Search Results - Anomaly detection and rules-based intrusion detection techniques*

Refine Results
  1. 1

    A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks by Sedjelmaci, Hichem, Senouci, Sidi Mohammed, Ansari, Nirwan

    ISSN: 2168-2216, 2168-2232
    Published: New York IEEE 01.09.2018
    “… In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network…”
    Get full text
    Journal Article
  2. 2

    A ZigBee Intrusion Detection System for IoT using Secure and Efficient Data Collection by Sadikin, Fal, Deursen, Ton van, Kumar, Sandeep

    ISSN: 2542-6605, 2542-6605
    Published: Elsevier B.V 01.12.2020
    Published in Internet of things (Amsterdam. Online) (01.12.2020)
    “… We introduce a novel hybrid Intrusion Detection System (IDS) by merging rule-based intrusion detection and machine learning-based anomaly detection…”
    Get full text
    Journal Article
  3. 3

    DoS attack mitigation using rule based and anomaly based techniques in software defined networking by Ombase, Prajakta M., Kulkarni, Nayana P., Bagade, Sudhir T., Mhaisgawali, Amrapali V.

    Published: IEEE 01.11.2017
    “… For detection and mitigation of DoS attack we used two techniques-1) Rule based approach using Snort tool 2…”
    Get full text
    Conference Proceeding
  4. 4

    A Combination Techniques of Intrusion Prevention and Detection for Cloud Computing by Alturfi, Sabah M., Muhsen, Dena Kadhim, Mohammed, Mohammed A., Aziz, Israa T., Aljshamee, Mustafa

    ISSN: 1742-6588, 1742-6596
    Published: Bristol IOP Publishing 01.02.2021
    Published in Journal of physics. Conference series (01.02.2021)
    “… To this end, we propose the Integrated Intrusion Prevention and Detection System (IIPDS) to prevent and detect different types of attacks to the infrastructure…”
    Get full text
    Journal Article
  5. 5

    ANOMALY DETECTION IN ZIGBEE-BASED IOT USING SECURE AND EFFICIENT DATA COLLECTION by Sadikin, Fal, Wiranda, Nuruddin

    ISSN: 2527-5399, 2528-2514
    Published: 30.04.2023
    “… The researchers introduced a hybrid Intrusion Detection System (IDS), combining rule-based intrusion detection and machine learning-based anomaly detection…”
    Get full text
    Journal Article
  6. 6

    Intrusion detection system based on new association rule mining model by Tian-rui Li, Wu-ming Pan

    ISBN: 0780390172, 9780780390171
    Published: IEEE 2005
    “… other. This research focuses on anomaly detection techniques for intrusion detection. Presently, several approaches based on classical association rule mining have been proposed for intrusion detection…”
    Get full text
    Conference Proceeding
  7. 7

    Intrusion detection and attack classifier based on three techniques : a comparative study by Brifcani, Adnan Muhsin Abd al-Aziz, Isa, Adil Sabri

    ISSN: 1681-6900, 2412-0758
    Published: Baghdad, Iraq University of Technology 2011
    “… The purpose of this work is to development, implement and evaluate an anomaly off-line based intrusion detection system using three techniques…”
    Get full text
    Journal Article
  8. 8

    Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection by Salome, Jacinth, Ravishankar, Ramya

    ISSN: 0973-5151, 2230-7168
    Published: Nagercoil iManager Publications 01.04.2007
    “… This system combines both anomaly based intrusion detection using fuzzy data mining techniques and misuse detection using traditional rule-based expert system techniques…”
    Get full text
    Journal Article
  9. 9

    Network Intrusion Detection System Using Neural Networks Approach in Networked Biometrics System by Mgabile, Tinny

    ISBN: 9798738674730
    Published: ProQuest Dissertations & Theses 01.01.2014
    “… The research community has proposed various methods to build a reliable network intrusion detection system to detect unauthorised activities in networked systems…”
    Get full text
    Dissertation
  10. 10

    Contrast Mining in Large Class Imbalance Data by Li, Jinjiu

    ISBN: 9798383408483
    Published: ProQuest Dissertations & Theses 01.01.2013
    “… in applications such as fraud/intrusion detection, medical diagnosis/monitoring, and risk management…”
    Get full text
    Dissertation
  11. 11

    A Study on Distributed Learning for Attack Detection in Wireless Sensor Networks by Savage, Eric Noah, Popillo, Cameron, Zhou, Ruolin

    ISSN: 2166-5656
    Published: IEEE 09.06.2025
    “…Wireless Sensor Networks (WSNs) have become a cornerstone in the implementation of Structural Health Monitoring (SHM) systems due to their versatility, energy…”
    Get full text
    Conference Proceeding
  12. 12

    Advanced AI-Powered Intrusion Detection Systems in Cybersecurity Protocols for Network Protection by Rai, Hari Mohan, Pal, Aditya, Ergash o’g’li, Rashidov Akbar, Kholmirzokhon Ugli, Bobokhonov Akhmadkhon, Shokirovich, Yarmatov Sherzojon

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2025
    Published in Procedia computer science (2025)
    “…Conventional rule-based network intrusion detection systems (NIDS) find it difficult to remain with the increasing complexity of cyber-attacks…”
    Get full text
    Journal Article
  13. 13

    Advancements in Machine Learning for Intrusion Detection in Cloud Environments by Sharma, Shashank

    ISSN: 2582-3930, 2582-3930
    Published: 09.07.2023
    “… Intrusion detection systems (IDS) are essential in identifying and mitigating potential threats in cloud environments…”
    Get full text
    Journal Article
  14. 14

    ENHANCING NETWORK INTRUSION DETECTION THROUGH AN EFFECTIVE COMBINATION OF TREE ALGORITHMS by Kumar, Avinash

    ISSN: 1303-5150
    Published: Bornova Izmir NeuroQuantology 01.01.2022
    Published in NeuroQuantology (01.01.2022)
    “… By combining the NB Tree and random trees techniques with the total rule program, 89.24% precision for detection was obtained…”
    Get full text
    Journal Article
  15. 15

    NIDS-Network Intrusion Detection System Based on Deep and Machine Learning Frameworks with CICIDS2018 using Cloud Computing by Bharati, Manisha Prakash, Tamane, Sharvari

    Published: IEEE 30.10.2020
    “… ML techniques enable us to develop IDS-Intrusion Detection Systems focused upon finding of anomalies rather than detection of misuse…”
    Get full text
    Conference Proceeding
  16. 16

    Adaptive weighted kernel support vector machine-based circle search approach for intrusion detection in IoT environments by Geetha, C., Johnson, Shiny Duela, Oliver, A. Sheryl, Lekha, D.

    ISSN: 1863-1703, 1863-1711
    Published: London Springer London 01.07.2024
    Published in Signal, image and video processing (01.07.2024)
    “… IoT systems are vulnerable to attacks due to the lack of basic security protocols. An intrusion detection system (IDS…”
    Get full text
    Journal Article
  17. 17

    Attacks against Rplin Iot: A Survey by Stephen, A, Arockiam, L

    ISSN: 2067-3019, 2067-8282
    Published: Arad "Vasile Goldis" Western University Arad, Romania 01.01.2021
    “…] analyzed the existing techniques to detect sinkhole attack in wireless sensor network such as rule based, anomaly based detection, statistical method, hybrid based…”
    Get full text
    Journal Article
  18. 18

    Network security: mapping intrusion & anomaly detection to very-high-degree polynomials by Garcia, R.C.

    ISBN: 0780386221, 9780780386228
    Published: Piscataway NJ IEEE 2004
    “…Intrusion and anomaly detection involves various techniques for rule-based as well as soft-computing systems…”
    Get full text
    Conference Proceeding
  19. 19

    Intrusion detection for wireless networks by Liu, Yu

    ISBN: 054251575X, 9780542515750
    Published: ProQuest Dissertations & Theses 01.01.2006
    “… With resource constraints and dynamic network topologies in mind, a novel hybrid anomaly intrusion detection approach is proposed, based on two data mining techniques…”
    Get full text
    Dissertation
  20. 20

    NSL-KDD Dataset Analysis: A Machine Learning Implementation to Detect Intrusions in the Computer Network by Mishra, Nilamadhab, Mishra, Sarojananda

    Published: IEEE 19.12.2024
    “… This research advocates for using machine learning techniques to enhance intrusion detection, moving beyond traditional rule-based systems…”
    Get full text
    Conference Proceeding