Search Results - computer based intrusion

Search alternatives:

Refine Results
  1. 1

    Intrusion-Detection System Based on Fast Learning Network in Cloud Computing by Mohammed Hasan, Ali, Mohamad Fadli, Zolkipli

    Published 2018
    “…This paper includes an overview of the intrusion-detection system and introduces to the reader some fundamental concepts of IDS work in cloud computing, also propose a new algorithm Fast Learning Network to work based on an intrusion detection.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5

    A signature based intrusion detection system (IDS) : using snort / Nik Mariza Nik Abdul Malik by Nik Abdul Malik, Nik Mariza

    Published 2004
    “…This is because those organizations are exposed to intruders. Intrusion Detection Systems (IDS) are software or hardware systems that automate the process of monitoring intrusion events that occur in a computer system or network, and analyze them for signs of intrusions. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing by Jaber, Aws Naser, Mohamad Fadli, Zolkipli, Shakir, Hasan Awni

    Published 2018
    “…The current results represent a feasible outcome for a good intrusion detection and prevention framework for DDoS-cloud computing systems based on statistics and predicted techniques. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  8. 8

    DYNAMIC ANT COLONY SYSTEM WITH THREE LEVEL UPDATE FEATURE SELECTION FOR INTRUSION DETECTION by MEHMOOD, TAHIR

    Published 2017
    “…Different detection methods have been used in these systems including Signature-based and Anomaly-based. The signature-based detection method is good to detect known attacks but it cannot detect novel attacks, as it only looks for signatures in the data which are fed in its knowledge base. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Q-Learning-based detection of IPv6 intrusions: a behavioral and performance study by Daru, April Firman, Hirzan, Alauddin Maulana, Mahmod Attar Bashi, Zainab Senan, Fanani, Fajriannoor

    Published 2025
    “…Intrusion attacks remain a persistent threat in computer networks, occurring unpredictably across various geographic locations. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Comparative study between signature-based and anomaly-based network intrusion detection system (SBNIDS and ABNIDS) by Chiadighikaobi, Ikenna Rene

    Published 2015
    “…In this proposed project we will be making a comparative study of Signature-based and Anomaly-based IDS in order to select suitable comparison parameters between different approach in network intrusion detection, to evaluate suitable software/system for deploying Signature-based and Anomaly-based detection and to conduct experimental study to evaluate the differences in selected parameters in different approach in network intrusion detection. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing by Fahad, Ahmed Mohammed, Ahmed, Abdulghani Ali, M. N. M., Kahar

    Published 2019
    “…However, many issues must be resolved before cloud computing can be accepted as a viable option to business computing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  14. 14
  15. 15
  16. 16

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by Iftikhar , Ahmad, Azween, Abdullah

    Published 2011
    “…vii Intrusions on computer network systems are major security issues these days. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection by Ghanem, Waheed Ali Hussein Mohammed

    Published 2019
    “…Intrusion Detection (ID) in the context of computer networks is an essential technique in modern defense-in-depth security strategies. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20