|
|
|
Ferry Astika Saputra, Muhammad Salman, Jauari Akhmad Nur Hasim, Isbat Uzzin Nadhori and Kalamullah Ramli
Snort is a well-known, signature-based network intrusion detection system (NIDS). The Snort sensor must be placed within the same physical network, and the defense centers in the typical NIDS architecture offer limited network coverage, especially for re...
ver más
|
|
|
|
|
|
|
Duc-Minh Ngo, Dominic Lightbody, Andriy Temko, Cuong Pham-Quoc, Ngoc-Thinh Tran, Colin C. Murphy and Emanuel Popovici
This study proposes a heterogeneous hardware-based framework for network intrusion detection using lightweight artificial neural network models. With the increase in the volume of exchanged data, IoT networks? security has become a crucial issue. Anomaly...
ver más
|
|
|
|
|
|
|
Atheer R. Muhsen,Ghazwh G. Jumaa,Nadia F. AL Bakri,Ahmed T. Sadiq
Pág. pp. 158 - 171
The task of network security is to keep services available at all times by dealing with hacker attacks. One of the mechanisms obtainable is the Intrusion Detection System (IDS) which is used to sense and classify any abnormal actions. Therefore, the IDS ...
ver más
|
|
|
|
|
|
|
Jovana Mijalkovic and Angelo Spognardi
Network Intrusion Detection Systems (NIDS) represent a crucial component in the security of a system, and their role is to continuously monitor the network and alert the user of any suspicious activity or event. In recent years, the complexity of network...
ver más
|
|
|
|
|
|
|
Saifudin Usman, Idris Winarno, Amang Sudarsono
Pág. 252 - 267
Nowadays, DDoS attacks are often aimed at cloud computing environments, as more people use virtualization servers. With so many Nodes and distributed services, it will be challenging to rely solely on conventional networks to control and monitor intrusio...
ver más
|
|
|
|
|
|
|
Saifudin Usman, Idris Winarno, Amang Sudarsono
Pág. 252 - 267
Nowadays, DDoS attacks are often aimed at cloud computing environments, as more people use virtualization servers. With so many Nodes and distributed services, it will be challenging to rely solely on conventional networks to control and monitor intrusio...
ver más
|
|
|
|
|
|
|
Abdulsalam O. Alzahrani and Mohammed J. F. Alenazi
Software-defined Networking (SDN) has recently developed and been put forward as a promising and encouraging solution for future internet architecture. Managed, the centralized and controlled network has become more flexible and visible using SDN. On the...
ver más
|
|
|
|
|
|
|
Edward Guillen, Jeisson Sánchez and Rafael Paez
A wide range of IDS implementations with anomaly detection modules have been deployed. In general, those modules depend on intrusion knowledge databases, such as Knowledge Discovery Dataset (KDD99), Center for Applied Internet Data Analysis (CAIDA) or Co...
ver más
|
|
|
|
|
|
|
Derick Blaauw,Anmar Pretorius
AbstractThe study of subjective well-being is no longer on the periphery of study in the field of economics. A significant body of literature exists on the determinants of subjective well-being in the developed world. This paper uses the first wave of th...
ver más
|
|
|
|
|
|
|
Faeiz Alserhani and Alaa Aljared
With the increased sophistication of cyber-attacks, there is a greater demand for effective network intrusion detection systems (NIDS) to protect against various threats. Traditional NIDS are incapable of detecting modern and sophisticated attacks due to...
ver más
|
|
|
|
|
|
|
Nisha Rawindaran, Ambikesh Jayal, Edmond Prakash and Chaminda Hewage
Cyber security has made an impact and has challenged Small and Medium Enterprises (SMEs) in their approaches towards how they protect and secure data. With an increase in more wired and wireless connections and devices on SME networks, unpredictable mali...
ver más
|
|
|
|
|
|
|
Mustafa Al Lail, Alejandro Garcia and Saul Olivo
Modern society has quickly evolved to utilize communication and data-sharing media with the advent of the internet and electronic technologies. However, these technologies have created new opportunities for attackers to gain access to confidential electr...
ver más
|
|
|
|
|
|
|
Minxiao Wang, Ning Yang, Dulaj H. Gunasinghe and Ning Weng
Utilizing machine learning (ML)-based approaches for network intrusion detection systems (NIDSs) raises valid concerns due to the inherent susceptibility of current ML models to various threats. Of particular concern are two significant threats associate...
ver más
|
|
|
|
|
|
|
Zeeshan Ahmad, Adnan Shahid Khan, Kashif Nisar, Iram Haider, Rosilah Hassan, Muhammad Reazul Haque, Seleviawati Tarmizi and Joel J. P. C. Rodrigues
The revolutionary idea of the internet of things (IoT) architecture has gained enormous popularity over the last decade, resulting in an exponential growth in the IoT networks, connected devices, and the data processed therein. Since IoT devices generate...
ver más
|
|
|
|
|
|
|
Lumengo Bonga-Bonga, Thabiso Molemohi and Frederich Kirsten
This paper contributes to the literature on the effects of adverse economic conditions on gender differences in the labour market by assessing how COVID-19, a global trigger for a critical adverse condition, impacted gender differences in the labour mark...
ver más
|
|
|
|
|
|
|
Jiaming Song, Xiaojuan Wang, Mingshu He and Lei Jin
In computer networks, Network Intrusion Detection System (NIDS) plays a very important role in identifying intrusion behaviors. NIDS can identify abnormal behaviors by analyzing network traffic. However, the performance of classifier is not very good in ...
ver más
|
|
|
|
|
|
|
Talent Zwane, Lorraine Greyling, Mokadi Maleka
This study employs panel data estimation models to investigate the determinants of household savings in South Africa over the period 2008 ? 2012. The novelty of some panel data models is their power to overcome the problems of endogeneity bias, in additi...
ver más
|
|
|
|
|
|
|
Abdulatif Alabdulatif, Sajjad Hussain Rizvi
Pág. 153 - 164
The rapid growth of the data-communications network for real-world commercial applications requires security and robustness. Network intrusion is one of the most prominent network attacks. Moreover, the variants of network intrusion have also been extens...
ver más
|
|
|
|
|
|
|
Mduduzi Biyase, Talent Zwane, September Rooderick
This paper employs a newly-available and representative National Income Dynamics Study (NIDS) data of South African households to investigate whether social grants crowd-out or displace remittances. The estimated results based on full sample reveal that ...
ver más
|
|
|
|
|
|
|
Hsiao-Chung Lin, Ping Wang and Wen-Hui Lin
Most existing approaches for solving the distributed denial-of-service (DDoS) problem focus on specific security mechanisms, for example, network intrusion detection system (NIDS) detection and firewall configuration, rather than on the packet routing ap...
ver más
|
|
|
|