Vydané v Signal, image and video processing (01.07.2024)
    “… IoT systems are vulnerable to attacks due to the lack of basic security protocols. An intrusion detection system (IDS…”
    Získať plný text
    Journal Article
  17. 17

    Attacks against Rplin Iot: A Survey Autor Stephen, A, Arockiam, L

    ISSN: 2067-3019, 2067-8282
    Vydavateľské údaje: Arad "Vasile Goldis" Western University Arad, Romania 01.01.2021
    “…] analyzed the existing techniques to detect sinkhole attack in wireless sensor network such as rule based, anomaly based detection, statistical method, hybrid based…”
    Získať plný text
    Journal Article
  18. 18

    Network security: mapping intrusion & anomaly detection to very-high-degree polynomials Autor Garcia, R.C.

    ISBN: 0780386221, 9780780386228
    Vydavateľské údaje: Piscataway NJ IEEE 2004
    “…Intrusion and anomaly detection involves various techniques for rule-based as well as soft-computing systems…”
    Získať plný text
    Konferenčný príspevok..
  19. 19

    Intrusion detection for wireless networks Autor Liu, Yu

    ISBN: 054251575X, 9780542515750
    Vydavateľské údaje: ProQuest Dissertations & Theses 01.01.2006
    “… With resource constraints and dynamic network topologies in mind, a novel hybrid anomaly intrusion detection approach is proposed, based on two data mining techniques…”
    Získať plný text
    Dissertation
  20. 20

    NSL-KDD Dataset Analysis: A Machine Learning Implementation to Detect Intrusions in the Computer Network Autor Mishra, Nilamadhab, Mishra, Sarojananda

    Vydavateľské údaje: IEEE 19.12.2024
    “… This research advocates for using machine learning techniques to enhance intrusion detection, moving beyond traditional rule-based systems…”
    Získať plný text
    Konferenčný príspevok..