Comparative research on network intrusion detection methods based on machine learning

C Zhang, D Jia, L Wang, W Wang, F Liu, A Yang - Computers & Security, 2022 - Elsevier
Network intrusion detection system is an essential part of network security research. It
detects intrusion behaviors through active defense technology and takes emergency …

A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets

PMS Sánchez, JMJ Valero, AH Celdrán… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
In the current network-based computing world, where the number of interconnected devices
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …

Intelligent and behavioral-based detection of malware in IoT spectrum sensors

AH Celdrán, PMS Sánchez, MA Castillo… - International Journal of …, 2023 - Springer
Abstract The number of Cyber-Physical Systems (CPS) available in industrial environments
is growing mainly due to the evolution of the Internet-of-Things (IoT) paradigm. In such a …

Hybrid semantic deep learning architecture and optimal advanced encryption standard key management scheme for secure cloud storage and intrusion detection

V Prabhakaran, A Kulandasamy - Neural Computing and Applications, 2021 - Springer
Cloud computing helps users to store and retrieve their data in the cloud online on an as-per-
pay basis anytime, anywhere in the world. As a consequence, the security of data stored in …

[PDF][PDF] Survey on intrusion detection system types

SM Othman, NT Alsohybe, FM Ba-Alwi… - International Journal of …, 2018 - researchgate.net
Intrusion detection system (IDS) is one of amongst the most essential consideration of cyber-
security that can discover intrusion before and/or after attack occur. An Intrusion detection …

A cloud-assisted reliable trust computing scheme for data collection in internet of things

W Mo, W Liu, G Huang, NN **ong… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Large number of Internet of Things (IoT) applications with intelligent sensing devices (ISDs)
are combined with cloud computing to collect and process data more efficiently. However …

AERF: Adaptive ensemble random fuzzy algorithm for anomaly detection in cloud computing

J Jiang, F Liu, WWY Ng, Q Tang, G Zhong… - Computer …, 2023 - Elsevier
The abnormality of system behavior is inevitable in cloud computing because of its
complexity and scale. How to perform anomaly detection on the system's operating data to …

A network intrusion detection system in cloud computing environment using dragonfly improved invasive weed optimization integrated Shepard convolutional neural …

SS Sathiyadhas… - International Journal of …, 2022 - Wiley Online Library
In cloud computing, the resources and memory are dynamically allocated to the user based
on their needs. Security is considered as a major issue in cloud as the use of cloud is …

Enhanced chimp optimization-based feature selection with fuzzy logic-based intrusion detection system in cloud environment

MA Alohali, M Elsadig, FN Al-Wesabi, M Al Duhayyim… - Applied Sciences, 2023 - mdpi.com
Cloud computing (CC) refers to an Internet-based computing technology in which shared
resources, such as storage, software, information, and platform, are offered to users on …

KVMInspector: KVM Based introspection approach to detect malware in cloud environment

P Mishra, I Verma, S Gupta - Journal of Information Security and …, 2020 - Elsevier
Cloud security is of paramount importance in this new era of computing. There are various
security challenges in which researchers are still working on. Malware detection is one such …