Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » Tags cloud » Intrusion Detection System (IDS)

Journals

  • IJIEC (747)
  • MSL (2643)
  • DSL (668)
  • CCL (508)
  • USCM (1092)
  • ESM (413)
  • AC (562)
  • JPM (271)
  • IJDS (912)
  • JFS (91)
  • HE (32)
  • SCI (26)

Keywords

Supply chain management(166)
Jordan(161)
Vietnam(149)
Customer satisfaction(120)
Performance(113)
Supply chain(110)
Service quality(98)
Competitive advantage(95)
Tehran Stock Exchange(94)
SMEs(87)
optimization(86)
Financial performance(83)
Trust(83)
TOPSIS(83)
Sustainability(81)
Job satisfaction(80)
Factor analysis(78)
Social media(78)
Knowledge Management(77)
Artificial intelligence(77)


» Show all keywords

Authors

Naser Azad(82)
Mohammad Reza Iravani(64)
Zeplin Jiwa Husada Tarigan(63)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(39)
Jumadil Saputra(36)
Dmaithan Almajali(36)
Muhammad Turki Alshurideh(35)
Barween Al Kurdi(32)
Ahmad Makui(32)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Mohammad Khodaei Valahzaghard(30)
Sautma Ronni Basana(29)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Haitham M. Alzoubi(27)


» Show all authors

Countries

Iran(2183)
Indonesia(1290)
India(787)
Jordan(786)
Vietnam(504)
Saudi Arabia(453)
Malaysia(441)
United Arab Emirates(220)
China(206)
Thailand(153)
United States(111)
Turkey(106)
Ukraine(104)
Egypt(98)
Canada(92)
Peru(88)
Pakistan(85)
United Kingdom(80)
Morocco(79)
Nigeria(78)


» Show all countries
Sort articles by: Volume | Date | Most Rates | Most Views | Reviews | Alphabet
1.

Internet of things and intrusion detection fog computing architectures using machine learning techniques Pages 767-782 Right click to download the paper Download PDF

Authors: Maha Helal, Tariq Kashmeery, Mohammed Zakariah, Wesam Shisha

DOI: 10.5267/j.dsl.2024.9.003

Keywords: Machine Learning (ML), Internet of Things, Anomaly detection, Intrusion Detection System (IDS), Anomaly detection in IoT, Fog Computing, UNSW-NB15 dataset

Abstract:
The exponential expansion of the Internet of Things (IoT) has fundamentally transformed the way people, machines, and gadgets communicate, resulting in unparalleled levels of interconnectedness. Nevertheless, the growth of IoT has also brought up notable security obstacles, requiring the creation of strong intrusion detection systems to safeguard IoT networks against hostile actions. This study investigates the utilization of fog computing architectures in conjunction with machine learning approaches to improve the security of the IoT. The UNSW-NB15 dataset, containing an extensive range of network traffic characteristics, is used as the basis for training and assessing the machine learning models. The study specifically applies and evaluates the performance of various models, including linear regression, Ridge classifier, SGD classifier, and ensemble learning. Furthermore, the findings indicate that these models are capable of accurately identifying intrusions, with success rates of 94%, 97%, 96.60%, and 96.50%, respectively. The Ridge Classifier demonstrates exceptional accuracy, highlighting its potential for effective implementation in IoT security frameworks. The results emphasize the efficacy of combining machine learning with fog computing to tackle the distinct security obstacles faced by IoT networks. In the future, our work will prioritize optimizing these models for real-time applications, improving their scalability, and investigating more advanced ensemble strategies to enhance detection accuracy. The project intends to enhance these areas to create a comprehensive and scalable intrusion detection system that can offer strong security solutions for the growing IoT environment. This will guarantee the integrity and dependability of linked devices and systems.

Details
  • 68
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: DSL | Year: 2024 | Volume: 13 | Issue: 4 | Views: 641 | Reviews: 0

 
2.

Deep learning-driven multi-layer intrusion detection and prevention framework for resilient defense against adaptive evasion techniques in modern networks Pages 37-52 Right click to download the paper Download PDF

Authors: Dena Abu Laila, Ibrahim Mohd I Obeidat, Mohammed Amin, Amer Alqutaish, Mansour Obeidat, Theyazn H. H. Aldhyani

DOI: 10.5267/j.ijdns.2025.10.014

Keywords: Intrusion Detection System (IDS), Zero-day Attacks, Multi-layer Security, Graph Neural Networks (GNN), Deep Learning

Abstract:
Current network security technologies face new threats from determined attackers employing advanced evasion techniques such as IP spoofing, tiny fragment attacks, tunneling, and HTML smuggling. Conventional intrusion detection and prevention systems (IDS/IPS) have significant limitations in detecting zero-day attacks and sophisticated threats that can continuously alter their attack vectors. This paper presents a novel deep learning-driven, multilayer intrusion detection and prevention framework that integrates network-based IDS/IPS, host-based intrusion detection systems (HIDS), and honeypot technologies with advanced machine learning models, including graph neural networks (GNNs), autoencoders, and transformers. The framework employs adaptive learning mechanisms to enhance resilience against evasion techniques while maintaining low false positive rates. Experimental evaluation using diverse attack datasets demonstrates superior performance, achieving 97.3% detection accuracy for zero-day attacks and 94.8% resilience against advanced evasion techniques, significantly outperforming existing state-of-the-art solutions. The proposed framework contributes to cybersecurity research by introducing innovative multilayer correlation mechanisms, adaptive threat modeling, and evasion-resilient detection algorithms.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2026 | Volume: 10 | Issue: 1 | Views: 1177 | Reviews: 0

 

® 2010-2026 GrowingScience.Com