A comprehensive systematic literature review on intrusion detection systems

M Ozkan-Okay, R Samet, Ö Aslan, D Gupta - IEEE Access, 2021 - ieeexplore.ieee.org
Effectively detecting intrusions in the computer networks still remains problematic. This is
because cyber attackers are changing packet contents to disguise the intrusion detection …

A survey and taxonomy of the fuzzy signature-based intrusion detection systems

M Masdari, H Khezri - Applied Soft Computing, 2020 - Elsevier
Organizations that benefit from information technologies are vulnerable to various attacks
and malicious behaviors. Intrusion Detection Systems (IDS) are one of the main lines of …

Network anomaly detection: methods, systems and tools

MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …

[KNYGA][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

Design of intelligent KNN‐based alarm filter using knowledge‐based alert verification in intrusion detection

W Meng, W Li, LF Kwok - Security and Communication …, 2015 - Wiley Online Library
Network intrusion detection systems (NIDSs) have been widely deployed in various network
environments to defend against different kinds of network attacks. However, a large number …

[PDF][PDF] A specification-based intrusion detection framework for cyber-physical environment in electric power system.

S Pan, TH Morris, U Adhikari - Int. J. Netw. Secur., 2015 - ijns.jalaxy.com.tw
The emergence of high-speed networks in electric power systems creates a tight interaction
of cyber infrastructure with the physical infrastructure and makes the power system …

Towards fuzzy anomaly detection-based security: a comprehensive review

M Masdari, H Khezri - Fuzzy Optimization and Decision Making, 2021 - Springer
In the data security context, anomaly detection is a branch of intrusion detection that can
detect emerging intrusions and security attacks. A number of anomaly detection systems …

Real-time multi-agent system for an adaptive intrusion detection system

WL Al-Yaseen, ZA Othman, MZA Nazri - Pattern Recognition Letters, 2017 - Elsevier
An adaptive intrusion detection system that can detect unknown attacks in real-time network
traffic is a major concern. Conventional adaptive intrusion detection systems are …

Towards false alarm reduction using fuzzy if-then rules for medical cyber physical systems

W Li, W Meng, C Su, LF Kwok - IEEE Access, 2018 - ieeexplore.ieee.org
Cyber-Physical Systems (CPS) are integrations of computation, networking, and physical
processes. Its process control is often referred to as embedded systems. Generally, CPS and …

Enhancing false alarm reduction using voted ensemble selection in intrusion detection

Y Meng, LF Kwok - International Journal of Computational Intelligence …, 2013 - Springer
Network intrusion detection systems (NIDSs) have become an indispensable component for
the current network security infrastructure. However, a large number of alarms especially …