intrusion detection and prevention
Recently Published Documents


TOTAL DOCUMENTS

315
(FIVE YEARS 87)

H-INDEX

19
(FIVE YEARS 5)

2021 ◽  
Author(s):  
Nitish A ◽  
Prof.(Dr).Hanumanthapppa J ◽  
Shiva Prakash S.P ◽  
Kirill Krinkin

<div>The dynamic heterogeneous IoT contexts adversely affect the performance of learning-based network intrusion detection and prevention systems resulting in increased misclassification rates—necessitating an expert knowledge correlated evaluation framework. The proposed framework includes intrusion root cause analysis and a correlation model that can be generalized over any network intrusion dataset, corresponding expert knowledge, detection technique, and learning-based algorithm. The experimentations prove the robustness of the propounded</div><div>framework on imbalanced datasets.</div>


2021 ◽  
Author(s):  
Nitish A ◽  
Prof.(Dr).Hanumanthapppa J ◽  
Shiva Prakash S.P ◽  
Kirill Krinkin

<div>The dynamic heterogeneous IoT contexts adversely affect the performance of learning-based network intrusion detection and prevention systems resulting in increased misclassification rates—necessitating an expert knowledge correlated evaluation framework. The proposed framework includes intrusion root cause analysis and a correlation model that can be generalized over any network intrusion dataset, corresponding expert knowledge, detection technique, and learning-based algorithm. The experimentations prove the robustness of the propounded</div><div>framework on imbalanced datasets.</div>


2021 ◽  
pp. 108283
Author(s):  
Christabelle Alvares ◽  
Dristi Dinesh ◽  
Syed Alvi ◽  
Tannish Gautam ◽  
Maheen Hasib ◽  
...  

Author(s):  
Yashavant Darange

Intrusion Detection System (IDS) is vital to protect smartphones from about to happen security breach and make sure user privacy. Android is the most popular mobile Operating System (OS), holding many markets share. Android malware detection has received important concentration, existing solutions typically rely on performing resource intensive analysis on a server, assuming an uninterrupted link between the device and the server. In this paper, we propose a behavior Host-based IDS (HIDS) by using permissions incorporating arithmetical and ML algorithms. The benefit of our proposed IDS is two folds. First, it is completely independent and runs on the smartphone device, without need any link to a server. Second, it requires only training dataset consisting of some of examples from both benign and malicious datasets for tuning. though, in put into practice, collecting malicious examples is exciting since its important infecting the device and collecting many of samples in order to characterize the malware’s behavior and the labelling has to be done. The evaluation outcome show that the proposed IDS gives a very hopeful accuracy.


Sign in / Sign up

Export Citation Format

Share Document