Research trends in network-based intrusion detection systems: A review

S Kumar, S Gupta, S Arora - Ieee Access, 2021 - ieeexplore.ieee.org
Network threats and hazards are evolving at a high-speed rate in recent years. Many
mechanisms (such as firewalls, anti-virus, anti-malware, and spam filters) are being used as …

Designing a network intrusion detection system based on machine learning for software defined networks

AO Alzahrani, MJF Alenazi - Future Internet, 2021 - mdpi.com
Software-defined Networking (SDN) has recently developed and been put forward as a
promising and encouraging solution for future internet architecture. Managed, the …

Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review

CN Modi, K Acha - the Journal of Supercomputing, 2017 - Springer
Virtualization plays a vital role in the construction of cloud computing. However, various
vulnerabilities are existing in current virtualization implementations, and thus there are …

Dendron: Genetic trees driven rule induction for network intrusion detection systems

D Papamartzivanos, FG Mármol… - Future Generation …, 2018 - Elsevier
Intrusion detection systems (IDSs) are essential entities in a network topology aiming to
safeguard the integrity and availability of sensitive assets in the protected systems. In misuse …

Towards an energy-efficient anomaly-based intrusion detection engine for embedded systems

E Viegas, AO Santin, A Franca… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Nowadays, a significant part of all network accesses comes from embedded and battery-
powered devices, which must be energy efficient. This paper demonstrates that a hardware …

A study on intrusion detection using neural networks trained with evolutionary algorithms

T Dash - Soft Computing, 2017 - Springer
Intrusion detection has been playing a crucial role for making a computer network secure for
any transaction. An intrusion detection system (IDS) detects various types of malicious …

Endocrine-based coevolutionary multi-swarm for multi-objective workflow scheduling in a cloud system

G Yao, Y Ding, Y **, K Hao - Soft Computing, 2017 - Springer
The workflow scheduling with multiple objectives is a well-known NP-complete problem, and
even more complex and challenging when the workflow is executed in cloud computing …

Multi‐objective approach of energy efficient workflow scheduling in cloud environments

A Rehman, SS Hussain, Z ur Rehman… - Concurrency and …, 2019 - Wiley Online Library
Scheduling the tasks of a workflow to the cloud resources is a well‐known N‐P hard
problem. The stakeholders involved in a cloud environment have different interests in …

Applications and Evaluations of Bio-Inspired Approaches in Cloud Security: A Review

MM Ahsan, KD Gupta, AK Nag, S Poudyal… - IEEE …, 2020 - ieeexplore.ieee.org
Cloud computing gained much popularity in the recent past due to its many internet-based
services related to data, application, operating system, and eliminating the need for central …

Flow-based IDS for ICMPv6-based DDoS attacks detection

OE Elejla, M Anbar, B Belaton, BO Alijla - Arabian Journal for Science and …, 2018 - Springer
Abstract The Internet Control Message Protocol version Six (ICMPv6) is categorized as the
most important part of the Internet Protocol version Six (IPv6) due to its core functionalities …