[PDF][PDF] A meta-analytic review of intelligent intrusion detection techniques in cloud computing environment

MG Raj, SK Pani - International Journal of Advanced …, 2021 - pdfs.semanticscholar.org
Security and data privacy continue to be major considerations in the selection and study of
cloud computing. Organizations are migrating more critical operations to the cloud, resulting …

An intrusion detection method for industrial control system based on machine learning

Y Cao, L Zhang, X Zhao, K **, Z Chen - Information, 2022 - mdpi.com
The integration of communication networks and the internet of industrial control in Industrial
Control System (ICS) increases their vulnerability to cyber attacks, causing devastating …

Heuristic intrusion detection based on traffic flow statistical analysis

W Szczepanik, M Niemiec - Energies, 2022 - mdpi.com
As telecommunications are becoming increasingly important for modern systems, ensuring
secure data transmission is getting more and more critical. Specialised numerous devices …

A Novel Internet of Things (IoT) Web Attack Detection Architecture Based on the Combination of Symbolism and Connectionism AI

Y An, FR Yu, Y He, J Li, J Chen… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The rapid advancement and wide application of the Internet of Things technology (IoT) have
brought unprecedented convenience to people's production and life. A great number of …

[PDF][PDF] Heuristic-based intrusion detection functionality in a snort environment

B Gdowski, R Kościej, M Niemiec - Information & Security, 2021 - connections-qj.org
This article provides an introduction to intrusion detection systems, focusing on extending
the Snort environment's functionalities by adding a new heuristic detection algorithm. The …

Hybrid intelligent technique for intrusion detection in cyber physical systems with improved feature set

M Sagar, C Vanmathi - Journal of Intelligent & Fuzzy Systems, 2024 - content.iospress.com
Abstract Machine learning techniques commonly used for intrusion detection systems (IDSs
face challenges due to inappropriate features and class imbalance. A novel IDS comprises …

Exploring IoT Device Vulnerabilities Through Malware Analysis and Reverse Engineering

R Tamilkodi, VB Sankar, S Madhu… - … Conference on Data …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) has significantly expanded the attack surface for cyber threats,
presenting new cybersecurity challenges. This project aims to analyze IoT device …

[PDF][PDF] Deployment of Snort Intrusion Detection System on Usmanu Danfodiyo University Network

MD Sifawa, BA Buhari, L Sulaiman - International Journal of …, 2022 - academia.edu
-------------------------------------------------------------------ABSTRACT-------------------------------------------
--------------------The increasingly frequent attacks on Internet visible systems are attempts to …

Host Intrusion Detection System Using Novel Predefined Signature Patterns by Comparing Random Forest over Decision Tree Algorithm

P Sai Chowdary, D Vinod - Advances in Parallel Computing …, 2022 - ebooks.iospress.nl
The objective of the work is to identify anomaly intrusion detection in a user network
environment using information accessing and retrieval from homogeneous network …

[ΑΝΑΦΟΡΑ][C] Heurystyczna detekcja ataków sieciowych z wykorzystaniem środowiska Snort 3

S Wnęk, R Kościej, M Niemiec - Przegląd Telekomunikacyjny+ …, 2022 - yadda.icm.edu.pl
Artykuł przedstawia algorytm detekcji ataków sieciowych, bazujący na podejściu
heurystycznym. Szczegółowo opisany został sposób w jaki opracowane rozwiązanie …