© International Research Publication House This paper discusses the concept and problem of detecting network scanning attacks and describes the targets of network scanning attacks. The main attack methods and approaches to scanning network ports are considered. Intrusion detection systems (IDS) are used to detect network scanning attacks. Based on the method of detecting attacks, such systems are divided into IDS, which detects attacks based on signatures, and IDS, which detects attacks based on anomalies. In practice, it is recommended that these IDS detection methods be used together. It is proposed to use a trained neural network as a tool for detecting network scanning attacks. The implementation of the neural network required to prepar...
The aim of this article is to explain how features of attacks could be extracted from the packets. I...
The use of Machine Learning (ML) techniques in Intrusion Detection Systems (IDS) has taken a promine...
Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hac...
Purpose. The article is aimed at the development of a methodology for detecting attacks on a compute...
The prevention of any type of cyber attack is indispensable because a single attack may break the se...
Purpose. Currently, there appear more often the reports of penetration into computer networks and at...
Modern Society is becoming increasingly dependent upon ever-more complex systems. We are in a situat...
M.Phil. (Electrical and Electronic Engineering)Network security has become increasingly important as...
AbstractThe potential damage to computer networks keeps increasing due to a growing reliance on the ...
The emergent damage to computer network keeps increasing due to an extensive and prevalent connectiv...
A solo attack may cause a big loss in computer and network systems, its prevention is, therefore, ve...
Abstract. In this paper, we present an approach for detecting and classifying attacks in computer ne...
In this paper, we present concepts in artificial neural networks (ANN) to help detect intrusion atta...
In this paper we introduce an intrusion detection system for Denial of Service (DoS) attacks against...
Intrusion detection systems are the foremost tools for providing safety in computer and network syst...
The aim of this article is to explain how features of attacks could be extracted from the packets. I...
The use of Machine Learning (ML) techniques in Intrusion Detection Systems (IDS) has taken a promine...
Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hac...
Purpose. The article is aimed at the development of a methodology for detecting attacks on a compute...
The prevention of any type of cyber attack is indispensable because a single attack may break the se...
Purpose. Currently, there appear more often the reports of penetration into computer networks and at...
Modern Society is becoming increasingly dependent upon ever-more complex systems. We are in a situat...
M.Phil. (Electrical and Electronic Engineering)Network security has become increasingly important as...
AbstractThe potential damage to computer networks keeps increasing due to a growing reliance on the ...
The emergent damage to computer network keeps increasing due to an extensive and prevalent connectiv...
A solo attack may cause a big loss in computer and network systems, its prevention is, therefore, ve...
Abstract. In this paper, we present an approach for detecting and classifying attacks in computer ne...
In this paper, we present concepts in artificial neural networks (ANN) to help detect intrusion atta...
In this paper we introduce an intrusion detection system for Denial of Service (DoS) attacks against...
Intrusion detection systems are the foremost tools for providing safety in computer and network syst...
The aim of this article is to explain how features of attacks could be extracted from the packets. I...
The use of Machine Learning (ML) techniques in Intrusion Detection Systems (IDS) has taken a promine...
Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hac...