Detecting Cyber Threats With a Graph-Based NIDPS DOI

Brendan Ooi Tze Wen,

Najihah Syahriza,

Nicholas Chan Wei Xian

и другие.

Advances in logistics, operations, and management science book series, Год журнала: 2023, Номер unknown, С. 36 - 74

Опубликована: Дек. 29, 2023

This chapter explores the topic of a novel network-based intrusion detection system (NIDPS) that utilises concept graph theory to detect and prevent incoming threats. With technology progressing at rapid rate, number cyber threats will also increase accordingly. Thus, demand for better network security through NIDPS is needed protect data contained in networks. The primary objective this explore based four different aspects: collection, analysis engine, preventive action, reporting. Besides analysing existing NIDS technologies market, various research papers journals were explored. authors' solution covers basic structure an system, from collecting processing generating alerts reports. Data collection methods like packet-based, flow-based, log-based collections terms scale viability.

Язык: Английский

Digital twin-based architecture for wire arc additive manufacturing using OPC UA DOI

Mohammad Mahruf Mahdi,

Mahdi Sadeqi Bajestani, Sang Do Noh

и другие.

Robotics and Computer-Integrated Manufacturing, Год журнала: 2025, Номер 94, С. 102944 - 102944

Опубликована: Янв. 5, 2025

Язык: Английский

Процитировано

1

A Literature Review on Security in the Internet of Things: Identifying and Analysing Critical Categories DOI Creative Commons

Hannelore Sebestyen,

Daniela Elena Popescu, Doina Zmaranda

и другие.

Computers, Год журнала: 2025, Номер 14(2), С. 61 - 61

Опубликована: Фев. 11, 2025

With the proliferation of IoT-based applications, security requirements are becoming increasingly stringent. Given diversity such systems, selecting most appropriate solutions and technologies to address challenges is a complex activity. This paper provides an exhaustive evaluation existing related IoT domain, analysing studies published between 2021 2025. review explores evolving landscape security, identifying key focus areas, challenges, proposed as presented in recent research. Through this analysis, categorizes efforts into six main areas: emerging (35.2% studies), securing identity management (19.3%), attack detection (17.9%), data protection (8.3%), communication networking (13.8%), risk (5.5%). These percentages highlight research community’s indicate areas requiring further investigation. From leveraging machine learning blockchain for anomaly real-time threat response optimising lightweight algorithms resource-limited devices, researchers propose innovative adaptive threats. The underscores integration advanced enhance system while also highlighting ongoing challenges. concludes with synthesis threats each identified category, along their solutions, aiming support decision-making during design approach applications guide future toward comprehensive efficient frameworks.

Язык: Английский

Процитировано

1

A novel deep learning-based framework with particle swarm optimisation for intrusion detection in computer networks DOI Creative Commons
Abdullah Asım Yılmaz

PLoS ONE, Год журнала: 2025, Номер 20(2), С. e0316253 - e0316253

Опубликована: Фев. 12, 2025

Intrusion detection plays a significant role in the provision of information security. The most critical element is ability to precisely identify different types intrusions into network. However, poses important challenge, as many new intrusion are now generated by cyber-attackers every day. A robust system still elusive, despite various strategies that have been proposed recent years. Hence, novel deep-learning-based architecture for detecting computer network this paper. aim construct hybrid enhances efficiency and accuracy detection. main contribution our work deep learning-based which PSO used hyperparameter optimisation three well-known pre-trained models combined an optimised way. suggested method involves six key stages: data gathering, pre-processing, neural (DNN) design, hyperparameters, training, evaluation trained DNN. To verify superiority over alternative state-of-the-art schemes, it was evaluated on KDDCUP’99, NSL-KDD UNSW-NB15 datasets. Our empirical findings show model successfully correctly classifies attacks with 82.44%, 90.42% 93.55% values obtained UNSW-B15, KDDCUP’99 datasets, respectively, outperforms schemes literature.

Язык: Английский

Процитировано

1

Overview on Intrusion Detection Systems for Computers Networking Security DOI Creative Commons
Lorenzo Diana, Pierpaolo Dini,

Davide Paolini

и другие.

Computers, Год журнала: 2025, Номер 14(3), С. 87 - 87

Опубликована: Март 3, 2025

The rapid growth of digital communications and extensive data exchange have made computer networks integral to organizational operations. However, this increased connectivity has also expanded the attack surface, introducing significant security risks. This paper provides a comprehensive review Intrusion Detection System (IDS) technologies for network security, examining both traditional methods recent advancements. covers IDS architectures types, key detection techniques, datasets test environments, implementations in modern environments such as cloud computing, virtualized networks, Internet Things (IoT), industrial control systems. It addresses current challenges, including scalability, performance, reduction false positives negatives. Special attention is given integration advanced like Artificial Intelligence (AI) Machine Learning (ML), potential distributed blockchain. By maintaining broad-spectrum analysis, aims offer holistic view state-of-the-art IDSs, support diverse audience, identify future research development directions critical area cybersecurity.

Язык: Английский

Процитировано

1

Detecting Cyber Threats With a Graph-Based NIDPS DOI

Brendan Ooi Tze Wen,

Najihah Syahriza,

Nicholas Chan Wei Xian

и другие.

Advances in logistics, operations, and management science book series, Год журнала: 2023, Номер unknown, С. 36 - 74

Опубликована: Дек. 29, 2023

This chapter explores the topic of a novel network-based intrusion detection system (NIDPS) that utilises concept graph theory to detect and prevent incoming threats. With technology progressing at rapid rate, number cyber threats will also increase accordingly. Thus, demand for better network security through NIDPS is needed protect data contained in networks. The primary objective this explore based four different aspects: collection, analysis engine, preventive action, reporting. Besides analysing existing NIDS technologies market, various research papers journals were explored. authors' solution covers basic structure an system, from collecting processing generating alerts reports. Data collection methods like packet-based, flow-based, log-based collections terms scale viability.

Язык: Английский

Процитировано

22