20   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Abdulsalam O. Alzahrani and Mohammed J. F. Alenazi    
Software-defined Networking (SDN) has recently developed and been put forward as a promising and encouraging solution for future internet architecture. Managed, the centralized and controlled network has become more flexible and visible using SDN. On the... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ayyaz-Ul-Haq Qureshi, Hadi Larijani, Nhamoinesu Mtetwa, Abbas Javed and Jawad Ahmad    
The exponential growth of internet communications and increasing dependency of users upon software-based systems for most essential, everyday applications has raised the importance of network security. As attacks are on the rise, cybersecurity should be ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Yuelei Xiao and Xing Xiao    
Residual networks (ResNets) are prone to over-fitting for low-dimensional and small-scale datasets. And the existing intrusion detection systems (IDSs) fail to provide better performance, especially for remote-to-local (R2L) and user-to-root (U2R) attack... ver más
Revista: Information    Formato: Electrónico

 
en línea
Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon and Sajjan Shiva    
The distributed denial of service (DDoS) attack is one of the most pernicious threats in cyberspace. Catastrophic failures over the past two decades have resulted in catastrophic and costly disruption of services across all sectors and critical infrastru... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Yanping Shen, Kangfeng Zheng, Yanqing Yang, Shuai Liu and Meng Huang    
Various machine-learning methods have been applied to anomaly intrusion detection. However, the Intrusion Detection System still faces challenges in improving Detection Rate and reducing False Positive Rate. In this paper, a Class-Level Soft-Voting Ensem... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
D.A. Safronov,Y.D. Kazer,K.S. Zaytsev     Pág. 39 - 45
The purpose of this work is to reduce the cost of troubleshooting digital equipment by improving anomaly recognition methods based on the use of autoencoders. To do this, the authors propose to use two types of autoencoders: a deep feed-forward autoencod... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
D.A. Safronov,Y.D. Kazer,K.S. Zaytsev     Pág. 39 - 45
The purpose of this work is to reduce the cost of troubleshooting digital equipment by improving anomaly recognition methods based on the use of autoencoders. To do this, the authors propose to use two types of autoencoders: a deep feed-forward autoencod... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Maya Hilda Lestari Louk and Bayu Adhi Tama    
As a system capable of monitoring and evaluating illegitimate network access, an intrusion detection system (IDS) profoundly impacts information security research. Since machine learning techniques constitute the backbone of IDS, it has been challenging ... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Vikas Tomer and Sachin Sharma    
Malicious attacks are becoming more prevalent due to the growing use of Internet of Things (IoT) devices in homes, offices, transportation, healthcare, and other locations. By incorporating fog computing into IoT, attacks can be detected in a short amoun... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Raha Soleymanzadeh, Mustafa Aljasim, Muhammad Waseem Qadeer and Rasha Kashef    
Smart devices are used in the era of the Internet of Things (IoT) to provide efficient and reliable access to services. IoT technology can recognize comprehensive information, reliably deliver information, and intelligently process that information. Mode... ver más
Revista: AI    Formato: Electrónico

 
en línea
Johan Mardini, Alberto Egea Colmenares    
Dado que la información se ha constituido en uno de los activos más valiosos de las organizaciones, es necesario salvaguardarla a través de diferentes estrategias de protección, con el fin de evitar accesos intrusivos o cualquier tipo de incidente que ca... ver más
Revista: Investigación e Innovación en IngenierÍ­as    Formato: Electrónico

 
en línea
Tianhao Hou, Hongyan Xing, Xinyi Liang, Xin Su and Zenghui Wang    
Marine sensors are highly vulnerable to illegal access network attacks. Moreover, the nation?s meteorological and hydrological information is at ever-increasing risk, which calls for a prompt and in depth analysis of the network behavior and traffic to d... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Xue Jun Li, Maode Ma and Yihan Sun    
Modern smart grids are built based on top of advanced computing and networking technologies, where condition monitoring relies on secure cyberphysical connectivity. Over the network infrastructure, transported data containing confidential information, mu... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Francesco Carrera, Vincenzo Dentamaro, Stefano Galantucci, Andrea Iannacone, Donato Impedovo and Giuseppe Pirlo    
The 0-day attack is a cyber-attack based on vulnerabilities that have not yet been published. The detection of anomalous traffic generated by such attacks is vital, as it can represent a critical problem, both in a technical and economic sense, for a sma... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Bhuvaneswari Amma Narayanavadivoo Gopinathan, Velliangiri Sarveshwaran, Vinayakumar Ravi and Rajasekhar Chaganti    
Cyberattacks have increased as a consequence of the expansion of the Internet of Things (IoT). It is necessary to detect anomalies so that smart devices need to be protected from these attacks, which must be mitigated at the edge of the IoT network. Ther... ver más
Revista: Information    Formato: Electrónico

 
en línea
Wen Xu, Julian Jang-Jaccard, Tong Liu, Fariza Sabrina and Jin Kwak    
Existing generative adversarial networks (GANs), primarily used for creating fake image samples from natural images, demand a strong dependence (i.e., the training strategy of the generators and the discriminators require to be in sync) for the generator... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Ahmed Bahaa, Ahmed Abdelaziz, Abdalla Sayed, Laila Elfangary and Hanan Fahmy    
In many enterprises and the private sector, the Internet of Things (IoT) has spread globally. The growing number of different devices connected to the IoT and their various protocols have contributed to the increasing number of attacks, such as denial-of... ver más
Revista: Information    Formato: Electrónico

 
en línea
Mike Nkongolo, Jacobus Philippus van Deventer and Sydney Mambwe Kasongo    
This research attempts to introduce the production methodology of an anomaly detection dataset using ten desirable requirements. Subsequently, the article presents the produced dataset named UGRansome, created with up-to-date and modern network traffic (... ver más
Revista: Information    Formato: Electrónico

 
en línea
Niraj Thapa, Zhipeng Liu, Dukka B. KC, Balakrishna Gokaraju and Kaushik Roy    
The development of robust anomaly-based network detection systems, which are preferred over static signal-based network intrusion, is vital for cybersecurity. The development of a flexible and dynamic security system is required to tackle the new attacks... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Thi-Thu-Huong Le, Yongsu Kim and Howon Kim    
The recent increase in hacks and computer network attacks around the world has intensified the need to develop better intrusion detection and prevention systems. The intrusion detection system (IDS) plays a vital role in detecting anomalies and attacks o... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »