Searched for: subject%3A%22Intrusion%255C+detection%255C+system%22
(1 - 8 of 8)
document
Sharma, Bhawana (author), Sharma, Lokesh (author), Lal, C. (author), Roy, Satyabrata (author)
The Internet of Things (IoT) is currently seeing tremendous growth due to new technologies and big data. Research in the field of IoT security is an emerging topic. IoT networks are becoming more vulnerable to new assaults as a result of the growth in devices and the production of massive data. In order to recognize the attacks, an intrusion...
journal article 2024
document
Sharma, Bhawana (author), Sharma, Lokesh (author), Lal, C. (author), Roy, Satyabrata (author)
Internet of Things (IoT) applications are growing in popularity for being widely used in many real-world services. In an IoT ecosystem, many devices are connected with each other via internet, making IoT networks more vulnerable to various types of cyber attacks, thus a major concern in its deployment is network security and user privacy. To...
journal article 2023
document
Sharma, Bhawana (author), Sharma, Lokesh (author), Lal, C. (author)
IoT has gained immense popularity recently with advancements in technologies and big data. IoT network is dynamically increasing with the addition of devices, and the big data is generated within the network, making the network vulnerable to attacks. Thus, network security is essential, and an intrusion detection system is needed. In this...
conference paper 2023
document
Aliyu, Ibrahim (author), van Engelenburg, S.H. (author), Mu'azu, Muhammed Bashir (author), Kim, Jinsul (author), Lim, Chang Gyoon (author)
The internet-of-Vehicle (IoV) can facilitate seamless connectivity between connected vehicles (CV), autonomous vehicles (AV), and other IoV entities. Intrusion Detection Systems (IDSs) for IoV networks can rely on machine learning (ML) to protect the in-vehicle network from cyber-attacks. Blockchain-based Federated Forests (BFFs) could be...
journal article 2022
document
Apruzzese, Giovanni (author), Pajola, Luca (author), Conti, M. (author)
Enhancing Network Intrusion Detection Systems (NIDS) with supervised Machine Learning (ML) is tough. ML-NIDS must be trained and evaluated, operations requiring data where benign and malicious samples are clearly labeled. Such labels demand costly expert knowledge, resulting in a lack of real deployments, as well as on papers always relying...
journal article 2022
document
Aliyu, Ibrahim (author), Feliciano, Marco Carlo (author), van Engelenburg, S.H. (author), Kim, Dong Ok (author), Lim, Chang Gyoon (author)
In-vehicle communication systems are usually managed by controller area networks (CAN). By broadcasting packets to their bus, the CAN facilitates the interaction between Electronic Control Units (ECU) that coordinate, monitor and control internal vehicle components. With no authentication mechanism for identifying the legitimacy and source of...
journal article 2021
document
Luchs, M. (author)
The world is rapidly embracing networked technology and transitioning into one of hyperconnectivity, a term first coined by social scientists Anabel Quan-Haase and Barry Wellman. Increased connectivity provides benefits such as automation and, remote access and control of networks and equipment, thereby decreasing operational costs. Maritime and...
master thesis 2016
document
Arelakis, A. (author)
Network Security is a significant issue nowadays. The information flow is enormous and the attacks have been substantially evolved.Every single packet of the flow must be scanned in deep and checked with all known attack rules (Deep Packet Inspection) to determine whether it is malicious. However, the task of Deep Packet Inspection requires a...
master thesis 2008
Searched for: subject%3A%22Intrusion%255C+detection%255C+system%22
(1 - 8 of 8)