-
21
Network Intrusion Detection and Prevention System Using Hybrid Machine Learning with Supervised Ensemble Stacking Model
Published 2024-01-01“…Network intrusion detection systems play a critical role in protecting a variety of services ranging from economic through social to commerce. …”
Get full text
Article -
22
ResInceptNet-SA: A Network Traffic Intrusion Detection Model Fusing Feature Selection and Balanced Datasets
Published 2025-01-01Subjects: “…network intrusion detection…”
Get full text
Article -
23
Overview of anomaly detection techniques for industrial Internet of things
Published 2022-03-01Subjects: Get full text
Article -
24
Classifying IoT Botnet Attacks With Kolmogorov-Arnold Networks: A Comparative Analysis of Architectural Variations
Published 2025-01-01Subjects: Get full text
Article -
25
Network Anomaly Detection Using Quantum Neural Networks on Noisy Quantum Computers
Published 2024-01-01Subjects: Get full text
Article -
26
-
27
GHSOM intrusion detection based on Dempster-Shafer theory
Published 2015-11-01“…On the basis of incremental GHSOM,the GHSOM neural network intrusion detection based on the theory of evidence reasoning method was put forward.It can deal with the uncertainty caused by randomness and fuzziness,as well as can constantly narrowing assumptions set by accumulate the evidence,effectively control dynamic growth of network and keep a good accuracy in noise environment.Experiments show that GHSOM intrusion detection method based on the Dempster Shafer theory realized the dynamic control for the scale of expended subnet during the process of detection.It has the better detection accuracy in the noise environment and improves the adaptability and extensibility of incremental GHSOM neural network intrusion detection method when the scale of network is expanded.…”
Get full text
Article -
28
PCA mix‐based Hotelling's T2 multivariate control charts for intrusion detection system
Published 2022-05-01“…Abstract Most of the data, which is in the field of network intrusion detection, have the characteristics of a mixture of high‐dimensional datasets of continuous and categorical variables. …”
Get full text
Article -
29
AN APPROACH HYBRID RECURRENT NEURAL NETWORK AND RULE-BASE FOR INTRUSION DETECTION SYSTEM
Published 2019-06-01“…Network intrusion detection is one of the most important issues of network security and is a research interest of many researchers. …”
Get full text
Article -
30
Research on intrusion detection algorithm in wireless network based on Bayes game model
Published 2010-01-01“…Bayes game theory was used to research parameter adjustment problems in wireless network intrusion detec-tion.Intrusion detection game model was designed,time interval adjust algorithm TSMA-BG and parameter correction algorithm DPMA were also designed according to the perfect equilibrium in game modeling.Simulation results show that intrusion detection systems can effectively use these algorithms to detect intrusion behavior that have been changed.…”
Get full text
Article -
31
A Network Traffic Classification Method for Class-Imbalanced Data
Published 2015-06-01“…It wi11 lead to a 1ow classification accuracy in network intrusion detection. For overcoming this class imbalance phenomenon,a pipelining ensemble approach in different feature spaces was proposed,which translates multi-class classification to two-class classification. …”
Get full text
Article -
32
Research on intrusion detection based on network events and deep protocol analysis
Published 2011-01-01“…The problems for restricting NIDS were investigated.Based on network events and deep protocol analysis,a new model MIDM analyzing and integrating network intrusion was proposed.After extending ABNF to describe network events,a new NIDS was built based on MIDM.Experimental results proved that,comparing to the current mainstream NIDS,the model MIDM can work effectively with less false positive rate and less redundancy of rule base.And if net-work stream and rule base were extended quickly,the CPU utilization of new model’s would remain low growth,which makes MIDM better adapt to high-speed network.And it’s also able to detect some unknown attacks and sustain rule gen-eralization.…”
Get full text
Article -
33
Research on intrusion detection for maritime meteorological sensor network based on balancing generative adversarial network
Published 2023-04-01“…Aiming at the problem that the resources of maritime mobile terminals were limited and the network traffic was imbalanced in the MMSN (maritime meteorological sensor network) environment, which made it difficult to detect network intrusion accurately, a mobile edge computing based physical architecture of MMSN was proposed, and an intrusion detection model based on balancing generative adversarial network was proposed.First, an advanced balancing generative adversarial network was adopted to augment the imbalanced data.Then, a lightweight network based on group convolution was applied to intrusion data classification.Finally, compared with conventional data augmentation models, the computer simulation proves that the proposed model has a higher ability to recognize various attacks, especially minority class attacks on MMSN.…”
Get full text
Article -
34
Intrusion detection model based on non-symmetric convolution auto-encode and support vector machine
Published 2018-11-01“…Network intrusion detection system plays an important role in protecting network security.With the continuous development of science and technology,the current intrusion technology cannot cope with the modern complex and volatile network abnormal traffic,without taking into account the scalability,sustainability and training time of the detection technology.Aiming at these problems,a new deep learning method was proposed,which used unsupervised non-symmetric convolutional auto-encoder to learn the characteristics of the data.In addition,a new method based on the combination of non-symmetric convolutional auto-encoder and multi-class support vector machine was proposed.Experiments on the data set of KDD99 show that the method achieves good results,significantly reduces training time compared with other methods,and further improves the network intrusion detection technology.…”
Get full text
Article -
35
Research on backup and remapping of network slice based on security classification
Published 2018-11-01“…In the future virtual environment of 5G core network,the general X86 servers make the attackers exploit vulnerabilities more easily,the substrate network is infected with and spreads the virus more easily,and the problem of single physical node failed will affect the service performance of the network slice seriously.Based on the existing node backup and remapping solutions,considering the impact of security constraints among nodes on network security performance,a security parameter evaluation model of virtual nodes and physical nodes were proposed in the network slicing,and the security constraint relationship was established between the virtual nodes and the physical nodes.Then backup virtual nodes were selected based on the security parameters evaluation model,and backup mapping methods were designed.Finally,the node remapping mechanism was designed with satisfying the requirement of network delay.Experiments show that the proposed method can significantly improve network intrusion tolerance with satisfying the requirements of network slicing service performance.…”
Get full text
Article -
36
An intrusion detection method based on depthwise separable convolution and attention mechanism
Published 2023-03-01“…In order to improve the accuracy of multi-classification in network intrusion detection, an intrusion detection method was proposed based on depthwise separable convolution and attention mechanism.By constructing a cascade structure combining depthwise separable convolution and long-term and short-term memory networks, the spatial and temporal features of network traffic data can be better extracted.A mixed-domain attention mechanism was introduced to enhance the detection performance.To solve the problem of low detection rate in some samples, a data balance strategy based on the combination of the variational auto-encoder (VAE) the generative adversarial network (GAN) and was designed, which can effectively cope with imbalanced datasets and improve the adaptability of the proposed detection method.The experimental results show that the proposed method is able to achieve 99.80%, 99.32%, and 83.87% accuracy on the CICIDS-2017, NSL-KDD and UNSW-NB15 datasets, which is improved by 0.6%, 0.5%, and 2.3%, respectively.…”
Get full text
Article -
37
SVM Intrusion Detection Model Based on Compressed Sampling
Published 2016-01-01“…Intrusion detection needs to deal with a large amount of data; particularly, the technology of network intrusion detection has to detect all of network data. …”
Get full text
Article -
38
Intrusion detection method for IoT in heterogeneous environment
Published 2024-04-01“…Ultimately, experimental results derived from the network intrusion dataset BoT-IoT substantiate that, relative to existing methods, the proposed method notably curtails the time expenditure of resource-constrained clients, and improves processing speed by 20.82%, while enhancing the accuracy of intrusion detection by 0.86% in Non-IID conditions.…”
Get full text
Article -
39
Identifying the Origin of Cyber Attacks Using Machine Learning and Network Traffic Analysis
Published 2025-01-01“…In this paper, PCAP refers to Packet Capture, Network Intrusion Detection Systems refers to NIDS, Artificial Intelligence refers to AI, machine learning refers to ML, Computer Vision refers to CV, and Natural Language Processing refers to NLP. …”
Get full text
Article -
40
Design of Anomaly Based Intrusion Detection System Using Support Vector Machine and Grasshopper Optimization Algorithm in IoT
Published 2024-02-01“…Like any computer network, it faces its own challenges and problems, one of which is the issue of network intrusion and disruption. This dissertation focuses on detecting anomaly-based intrusion into the Internet of Things using data mining. …”
Get full text
Article