• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Intrusion Detection ]" (14)
  1. 1. A Study on Data Augmentation Methods for Improving the Performance of Machine Learning Models in Network Attack Detection
    Taesu Kim, Dongkyoo Shin, Dongil Shin, Vol. 26, No. 3, pp. 1-7, Jun. 2025
    10.7472/jksii.2025.26.3.1
    Keywords: Network intrusion detection, data augmentation
  2. 2. Research on Network Packet Analysis and Unknown Intrusion Detection Method based on LSTM-Autoencoder
    Hyoseong Park, Dongkyoo Shin, Dongil Shin, Vol. 26, No. 1, pp. 149-155, Feb. 2025
    10.7472/jksii.2025.26.1.149
    Keywords: LSTM, Autoencoder, Network intrusion detection, CIC-IDS2018
  3. 3. Anomaly detection and attack type classification mechanism using Extra Tree and ANN
  4. 4. A hybrid intrusion detection system based on CBA and OCSVM for unknown threat detection
  5. 5. A Research on Network Intrusion Detection based on Discrete Preprocessing Method and Convolution Neural Network
    JiHoon Yoo, Byeongjun Min, Sangsoo Kim, Dongil Shin, Dongkyoo Shin, Vol. 22, No. 2, pp. 29-39, Apr. 2021
    10.7472/jksii.2021.22.2.29
    Keywords: NSL-KDD, Network intrusion detection, CNN, Discretization of Continuous
  6. 6. Network Intrusion Detection with One Class Anomaly Detection Model based on Auto Encoder
    Byeoungjun Min, Jihoon Yoo, Sangsoo Kim, Dongil Shin, Dongkyoo Shin, Vol. 22, No. 1, pp. 13-22, Feb. 2021
    10.7472/jksii.2021.22.1.13
    Keywords: Anomaly Detection, Network intrusion detection, Autoencoder, NSL-KDD
  7. 7. A study on evaluation method of NIDS datasets in closed military network
    Yong-bin Park, Sung-uk Shin, In-sup Lee, Vol. 21, No. 2, pp. 121-130, Apr. 2020
    10.7472/jksii.2020.21.2.121
    Keywords: dataset, Network intrusion detection system, Data evaluation, Machine Learning
  8. 8. Extraction of Network Threat Signatures Using Latent Dirichlet Allocation
    Sungil Lee, Suchul Lee, Jun-Rak Lee, Heung-youl Youm, Vol. 19, No. 1, pp. 1-10, Feb. 2018
    10.7472/jksii.2018.19.1.1
    Keywords: LDA, network threat detection, Intrusion Detection System, signature
  9. 9. Security Framework for Improving the Performance of the Malicious Process Control System
    Iksu Kim, Jongmyung Choi, Vol. 14, No. 2, pp. 61-72, Apr. 2013
    10.7472/jksii.2013.14.2.61
    Keywords: Internet Worm, Intrusion Detection, Intrusion Prevention, Malicious Process
  10. 10. Performance Analysis of TCAM-based Jumping Window Algorithm for Snort 2.9.0
    Sung-Yun Lee, Ki-Yeol Ryu, Vol. 13, No. 2, pp. 41-50, Apr. 2012
    10.7472/jksii.2012.13.2.41
    Keywords: Distributed Denial of Service, Intrusion Detection System, Jumping Window Algorithm, Snort2.9.0, TCAM