|
|
|
Ibrahim Obeidat,Nabhan Hamadneh,Mouhammd Alkasassbeh,Mohammad Almseidin,Mazen Ibrahim AlZubi
Pág. pp. 70 - 84
Abstract? Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the obtainable mechanism that used to sense and classify any abnormal actions. Therefore, the IDS m...
ver más
|
|
|
|
|
|
|
Cristian González García and Eva Álvarez-Fernández
Big Data has changed how enterprises and people manage knowledge and make decisions. However, when talking about Big Data, so many times there are different definitions about what it is and what it is used for, as there are many interpretations and disag...
ver más
|
|
|
|
|
|
|
Abdulsalam O. Alzahrani and Mohammed J. F. Alenazi
Software-defined Networking (SDN) has recently developed and been put forward as a promising and encouraging solution for future internet architecture. Managed, the centralized and controlled network has become more flexible and visible using SDN. On the...
ver más
|
|
|
|
|
|
|
Ayyaz-Ul-Haq Qureshi, Hadi Larijani, Nhamoinesu Mtetwa, Abbas Javed and Jawad Ahmad
The exponential growth of internet communications and increasing dependency of users upon software-based systems for most essential, everyday applications has raised the importance of network security. As attacks are on the rise, cybersecurity should be ...
ver más
|
|
|
|
|
|
|
Kanza Gulzar, Muhammad Ayoob Memon, Syed Muhammad Mohsin, Sheraz Aslam, Syed Muhammad Abrar Akber and Muhammad Asghar Nadeem
In the public health sector and the field of medicine, the popularity of data mining and its usage in knowledge discovery and databases (KDD) are rising. The growing popularity of data mining has discovered innovative healthcare links to support decision...
ver más
|
|
|
|
|
|
|
Yuelei Xiao and Xing Xiao
Residual networks (ResNets) are prone to over-fitting for low-dimensional and small-scale datasets. And the existing intrusion detection systems (IDSs) fail to provide better performance, especially for remote-to-local (R2L) and user-to-root (U2R) attack...
ver más
|
|
|
|
|
|
|
Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon and Sajjan Shiva
The distributed denial of service (DDoS) attack is one of the most pernicious threats in cyberspace. Catastrophic failures over the past two decades have resulted in catastrophic and costly disruption of services across all sectors and critical infrastru...
ver más
|
|
|
|
|
|
|
Maya Hilda Lestari Louk and Bayu Adhi Tama
As a system capable of monitoring and evaluating illegitimate network access, an intrusion detection system (IDS) profoundly impacts information security research. Since machine learning techniques constitute the backbone of IDS, it has been challenging ...
ver más
|
|
|
|
|
|
|
Vikas Tomer and Sachin Sharma
Malicious attacks are becoming more prevalent due to the growing use of Internet of Things (IoT) devices in homes, offices, transportation, healthcare, and other locations. By incorporating fog computing into IoT, attacks can be detected in a short amoun...
ver más
|
|
|
|
|
|
|
D.A. Safronov,Y.D. Kazer,K.S. Zaytsev
Pág. 39 - 45
The purpose of this work is to reduce the cost of troubleshooting digital equipment by improving anomaly recognition methods based on the use of autoencoders. To do this, the authors propose to use two types of autoencoders: a deep feed-forward autoencod...
ver más
|
|
|
|
|
|
|
D.A. Safronov,Y.D. Kazer,K.S. Zaytsev
Pág. 39 - 45
The purpose of this work is to reduce the cost of troubleshooting digital equipment by improving anomaly recognition methods based on the use of autoencoders. To do this, the authors propose to use two types of autoencoders: a deep feed-forward autoencod...
ver más
|
|
|
|
|
|
|
Raha Soleymanzadeh, Mustafa Aljasim, Muhammad Waseem Qadeer and Rasha Kashef
Smart devices are used in the era of the Internet of Things (IoT) to provide efficient and reliable access to services. IoT technology can recognize comprehensive information, reliably deliver information, and intelligently process that information. Mode...
ver más
|
|
|
|
|
|
|
Yanping Shen, Kangfeng Zheng, Yanqing Yang, Shuai Liu and Meng Huang
Various machine-learning methods have been applied to anomaly intrusion detection. However, the Intrusion Detection System still faces challenges in improving Detection Rate and reducing False Positive Rate. In this paper, a Class-Level Soft-Voting Ensem...
ver más
|
|
|
|
|
|
|
Ahmed Salih AL-Khaleefa, Mohd Riduan Ahmad, Azmi Awang Md Isa, Mona Riza Mohd Esa, Ahmed AL-Saffar and Mustafa Hamid Hassan
Online learning is the capability of a machine-learning model to update knowledge without retraining the system when new, labeled data becomes available. Good online learning performance can be achieved through the ability to handle changing features and...
ver más
|
|
|
|
|
|
|
Nureni Ayofe Azeez, Tolulope Jide Ayemobola, Sanjay Misra, Rytis Maskeliunas and Robertas Dama?evicius
Ubiquitous nature of Internet services across the globe has undoubtedly expanded the strategies and operational mode being used by cybercriminals to perpetrate their unlawful activities through intrusion on various networks. Network intrusion has led to ...
ver más
|
|
|
|
|
|
|
Kotey Seth Djanie, Tchao Eric Tutu and Gadze James Dzisi
A denial of service (DoS) attack in a computer network is an attack on the availability of computer resources to prevent users from having access to those resources over the network. Denial of service attacks can be costly, capable of reaching $100,000 p...
ver más
|
|
|
|
|
|
|
Mohammed Aitdaoud,Khalil Namir,Mohssine Bentaib,Rachida Ihya,Soufiane Bouiti,Mohammed Talbi
Pág. 59 - 65
The goal of every company and public sector organization is to provide quality service to their customers and make them satisfied. However, as we move to-wards a more connected world where technology has been integrated into the business process, handlin...
ver más
|
|
|
|
|
|
|
Johan Mardini, Alberto Egea Colmenares
Dado que la información se ha constituido en uno de los activos más valiosos de las organizaciones, es necesario salvaguardarla a través de diferentes estrategias de protección, con el fin de evitar accesos intrusivos o cualquier tipo de incidente que ca...
ver más
|
|
|
|
|
|
|
Wesley Romão, Alex Alves Freitas, Roberto dos Santos Pacheco (Author)
Pág. 1347 - 1359
Knowledge Discovery in Databases (KDD) process consists of many stages among which the main one is Data Mining (DM). There are many DM tasks but the discovery of classification rules is the most known. The classification task can be addressed by conventi...
ver más
|
|
|
|
|
|
|
Tianhao Hou, Hongyan Xing, Xinyi Liang, Xin Su and Zenghui Wang
Marine sensors are highly vulnerable to illegal access network attacks. Moreover, the nation?s meteorological and hydrological information is at ever-increasing risk, which calls for a prompt and in depth analysis of the network behavior and traffic to d...
ver más
|
|
|
|