Search Results - Anomaly detection and rules-based intrusion detection techniques*
-
1
A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks
ISSN: 2168-2216, 2168-2232Published: New York IEEE 01.09.2018Published in IEEE transactions on systems, man, and cybernetics. Systems (01.09.2018)“… In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network…”
Get full text
Journal Article -
2
A ZigBee Intrusion Detection System for IoT using Secure and Efficient Data Collection
ISSN: 2542-6605, 2542-6605Published: Elsevier B.V 01.12.2020Published in Internet of things (Amsterdam. Online) (01.12.2020)“… We introduce a novel hybrid Intrusion Detection System (IDS) by merging rule-based intrusion detection and machine learning-based anomaly detection…”
Get full text
Journal Article -
3
DoS attack mitigation using rule based and anomaly based techniques in software defined networking
Published: IEEE 01.11.2017Published in 2017 International Conference on Inventive Computing and Informatics (ICICI) (01.11.2017)“… For detection and mitigation of DoS attack we used two techniques-1) Rule based approach using Snort tool 2…”
Get full text
Conference Proceeding -
4
A Combination Techniques of Intrusion Prevention and Detection for Cloud Computing
ISSN: 1742-6588, 1742-6596Published: Bristol IOP Publishing 01.02.2021Published in Journal of physics. Conference series (01.02.2021)“… To this end, we propose the Integrated Intrusion Prevention and Detection System (IIPDS) to prevent and detect different types of attacks to the infrastructure…”
Get full text
Journal Article -
5
ANOMALY DETECTION IN ZIGBEE-BASED IOT USING SECURE AND EFFICIENT DATA COLLECTION
ISSN: 2527-5399, 2528-2514Published: 30.04.2023Published in Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) (30.04.2023)“… The researchers introduced a hybrid Intrusion Detection System (IDS), combining rule-based intrusion detection and machine learning-based anomaly detection…”
Get full text
Journal Article -
6
Intrusion detection system based on new association rule mining model
ISBN: 0780390172, 9780780390171Published: IEEE 2005Published in 2005 IEEE International Conference on Granular Computing : Beijing, China, July 25-27, 2005 (2005)“… other. This research focuses on anomaly detection techniques for intrusion detection. Presently, several approaches based on classical association rule mining have been proposed for intrusion detection…”
Get full text
Conference Proceeding -
7
Intrusion detection and attack classifier based on three techniques : a comparative study
ISSN: 1681-6900, 2412-0758Published: Baghdad, Iraq University of Technology 2011Published in Engineering and Technology Journal (2011)“… The purpose of this work is to development, implement and evaluate an anomaly off-line based intrusion detection system using three techniques…”
Get full text
Journal Article -
8
Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection
ISSN: 0973-5151, 2230-7168Published: Nagercoil iManager Publications 01.04.2007Published in I-Manager's Journal on Software Engineering (01.04.2007)“… This system combines both anomaly based intrusion detection using fuzzy data mining techniques and misuse detection using traditional rule-based expert system techniques…”
Get full text
Journal Article -
9
Network Intrusion Detection System Using Neural Networks Approach in Networked Biometrics System
ISBN: 9798738674730Published: ProQuest Dissertations & Theses 01.01.2014“… The research community has proposed various methods to build a reliable network intrusion detection system to detect unauthorised activities in networked systems…”
Get full text
Dissertation -
10
Contrast Mining in Large Class Imbalance Data
ISBN: 9798383408483Published: ProQuest Dissertations & Theses 01.01.2013“… in applications such as fraud/intrusion detection, medical diagnosis/monitoring, and risk management…”
Get full text
Dissertation -
11
A Study on Distributed Learning for Attack Detection in Wireless Sensor Networks
ISSN: 2166-5656Published: IEEE 09.06.2025Published in Prognostics and System Health Management Conference (09.06.2025)“…Wireless Sensor Networks (WSNs) have become a cornerstone in the implementation of Structural Health Monitoring (SHM) systems due to their versatility, energy…”
Get full text
Conference Proceeding -
12
Advanced AI-Powered Intrusion Detection Systems in Cybersecurity Protocols for Network Protection
ISSN: 1877-0509, 1877-0509Published: Elsevier B.V 2025Published in Procedia computer science (2025)“…Conventional rule-based network intrusion detection systems (NIDS) find it difficult to remain with the increasing complexity of cyber-attacks…”
Get full text
Journal Article -
13
Advancements in Machine Learning for Intrusion Detection in Cloud Environments
ISSN: 2582-3930, 2582-3930Published: 09.07.2023Published in INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (09.07.2023)“… Intrusion detection systems (IDS) are essential in identifying and mitigating potential threats in cloud environments…”
Get full text
Journal Article -
14
ENHANCING NETWORK INTRUSION DETECTION THROUGH AN EFFECTIVE COMBINATION OF TREE ALGORITHMS
ISSN: 1303-5150Published: Bornova Izmir NeuroQuantology 01.01.2022Published in NeuroQuantology (01.01.2022)“… By combining the NB Tree and random trees techniques with the total rule program, 89.24% precision for detection was obtained…”
Get full text
Journal Article -
15
NIDS-Network Intrusion Detection System Based on Deep and Machine Learning Frameworks with CICIDS2018 using Cloud Computing
Published: IEEE 30.10.2020Published in 2020 International Conference on Smart Innovations in Design, Environment, Management, Planning and Computing (ICSIDEMPC) (30.10.2020)“… ML techniques enable us to develop IDS-Intrusion Detection Systems focused upon finding of anomalies rather than detection of misuse…”
Get full text
Conference Proceeding -
16
Adaptive weighted kernel support vector machine-based circle search approach for intrusion detection in IoT environments
ISSN: 1863-1703, 1863-1711Published: London Springer London 01.07.2024Published in Signal, image and video processing (01.07.2024)“… IoT systems are vulnerable to attacks due to the lack of basic security protocols. An intrusion detection system (IDS…”
Get full text
Journal Article -
17
Attacks against Rplin Iot: A Survey
ISSN: 2067-3019, 2067-8282Published: Arad "Vasile Goldis" Western University Arad, Romania 01.01.2021Published in Annals of the Romanian society for cell biology (01.01.2021)“…] analyzed the existing techniques to detect sinkhole attack in wireless sensor network such as rule based, anomaly based detection, statistical method, hybrid based…”
Get full text
Journal Article -
18
Network security: mapping intrusion & anomaly detection to very-high-degree polynomials
ISBN: 0780386221, 9780780386228Published: Piscataway NJ IEEE 2004Published in 2004 38th Asilomar Conference on Signals, Systems and Computers (2004)“…Intrusion and anomaly detection involves various techniques for rule-based as well as soft-computing systems…”
Get full text
Conference Proceeding -
19
Intrusion detection for wireless networks
ISBN: 054251575X, 9780542515750Published: ProQuest Dissertations & Theses 01.01.2006“… With resource constraints and dynamic network topologies in mind, a novel hybrid anomaly intrusion detection approach is proposed, based on two data mining techniques…”
Get full text
Dissertation -
20
NSL-KDD Dataset Analysis: A Machine Learning Implementation to Detect Intrusions in the Computer Network
Published: IEEE 19.12.2024Published in 2024 2nd International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES) (19.12.2024)“… This research advocates for using machine learning techniques to enhance intrusion detection, moving beyond traditional rule-based systems…”
Get full text
Conference Proceeding

