Dive into the most influential research papers on Intrusion Detection Systems. These papers offer essential insights, advancements, and methodologies for enhancing your cybersecurity measures. Our selection provides a comprehensive understanding of current trends and future directions in detecting and mitigating security threats.
Looking for research-backed answers?Try AI Search
Sachin Malviya, S. Joshi
journal unavailable
The electronic data has now become the bone of communication & network uses electronic form of transfer & to protect it from the unauthorized world the intrusion detection system is needed.
Intrusion detection system (IDS) merupakan penghambat semua serangan yang akan menganggu sebuah jaringan, kemampuan dari IDS memberikan peringatan kepada administrator server saat terjadi sebuah aktifitas tertentu yang tidak diinginkan admiministrator sebagai penanggung jawab sebuah system. Selain memberikan peringatan IDS juga mampu melacak jenis aktivitas yang merugikan sebuah system. Suatu IDS akan melakukan pengamatan (monitoring) terhadap paket-paket yang melewati jaringan dan berusaha menemukan apakah terdapat paket-paket yang berisi aktifitas mencurigakan sekaligus melakukan tindak lanj...
New Angriffsmethoden und unentdeckte Fehler im Betriebssystem des Firewall-Rechners konnen Angreifern auch bei korrekter Konfiguration ein Eindringen ermoglichen, werden insbesondere in komplexen Netzarchitekturen nicht ausgeschlossen werde.
Safana Hyder Abbas, Wedad Abdul Khuder Naser, Amal Abbas Kadhim
Global Journal of Engineering and Technology Advances
This paper provides an explanation of network intrusion, detection, and prevention to overcome them and recommends an intrusion prevention system that can also attempt to stop possible incidents.
M. Pradhan, C. Nayak, S. Pradhan
Securing the Internet of Things
This chapter investigated the most important design approaches for IDSs, by mainly focusing on their collecting, analysis, responding capabilities and types of current IDS products.
S. S. Anjum, V. S. Karwande, M.Tech Student
journal unavailable
.
This paper presents a review on Intrusion Detection Systems, a technology that monitors the network to avoid any such attacks and can monitor the system activities for potential breach of security policies.
A. Fatima, S. Banu
International journal of engineering research and technology
The double guard system is used to detect attacks using Intrusion detection system, which models the network behavior of user sessions across both the front-end web server and the back-end database.
Asmaa Shaker Ashoor
journal unavailable
The stages of the evolution of the idea of IDS are explained and its importance to researchers and research centres, security, military and to examine the importance of intrusion detection systems and categories, classifications, and where can put IDS to reduce the risk to the network.
Wu Chengmai
Journal of Heilongjiang Institute of Science
The concept of net intrusion is discussed, the basic demand to the Intrusion Detecting System (IDS), and a kind of model of the NIDS is summarized, and the role of IDS in network security is discussed.
Kenan Ince
Turkish J. Electr. Eng. Comput. Sci.
A high-performance approach that can be applied in real-time systems is proposed: visual IDS (V-IDS), and NSL-KDD dataset, one of the large-scale datasets, is used and data was classified by using the DL model.
Rupak Dutta, B. K. Nirupama, Niranjanamurthy
2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon)
The accuracy of four different machine learning models has been used to the NSL-KDD dataset to provide enhanced accuracy and outperform some other conventional classifiers for attack classifications and indicate that this suggested approach can provide a reduced false alarm rate while keeping a high diagnosis rate.
Amol Borkar, Akshay Donode, Anjali Kumari
2017 International Conference on Inventive Computing and Informatics (ICICI)
Data mining methods are proposed for cyber analytics in support of intrusion detection that uses various data mining and forensic techniques algorithms for the system to work in real time.
Shubham Bharti
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
This research shows a significant improvement in the ability to detect and prevent cyber threats when IDS/IPS are properly integrated with OS, and emphasizes the need for organizations to shift to proactive defense strategies and strengthen their OS environments by leveraging IDS/IPS technologies.
A. D. Kulkarni, Prof. R. B. Joshi
journal unavailable
The goal of this survey paper is heading toward the future direction into agent based security methods for both wireless as well wired networks, and the agents in intrusion detection systems are presented with their advantages and disadvantages.
Li Yang, Abdallah Moubayed, A. Shami
IEEE Internet of Things Journal
A multitiered hybrid IDS that incorporates a signature- based IDS and an anomaly-based IDS is proposed to detect both known and unknown attacks on vehicular networks, and experimental results illustrate the feasibility of implementing the proposed system in real-time vehicle systems.
D. D. Priya, Ajmeera Kiran, P. Purushotham
2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)
This paper provides a machine-learning-based IDS for IoT network threats (ML-IDS) and compares seven popular categorization techniques on three data sets to find the best intrusion detection results.
Natalia Lukova-Chuiko, Serhii Toliupa, I. Parkhomenko
Information systems and technologies security
Exploring the possibility of using mechanisms that are aimed at detecting anomalies in the system, or to search for abuses can help implement effective solutions for intrusion detection and prevention systems.
Dr Priyanka A. Motekar, Dr Pradip M. Jawandhiya
journal unavailable
Different approaches to network intrusion detection like genetic algorithmic program (GA), associate increased higher cognitive process by rule-list i and varied approaches to network intrusion detection like genetic algorithmic program (GA) are presented.
S. Istiaque, Asif Khan, Zaber Al Hassan + 1 more
European Journal of Engineering and Technology Research
validation of the smart IDS model is conducted and it is found that the model is efficient and effective in relation to intrusion detection.
authors unavailable
journal unavailable
This survey is intended to be a comprehensive compilation and categorization of currently available intrusion detection system (IDS) commercial products and is intended wholly as a resource for those interested in the current state and the ongoing evolution of IDS products and what that implies for IDS research and development.
Chen Chau Chu
Journal of Hebei Engineering Vocational College
The principle, sort and structure of IDS are introduced, and several methods based on the weak points ofIDS used by hacker to attackIDS are listed, and the method of resolving these problems is given.
Asmaa Shaker Ashoor, S. Gore
journal unavailable
The stages of the evolution of the idea of IDS are explained and its importance to researchers and research centres, security, military and the importance of intrusion detection systems and categories, classifications, and where can put IDS to reduce the risk to the network are examined.
Daniel Alejandro Montoya Villalba, Daniel Fernando Montaña Varon, Fernando Gutiérrez Pórtela + 1 more
2022 V Congreso Internacional en Inteligencia Ambiental, Ingeniería de Software y Salud Electrónica y Móvil (AmITIC)
A neural network model was proposed with the use of supervised techniques that allows improvement in a Network Intrusion Detection System (NIDS) that allows optimal detection of any type of network layer and achieved a value close to 100% accuracy.
Mohd. Fauzan Safiee
journal unavailable
This project is to analysis the network with data free attacks in a simulator that involved selfsimilar traffic that ideally represents the internet traffic modeling as well as the Poisson traffic modeling for the non peak hours periods.
Hu Bing, Su Jun
TENCON 2005 - 2005 IEEE Region 10 Conference
An intelligent lightweight IDS, called host-based forensic intrusion detection system, developed with forensics,biometrics, data mining and watermark techniques, to detect the intrusion real-time, effectively and efficiently.
Zhengbing Hu, V. P. Shirochin, Yueping Yang
EUROCON 2005 - The International Conference on "Computer as a Tool"
This paper presents an intelligent lightweight IDS, which used the forensics technique to profile the user behavior in order to automate the maintenance of user profile, data mining technique to find out the cooperative attack, and watermark technique to trace back the hackers or intruders. The goal of the system is to detect the intrusion real-time, effectively and efficiently
J. Chahal, Vidhyotma Gandhi, Payal Kaushal + 3 more
2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)
This paper proposes a technique called KAS-IDS, i.e. K-Means and Adaptive SVM based Intrusion Detection System that has better performance as compared to the individual algorithm when it comes to detection accuracy and false alarm rate.
Mehrdad Hajizadeh, Sudip Barua, Pegah Golchin
NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium
A Flow-based Self-Active IDS (FSA-IDS), which is a novel framework adopting active learning (AL) into self-learning to reduce the labeling cost significantly and to realize an effective IDS, is introduced.
Inadyuti Dutt, Samarjeet Borah, I. Maitra
IEEE Access
The immunological model is explored and Statistical Modeling based Anomaly Detection (SMAD) is proposed as the first layer of Intrusion Detection System (IDS), which works as the Innate Immune System (IIS) interface and captures the initial traffic of a network to find out the first-hand vulnerability.
Maiada M. Mahmoud, Yasser Omar Youssef, Ayman A. Abdel-Hamid
Future Internet
Experiments conducted on the UNSW-NB15 and CICIDS2017 datasets demonstrate significant improvements in detection performance, with a notable reduction in false negative rates for low-frequency attacks, while maintaining high precision, recall, and F1-scores.
Sean Fuhrman, Onat Gungor, T. Rosing
journal unavailable
CND-IDS is proposed, a continual novelty detection IDS framework which consists of a learning-based feature extractor that continuously updates new feature representations of the system data, and a novelty detector that identifies new cyber attacks by leveraging principal component analysis (PCA) reconstruction.
A. Halbouni, T. S. Gunawan, Murad Halbouni + 3 more
2022 8th International Conference on Wireless and Telematics (ICWT)
A convolutional neural network-based intrusion detection system that was evaluated using the CIC-IDS2017 dataset and aims to deliver a low false alarm rate, high accuracy, and a high detection rate.
Asmaa Shaker Ashoor, S. Gore
journal unavailable
Intrusion Detection system and intrusion Prevention System (IDS/IPS) technology in computer networks stability, performance and accuracy wise result are comparing.
Dongzi Jin, Yiqin Lu, Jiancheng Qin + 2 more
2020 International Conference on High Performance Big Data and Intelligent Systems (HPBD&IS)
Experimental results on KDD99 dataset verified that KC-IDS can achieve better detection performance compared with some existing machine learning methods.
Michal Korcak, Jaroslav Lámer, F. Jakab
International Journal of Computer Networks & Communications
The goal of the work is to design and evaluate wireless IDPS with use of packet injection method, and decrease of attacker's traffic by 95% was observed when compared to attacker’s traffic without deployment of proposed IDPS system.
V. Manikandan, K. Gowsic, T. Prince + 3 more
2020 International Conference on Computing and Information Technology (ICCIT-1441)
Convolutional Neural Network (CNN), which a kind of Deep learning is explored along with dimensionality reduction for Intrusion Detection (DRCNN-IDS), this approach is used to identify and classify unpredictable attacks in networks.
Brooke Elizabeth Kidmose, W. Meng
GLOBECOM 2022 - 2022 IEEE Global Communications Conference
IDS for CAN is developed – an Android application that functions as an intrusion detection system (IDS) for the CAN bus system, which will allow consumers to take charge of automotive security.
Yew Loon Lee
journal unavailable
The project proposed is mainly for the purpose to detect any network vulnerabilities and threats by providing an extra layer of security to SCS Computer System Sdn.
Amir Soltany Mahboob, Mohammad Reza Ostadi Moghaddam, S. Yousefi
2021 12th International Conference on Information and Knowledge Technology (IKT)
Experimental results show better performance of the proposed hybrid IDS using an Arithmetic Optimizer Algorithm (AOA) and Majority Vote Classifier (MVC) in terms of higher intrusion detection accuracy and fewer features compared to other similar studies.
Amit Kumar Dinkar, Ajay Kumar Choudhary
Seminars in Medical Writing and Education
Introduction; The Internet of Things (IoT) has revolutionized numerous sectors, such as home automation, healthcare, and industrial operations, by enabling interconnected devices to facilitate automation, real-time data analysis, and intelligent decision-making. Despite its transformative potential, the rapid proliferation of IoT has introduced critical cybersecurity challenges due to the heterogeneous and fragmented nature of IoT environments. Objective; IoT networks consist of diverse devices with varying capabilities and protocols, making the implementation of standardized security measures...
Fanyi Zhao, Hanzhe Li, Kaiyi Niu + 2 more
Applied and Computational Engineering
The experimental results show that CNN-Focal performs well on the open data set, demonstrating the potential and advantages of its application in the natural network environment and providing a new perspective and method for further research of deep learning in the field of network security in the future.
Vijay Budania, Mushtaq Ahmed, Anshita Verma
2023 10th International Conference on Computing for Sustainable Global Development (INDIACom)
This paper proposes DL based IDS which create model of normal network traffic which classifies attacks based on the various features present in the dataset, and achieves a low False Positive Rate and high Detection Rate compared to existing models.
Pavan Navandar
Journal of Biosensors and Bioelectronics Research
The main duties of an Intrusion Detection System are anomaly detection and reporting; however, certain Intrusion Detection Systems can act when malicious activity or unusual traffic is discovered.
Man Wu, Hiroki Matsutani, Masaaki Kondo
2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)
This paper proposes an on-device sequential learning semi-supervised anomaly detector-based intrusion detection system (ONLAD-IDS) using smart interface network cards (NICs) to address challenges of real-time developments of the Internet of Things.
Pritam Ahire, Abhijeet Mowade, N. Bankar + 1 more
journal unavailable
Using Random Forest, Linear Discriminant Analysis, K-Nearest Neighbor, Decision-Tree, Decision-Tree, Adaboost, and Gradient Boosting algorithms, six machine-based IDS are suggested to improve the reliability of the system based on the types of attacks and to eliminate unreliable access and false alarms.
S. Latha, V. Prakash
International Journal of Recent Technology and Engineering
A new algorithm is proposed for Rule generation phase of proposed IDS to configure the rules by implementing Ant Colony Optimization Technique with Association Rule Mining and it is proved that this proposed algorithm outperforms the other existing algorithms.
Anurag Jain, J. Rana, R. Gandhi
journal unavailable
The cost sensitivity of true positive and false positive results is done and a method is proposed to select the elements of cost sensitivity metrics for further improving the results to achieve the overall better performance.
Divij Ramchandra, S. Mukesh, Pawar Pawan Chandrakant + 1 more
journal unavailable
Intrusion Detection System (IDS) which detects the thief and unauthorized person in the room with surveillance system or the cameras which may be the bank server room which will track down the unauthorized user in the room and send the alert message to the authorized user/ admin.
Jitendra Pratap Dehury
journal unavailable
Random forest algorithm is used for outlier detection of network patterns in this thesis to reduce the false positive rate and improve the performance of intrusion detection systems which will help to prevent and monitor different types of attack.