A comprehensive systematic literature review on intrusion detection systems

M Ozkan-Okay, R Samet, Ö Aslan, D Gupta - IEEE Access, 2021 - ieeexplore.ieee.org
Effectively detecting intrusions in the computer networks still remains problematic. This is
because cyber attackers are changing packet contents to disguise the intrusion detection …

iNIDS: SWOT Analysis and TOWS Inferences of State-of-the-Art NIDS solutions for the development of Intelligent Network Intrusion Detection System

J Verma, A Bhandari, G Singh - Computer Communications, 2022 - Elsevier
Introduction: The growth of ubiquitous networked devices and the proliferation of
geographically dispersed 'Internet of Thing'devices have exponentially increased network …

Global intrusion detection environments and platform for anomaly-based intrusion detection systems

J Snehi, A Bhandari, M Snehi, U Tandon… - Proceedings of Second …, 2021 - Springer
The defense is the critical element of the computer system, and the most challenging issues
are detecting the intrusion attacks. The IDS is the most critical cyber-security factor which …

Road: Robotics-assisted onsite data collection and deep learning enabled robotic vision system for identification of cracks on diverse surfaces

R Popli, I Kansal, J Verma, V Khullar, R Kumar… - sustainability, 2023 - mdpi.com
Crack detection on roads is essential nowadays because it has a significant impact on
ensuring the safety and reliability of road infrastructure. Thus, it is necessary to create more …

Introspecting intrusion detection systems in dealing with security concerns in cloud environment

J Snehi, M Snehi, A Bhandari… - … on System Modeling …, 2021 - ieeexplore.ieee.org
Cloud computing is one of the most quickly develo** computing advances in today's IT
environment. The cloud infrastructure links data and software from different geographically …

Apprehending mirai botnet philosophy and smart learning models for IoT-DDoS detection

M Snehi, A Bhandari - 2021 8th International Conference on …, 2021 - ieeexplore.ieee.org
This paper aims at imparting acquaintance to the researchers an insight into the IoT
metamorphosis from a security point of view. This paper presents a state-of-the-art …

A meta-analysis of role of network intrusion detection systems in confronting network attacks

J Verma, A Bhandari, G Singh - 2021 8th international …, 2021 - ieeexplore.ieee.org
Traffic on the network is increasing immensely. Unprecedented development and close
integration of devices for the Internet of Things (IoT) have contributed to an enormous …

Feature selection algorithm characterization for NIDS using machine and deep learning

J Verma, A Bhandari, G Singh - 2022 IEEE International IOT …, 2022 - ieeexplore.ieee.org
Data dimensionality is increasing at a rapid rate, posing difficulties for traditional mining and
learning algorithms. Commercial NIDS models make use of statistical measures to analyze …

Foggier skies, clearer clouds: A real-time IoT-DDoS attack mitigation framework in fog-assisted software-defined cyber-physical systems

M Snehi, A Bhandari, J Verma - Computers & Security, 2024 - Elsevier
Introduction The convergence of the Internet of Anything (IoX), software-defined
communication layer, and sophisticated cloud platform has steered the dawn of the fourth …

AIDAAS: Incident handling and remediation anomaly-based IDaaS for cloud service providers

J Snehi, A Bhandari, V Baggan… - … Conference on System …, 2021 - ieeexplore.ieee.org
In recent years cloud computing has become an integral part of the IT sector. Malicious
individuals have expanded their capacity to breach Cloud security. It is scattered across …