Research Papers On Intrusion Detection Act Essay Prompt
Feature selection in network intrusion detection using metaheuristic algorithms. "Feature selection in network intrusion detection using metaheuristic algorithms." International Journal of Advance Research, Ideas and Innovations in Technology 4.4 (2018).
With the rapid development of vehicle intelligent and networking technology, the IT security of automotive systems becomes an important area of research.
We are becoming acutely aware of the difficulty of making any meaningful cross-evaluation of such systems due to inadequate availability of datasets and poor reproducibility practices.
This project aims at exploring reproducibility literature, practises and tools to develop solutions adapted to IDS.
Citation: Li, F., Wang, L., and Wu, Y., "Research on CAN Network Security Aspects and Intrusion Detection Design," SAE Technical Paper 20, 2017, https://doi.org/10.4271/20.
The group: The successful candidate will join the University of Bristol Cyber Security Group (UBCSG).We propose to investigate methods to generate shareable IDS evaluations.The idea is not to build an IDS benchmark (a task seemingly impossible as systems must evolve alongside threats), but rather to explore technical and non-technical means to share software artefacts allowing the reproduction of an evaluation.One of the cornerstones of proper scientific enquiry is to make such evaluation repeatable.However, such an objective is mired by many issues, among those:1) datasets used in previous systems are either not available or not adapted to the evaluated system;2) source-code of most systems is not accessible even through interactions with authors, or when it is, the version used in a paper is not identifiable (the fabled grad student version);3) evaluation metrics are inconsistent across papers, and this makes meaningful comparisons without 1) and 2) barely possible.In addition to the basic vehicle control, intelligent advanced driver assistance systems, infotainment systems will all exchange data with in-vehicle network.Unfortunately, current communication network protocols, including Controller Area Network (CAN), Flex Ray, MOST, and LIN have no security services, such as authentication or encryption, etc.These services are provided over the Internet using known networking protocols, standards and formats under the supervision of different managements.Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion.UBCSG is recognised jointly by the National Cyber Security Centre (NCSC) and the Engineering and Physical Sciences Research Council (EPSRC) as an Academic Centre of Excellence in Cyber Security Research, and hosts a Centres for Doctoral Training in Cybersecurity.The successful candidate will join a dynamic and growing research and student community.