Výsledky vyhľadávania - Anomaly detection and rules-based intrusion detection techniques*
-
1
A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks
ISSN: 2168-2216, 2168-2232Vydavateľské údaje: New York IEEE 01.09.2018Vydané v IEEE transactions on systems, man, and cybernetics. Systems (01.09.2018)“… In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network…”
Získať plný text
Journal Article -
2
A ZigBee Intrusion Detection System for IoT using Secure and Efficient Data Collection
ISSN: 2542-6605, 2542-6605Vydavateľské údaje: Elsevier B.V 01.12.2020Vydané v Internet of things (Amsterdam. Online) (01.12.2020)“… We introduce a novel hybrid Intrusion Detection System (IDS) by merging rule-based intrusion detection and machine learning-based anomaly detection…”
Získať plný text
Journal Article -
3
DoS attack mitigation using rule based and anomaly based techniques in software defined networking
Vydavateľské údaje: IEEE 01.11.2017Vydané v 2017 International Conference on Inventive Computing and Informatics (ICICI) (01.11.2017)“… For detection and mitigation of DoS attack we used two techniques-1) Rule based approach using Snort tool 2…”
Získať plný text
Konferenčný príspevok.. -
4
A Combination Techniques of Intrusion Prevention and Detection for Cloud Computing
ISSN: 1742-6588, 1742-6596Vydavateľské údaje: Bristol IOP Publishing 01.02.2021Vydané v Journal of physics. Conference series (01.02.2021)“… To this end, we propose the Integrated Intrusion Prevention and Detection System (IIPDS) to prevent and detect different types of attacks to the infrastructure…”
Získať plný text
Journal Article -
5
ANOMALY DETECTION IN ZIGBEE-BASED IOT USING SECURE AND EFFICIENT DATA COLLECTION
ISSN: 2527-5399, 2528-2514Vydavateľské údaje: 30.04.2023Vydané v Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) (30.04.2023)“… The researchers introduced a hybrid Intrusion Detection System (IDS), combining rule-based intrusion detection and machine learning-based anomaly detection…”
Získať plný text
Journal Article -
6
Intrusion detection system based on new association rule mining model
ISBN: 0780390172, 9780780390171Vydavateľské údaje: IEEE 2005Vydané v 2005 IEEE International Conference on Granular Computing : Beijing, China, July 25-27, 2005 (2005)“… other. This research focuses on anomaly detection techniques for intrusion detection. Presently, several approaches based on classical association rule mining have been proposed for intrusion detection…”
Získať plný text
Konferenčný príspevok.. -
7
Intrusion detection and attack classifier based on three techniques : a comparative study
ISSN: 1681-6900, 2412-0758Vydavateľské údaje: Baghdad, Iraq University of Technology 2011Vydané v Engineering and Technology Journal (2011)“… The purpose of this work is to development, implement and evaluate an anomaly off-line based intrusion detection system using three techniques…”
Získať plný text
Journal Article -
8
Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection
ISSN: 0973-5151, 2230-7168Vydavateľské údaje: Nagercoil iManager Publications 01.04.2007Vydané v I-Manager's Journal on Software Engineering (01.04.2007)“… This system combines both anomaly based intrusion detection using fuzzy data mining techniques and misuse detection using traditional rule-based expert system techniques…”
Získať plný text
Journal Article -
9
Network Intrusion Detection System Using Neural Networks Approach in Networked Biometrics System
ISBN: 9798738674730Vydavateľské údaje: ProQuest Dissertations & Theses 01.01.2014“… The research community has proposed various methods to build a reliable network intrusion detection system to detect unauthorised activities in networked systems…”
Získať plný text
Dissertation -
10
Contrast Mining in Large Class Imbalance Data
ISBN: 9798383408483Vydavateľské údaje: ProQuest Dissertations & Theses 01.01.2013“… in applications such as fraud/intrusion detection, medical diagnosis/monitoring, and risk management…”
Získať plný text
Dissertation -
11
A Study on Distributed Learning for Attack Detection in Wireless Sensor Networks
ISSN: 2166-5656Vydavateľské údaje: IEEE 09.06.2025Vydané v Prognostics and System Health Management Conference (09.06.2025)“…Wireless Sensor Networks (WSNs) have become a cornerstone in the implementation of Structural Health Monitoring (SHM) systems due to their versatility, energy…”
Získať plný text
Konferenčný príspevok.. -
12
Advanced AI-Powered Intrusion Detection Systems in Cybersecurity Protocols for Network Protection
ISSN: 1877-0509, 1877-0509Vydavateľské údaje: Elsevier B.V 2025Vydané v Procedia computer science (2025)“…Conventional rule-based network intrusion detection systems (NIDS) find it difficult to remain with the increasing complexity of cyber-attacks…”
Získať plný text
Journal Article -
13
Advancements in Machine Learning for Intrusion Detection in Cloud Environments
ISSN: 2582-3930, 2582-3930Vydavateľské údaje: 09.07.2023Vydané v INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (09.07.2023)“… Intrusion detection systems (IDS) are essential in identifying and mitigating potential threats in cloud environments…”
Získať plný text
Journal Article -
14
ENHANCING NETWORK INTRUSION DETECTION THROUGH AN EFFECTIVE COMBINATION OF TREE ALGORITHMS
ISSN: 1303-5150Vydavateľské údaje: Bornova Izmir NeuroQuantology 01.01.2022Vydané v NeuroQuantology (01.01.2022)“… By combining the NB Tree and random trees techniques with the total rule program, 89.24% precision for detection was obtained…”
Získať plný text
Journal Article -
15
NIDS-Network Intrusion Detection System Based on Deep and Machine Learning Frameworks with CICIDS2018 using Cloud Computing
Vydavateľské údaje: IEEE 30.10.2020Vydané v 2020 International Conference on Smart Innovations in Design, Environment, Management, Planning and Computing (ICSIDEMPC) (30.10.2020)“… ML techniques enable us to develop IDS-Intrusion Detection Systems focused upon finding of anomalies rather than detection of misuse…”
Získať plný text
Konferenčný príspevok.. -
16
Adaptive weighted kernel support vector machine-based circle search approach for intrusion detection in IoT environments
ISSN: 1863-1703, 1863-1711Vydavateľské údaje: London Springer London 01.07.2024Vydané v Signal, image and video processing (01.07.2024)“… IoT systems are vulnerable to attacks due to the lack of basic security protocols. An intrusion detection system (IDS…”
Získať plný text
Journal Article -
17
Attacks against Rplin Iot: A Survey
ISSN: 2067-3019, 2067-8282Vydavateľské údaje: Arad "Vasile Goldis" Western University Arad, Romania 01.01.2021Vydané v Annals of the Romanian society for cell biology (01.01.2021)“…] analyzed the existing techniques to detect sinkhole attack in wireless sensor network such as rule based, anomaly based detection, statistical method, hybrid based…”
Získať plný text
Journal Article -
18
Network security: mapping intrusion & anomaly detection to very-high-degree polynomials
ISBN: 0780386221, 9780780386228Vydavateľské údaje: Piscataway NJ IEEE 2004Vydané v 2004 38th Asilomar Conference on Signals, Systems and Computers (2004)“…Intrusion and anomaly detection involves various techniques for rule-based as well as soft-computing systems…”
Získať plný text
Konferenčný príspevok.. -
19
Intrusion detection for wireless networks
ISBN: 054251575X, 9780542515750Vydavateľské údaje: ProQuest Dissertations & Theses 01.01.2006“… With resource constraints and dynamic network topologies in mind, a novel hybrid anomaly intrusion detection approach is proposed, based on two data mining techniques…”
Získať plný text
Dissertation -
20
NSL-KDD Dataset Analysis: A Machine Learning Implementation to Detect Intrusions in the Computer Network
Vydavateľské údaje: IEEE 19.12.2024Vydané v 2024 2nd International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES) (19.12.2024)“… This research advocates for using machine learning techniques to enhance intrusion detection, moving beyond traditional rule-based systems…”
Získať plný text
Konferenčný príspevok..

