Owing to the distributed nature of modern attacks (e.g. denial-of-service), it is extremely challenging to detect such malicious behaviour using traditional intrusion detection systems. In this thesis, we investigate the possibility of adapting an intelligent system to an Intrusion Detection System (IDS) by proposing a cooperative and intelligent detection and prevention system using machine learning approaches, and aim to facilitate the detection and prevention process in a distributed environment. Firstly, we review the state of the art of intelligent intrusion detection and prevention system (IIDPS), and highlight the security requirement of cooperative based-IIDPS. Adaptive optimization techniques such as fuzzy logic controller (FLC), r...
Distributed denial of service (DDoS) attacks the target service providers by sending a huge amount o...
Demand for intrusion detection systems (IDSs) has increased significantly due to the exponential inc...
Each fog node interacts with data from multiple end-users in mobile fog computing (MFC) networks. Ma...
Owing to the distributed nature of denial-of-service attacks, it is tremendously challenging to dete...
Privacy and trustworthiness are the key apprehensions for the users of Internet of Vehicle (IoV) ser...
This thesis presents a novel approach to provide adaptive mechanisms to detect and categorise Floodi...
Abstract. In recent years, distributed denial of service (DDoS) attacks have brought increasing thre...
The rapid growth of IoT, smart devices, and 5G networks has increased the prevalence and complexity ...
Abstract — Firewall is employed for defense however they are doing not offer full protection. This e...
Carefully crafted computer worms such as Stuxnet and recent data breaches on retail organizations (e...
Network intrusion detection systems (NIDSs) are pattern recognition problems that classify network t...
Given the continuing advancement of networking applications and our increased dependence upon softwa...
This thesis presents a novel approach to provide adaptive mechanisms to detect and categorise Floodi...
Abstract—Preserving the availability and integrity of networked computing systems in the face of fas...
This paper presents an approach for optimal cyber security decisions to protect instances of a feder...
Distributed denial of service (DDoS) attacks the target service providers by sending a huge amount o...
Demand for intrusion detection systems (IDSs) has increased significantly due to the exponential inc...
Each fog node interacts with data from multiple end-users in mobile fog computing (MFC) networks. Ma...
Owing to the distributed nature of denial-of-service attacks, it is tremendously challenging to dete...
Privacy and trustworthiness are the key apprehensions for the users of Internet of Vehicle (IoV) ser...
This thesis presents a novel approach to provide adaptive mechanisms to detect and categorise Floodi...
Abstract. In recent years, distributed denial of service (DDoS) attacks have brought increasing thre...
The rapid growth of IoT, smart devices, and 5G networks has increased the prevalence and complexity ...
Abstract — Firewall is employed for defense however they are doing not offer full protection. This e...
Carefully crafted computer worms such as Stuxnet and recent data breaches on retail organizations (e...
Network intrusion detection systems (NIDSs) are pattern recognition problems that classify network t...
Given the continuing advancement of networking applications and our increased dependence upon softwa...
This thesis presents a novel approach to provide adaptive mechanisms to detect and categorise Floodi...
Abstract—Preserving the availability and integrity of networked computing systems in the face of fas...
This paper presents an approach for optimal cyber security decisions to protect instances of a feder...
Distributed denial of service (DDoS) attacks the target service providers by sending a huge amount o...
Demand for intrusion detection systems (IDSs) has increased significantly due to the exponential inc...
Each fog node interacts with data from multiple end-users in mobile fog computing (MFC) networks. Ma...