Survey of intrusion detection systems: techniques, datasets and challenges
Cyber-attacks are becoming more sophisticated and thereby presenting increasing
challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade …
challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade …
A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
A Khraisat, A Alazab - Cybersecurity, 2021 - Springer
Abstract The Internet of Things (IoT) has been rapidly evolving towards making a greater
impact on everyday life to large industrial systems. Unfortunately, this has attracted the …
impact on everyday life to large industrial systems. Unfortunately, this has attracted the …
A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks
The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on
everyday life to large industrial systems. Unfortunately, this has attracted the attention of …
everyday life to large industrial systems. Unfortunately, this has attracted the attention of …
An intrusion detection system using network traffic profiling and online sequential extreme learning machine
Abstract Anomaly based Intrusion Detection Systems (IDS) learn normal and anomalous
behavior by analyzing network traffic in various benchmark datasets. Common challenges …
behavior by analyzing network traffic in various benchmark datasets. Common challenges …
Hybrid intrusion detection system based on the stacking ensemble of c5 decision tree classifier and one class support vector machine
Cyberttacks are becoming increasingly sophisticated, necessitating the efficient intrusion
detection mechanisms to monitor computer resources and generate reports on anomalous …
detection mechanisms to monitor computer resources and generate reports on anomalous …
Internet attacks and intrusion detection system: A review of the literature
Purpose The paper addresses various cyber threats and their effects on the internet. A
review of the literature on intrusion detection systems (IDSs) as a means of mitigating …
review of the literature on intrusion detection systems (IDSs) as a means of mitigating …
Metamorphic malware and obfuscation: a survey of techniques, variants, and generation kits
K Brezinski, K Ferens - Security and Communication Networks, 2023 - Wiley Online Library
The competing landscape between malware authors and security analysts is an ever‐
changing battlefield over who can innovate over the other. While security analysts are …
changing battlefield over who can innovate over the other. While security analysts are …
A closer look at intrusion detection system for web applications
Intrusion Detection System (IDS) acts as a defensive tool to detect the security attacks on the
web. IDS is a known methodology for detecting network‐based attacks but is still immature …
web. IDS is a known methodology for detecting network‐based attacks but is still immature …
A quasi-newton neural network based efficient intrusion detection system for wireless sensor network
Abstract In Wireless Sensor Networks (WSN), attacks mostly aim in limiting or eliminating the
capability of the network to do its normal function. Detecting this misbehaviour is a …
capability of the network to do its normal function. Detecting this misbehaviour is a …
An effective bootstrap** framework for web services discovery using trigram approach
Web services are progressively being used to comprehend service‐oriented architectures.
Web services facilitate the integration of applications and simplify interoperability …
Web services facilitate the integration of applications and simplify interoperability …