www.researchgate.net Open in urlscan Pro
2606:4700::6811:2169  Public Scan

URL: https://www.researchgate.net/figure/Intrusion-detection-system-architecture-37_fig2_315662151
Submission: On June 02 via api from ZW — Scanned from DE

Form analysis 3 forms found in the DOM

GET search

<form method="GET" action="search" class="lite-page__header-search-input-wrapper"><input type="hidden" name="context" readonly="" value="publicSearchHeader"><input placeholder="Search for publications, researchers, or questions" name="q"
    autocomplete="off" class="lite-page__header-search-input"><button
    class="nova-legacy-c-button nova-legacy-c-button--align-center nova-legacy-c-button--radius-m nova-legacy-c-button--size-m nova-legacy-c-button--color-green nova-legacy-c-button--theme-bare nova-legacy-c-button--width-square lite-page__header-search-button"
    type="submit"><span class="nova-legacy-c-button__label"><svg aria-hidden="true" class="nova-legacy-e-icon nova-legacy-e-icon--size-s nova-legacy-e-icon--theme-bare nova-legacy-e-icon--color-inherit nova-legacy-e-icon--luminosity-medium">
        <use xlink:href="/m/4210735495654424/images/icons/nova/icon-stack-s.svg#magnifier-s"></use>
      </svg></span></button></form>

Name: loginFormPOST https://www.researchgate.net/login?_sg=csRAU-D-4Iph0CnETLkLTJ_CfVmw-y9LCcALWnbjpg5jzMChAYeKR7ip2Wr-_B6hsZdZvFE2m_Ga-Q

<form method="post" action="https://www.researchgate.net/login?_sg=csRAU-D-4Iph0CnETLkLTJ_CfVmw-y9LCcALWnbjpg5jzMChAYeKR7ip2Wr-_B6hsZdZvFE2m_Ga-Q" name="loginForm" id="headerLoginForm"><input type="hidden" name="request_token"
    value="aad-7OS+RQdn34k6aQr6tVlE8cBpDT/kI1G9uHrzCp4IZxjZJgOXAUhQEJPDfCffQAP83efadf0KcILCJ3bMokvNqI8733qZTdfxyZnyByxil9RjVJcJ5wM0G5I5KQaH1KZNJt9dR0sF/QJi3mpuKDcaGOwUzAF1a1taywyc0J/51k6zb5/POYoWQLPyBz8AFenL8bzy5fIh29jMPzSTM0OCcVnfS9HdXP5XUqMkm3WBEEASTyzp0BOwbGu3OTaFvm4y2xV97VhGSWQiQo4oofk="><input
    type="hidden" name="urlAfterLogin" value="figure/Intrusion-detection-system-architecture-37_fig2_315662151"><input type="hidden" name="invalidPasswordCount" value="0"><input type="hidden" name="headerLogin" value="yes">
  <div class="lite-page__header-login-item"><label class="nova-legacy-e-text nova-legacy-e-text--size-m nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-inherit lite-page__header-login-label"
      for="input-header-login">Email <div class="lite-page-tooltip "><svg aria-hidden="true" class="nova-legacy-e-icon nova-legacy-e-icon--size-s nova-legacy-e-icon--theme-bare nova-legacy-e-icon--color-inherit nova-legacy-e-icon--luminosity-medium">
          <use xlink:href="/m/4210735495654424/images/icons/nova/icon-stack-s.svg#info-circle-s"></use>
        </svg>
        <div class="lite-page-tooltip__content lite-page-tooltip__content--above">
          <div class="nova-legacy-e-text nova-legacy-e-text--size-s nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-inherit"><b>Tip:</b> Most researchers use their institutional email address as their
            ResearchGate login</div>
          <div class="lite-page-tooltip__arrow lite-page-tooltip__arrow--above">
            <div class="lite-page-tooltip__arrow-tip"></div>
          </div>
        </div>
      </div></label></div><input type="email" required="" id="input-header-login" name="login" autocomplete="email" tabindex="1" placeholder=""
    class="nova-legacy-e-input__field nova-legacy-e-input__field--size-m lite-page__header-login-item nova-legacy-e-input__ambient nova-legacy-e-input__ambient--theme-default">
  <div class="lite-page__header-login-item"><label class="lite-page__header-login-label"
      for="input-header-password">Password</label><a class="nova-legacy-e-link nova-legacy-e-link--color-blue nova-legacy-e-link--theme-bare lite-page__header-login-forgot" href="application.LostPassword.html">Forgot password?</a></div><input
    type="password" required="" id="input-header-password" name="password" autocomplete="current-password" tabindex="2" placeholder=""
    class="nova-legacy-e-input__field nova-legacy-e-input__field--size-m lite-page__header-login-item nova-legacy-e-input__ambient nova-legacy-e-input__ambient--theme-default">
  <div><label class="nova-legacy-e-checkbox lite-page__header-login-checkbox"><input type="checkbox" class="nova-legacy-e-checkbox__input" aria-invalid="false" name="setLoginCookie" tabindex="3" value="yes" checked=""><span
        class="nova-legacy-e-checkbox__checkmark"></span><span class="nova-legacy-e-checkbox__label"> Keep me logged in</span></label></div>
  <div
    class="nova-legacy-l-flex__item nova-legacy-l-flex nova-legacy-l-flex--gutter-m nova-legacy-l-flex--direction-column@s-up nova-legacy-l-flex--align-items-stretch@s-up nova-legacy-l-flex--justify-content-center@s-up nova-legacy-l-flex--wrap-nowrap@s-up">
    <div class="nova-legacy-l-flex__item"><button
        class="nova-legacy-c-button nova-legacy-c-button--align-center nova-legacy-c-button--radius-m nova-legacy-c-button--size-m nova-legacy-c-button--color-blue nova-legacy-c-button--theme-solid nova-legacy-c-button--width-full" type="submit"
        tabindex="4"><span class="nova-legacy-c-button__label">Log in</span></button></div>
    <div class="nova-legacy-l-flex__item nova-legacy-l-flex__item--align-self-center@s-up">
      <div class="nova-legacy-e-text nova-legacy-e-text--size-s nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-inherit">or</div>
    </div>
    <div class="nova-legacy-l-flex__item">
      <div
        class="nova-legacy-l-flex__item nova-legacy-l-flex nova-legacy-l-flex--gutter-m nova-legacy-l-flex--direction-column@s-up nova-legacy-l-flex--align-items-center@s-up nova-legacy-l-flex--justify-content-flex-start@s-up nova-legacy-l-flex--wrap-nowrap@s-up">
        <div class="nova-legacy-l-flex__item">
          <a href="connector/google"><div style="display:inline-block;width:247px;height:40px;text-align:left;border-radius:2px;white-space:nowrap;color:#444;background:#4285F4"><span style="margin:1px 0 0 1px;display:inline-block;vertical-align:middle;width:38px;height:38px;background:url('images/socialNetworks/logos-official-2019-05/google-logo.svg') transparent 50% no-repeat"></span><span style="color:#FFF;display:inline-block;vertical-align:middle;padding-left:15px;padding-right:42px;font-size:16px;font-family:Roboto, sans-serif">Continue with Google</span></div></a>
        </div>
      </div>
    </div>
  </div>
</form>

Name: loginFormPOST https://www.researchgate.net/login?_sg=csRAU-D-4Iph0CnETLkLTJ_CfVmw-y9LCcALWnbjpg5jzMChAYeKR7ip2Wr-_B6hsZdZvFE2m_Ga-Q

<form method="post" action="https://www.researchgate.net/login?_sg=csRAU-D-4Iph0CnETLkLTJ_CfVmw-y9LCcALWnbjpg5jzMChAYeKR7ip2Wr-_B6hsZdZvFE2m_Ga-Q" name="loginForm" id="modalLoginForm"><input type="hidden" name="request_token"
    value="aad-7OS+RQdn34k6aQr6tVlE8cBpDT/kI1G9uHrzCp4IZxjZJgOXAUhQEJPDfCffQAP83efadf0KcILCJ3bMokvNqI8733qZTdfxyZnyByxil9RjVJcJ5wM0G5I5KQaH1KZNJt9dR0sF/QJi3mpuKDcaGOwUzAF1a1taywyc0J/51k6zb5/POYoWQLPyBz8AFenL8bzy5fIh29jMPzSTM0OCcVnfS9HdXP5XUqMkm3WBEEASTyzp0BOwbGu3OTaFvm4y2xV97VhGSWQiQo4oofk="><input
    type="hidden" name="urlAfterLogin" value="figure/Intrusion-detection-system-architecture-37_fig2_315662151"><input type="hidden" name="invalidPasswordCount" value="0"><input type="hidden" name="modalLogin" value="yes">
  <div class="nova-legacy-l-form-group nova-legacy-l-form-group--layout-stack nova-legacy-l-form-group--gutter-s">
    <div class="nova-legacy-l-form-group__item nova-legacy-l-form-group__item--width-auto@m-up"><label
        class="nova-legacy-e-text nova-legacy-e-text--size-m nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-xxs nova-legacy-e-text--color-inherit nova-legacy-e-label" for="input-modal-login-label"><span
          class="nova-legacy-e-label__text">Email <div class="lite-page-tooltip "><span class="nova-legacy-e-text nova-legacy-e-text--size-m nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-grey-500">·
              Hint</span>
            <div class="lite-page-tooltip__content lite-page-tooltip__content--above">
              <div class="nova-legacy-e-text nova-legacy-e-text--size-s nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-inherit"><b>Tip:</b> Most researchers use their institutional email address as
                their ResearchGate login</div>
              <div class="lite-page-tooltip__arrow lite-page-tooltip__arrow--above">
                <div class="lite-page-tooltip__arrow-tip"></div>
              </div>
            </div>
          </div></span></label><input type="email" required="" id="input-modal-login" name="login" autocomplete="email" tabindex="1" placeholder="Enter your email"
        class="nova-legacy-e-input__field nova-legacy-e-input__field--size-m nova-legacy-e-input__ambient nova-legacy-e-input__ambient--theme-default"></div>
    <div class="nova-legacy-l-form-group__item nova-legacy-l-form-group__item--width-auto@m-up">
      <div class="lite-page-modal__forgot"><label class="nova-legacy-e-text nova-legacy-e-text--size-m nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-xxs nova-legacy-e-text--color-inherit nova-legacy-e-label"
          for="input-modal-password-label"><span
            class="nova-legacy-e-label__text">Password</span></label><a class="nova-legacy-e-link nova-legacy-e-link--color-blue nova-legacy-e-link--theme-bare lite-page-modal__forgot-link" href="application.LostPassword.html">Forgot password?</a>
      </div><input type="password" required="" id="input-modal-password" name="password" autocomplete="current-password" tabindex="2" placeholder=""
        class="nova-legacy-e-input__field nova-legacy-e-input__field--size-m nova-legacy-e-input__ambient nova-legacy-e-input__ambient--theme-default">
    </div>
    <div class="nova-legacy-l-form-group__item nova-legacy-l-form-group__item--width-auto@m-up">
      <div><label class="nova-legacy-e-checkbox"><input type="checkbox" class="nova-legacy-e-checkbox__input" aria-invalid="false" checked="" value="yes" name="setLoginCookie" tabindex="3"><span class="nova-legacy-e-checkbox__checkmark"></span><span
            class="nova-legacy-e-checkbox__label"> Keep me logged in</span></label></div>
    </div>
    <div class="nova-legacy-l-form-group__item nova-legacy-l-form-group__item--width-auto@m-up"><button
        class="nova-legacy-c-button nova-legacy-c-button--align-center nova-legacy-c-button--radius-m nova-legacy-c-button--size-m nova-legacy-c-button--color-blue nova-legacy-c-button--theme-solid nova-legacy-c-button--width-full" type="submit"
        tabindex="4"><span class="nova-legacy-c-button__label">Log in</span></button></div>
    <div class="nova-legacy-l-form-group__item nova-legacy-l-form-group__item--width-auto@m-up">
      <div
        class="nova-legacy-l-flex__item nova-legacy-l-flex nova-legacy-l-flex--gutter-m nova-legacy-l-flex--direction-column@s-up nova-legacy-l-flex--align-items-center@s-up nova-legacy-l-flex--justify-content-flex-start@s-up nova-legacy-l-flex--wrap-nowrap@s-up">
        <div class="nova-legacy-l-flex__item">
          <div class="nova-legacy-e-text nova-legacy-e-text--size-s nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-inherit">or</div>
        </div>
        <div class="nova-legacy-l-flex__item">
          <div
            class="nova-legacy-l-flex__item nova-legacy-l-flex nova-legacy-l-flex--gutter-m nova-legacy-l-flex--direction-column@s-up nova-legacy-l-flex--align-items-center@s-up nova-legacy-l-flex--justify-content-flex-start@s-up nova-legacy-l-flex--wrap-nowrap@s-up">
            <div class="nova-legacy-l-flex__item">
              <a href="connector/google"><div style="display:inline-block;width:247px;height:40px;text-align:left;border-radius:2px;white-space:nowrap;color:#444;background:#4285F4"><span style="margin:1px 0 0 1px;display:inline-block;vertical-align:middle;width:38px;height:38px;background:url('images/socialNetworks/logos-official-2019-05/google-logo.svg') transparent 50% no-repeat"></span><span style="color:#FFF;display:inline-block;vertical-align:middle;padding-left:15px;padding-right:42px;font-size:16px;font-family:Roboto, sans-serif">Continue with Google</span></div></a>
            </div>
          </div>
        </div>
        <div class="nova-legacy-l-flex__item">
          <div class="nova-legacy-e-text nova-legacy-e-text--size-s nova-legacy-e-text--family-sans-serif nova-legacy-e-text--spacing-none nova-legacy-e-text--color-grey-500 lite-page-center">No account?
            <a class="nova-legacy-e-link nova-legacy-e-link--color-blue nova-legacy-e-link--theme-decorated" href="signup.SignUp.html?hdrsu=1&amp;_sg%5B0%5D=tQr7qdxv14wHpCcptpMuW36Ysh4KWgQYdlX5OVVdTv70MYPcLgTWBBJXFdSM-uQxOwp_OwxtJtqRpk7HsGZGUiK7RPA">Sign up</a>
          </div>
        </div>
      </div>
    </div>
  </div>
</form>

Text Content

WE VALUE YOUR PRIVACY

We and our partners store and/or access information on a device, such as cookies
and process personal data, such as unique identifiers and standard information
sent by a device for personalised ads and content, ad and content measurement,
and audience insights, as well as to develop and improve products.With your
permission we and our partners may use precise geolocation data and
identification through device scanning. You may click to consent to our and our
partners’ processing as described above. Alternatively you may click to refuse
to consent or access more detailed information and change your preferences
before consenting.Please note that some processing of your personal data may not
require your consent, but you have a right to object to such processing. Your
preferences will apply to a group of websites. You can change your preferences
at any time by returning to this site or visit our privacy policy.
AGREE DISAGREE MORE OPTIONS
Figure 3 - uploaded by Shahid Anwar
Content may be subject to copyright.
Download
View publication
Copy reference
Copy caption
Embed figure


INTRUSION DETECTION SYSTEM ARCHITECTURE [37]. 

Source publication
+5

From Intrusion Detection to an Intrusion Response System: Fundamentals,
Requirements, and Future Directions
Article
Full-text available
 * Mar 2017

 * Shahid Anwar
 * Jasni Mohamad Zain
 * Mohamad Fadli Zolkipli
 * [...]
 * Victor Chang

In the past few decades, the rise in attacks on communication devices in
networks has resulted in a reduction of network functionality, throughput, and
performance. To detect and mitigate these network attacks, researchers,
academicians, and practitioners developed Intrusion Detection Systems (IDSs)
with automatic response systems. The response sys...
Cite
Download full-text



CONTEXT IN SOURCE PUBLICATION

Context 1
... mobile visualization hybrid IDS [4] is an adaptive hybrid IDS that uses an
artificial neural network for intrusion detection. A generalized intrusion
detection and prevention (GIDP) mechanism for mobile ad hoc-networks [35] Figure
3 presents the basic architecture of intrusion detection system. ...
View in full-text


SIMILAR PUBLICATIONS

INTRUSION DETECTION SYSTEM
Article
Full-text available
 * Apr 2017

 * Mohit Tiwari
 * Raj Kumar
 * Akash Bharti
 * Jai Kishan

Intrusion Detection System (IDS) defined as a Device or software application
which monitors the network or system activities and finds if there is any
malicious activity occur. Outstanding growth and usage of internet raises
concerns about how to communicate and protect the digital information safely. In
today's world hackers use different types of...
View




CITATIONS

... interest in the research of intrusion detection systems and good detection
results have been achieved [8][9][10]. ...

MFVT: an anomaly traffic detection method merging feature fusion network and
vision transformer architecture
Article
Full-text available
 * Apr 2022
 * EURASIP J WIREL COMM

 * Ming Li
 * Dezhi Han
 * Dun Li
 * Han Liu
 * Chin-Chen Chang

Network intrusion detection, which takes the extraction and analysis of network
traffic features as the main method, plays a vital role in network security
protection. The current network traffic feature extraction and analysis for
network intrusion detection mostly uses deep learning algorithms. Currently,
deep learning requires a lot of training resources and has weak processing
capabilities for imbalanced datasets. In this paper, a deep learning model
(MFVT) based on feature fusion network and vision transformer architecture is
proposed, which improves the processing ability of imbalanced datasets and
reduces the sample data resources needed for training. Besides, to improve the
traditional raw traffic features extraction methods, a new raw traffic features
extraction method (CRP) is proposed, and the CPR uses PCA algorithm to reduce
all the processed digital traffic features to the specified dimension. On the
IDS 2017 dataset and the IDS 2012 dataset, the ablation experiments show that
the performance of the proposed MFVT model is significantly better than other
network intrusion detection models, and the detection accuracy can reach the
state-of-the-art level. And, when MFVT model is combined with CRP algorithm, the
detection accuracy is further improved to 99.99%.
View
... It works using constructed hyper-plane that uses linear models implementing
class boundaries that has non-linear attributes which engages input vectors with
non-linear mapping in high dimensional feature space [12]. The SVM has been
engaged in different domains for prediction ranging from system intruder's
detection, pattern recognition, estimation of age, face recognition, as well as
telecommunications according to ([13], [14], [15], [16). ...

Analysis of Violent Crime Dataset Using Support Vector Machine Model
Chapter
 * Apr 2022

 * Falade Adesola
 * Ambrose Azeta
 * Sanjay Misra
 * Aderonke Oni
 * Ademola Omolola

It is usually a challenging task predicting violent crime occurrences in space
and time. Huge dataset are needed for accurate prediction of future violent
crime occurrence, which in most cases were subjected to artificial intelligence
or statistical methods. Most studies from literature adopted data mining
techniques for violent crime prediction with some inherent limitation of
accuracy as one of the gaps that needed to be filled. The study applied support
vector machine model on the six different historical violent crime dataset
gathered between July 2016 and July 2019 from Nigeria Police Lagos headquarter
to predict spatio-temporal occurrences of violent crime in the state. The six
different violent crime dataset used for the study are: armed robbery, rape,
kidnapping, assault, murder and manslaughter. The dataset was preprocessed and
fed into the support vector machine model built in Watson machine learning
studio using python as a programming language. The model returned 82.12%
prediction accuracy, which is assumed to be good enough for any prediction
system. This result was evaluated using confusion matric, and tested against
some results from literature, and was found to out-perform some machine learning
models used in the previous studies. Based on this empirical study, the police
authority could adopt this model to strengthen violent crime prevention
strategies in order to mitigate violent crime occurrences in Lagos state,
Nigeria.
View
... The purpose of an IDS is to monitor traffic data in order to identify and
protect an information system against intrusions that could compromise its
confidentiality, integrity, and availability [35]. The purpose of an IDS is to
capture a copy of information systems' data traffic and to analyze this copy to
identify potentially harmful activities [36]. ...

Investigation on Intrusion Detection Systems (IDSs) in IoT
Article
Full-text available
 * Mar 2022

 * Karthikkumar Vaigandla
 * Nilofar Azmi
 * Radhakrishna Karne

In smart environments, comfort and efficiency are important goals in terms of
the quality of human life. Recent developments in Internet of Things (IoT)
technology have made it possible to design smart environments. IoT-based smart
environments are concerned with security and privacy as key issues. Systems
based on the IoT pose a security threat to smart environments. In order to
prevent IoT-related security attacks which take advantage of some of these
security vulnerabilities, intrusion detection systems (IDSs) designed for IoT
environments are crucial. Data generated by connected objects in the age of the
IoT provides the basis for big data analytics, which could be employed to
identify patterns and identifies anomalies in data. In order to detect
intrusions, most cyber security systems employ IDSs, which are used by a variety
of techniques and architectures. As opposed to signature-based IDS,
anomaly-based IDS learns the normal pattern of system behavior and alerts on
abnormal events that occur, as opposed to monitoring monitored events against a
database of known intrusion experiences. This paper focuses on the IDS
implementation on the IoT network. The use of sensor devices to collect data
from smart grid environments has led to smart grids becoming the preferred
intrusion target due to the IoTs using advanced information technology. Clouds
are data storage systems that provide a variety of smart infrastructure
services, such as smart homes and smart buildings, over the internet. A deep
learning-based intrusion detection system for the Internet of Things requires
consideration of key design principles presented in this paper.
View
... As internet-connected devices are increasing, cyber security became more
important [1]. Intrusion is a series of actions that invade security policies
like integrity and confidentiality [2]. The adversaries attack a network with
highly skilled programming tools and target vulnerabilities in the network. ...

A Deep Learning-Based Smart Framework for Cyber-Physical and Satellite System
Security Threats Detection
Article
Full-text available
 * Feb 2022

 * Imran Ashraf
 * Manideep Narra
 * Muhammad Umer
 * Rizwan Majeed
 * Nouman Rasool

An intrusion detection system serves as the backbone for providing high-level
network security. Different forms of network attacks have been discovered and
they continue to become gradually more sophisticated and complicated. With the
wide use of internet-based applications, cyber security has become an important
research area. Despite the availability of many existing intrusion detection
systems, intuitive cybersecurity systems are needed due to alarmingly increasing
intrusion attacks. Furthermore, with new intrusion attacks, the efficacy of
existing systems depletes unless they evolve. The lack of real datasets adds
further difficulties to properly investigating this problem. This study proposes
an intrusion detection approach for the modern network environment by
considering the data from satellite and terrestrial networks. Incorporating
machine learning models, the study proposes an ensemble model RFMLP that
integrates random forest (RF) and multilayer perceptron (MLP) for increasing
intrusion detection performance. For analyzing the efficiency of the proposed
framework, three different datasets are used for experiments and validation,
namely KDD-CUP 99, NSL-KDD, and STIN. In addition, performance comparison with
state-of-the-art models is performed which suggests that the RFMLP can detect
intrusion attacks with high accuracy than the existing approaches.
View
... Response mechanism is the way an IDS responds when an intrusion has
occurred; it can be an active or a passive response (Anwar et al. 2017). Active
IDS response mechanism can be stated as the system built to block the intrusions
or attacks instantly at the time they are detected without even concerning the
security expert (Inayat et al. 2016). ...

A survey on intrusion detection system: feature selection, model, performance
measures, application perspective, challenges, and future research directions
Article
Full-text available
 * Jan 2022
 * ARTIF INTELL REV

 * Ankit Thakkar
 * Ritika Lohiya

With the increase in the usage of the Internet, a large amount of information is
exchanged between different communicating devices. The data should be
communicated securely between the communicating devices and therefore, network
security is one of the dominant research areas for the current network scenario.
Intrusion detection systems (IDSs) are therefore widely used along with other
security mechanisms such as firewall and access control. Many research ideas
have been proposed pertaining to the IDS using machine learning (ML) techniques,
deep learning (DL) techniques, and swarm and evolutionary algorithms (SWEVO).
These methods have been tested on the datasets such as DARPA, KDD CUP 99, and
NSL-KDD using network features to classify attack types. This paper surveys the
intrusion detection problem by considering algorithms from areas such as ML, DL,
and SWEVO. The survey is a representative research work carried out in the field
of IDS from the year 2008 to 2020. The paper focuses on the methods that have
incorporated feature selection in their models for performance evaluation. The
paper also discusses the different datasets of IDS and a detailed description of
recent dataset CIC IDS-2017. The paper presents applications of IDS with
challenges and potential future research directions. The study presented, can
serve as a pedestal for research communities and novice researchers in the field
of network security for understanding and developing efficient IDS models.
View
... Denial of Service DoS attack, for instance, floods computing resources with
information, which destroys the concept of availability, while malware disrupts
the implementation of a program that infringes the concept of integrity [19]. An
IDS is a surveillance and review tool for operations in a computerized system or
infrastructure to identify perceived threats by their observations of offences
related to the principles of CIA in computer security policy [18], [20], [21].
According to Nexusguard the DDoS attacks in first quarter of 2020 has increased
by 500% as compared to last quarter of 2019 [22]. ...

Protocol Based Deep Intrusion Detection for DoS and DDoS attacks using UNSW-NB15
and Bot-IoT data-sets
Article
Full-text available
 * Dec 2021

 * Muhammad Zeeshan
 * Qaiser Riaz
 * Muhammad Ahmad Bilal
 * Muhammad K. Shahzad
 * Azizur Rahim

Since its inception, the Internet of Things (IoT) has witnessed mushroom growth
as a breakthrough technology. In a nutshell, IoT is the integration of devices
and data such that processes are automated and centralized to a certain extent.
IoT is revolutionizing the way business is done and is transforming society as a
whole. As this technology advances further, the need to exploit detection and
weakness awareness increases to prevent unauthorized access to critical
resources and business functions, thereby rendering the system unavailable.
Denial of Service (DoS) and Distributed DoS attacks are all too common. In this
paper, we propose a Protocol Based Deep Intrusion Detection (PB-DID)
architecture, in which we created a data-set of packets from IoT traffic by
comparing features from the UNSWNB15 and Bot-IoT data-sets based on flow and
Transmission Control Protocol (TCP). We classify non-anomalous, DoS, and DDoS
traffic uniquely by taking care of the problems like imbalanced and
over-fitting. We have achieved a classification accuracy of 96.3% by using deep
learning (DL) technique.
View
... Web 2.0, in collaboration with SaaS (Software as a Service), free their
users from system maintenance troubles as the networks hold the cloud
environment. Still, it faces many security concerns like[11][41][1][42][43]. ...

Cloud related paper
Preprint
 * Dec 2021

 * Dr Kamta Nath Mishra
 * Vandana Bhattacharjee
 * Shashwat Saket
 * Shivam Mishra

Abstract
View
... Intrusion detection is one of the significant presentations of outlier
identification that is utilized to recognize the system attacks by opponents.
Intrusion Detection Systems (IDSs) are fundamental to guarantee system security
[4,5]. The generally utilized methodologies for intrusion detection are the
anomaly and signature dependent methodologies [6]. ...

Support Based Graph Framework for Effective Intrusion Detection and
Classification
Preprint
Full-text available
 * Oct 2021

 * Rahul B Adhao
 * Vinod K Pachghare

Intrusion Detection System is one of the worthwhile areas for researchers for a
long. Numbers of researchers have worked for increasing the efficiency of
Intrusion Detection Systems. But still, many challenges are present in modern
Intrusion Detection Systems. One of the major challenges is controlling the
false positive rate. In this paper, we have presented an efficient soft
computing framework for the classification of intrusion detection dataset to
diminish a false positive rate. The proposed processing steps are described as;
the input data is at first pre-processed by the normalization process.
Afterward, optimal features are chosen for the dimensionality decrease utilizing
krill herd optimization. Here, the effective feature assortment is utilized to
enhance classification accuracy. Support value is then estimated from ideally
chosen features and lastly, a support value-based graph is created for the
powerful classification of data into intrusion or normal. The exploratory
outcomes demonstrate that the presented technique outperforms the existing
techniques regarding different performance examinations like execution time,
accuracy, false-positive rate, and their intrusion detection model increases the
detection rate and decreases the false rate.
View
... Recently, due to the rapid development of mobile Internet, attacks on
Internet-connected devices are gradually increasing. Thus, many scholars have a
strong interest in the research of intrusion detection systems and good
detection results have been achieved [4]. ...

MFVT:An Anomaly Traffic Detection Method Merging Feature Fusion Network and
Vision Transformer Architecture
Preprint
Full-text available
 * Sep 2021

 * Ming Li
 * Dezhi Han
 * Dun Li
 * Han Liu
 * Chin- Chen Chang

Network intrusion detection, which takes the extraction and analysis of network
traffic features as the main method, plays a vital role in network security
protection. The current network traffic feature extraction and analysis for
network intrusion detection mostly uses deep learning algorithms. Currently,
deep learning requires a lot of training resources, and have weak processing
capabilities for imbalanced data sets. In this paper, a deep learning model
(MFVT) based on feature fusion network and Vision Transformer architecture is
proposed, to which improves the processing ability of imbalanced data sets and
reduces the sample data resources needed for training. Besides, to improve the
traditional raw traffic features extraction methods, a new raw traffic features
extraction method (CRP) is proposed, the CPR uses PCA algorithm to reduce all
the processed digital traffic features to the specified dimension. On the IDS
2017 dataset and the IDS 2012 dataset, the ablation experiments show that the
performance of the proposed MFVT model is significantly better than other
network intrusion detection models, and the detection accuracy can reach the
state-of-the-art level. And, When MFVT model is combined with CRP algorithm, the
detection accuracy is further improved to 99.99%.
View
... Phishing: Phishing is a fraud type attack [32] that tries to delude the
users by impersonating someone else, e.g., a company, which the user (victim)
trusts. Often in these attacks, the attackers send an email that seems to be
legitimate but it is not. ...

Intrusion Detection in Critical Infrastructures: A Literature Review
Article
Full-text available
 * Aug 2021

 * Fountas Panagiotis
 * Kouskouras Taxiarxchis
 * Kranas Georgios
 * Leandros Maglaras
 * Mohamed Amine Ferrag

Over the years, the digitization of all aspects of life in modern societies is
considered an acquired advantage. However, like the terrestrial world, the
digital world is not perfect and many dangers and threats are present. In the
present work, we conduct a systematic review on the methods of network detection
and cyber attacks that can take place in a critical infrastructure. As is shown,
the implementation of a system that learns from the system behavior (machine
learning), on multiple levels and spots any diversity, is one of the most
effective solutions.
View
Show more
Get access to 30 million figures
Join ResearchGate to access over 30 million figures and 135+ million
publications – all in one place.
Join for free
Advertisement
Join ResearchGate to find the people and research you need to help your work.
 * 20+ million members
 * 135+ million publications
 * 700k+ research projects

Join for free
or
Discover by subject area
 * Recruit researchers
 * Join for free
 * Login
   Email
   Tip: Most researchers use their institutional email address as their
   ResearchGate login
   
   PasswordForgot password?
   Keep me logged in
   Log in
   or
   Continue with Google
   
   Welcome back! Please log in.
   Email
   · Hint
   Tip: Most researchers use their institutional email address as their
   ResearchGate login
   
   PasswordForgot password?
   Keep me logged in
   Log in
   or
   Continue with Google
   No account? Sign up
   

Company
About us
News
Careers
Support
Help Center
Business solutions
Advertising
Recruiting

© 2008-2022 ResearchGate GmbH. All rights reserved.
 * Terms
 * Privacy
 * Copyright
 * Imprint