The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021
DOI: 10.3934/mbe.2021398
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid network intrusion detection using darwinian particle swarm optimization and stacked autoencoder hoeffding tree

Abstract: <abstract> <p>Cybersecurity experts estimate that cyber-attack damage cost will rise tremendously. The massive utilization of the web raises stress over how to pass on electronic information safely. Usually, intruders try different attacks for getting sensitive information. An Intrusion Detection System (IDS) plays a crucial role in identifying the data and user deviations in an organization. In this paper, stream data mining is incorporated with an IDS to do a specific task. The task is to dist… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 27 publications
0
1
0
Order By: Relevance
“…Block chain provides additional advantages like confidentiality, uprightness, and authentication along with privacy, ease of real time medical and clinical data accessing [18] and other user application oriented data, and administration [36][37][38][39]. Consequently, the key goal of the present contribution is to facilitate strict data privacy and security framework for cloud users' data by combining the block chain technique with quantum base ciphered text attribute encryption technique for additional security and to avoid man in the middle attacks [40][41][42]. Figure 4 shows how the model provides the security to cloud data.…”
mentioning
confidence: 99%
“…Block chain provides additional advantages like confidentiality, uprightness, and authentication along with privacy, ease of real time medical and clinical data accessing [18] and other user application oriented data, and administration [36][37][38][39]. Consequently, the key goal of the present contribution is to facilitate strict data privacy and security framework for cloud users' data by combining the block chain technique with quantum base ciphered text attribute encryption technique for additional security and to avoid man in the middle attacks [40][41][42]. Figure 4 shows how the model provides the security to cloud data.…”
mentioning
confidence: 99%