Zobrazeno 1 - 10
of 721
pro vyhledávání: '"network intrusion detection system"'
Publikováno v:
Egyptian Informatics Journal, Vol 27, Iss , Pp 100501- (2024)
The expanding use of Unmanned Aerial Vehicle (UAVs)/drones has been noticeable in recent years. Drones have several uses in a wide range of industries, including the military, delivery, agricultural, and surveillance. This led to a visible increase i
Externí odkaz:
https://doaj.org/article/72433a81fa1648d5935e27389e70da34
Publikováno v:
Digital Communications and Networks, Vol 10, Iss 1, Pp 205-216 (2024)
A large number of network security breaches in IoT networks have demonstrated the unreliability of current Network Intrusion Detection Systems (NIDSs). Consequently, network interruptions and loss of sensitive data have occurred, which led to an acti
Externí odkaz:
https://doaj.org/article/da358f6afd984bae893b7a911c4a7205
Autor:
Davide Di Monda, Antonio Montieri, Valerio Persico, Pasquale Voria, Matteo De Ieso, Antonio Pescape
Publikováno v:
IEEE Open Journal of the Communications Society, Vol 5, Pp 6736-6757 (2024)
In today’s digital landscape, critical services are increasingly dependent on network connectivity, thus cybersecurity has become paramount. Indeed, the constant escalation of cyberattacks, including zero-day exploits, poses a significant threat. W
Externí odkaz:
https://doaj.org/article/bd4edb29be314e6ea238dd0743948967
Publikováno v:
IEEE Access, Vol 12, Pp 136805-136824 (2024)
The modern digital environment is becoming increasingly interconnected, underscoring the critical need to safeguard network infrastructures. Detecting anomalies in network traffic remains essential as cyber threats continue to evolve. Analyzing trend
Externí odkaz:
https://doaj.org/article/469f201469a14b68886b4d54052dc1f2
Publikováno v:
IEEE Access, Vol 12, Pp 137618-137633 (2024)
Intrusion detection systems (IDS) stand as formidable guardians in network security, playing a pivotal role in identifying and mitigating potential threats. As our digital landscape evolves, the imperative for robust intrusion detection mechanisms gr
Externí odkaz:
https://doaj.org/article/5d18f669bb394a61990b72dc233c6eb3
Publikováno v:
IEEE Transactions on Quantum Engineering, Vol 5, Pp 1-11 (2024)
The escalating threat and impact of network-based attacks necessitate innovative intrusion detection systems. Machine learning has shown promise, with recent strides in quantum machine learning offering new avenues. However, the potential of quantum
Externí odkaz:
https://doaj.org/article/0e6826d858b745c0a451d3210f92a5a8
Publikováno v:
Sensors, Vol 24, Iss 18, p 6035 (2024)
To address the class imbalance issue in network intrusion detection, which degrades performance of intrusion detection models, this paper proposes a novel generative model called VAE-WACGAN to generate minority class samples and balance the dataset.
Externí odkaz:
https://doaj.org/article/1ace9ad303b24fd29d61cd53efd3842f
Publikováno v:
Symmetry, Vol 16, Iss 9, p 1220 (2024)
As network technology evolves, cyberattacks are not only increasing in frequency but also becoming more sophisticated. To proactively detect and prevent these cyberattacks, researchers are developing intrusion detection systems (IDSs) leveraging mach
Externí odkaz:
https://doaj.org/article/ba975070758a41ca810430a7642c4bfb
Autor:
Touati B. Adli, Salem-Bilal B. Amokrane, Boban Z. Pavlović, Mohammad Zouaoui M. Laidouni, Taki-eddine Ahmed A. Benyahia
Publikováno v:
Vojnotehnički Glasnik, Vol 71, Iss 4, Pp 941-969 (2023)
Introduction/purpose: Anomaly detection-based Network Intrusion Detection Systems (NIDSs) have emerged as a valuable tool, particularly in military fields, for protecting networks against cyberattacks, specifically focusing on Netflow data, to identi
Externí odkaz:
https://doaj.org/article/2f0d10a6fb52416f8a677871dc569fdf
Publikováno v:
Alexandria Engineering Journal, Vol 78, Iss , Pp 469-482 (2023)
Anomaly-based intrusion detection system have been consistently used in business organizations and military to detect a breach in network by identifying any activity that deviates from the baseline pattern. In this paper, we propose an effective intr
Externí odkaz:
https://doaj.org/article/57748ffd328b466db722ef9f89678720