Filters








37,712 Hits in 7.5 sec

Development of an Intrusion-Detection System in Distributed Energy Systems

YAKOV LVOVICH, IGOR LVOVICH, ALEKSANDR OSTAPENKO, ANDREY PREOBRAZHENSKIY, OLEG CHOPOROV
<span title="2019-08-06">2019</span> <i title="DEStech Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ugjloj4elnhchek5k3frqkmwfy" style="color: black;">DEStech Transactions on Environment Energy and Earth Science</a> </i> &nbsp;
The structure of the intrusion detection system in distributed energy systems is proposed.  ...  Actual problems associated with the detection of anomalies in distributed energy networks were considered. These anomalies can be correlated with intrusions.  ...  Block diagram of an intrusion detection system in distributed energy systems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.12783/dteees/tpcase2018/30445">doi:10.12783/dteees/tpcase2018/30445</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/va2ny2ha6rfahig3hbcclmcgti">fatcat:va2ny2ha6rfahig3hbcclmcgti</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220309214149/http://www.dpi-proceedings.com/index.php/dteees/article/download/30445/29156" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/97/2b/972bf544ddcddab844575f02221272e94f8d551d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.12783/dteees/tpcase2018/30445"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Distributed Network Intrusion Detection System for DDoS Detection in VANET

Ying Gao, Hongrui Wu, Binjie Song, Yaqia Jin, Xiongwen Luo, Xing Zeng
<span title="">2019</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
To overcome these challenges, this paper proposes a distributed DDoS network intrusion detection system based on big data technology.  ...  INDEX TERMS Artificial intelligence, distributed denial-of-services, intrusion detection, intelligent transportation systems, spark, vehicular ad hoc networks.  ...  RDD is an abstraction of data structure in Spark, representing a set of immutable, partitioned storage, and can be computed in parallel. An RDD has multiple partitions.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2019.2948382">doi:10.1109/access.2019.2948382</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mwurvjphwzg7zjs6sgrx3jfexe">fatcat:mwurvjphwzg7zjs6sgrx3jfexe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201103001813/https://ieeexplore.ieee.org/ielx7/6287639/8600701/08876835.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f9/43/f943e202d4d155dd687940a412b6d82953fa8388.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2019.2948382"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

A New Distributed Intrusion Detection System in Computer Network: An Approach to Detect Malicious Intrusion Threats at Initial Stage

parveen Sadotra, Chandrakant Sharma
<span title="2017-06-18">2017</span> <i title="Oriental Scientific Publishing Company"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/xihalftfkfec7hcz4cvixklzce" style="color: black;">Oriental journal of computer science and technology</a> </i> &nbsp;
Main objective of this research work to study about problem associated with intrusion in network system and analyzes the use of intrusion Detection systems.  ...  So, we will be presenting our newly developed application based IDS which is to be suitable way to detect threat in the network system which can be cost effective and easy to use also it should have instantaneous  ...  An intrusion detection system can be divided broadly into two approaches which are behavior based that is anomaly and knowledge based that means misuse.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13005/ojcst/10.02.10">doi:10.13005/ojcst/10.02.10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mtp467b2jbajhp3zafu2w6cjwa">fatcat:mtp467b2jbajhp3zafu2w6cjwa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721195108/http://www.computerscijournal.org/download/6072" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/75/0f/750fa816c12774ff8329e288535f510f60bec9d5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13005/ojcst/10.02.10"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

An Approach for Collaborative Decision in Distributed Intrusion Detection System

Deepak Kumar, Nikhil Kumar
<span title="2016-01-15">2016</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
We have proposed an approach to enhance the collaborative decision making by conducting polls between registered intrusion detection systems in the network.  ...  General Terms Intrusion detection systems, collaborative decision making system Keywords Distributed IDS, Anomaly detection Recently, a number of innovative approaches and new models for IDS have been  ...  CONCLUSION For the problems in the distributed intrusion detection system model and the need in practical application, this paper puts forth a distributed collaborative intrusion detection system model  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2016908026">doi:10.5120/ijca2016908026</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xpk44wsybjekxnjkzilvazjige">fatcat:xpk44wsybjekxnjkzilvazjige</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180601223601/https://www.ijcaonline.org/research/volume133/number13/sharma-2016-ijca-908026.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/29/cc/29cc20c136e6b14786fa338dbe0d5f0654c614d5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2016908026"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Intrusion Detection Systems in Wireless Sensor Networks: A Review

Nabil Ali Alrajeh, S. Khan, Bilal Shams
<span title="">2013</span> <i title="SAGE Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/snvb3djywzbhvjtue42hxtjery" style="color: black;">International Journal of Distributed Sensor Networks</a> </i> &nbsp;
Abstract: In Wireless Sensor Networks (WSN), the intrusion detection work out but it needs an intrusion detection system to LITERATURE REVIEW. study of intrusion detection systems (IDSs) has received a  ...  Abstract-The Wireless Sensor Networks (WSNs) are highly distributed Index Terms-Wireless sensor networks, Intrusion Detection System, sensor nodes.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2013/167575">doi:10.1155/2013/167575</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/q73dw3ptgzfy3er47hkzjufxwm">fatcat:q73dw3ptgzfy3er47hkzjufxwm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808211508/https://bravemigex.files.wordpress.com/2015/08/intrusion-detection-systems-in-wireless-sensor-networks-a-review.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6c/d2/6cd22442e26c6c1b2d2a56bcd1764734a5a07957.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2013/167575"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

Intrusion detection in distributed systems, an approach based on taint marking

Christophe Hauser, Frederic Tronel, Colin Fidge, Ludovic Me
<span title="">2013</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jtcdcetsmvdmjcshq24lhzakwu" style="color: black;">2013 IEEE International Conference on Communications (ICC)</a> </i> &nbsp;
This paper presents a new framework for distributed intrusion detection based on taint marking.  ...  Our system tracks information flows between applications of multiple hosts gathered in groups (i.e. sets of hosts sharing the same distributed information flow policy) by attaching taint labels to system  ...  In this paper, we presented a novel approach of intrusion detection in distributed systems based on taint marking along with an information flow policy.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icc.2013.6654811">doi:10.1109/icc.2013.6654811</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icc/HauserTFM13.html">dblp:conf/icc/HauserTFM13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/horodedddzeinn642usyxajuxa">fatcat:horodedddzeinn642usyxajuxa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170706000421/http://eprints.qut.edu.au/64725/1/accepted-version.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/af/62/af6250db631348b3c3e0d2307a781a4a4debe5c3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icc.2013.6654811"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

An Agent based Distributed Security System for Intrusion Detection in Computer Networks

Arun Saxena, A.K. Sharma
<span title="2010-12-10">2010</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
based distributed attacks spanning over a considerable amount of time.  ...  Intruders damage or steal valuable information by either bypassing security tools or penetrating through them, necessitating the need to detect such intrusion attempts especially in case of multi-event  ...  In this paper a distributed agent based architecture following an objectoriented approach to detect intrusions is proposed where a collection of agents is used to determine any ongoing intrusion attempt  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/1659-2234">doi:10.5120/1659-2234</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pcfu7lkskzet7mfugwwrabaeqq">fatcat:pcfu7lkskzet7mfugwwrabaeqq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922213856/http://www.ijcaonline.org/volume12/number3/pxc3872234.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1b/99/1b993f06a4c3fa7df5d68d7562f64a74b11b9ed1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/1659-2234"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks

Yun Wang, Weihuang Fu, Dharma P. Agrawal
<span title="">2013</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ll6bfs5o6bahfinh3u5z2cnyoy" style="color: black;">IEEE Transactions on Parallel and Distributed Systems</a> </i> &nbsp;
For example, an intrusion detection application may need improved detection probability around important entities.  ...  In a Wireless Sensor Network (WSN), intrusion detection is of significant importance in many applications in detecting malicious or unexpected intruder(s).  ...  the intrusion detection probability in a uniformly distributed WSN based on the methodology we used in analyzing the Gaussian-distributed WSN.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tpds.2012.105">doi:10.1109/tpds.2012.105</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/a4jzesibtbezxchs4gfhona7su">fatcat:a4jzesibtbezxchs4gfhona7su</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180720053136/http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.338.1999&amp;rep=rep1&amp;type=pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/41/3a/413a614d82e3e57f9fec5190dc35c7c8bb96ac74.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tpds.2012.105"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids

Yichi Zhang, Lingfeng Wang, Weiqing Sun, Robert C. Green II, Mansoor Alam
<span title="">2011</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/a5kk7qbvf5faxmrimylu5xx4zu" style="color: black;">IEEE Transactions on Smart Grid</a> </i> &nbsp;
This thesis proposes a Distributed Intrusion Detection System for Smart Grids by developing and deploying intelligent modules in multiple layers of the smart grid in order to handle cyber security threats  ...  These intelligent modules employ Support Vector Machines and Artificial Immune System to detect and classify malicious data and possible cyber attacks.  ...  between servers, and the improved SGDIDS will be implemented to detect the intrusions when they occur.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tsg.2011.2159818">doi:10.1109/tsg.2011.2159818</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ufxfqjib6ncjblkv22xixnztvu">fatcat:ufxfqjib6ncjblkv22xixnztvu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160102085932/http://utdr.utoledo.edu/cgi/viewcontent.cgi?article=1787&amp;context=theses-dissertations" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/61/c2/61c2264cd08a8115014b73bc81e59af0dac245d9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tsg.2011.2159818"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Network defense: Approaches, methods and techniques

Rup Kumar Deka, Kausthav Pratim Kalita, D.K. Bhattacharya, Jugal K. Kalita
<span title="">2015</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/zpj7dqnpznduhha4bqzx3te2um" style="color: black;">Journal of Network and Computer Applications</a> </i> &nbsp;
This paper presents a comprehensive survey of methods and systems introduced by researchers in the past two decades to protect network resources from intrusion.  ...  A detailed pros and cons analysis of these methods and systems is also reported in this paper.  ...  Based on Approach Used Based on the approach used to counter intrusions the four main intrusion defense systems such as: intrusion detection systems, intrusion prevention systems, intrusion response systems  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.jnca.2015.07.011">doi:10.1016/j.jnca.2015.07.011</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/piuhci3xrjggvp6kuqtzojyh4q">fatcat:piuhci3xrjggvp6kuqtzojyh4q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829133013/http://www.cs.uccs.edu/~jkalita/papers/2015/RupDekaJNCA2015.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c1/d2/c1d2a5b512133faef7ff415a2c5e72f4578a90a3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.jnca.2015.07.011"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems – A Brief Survey of Concepts and Approaches [article]

Muhammad Imran Khan, Simon N. Foley, Barry O'Sullivan
<span title="2020-11-04">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Database Intrusion detection systems, specifically behavioural-based database intrusion detection systems, have been shown effective in detecting insider attacks.  ...  This paper presents background concepts on database intrusion detection systems in the context of detecting insider threats and examines existing approaches in the literature on detecting malicious accesses  ...  An Intrusion Detection Systems (IDS), in particular, behavioural-based intrusion detection systems (also referred to as behavioural-based anomaly detection systems) [45, 39, 50] , can play a role in detecting  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2011.02308v1">arXiv:2011.02308v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ocd3jkt5hvfp7difbh6ukw6tta">fatcat:ocd3jkt5hvfp7difbh6ukw6tta</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201107011039/https://arxiv.org/pdf/2011.02308v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/35/a1/35a1fbab2df54d2a450312a6a063ed52b1ff70e7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2011.02308v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Classification of KDDCup99 Dataset for Intrusion Detection: A Survey

<span title="2017-07-07">2017</span> <i title="International Journal of Recent Trends in Engineering and Research"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q6j7kxpeujbvdfdbleu52jna4a" style="color: black;">International Journal of Recent Trends in Engineering and Research</a> </i> &nbsp;
Detection of intrusion in network is necessary since the intrusion may create harm or attack any application which needs to be detected and prevented.  ...  Although there are various algorithms implemented for the detection of intrusions, but the classification of these intrusion is also an important concern since the type of attack depends on the intrusion  ...  Network intrusion detection system is used to detect any intruder which might have entered into the computer system In this paper, a multi agent based approach is used for network intrusion detection.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.23883/ijrter.2017.3327.eds6q">doi:10.23883/ijrter.2017.3327.eds6q</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qptogod7czanffi64fwlpiitj4">fatcat:qptogod7czanffi64fwlpiitj4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180601225109/http://www.ijrter.com/papers/volume-3/issue-7/classification-of-kddcup99-dataset-for-intrusion-detection-a-survey.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f5/8a/f58a1583cb816d007c1c2f91ee3f8a52494d4905.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.23883/ijrter.2017.3327.eds6q"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Abstraction-based intrusion detection in distributed environments

Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
<span title="2001-11-01">2001</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/trn6le535rfr5ma6j7pf3fegae" style="color: black;">ACM Transactions on Privacy and Security</a> </i> &nbsp;
However, abstraction is an error-prone process and is not well supported in current Intrusion Detection Systems (IDSs).  ...  Abstraction is an important issue in intrusion detection, since it not only hides the difference between heterogeneous systems, but also allows generic intrusion detection models.  ...  NetSTAT is specific to network-based intrusion detection, while our approach is generic to any kind of distributed intrusion detection.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/503339.503342">doi:10.1145/503339.503342</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cwthie7o3ra47lnblvmbdtiplu">fatcat:cwthie7o3ra47lnblvmbdtiplu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170705062157/http://discovery.csc.ncsu.edu/pubs/Abstract.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e8/0f/e80ffca512a2dfd6f4f1ffb31d88736b8dc0332e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/503339.503342"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Top 10 Intrusion Detection System Papers : Recommended Reading – Network Security Research

Jae-Kwang Lee
<span title="2018-06-01">2018</span> <i title="Zenodo"> Zenodo </i> &nbsp;
In this progression, here we present an Intrusion Detection System (IDS), by applying genetic algorithm (GA) to efficiently detect various types of network intrusions.  ...  There are various approaches being utilized in intrusion detections, but unfortunately any of the systems so far is not completely flawless. So, the quest of betterment continues.  ...  Spezzano, "GP Ensemble for Distributed Intrusion Detection Systems".  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1256987">doi:10.5281/zenodo.1256987</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/n6lf4yl6mfefnkqrjvsszdcmpy">fatcat:n6lf4yl6mfefnkqrjvsszdcmpy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200310004847/https://zenodo.org/record/1256988/files/TOP%2010%20INTRUSION%20DETECTION%20SYSTEM%20PAPES.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5e/6e/5e6e269366efe41db3470ddb28eac6dba27c5a16.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1256987"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

Poster Abstract: Towards Scalable and Trustworthy Decentralized Collaborative Intrusion Detection System for IoT [article]

Guntur Dharma Putra, Volkan Dedeoglu, Salil S Kanhere, Raja Jurdak
<span title="2020-02-18">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Intrusion Detection System (CIDS).  ...  An Intrusion Detection System (IDS) aims to alert users of incoming attacks by deploying a detector that monitors network traffic continuously.  ...  INTRODUCTION An Intrusion Detection System (IDS) is deployed as an indispensable defense mechanism, which comprised of monitors across the network, to identify and alert users about incoming attacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2002.07512v1">arXiv:2002.07512v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xtubrn7xnvap5fvanf2p4r2im4">fatcat:xtubrn7xnvap5fvanf2p4r2im4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200321111545/https://arxiv.org/pdf/2002.07512v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2002.07512v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 37,712 results