Results for 'Intrusion Detection System (IDS)'

8 found
Order:
  1.  28
    Intrusion Detection Systems in Cloud Computing Paradigm: Analysis and Overview.Pooja Rana, Isha Batra, Arun Malik, Agbotiname Lucky Imoize, Yongsung Kim, Subhendu Kumar Pani, Nitin Goyal, Arun Kumar & Seungmin Rho - 2022 - Complexity 2022:1-14.
    Cloud computing paradigm is growing rapidly, and it allows users to get services via the Internet as pay-per-use and it is convenient for developing, deploying, and accessing mobile applications. Currently, security is a requisite concern owning to the open and distributed nature of the cloud. Copious amounts of data are responsible for alluring hackers. Thus, developing efficacious IDS is an imperative task. This article analyzed four intrusion detection systems for the detection of attacks. Two standard benchmark datasets, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  99
    Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models.Basim Mahbooba, Radhya Sahal, Martin Serrano & Wael Alosaimi - 2021 - Complexity 2021:1-23.
    To design and develop AI-based cybersecurity systems ), users can justifiably trust, one needs to evaluate the impact of trust using machine learning and deep learning technologies. To guide the design and implementation of trusted AI-based systems in IDS, this paper provides a comparison among machine learning and deep learning models to investigate the trust impact based on the accuracy of the trusted AI-based systems regarding the malicious data in IDs. The four machine learning techniques are decision tree, K nearest (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  17
    Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment.S. S. Sujatha & S. Immaculate Shyla - 2019 - Journal of Intelligent Systems 29 (1):1626-1642.
    In cloud security, intrusion detection system (IDS) is one of the challenging research areas. In a cloud environment, security incidents such as denial of service, scanning, malware code injection, virus, worm, and password cracking are getting usual. These attacks surely affect the company and may develop a financial loss if not distinguished in time. Therefore, securing the cloud from these types of attack is very much needed. To discover the problem, this paper suggests a novel IDS established (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  35
    Explainable Artificial Intelligence (XAI) to Enhance Trust Management in Intrusion Detection Systems Using Decision Tree Model.Basim Mahbooba, Mohan Timilsina, Radhya Sahal & Martin Serrano - 2021 - Complexity 2021:1-11.
    Despite the growing popularity of machine learning models in the cyber-security applications ), most of these models are perceived as a black-box. The eXplainable Artificial Intelligence has become increasingly important to interpret the machine learning models to enhance trust management by allowing human experts to understand the underlying data evidence and causal reasoning. According to IDS, the critical role of trust management is to understand the impact of the malicious data to detect any intrusion in the system. The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  31
    Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol.Hector Alaiz-Moreton, Jose Aveleira-Mata, Jorge Ondicol-Garcia, Angel Luis Muñoz-Castañeda, Isaías García & Carmen Benavides - 2019 - Complexity 2019:1-11.
    The large number of sensors and actuators that make up the Internet of Things obliges these systems to use diverse technologies and protocols. This means that IoT networks are more heterogeneous than traditional networks. This gives rise to new challenges in cybersecurity to protect these systems and devices which are characterized by being connected continuously to the Internet. Intrusion detection systems are used to protect IoT systems from the various anomalies and attacks at the network level. Intrusion (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  6.  1
    Influence of autoencoder latent space on classifying IoT CoAP attacks.María Teresa García-Ordás, Jose Aveleira-Mata, Isaías García-Rodrígez, José Luis Casteleiro-Roca, Martín Bayón-Gutiérrez & Héctor Alaiz-Moretón - forthcoming - Logic Journal of the IGPL.
    The Internet of Things (IoT) presents a unique cybersecurity challenge due to its vast network of interconnected, resource-constrained devices. These vulnerabilities not only threaten data integrity but also the overall functionality of IoT systems. This study addresses these challenges by exploring efficient data reduction techniques within a model-based intrusion detection system (IDS) for IoT environments. Specifically, the study explores the efficacy of an autoencoder’s latent space combined with three different classification techniques. Utilizing a validated IoT dataset, particularly (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  23
    An alert correlation approach based on security operator's knowledge and preferences.Salem Benferhat & Karima Sedki - 2010 - Journal of Applied Non-Classical Logics 20 (1-2):7-37.
    One of the major problems of intrusion detection concerns the large amount of alerts that intrusion detection systems (IDS) produce. Security operator who analyzes alerts and takes decisions, is often submerged by the high number of alerts to analyze. In this paper, we present a new alert correlation approach based on knowledge and preferences of security operators. This approach, which is complementary to existing ones, allows to rank-order produced alerts on the basis of a security operator (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  46
    An alert correlation approach based on security operator's knowledge and preferences.Salem Benferhat & Karima Sedki - 2010 - Journal of Applied Non-Classical Logics 20 (1-2):7-37.
    One of the major problems of intrusion detection concerns the large amount of alerts that intrusion detection systems (IDS) produce. Security operator who analyzes alerts and takes decisions, is often submerged by the high number of alerts to analyze. In this paper, we present a new alert correlation approach based on knowledge and preferences of security operators. This approach, which is complementary to existing ones, allows to rank-order produced alerts on the basis of a security operator (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark