Search Results

Results (20)

Search Parameters:

Keyword: Intrusion
Order results
Results per page
Open AccessArticle
20 Pages, 379 KB Download PDF

Hybrid Intrusion Detection Using the AEN Graph Model

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 2, Page # 44–63, 2023; DOI: 10.25046/aj080206
Abstract:

The Activity and Event Network (AEN) is a new dynamic knowledge graph that models different network entities and the relationships between them. The graph is generated by processing various network security logs, such as network packets, system logs, and intrusion detection alerts, which allows the graph to capture security-relevant activity and events in the network.…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
7 Pages, 917 KB Download PDF

Matching TCP Packets to Detect Stepping-Stone Intrusion using Packet Crossover

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 13–19, 2022; DOI: 10.25046/aj070602
Abstract:

Hackers on the Internet often send attacking commands through compromised hosts, called stepping-stones, for the purpose to be hidden behind a long interactive communication session. In a stepping-stone attack, an intruder uses a chain of stepping-stones as relay machines and remotely login these machines using a remote login program such as SSH (secure shell). A…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
13 Pages, 930 KB Download PDF

Enhance Student Learning Experience in Cybersecurity Education by Designing Hands-on Labs on Stepping-stone Intrusion Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 4, Page # 355–367, 2021; DOI: 10.25046/aj060440
Abstract:

Stepping-stone intrusion has been widely used by professional hackers to launch their attacks. Unfortunately, this important and typical offensive skill has not been taught in most colleges and universities. In this paper, after surveying the most popular detection techniques in stepping-stone intrusion, we develop 10 hands-on labs to enhance student-learning experience in cybersecurity education. The…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
21 Pages, 2,476 KB Download PDF

Intrusion Detection and Classification using Decision Tree Based Key Feature Selection Classifiers

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 370–390, 2020; DOI: 10.25046/aj050645
Abstract:

Feature selection method applied on an intrusion dataset is used to classify the intrusion data as normal or intrusive. We have made an attempt to detect and classify the intrusion data using rank-based feature selection classifiers. A set of redundant features having null rank value are eliminated then the performance evaluation using various feature selection…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 548 KB Download PDF

Machine Learning for Network Intrusion Detection Based on SVM Binary Classification Model

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 638–644, 2020; DOI: 10.25046/aj050476
Abstract:

Recently, the number of connected machines around the worldwide has become very large, generating a huge amount of data either to be stored or to be communicated. Data protection is a concern for all institutions, it is difficult to manage the masses of data that are susceptible to multiple threats. In this work, we present…

Read More
(This article belongs to the iraset-20 (Special Issue on Innovative Research in Applied Science, Engineering and Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 750 KB Download PDF

Risk Management: The Case of Intrusion Detection using Data Mining Techniques

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 529–535, 2020; DOI: 10.25046/aj050365
Abstract:

Every institution nowadays relies on their online system and framework to do businesses. Such procedures need more attention due to the massive amount of attacks that occurs. These procedures have to go first through the management team of the institution, in order to prevent exploits of the attackers. Thus, the risk management can easily control…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 930 KB Download PDF

A Hybrid Approach for Intrusion Detection using Integrated K-Means based ANN with PSO Optimization

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 317–323, 2020; DOI: 10.25046/aj050341
Abstract:

Many advances in computer systems and IT infrastructures increases the risks associated with the use of these technologies. Specifically, intrusion into computer systems by unauthorized users is a growing problem and it is very challenging to detect. Intrusion detection technologies are therefore becoming extremely important to improve the overall security of computer systems. In the…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 1,578 KB Download PDF

Improved Nonlinear Fuzzy Robust PCA for Anomaly-based Intrusion Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 249–258, 2020; DOI: 10.25046/aj050332
Abstract:

Among the most popular tools in security field is the anomaly based Intrusion Detection System (IDS), it detects intrusions by learning to classify the normal activities of the network. Thus if any abnormal activity or behaviour is recognized it raises an alarm to inform the users of a given network. Nevertheless, IDS is generally susceptible…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 703 KB Download PDF

Intrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 72–81, 2020; DOI: 10.25046/aj050310
Abstract:

In recent years, cyber security has been received interest from several research communities with respect to Intrusion Detection System (IDS). Cyber security is “a fast-growing field demanding a great deal of attention because of remarkable progresses in social networks, cloud and web technologies, online banking, mobile environment, smart grid, etc.” An IDS is a software…

Read More
(This article belongs to Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
18 Pages, 2,130 KB Download PDF

A Support Vector Machine Cost Function in Simulated Annealing for Network Intrusion Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 260–277, 2019; DOI: 10.25046/aj040334
Abstract:

This paper proposes a computationally intelligent algorithm for extracting relevant features from a training set. An optimal subset of features is extracted from training examples of network intrusion datasets. The Support Vector Machine (SVM) algorithm is used as the cost function within the thermal equilibrium loop of the Simulated Annealing (SA) algorithm. The proposed fusion…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
6 Pages, 621 KB Download PDF

An Analysis of K-means Algorithm Based Network Intrusion Detection System

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 496–501, 2018; DOI: 10.25046/aj030160
Abstract:

In this modern age, information technology (IT) plays a role in a number of different fields. And therefore, the role of security is very important to control and assist the flow of activities over the network. Intrusion detection (ID) is a kind of security management system for computers and networks. There are many approaches and…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 975 KB Download PDF

Building an Efficient Alert Management Model for Intrusion Detection Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 18–24, 2018; DOI: 10.25046/aj030103
Abstract:

This paper is an extension of work originally presented in WITS-2017 CONF. We extend our previous works by improving the Risk calculation formula, and risk assessment of an alert cluster instead of every single alert. Also, we presented the initial results of the implementation of our model based on risk assessment and alerts prioritization. The…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 803 KB Download PDF

Network Intrusion Detection System using Apache Storm

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 812–818, 2017; DOI: 10.25046/aj0203102
Abstract:

Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 700 KB Download PDF

Intrusion detection in cloud computing based attack patterns and risk assessment

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 479–484, 2017; DOI: 10.25046/aj020361
Abstract:

This paper is an extension of work originally presented in SYSCO CONF.We extend our previous work by presenting the initial results of the implementation of intrusion detection based on risk assessment on cloud computing. The idea focuses on a novel approach for detecting cyber-attacks on the cloud environment by analyzing attacks pattern using risk assessment…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 1,262 KB Download PDF

Detection Method and Mitigation of Server-Spoofing Attacks on SOME/IP at the Service Discovery Phase

Advances in Science, Technology and Engineering Systems Journal, Volume 11, Issue 1, Page # 25–32, 2026; DOI: 10.25046/aj110103
Abstract:

Service-oriented architecture has attracted attention in automotive development. The Automotive Open System Architecture (AUTOSAR) specifies Scalable Service-Oriented Middleware over IP (SOME/IP) as a key middleware for service-oriented communication in-vehicles. However, SOME/IP-based networks are vulnerable to server spoofing during the service discovery phase, enabling attackers to cause man-in-the-middle attacks by impersonating legitimate services. This paper proposes…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
18 Pages, 2,108 KB Download PDF

iDRP Framework: An Intelligent Malware Exploration Framework for Big Data and Internet of Things (IoT) Ecosystem

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 5, Page # 185–202, 2021; DOI: 10.25046/aj060521
Abstract:

The Internet of Things (IoT) is at a face paced growth in the advanced Industrial Revolution (IR) 4.0 in the modern digital world. Considering the current network security challenges and sophistication of attacks in the heavily computerized and interconnected systems, such as an IoT ecosystem, the need for an innovative, robust, intelligent and adaptive malware…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 3,910 KB Download PDF

Nonlinear \(\ell_{2,p}\)-norm based PCA for Anomaly Network Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 234–243, 2020; DOI: 10.25046/aj050429
Abstract:

Intrusion detection systems are well known for their ability to detect internal and external intrusions, it usually recognizes intrusions through learning the normal behaviour of users or the normal traffic of activities in the network. So, if any suspicious activity or behaviour is detected, it informs the users of the network. Nonetheless, intrusion detection system…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 390 KB Download PDF

Attacks Classification and a Novel IDS for Detecting Jamming Attack in WBAN

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 80–86, 2020; DOI: 10.25046/aj050210
Abstract:

Wireless Body Area Network (WBAN) aims to monitor patient’s health remotely, by using mini medical sensors that are attached on the human body to collect important data via the wireless network. However, this type of communication is very vulnerable to various types of attacks, poses serious problems to the individual’s life who wears the nodes.…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Network Engineering (ENW))
Open AccessArticle
8 Pages, 1,116 KB Download PDF

EKMC: Ensemble of kNN using MetaCost for Efficient Anomaly Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 401–408, 2019; DOI: 10.25046/aj040552
Abstract:

Anomaly detection aims at identification of suspicious items, observations or events by differing from most of the data. Intrusion Detection, Fault Detection, and Fraud Detection are some of the various applications of Anomaly Detection. The Machine learning classifier algorithms used in these applications would greatly affect the overall efficiency. This work is an extension of…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
11 Pages, 872 KB Download PDF

Cross layers security approach via an implementation of data privacy and by authentication mechanism for mobile WSNs

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 97–107, 2017; DOI: 10.25046/aj020112
Abstract:

To implement a new secure network with high mobility and low energy consumption, we use smart sensors. These sensors are powered by micro batteries generally non rechargeable. So, to extend their lifetime, it is necessary to implement new energy conservation techniques. Existing works separate the two features (security, energy conservation) and are interested specifically in…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Network Engineering (ENW))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026