BAT: Deep learning methods on network intrusion detection using NSL-KDD dataset

T Su, H Sun, J Zhu, S Wang, Y Li - IEEE Access, 2020 - ieeexplore.ieee.org
Intrusion detection can identify unknown attacks from network traffics and has been an
effective means of network security. Nowadays, existing methods for network anomaly …

A novel wireless network intrusion detection method based on adaptive synthetic sampling and an improved convolutional neural network

Z Hu, L Wang, L Qi, Y Li, W Yang - IEEE Access, 2020 - ieeexplore.ieee.org
The diversity of network attacks poses severe challenges to intrusion detection systems
(IDSs). Traditional attack recognition methods usually adopt mining data associations to …

[HTML][HTML] SPIDER: A shallow PCA based network intrusion detection system with enhanced recurrent neural networks

PB Udas, ME Karim, KS Roy - Journal of King Saud University-Computer …, 2022 - Elsevier
In recent years, ensuring the stability of the huge volume of data generated by billions of
users has become the main concern in the field of cyber security. Network security is an …

[HTML][HTML] What distinguishes binary from multi-class intrusion detection systems: Observations from experiments

A Palshikar - International Journal of Information Management Data …, 2022 - Elsevier
Modern world has become prune to technology and security is turning invasive by the day.
Thus, capturing personal information or access to remote devices can prove to be …

An efficient network intrusion detection model based on temporal convolutional networks

J Chen, S Yin, S Cai, C Zhang, Y Yin… - 2021 IEEE 21st …, 2021 - ieeexplore.ieee.org
Network intrusion detection plays an important role in the network security, but the
increasingly complex network environment brings a serious challenge to intrusion detection …

An Enhanced intelligent intrusion detection system to secure E-commerce communication systems

A Hussain, KN Qureshi, K Javeed, M Alhussein - 2023 - researchrepository.ul.ie
Information and communication technologies are spreading rapidly due to their fast
proliferation in many fields. The number of Internet users has led to a spike in cyber-attack …

EFFICIENT MALICIOUS NODE DETECTION IN WIRELESS SENSOR NETWORKS USING RABIN-KARP ALGORITHM

T Devapriya, V Ganesan… - … JOURNAL OF ADVANCES …, 2024 - xlescience.org
The resource-constrained nature of Wireless Sensor Networks (WSNs) makes efficient
identification of rogue nodes a significant problem. A scalable, lightweight algorithm that can …

[PDF][PDF] Classification and technical analysis of network intrusion detection systems

NB Nanda, A Parikh - International Journal of Advanced Research in …, 2017 - academia.edu
System and network technology provide great convenience for rapid development. Network
infrastructure devices help greatly in managing various spines of any enterprise like bank …

[PDF][PDF] Computer and Information Sciences

PB Udas, ME Karim, KS Roy - Journal of King Saud University …, 2022 - researchgate.net
abstract In recent years, ensuring the stability of the huge volume of data generated by
billions of users has become the main concern in the field of cyber security. Network security …

Two-phase PFAC algorithm for multiple patterns matching on CUDA GPUs

WS Lai, CC Wu, LF Lai, MC Sie - Electronics, 2019 - mdpi.com
The rapid advancement of high speed networks has resulted in a significantly increasing
number of network packets per second nowadays, implying network intrusion detection …