Exploring foci of:
Revue d intelligence artificielle • Vol 35 • No 6
Vigorous IDS on Nefarious Operations and Threat Analysis Using Ensemble Machine Learning
December 2021 • Usman Shuaibu Musa, Sudeshna Chakraborty, Hitesh Kumar Sharma, Tanupriya Choudhury, Chiranjit Dutta, Bhagwant Singh
The geometric increase in the usage of computer networking activities poses problems with the management of network normal operations. These issues had drawn the attention of network security researchers to introduce different kinds of intrusion detection systems (IDS) which monitor data flow in a network for unwanted and illicit operations. The violation of security policies with nefarious motive is what is known as intrusion. The IDS therefore examine traffic passing through networked systems checking for nefari…
Computer Science
Anomaly Detection
Computer Security
Intrusion (Film)
Machine Learning
Artificial Intelligence
Data Mining