Academic literature on the topic 'Network Intrusion Detection Systems (NIDS)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Network Intrusion Detection Systems (NIDS).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Network Intrusion Detection Systems (NIDS)"
Kumar, Satish, Sunanda Gupta, and Sakshi Arora. "A comparative simulation of normalization methods for machine learning-based intrusion detection systems using KDD Cup’99 dataset." Journal of Intelligent & Fuzzy Systems 42, no. 3 (February 2, 2022): 1749–66. http://dx.doi.org/10.3233/jifs-211191.
Full textMulyanto, Mulyanto, Muhamad Faisal, Setya Widyawan Prakosa, and Jenq-Shiou Leu. "Effectiveness of Focal Loss for Minority Classification in Network Intrusion Detection Systems." Symmetry 13, no. 1 (December 22, 2020): 4. http://dx.doi.org/10.3390/sym13010004.
Full textHu, Qinwen, Muhammad Rizwan Asghar, and Nevil Brownlee. "Effectiveness of Intrusion Detection Systems in High-speed Networks." International Journal of Information, Communication Technology and Applications 4, no. 1 (March 18, 2018): 1–10. http://dx.doi.org/10.17972/ijicta20184138.
Full textAlbasheer, Hashim, Maheyzah Md Siraj, Azath Mubarakali, Omer Elsier Tayfour, Sayeed Salih, Mosab Hamdan, Suleman Khan, Anazida Zainal, and Sameer Kamarudeen. "Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey." Sensors 22, no. 4 (February 15, 2022): 1494. http://dx.doi.org/10.3390/s22041494.
Full textHan, Jonghoo, and Wooguil Pak. "Hierarchical LSTM-Based Network Intrusion Detection System Using Hybrid Classification." Applied Sciences 13, no. 5 (February 27, 2023): 3089. http://dx.doi.org/10.3390/app13053089.
Full textHan, Jonghoo, and Wooguil Pak. "High Performance Network Intrusion Detection System Using Two-Stage LSTM and Incremental Created Hybrid Features." Electronics 12, no. 4 (February 15, 2023): 956. http://dx.doi.org/10.3390/electronics12040956.
Full textKim, Taehoon, and Wooguil Pak. "Integrated Feature-Based Network Intrusion Detection System Using Incremental Feature Generation." Electronics 12, no. 7 (March 31, 2023): 1657. http://dx.doi.org/10.3390/electronics12071657.
Full textYang, Hao, Jinyan Xu, Yongcai Xiao, and Lei Hu. "SPE-ACGAN: A Resampling Approach for Class Imbalance Problem in Network Intrusion Detection Systems." Electronics 12, no. 15 (August 3, 2023): 3323. http://dx.doi.org/10.3390/electronics12153323.
Full textWang, Minxiao, Ning Yang, and Ning Weng. "Securing a Smart Home with a Transformer-Based IoT Intrusion Detection System." Electronics 12, no. 9 (May 4, 2023): 2100. http://dx.doi.org/10.3390/electronics12092100.
Full textWang, Zhen Qi, and Dan Kai Zhang. "HIDS and NIDS Hybrid Intrusion Detection System Model Design." Advanced Engineering Forum 6-7 (September 2012): 991–94. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.991.
Full textDissertations / Theses on the topic "Network Intrusion Detection Systems (NIDS)"
Mahajan, Atul. "High speed circuit techniques for network intrusion detection systems (NIDS) /." Available to subscribers only, 2008. http://proquest.umi.com/pqdweb?did=1650508461&sid=1&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Full textAtakan, Mustafa. "Improving Performance Of Network Intrusion Detection Systems Through Concurrent Mechanisms." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/1061399/index.pdf.
Full textSchier, Thomas. "NIDS im Campusnetz." Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400501.
Full textGoh, Vik Tor. "Intrusion detection framework for encrypted networks." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/41733/1/Vik_Tor_Goh_Thesis.pdf.
Full textAndersson, Michael, and Andreas Mickols. "A study of Centralized Network Intrusion Detection System using low end single board computers." Thesis, Högskolan Dalarna, Datateknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:du-25552.
Full textSilva, Eduardo Germano da. "A one-class NIDS for SDN-based SCADA systems." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2007. http://hdl.handle.net/10183/164632.
Full textPower grids have great influence on the development of the world economy. Given the importance of the electrical energy to our society, power grids are often target of network intrusion motivated by several causes. To minimize or even to mitigate the aftereffects of network intrusions, more secure protocols and standardization norms to enhance the security of power grids have been proposed. In addition, power grids are undergoing an intense process of modernization, and becoming highly dependent on networked systems used to monitor and manage power components. These so-called Smart Grids comprise energy generation, transmission, and distribution subsystems, which are monitored and managed by Supervisory Control and Data Acquisition (SCADA) systems. In this Masters dissertation, we investigate and discuss the applicability and benefits of using Software-Defined Networking (SDN) to assist in the deployment of next generation SCADA systems. We also propose an Intrusion Detection System (IDS) that relies on specific techniques of traffic classification and takes advantage of the characteristics of SCADA networks and of the adoption of SDN/OpenFlow. Our proposal relies on SDN to periodically gather statistics from network devices, which are then processed by One- Class Classification (OCC) algorithms. Given that attack traces in SCADA networks are scarce and not publicly disclosed by utility companies, the main advantage of using OCC algorithms is that they do not depend on known attack signatures to detect possible malicious traffic. As a proof-of-concept, we developed a prototype of our proposal. Finally, in our experimental evaluation, we observed the performance and accuracy of our prototype using two OCC-based Machine Learning (ML) algorithms, and considering anomalous events in the SCADA network, such as a Denial-of-Service (DoS), and the failure of several SCADA field devices.
Akhlaq, Monis. "Improved performance high speed network intrusion detection systems (NIDS) : a high speed NIDS architectures to address limitations of packet loss and low detection rate by adoption of dynamic cluster architecture and traffic anomaly filtration (IADF)." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5377.
Full textNiyaz, Quamar. "Design and Implementation of a Deep Learning based Intrusion Detection System in Software-Defined Networking Environment." University of Toledo / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1501785493311223.
Full textAlserhani, Faeiz. "A framework for correlation and aggregation of security alerts in communication networks : a reasoning correlation and aggregation approach to detect multi-stage attack scenarios using elementary alerts generated by Network Intrusion Detection Systems (NIDS) for a global security perspective." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5430.
Full textKabir-Querrec, Maëlle. "Cyber sécurité des systèmes industriels pour les smart-grids : détection d'intrusion dans les réseaux de communication IEC 61850." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT032/document.
Full textInformation and Communication Technologies have been pervading Industrial Automation and Control Systems (IACS) for a few decades now. Initially, IACS ran proprietary protocols on closed networks, thus ensuring some level of security through obscurity and isolation. Technologies and usages have evolved and today this intrinsic security does not exist any longer, though. This transition is in progress in the electricity domain, the power infrastructure turning into the "smart grid".The IEC 61850 standard is key to the smart grid development. It is aimed at making interoperability possible in ``Communication networks and systems for power utility automation''. It thus defines a common data object model and a stack of protocols answering different purposes.Although the cyber risk in IACS is now widely acknowledged, IEC 61850 does not address cyber security in any way whatsoever.This work tackles the question of cyber security through network intrusion detection in IEC 61850 networks, and more specifically in real-time GOOSE communications. The idea is to get the most out of the protocol specifications and system configuration while developing a tailored NIDS. This enables detection accuracy
Books on the topic "Network Intrusion Detection Systems (NIDS)"
1980-, Lu Wei, and Tavallaee Mahbod, eds. Network intrusion detection and prevention: Concepts and techniques. New York: Springer, 2010.
Find full textComputer Intrusion Detection and Network Monitoring: A Statistical Viewpoint. New York, NY: Springer New York, 2001.
Find full textImplementing intrusion detection systems: A hands-on guide for securing the network. Indianapolis, IN: Wiley Pub., 2003.
Find full textNing, Peng. Intrusion Detection in Distributed Systems: An Abstraction-Based Approach. Boston, MA: Springer US, 2004.
Find full textStephen, Northcutt, and Edmead Mark T, eds. Inside network perimeter security: The definitive guide to firewalls, VPNs, routers, and intrusion detection systems. Indianapolis, Ind: New Riders, 2003.
Find full textNetwork anomaly detection: A machine learning perspective. Boca Raton: CRC Press, Taylor & Francis Group, 2014.
Find full textBennett, Jeremy, and Brian Hernacki. Testing Network Security, Evaluating Intrusion Detection and Prevention Systems. Pearson Education, Limited, 2020.
Find full textNetwork Defense-in-Depth: Evaluating Host-Based Intrusion Detection Systems. Storming Media, 2001.
Find full textCrothers, Tim. Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Network. Wiley, 2002.
Find full textBook chapters on the topic "Network Intrusion Detection Systems (NIDS)"
Deng, Lirui, Youjian Zhao, and Heng Bao. "A Self-supervised Adversarial Learning Approach for Network Intrusion Detection System." In Communications in Computer and Information Science, 73–85. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-8285-9_5.
Full textDominique, Nyiribakwe, and Zhuo Ma. "Enhancing Network Intrusion Detection System Method (NIDS) Using Mutual Information (RF-CIFE)." In Security with Intelligent Computing and Big-data Services, 329–42. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16946-6_26.
Full textde Loiola Costa, Wagner Elvio, Denivaldo Lopes, Zair Abdelouahab, and Bruno Froz. "Network Intrusion Detection System Based on SOA (NIDS-SOA): Enhancing Interoperability Between IDS." In Lecture Notes in Electrical Engineering, 935–48. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-3535-8_78.
Full textMantur, Bhimshankar, Abhijeet Desai, and K. S. Nagegowda. "Centralized Control Signature-Based Firewall and Statistical-Based Network Intrusion Detection System (NIDS) in Software Defined Networks (SDN)." In Emerging Research in Computing, Information, Communication and Applications, 497–506. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2550-8_48.
Full textKeserwani, Pankaj Kumar, Mridul Mittal, and Mahesh Chandra Govil. "An Improved NIDS Using RF-Based Feature Selection Technique and Voting Classifier." In Artificial Intelligence for Intrusion Detection Systems, 133–54. Boca Raton: Chapman and Hall/CRC, 2023. http://dx.doi.org/10.1201/9781003346340-7.
Full textAkhlaq, Monis, Faeiz Alserhani, Irfan U. Awan, Andrea J. Cullen, John Mellor, and Pravin Mirchandani. "Virtualization in Network Intrusion Detection Systems." In Lecture Notes in Computer Science, 6–8. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05290-3_3.
Full textPomerleau, Pierre-Luc, and David Maimon. "Network security and intrusion detection systems." In Evidence-Based Cybersecurity, 85–108. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003201519-6.
Full textHe, Guofeng, Qing Lu, Guangqiang Yin, and Hu Xiong. "Network Intrusion Detection Based on Hybrid Neural Network." In Wireless Algorithms, Systems, and Applications, 644–55. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-19214-2_54.
Full textPark, Woo Young, Sang Hyun Kim, Duy-Son Vu, Chang Han Song, Hee Soo Jung, and Hyeon Jo. "Intrusion Detection System for Industrial Network." In Lecture Notes in Networks and Systems, 646–58. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-16075-2_48.
Full textZiai, Amir. "Active Learning for Network Intrusion Detection." In Transactions on Computer Systems and Networks, 3–14. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1681-5_1.
Full textConference papers on the topic "Network Intrusion Detection Systems (NIDS)"
Raghunath, Bane Raman, and Shivsharan Nitin Mahadeo. "Network Intrusion Detection System (NIDS)." In 2008 First International Conference on Emerging Trends in Engineering and Technology. IEEE, 2008. http://dx.doi.org/10.1109/icetet.2008.252.
Full textRadhi Hadi, Mhmood, and Adnan Saher Mohammed. "A Novel Approach to Network Intrusion Detection System using Deep Learning for SDN: Futuristic Approach." In 4th International Conference on Machine Learning & Applications (CMLA 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121106.
Full textAl-Maksousy, Hassan Hadi, Michele C. Weigle, and Cong Wang. "NIDS: Neural Network based Intrusion Detection System." In 2018 IEEE International Symposium on Technologies for Homeland Security (HST). IEEE, 2018. http://dx.doi.org/10.1109/ths.2018.8574174.
Full textAlnajjar, Yazan, and Jinane Mounsef. "Next-Generation Network Intrusion Detection System (NG-NIDS)." In 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS). IEEE, 2021. http://dx.doi.org/10.1109/telsiks52058.2021.9606424.
Full textAlalmaie, Abeer, Priyadarsi Nanda, and Xiangjian He. "ZT-NIDS: Zero Trust, Network Intrusion Detection System." In 20th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2023. http://dx.doi.org/10.5220/0012080000003555.
Full textMesser, Winston. "NIDS in Airgapped LANs--Does it Matter?" In 2022 KSU CONFERENCE ON CYBERSECURITY EDUCATION, RESEARCH AND PRACTICE. Kennesaw State University, 2022. http://dx.doi.org/10.32727/28.2023.3.
Full textRamesh Kumar, M., and Pradeep Sudhakaran. "Comprehensive Survey on Detecting Security Attacks of IoT Intrusion Detection Systems." In International Research Conference on IOT, Cloud and Data Science. Switzerland: Trans Tech Publications Ltd, 2023. http://dx.doi.org/10.4028/p-270t9z.
Full textSubba, Basant. "A Neural Network based NIDS framework for intrusion detection in contemporary network traffic." In 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, 2019. http://dx.doi.org/10.1109/ants47819.2019.9117966.
Full textCaruso, Luis Carlos, Guilherme Guindani, Hugo Schmitt, Ney Calazans, and Fernando Moraes. "SPP-NIDS - A Sea of Processors Platform for Network Intrusion Detection Systems." In 18th IEEE/IFIP International Workshop on Rapid System Prototyping. IEEE, 2007. http://dx.doi.org/10.1109/rsp.2007.35.
Full textPrabhakaran, Ayonya, Vijay Kumar Chaurasiya, Sunakshi Singh, and Suneel Yadav. "An Optimized Deep Learning Framework for Network Intrusion Detection System (NIDS)." In 2020 International Conference Engineering and Telecommunication (En&T). IEEE, 2020. http://dx.doi.org/10.1109/ent50437.2020.9431266.
Full textReports on the topic "Network Intrusion Detection Systems (NIDS)"
Tayeb, Shahab. Taming the Data in the Internet of Vehicles. Mineta Transportation Institute, January 2022. http://dx.doi.org/10.31979/mti.2022.2014.
Full text