Network intrusion detection algorithm based on deep neural network

Y Jia, M Wang, Y Wang - IET Information Security, 2019 - Wiley Online Library
With the rapid development of network technology, active defending of the network intrusion
is more important than before. In order to improve the intelligence and accuracy of network …

Support vector machine for network intrusion and cyber-attack detection

K Ghanem, FJ Aparicio-Navarro… - 2017 sensor signal …, 2017 - ieeexplore.ieee.org
Cyber-security threats are a growing concern in networked environments. The development
of Intrusion Detection Systems (IDSs) is fundamental in order to provide extra level of …

Constructing important features from massive network traffic for lightweight intrusion detection

W Wang, Y He, J Liu, S Gombault - IET Information Security, 2015 - Wiley Online Library
Efficiently processing massive data is a big issue in high‐speed network intrusion detection,
as network traffic has become increasingly large and complex. In this work, instead of …

Multi-stage attack detection using contextual information

FJ Aparicio-Navarro, KG Kyriakopoulos… - MILCOM 2018-2018 …, 2018 - ieeexplore.ieee.org
The appearance of new forms of cyber-threats, such as Multi-Stage Attacks (MSAs), creates
new challenges to which Intrusion Detection Systems (IDSs) need to adapt. An MSA is …

Building a fast intrusion detection system for high-speed-networks: Probe and dos attacks detection

TAIT Tchakoucht, M Ezziyyani - Procedia Computer Science, 2018 - Elsevier
Using computers and other intelligent devices associated with internet has become vital in
the modern life. Banking transactions, education, trade marketing, social networking, etc. are …

Energy-efficient two-layer cooperative defense scheme to secure sensor-clouds

J Liu, J Yu, S Shen - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
Sensor-cloud computing is envisioned as a promising technology that can integrate various
services by extending the computational capabilities of physical sensor nodes. It is prone to …

A basic probability assignment methodology for unsupervised wireless intrusion detection

I Ghafir, KG Kyriakopoulos, FJ Aparicio-Navarro… - IEEE …, 2018 - ieeexplore.ieee.org
The broadcast nature of wireless local area networks has made them prone to several types
of wireless injection attacks, such as Man-in-the-Middle (MitM) at the physical layer …

Intrusion detection system for detecting wireless attacks in IEEE 802.11 networks

SC Sethuraman, S Dhamodaran, V Vijayakumar - IET networks, 2019 - Wiley Online Library
Sophisticated wireless attacks such as Wifiphishing, Evil twin and so on are a serious threat
to Wi‐Fi networks. These attacks are tricky enough to spoof users by launching a fake …

Using pattern-of-life as contextual information for anomaly-based intrusion detection systems

FJ Aparicio-Navarro, KG Kyriakopoulos, Y Gong… - IEEE …, 2017 - ieeexplore.ieee.org
As the complexity of cyber-attacks keeps increasing, new robust detection mechanisms
need to be developed. The next generation of Intrusion Detection Systems (IDSs) should be …

Using the pattern-of-life in networks to improve the effectiveness of intrusion detection systems

FJ Aparicio-Navarro, JA Chambers… - 2017 IEEE …, 2017 - ieeexplore.ieee.org
As the complexity of cyber-attacks keeps increasing, new and more robust detection
mechanisms need to be developed. The next generation of Intrusion Detection Systems …