You are currently on the new version of our website. Access the old version .

29 Results Found

  • Article
  • Open Access
6 Citations
8,868 Views
15 Pages

The Next-Generation NIDS Platform: Cloud-Based Snort NIDS Using Containers and Big Data

  • Ferry Astika Saputra,
  • Muhammad Salman,
  • Jauari Akhmad Nur Hasim,
  • Isbat Uzzin Nadhori and
  • Kalamullah Ramli

Snort is a well-known, signature-based network intrusion detection system (NIDS). The Snort sensor must be placed within the same physical network, and the defense centers in the typical NIDS architecture offer limited network coverage, especially fo...

  • Article
  • Open Access
431 Views
22 Pages

A Comparative Evaluation of Snort and Suricata for Detecting Data Exfiltration Tunnels in Cloud Environments

  • Mahmoud H. Qutqut,
  • Ali Ahmed,
  • Mustafa K. Taqi,
  • Jordan Abimanyu,
  • Erika Thea Ajes and
  • Fatima Alhaj

Data exfiltration poses a major cybersecurity challenge because it involves the unauthorized transfer of sensitive information. Intrusion Detection Systems (IDSs) are vital security controls in identifying such attacks; however, their effectiveness i...

  • Article
  • Open Access
22 Citations
14,605 Views
15 Pages

As one of the most reliable technologies, network intrusion detection system (NIDS) allows the monitoring of incoming and outgoing traffic to identify unauthorised usage and mishandling of attackers in computer network systems. To this extent, this p...

  • Article
  • Open Access
1 Citations
2,119 Views
19 Pages

Learning from Playbacks: Testing the Communicative Function of Snort and Pant Calls in the Southern White Rhinoceros

  • Julia Jenikejew,
  • Mascha Huelsewig,
  • Damaris Riedner,
  • Mathilde Stomp,
  • Alban Lemasson,
  • Martine Hausberger,
  • Idu Azogu-Sepe,
  • Martin Böye and
  • Marina Scheumann

In southern white rhinoceroses (Ceratotherium simum simum), pant calls are well-studied contact vocalisations, whereas the function of frequently emitted snorts remains unclear. We conducted playback experiments with 15 rhinoceroses at three European...

  • Article
  • Open Access
356 Views
26 Pages

Adaptive Real-Time Risk and Impact Assessment for 5G Network Security

  • Dionysia Varvarigou,
  • Kostas Lampropoulos,
  • Spyros Denazis and
  • Paris Kitsos

24 December 2025

The expansion of 5G networks has led to larger attack surfaces due to more applications and use cases, more IoT connections, and the distributed 5G system architecture. Existing security frameworks often lack the ability to perform real-time, context...

  • Article
  • Open Access
1,416 Views
17 Pages

Current cloud computing expects to face huge traffic costs, data loads, and high latency due to the explosion of data from devices as the IoT and 5G technology evolve. Fog computing has emerged to overcome these issues. It deploys small fog servers a...

  • Article
  • Open Access
9 Citations
4,091 Views
19 Pages

4 July 2023

Distributed Denial of Service (DDoS) attacks pose a significant threat to internet and cloud security. Our study utilizes a Poisson distribution model to efficiently detect DDoS attacks with a computational complexity of O(n). Unlike Machine Learning...

  • Perspective
  • Open Access
5 Citations
16,492 Views
8 Pages

Intranasal Pregabalin Administration: A Review of the Literature and the Worldwide Spontaneous Reporting System of Adverse Drug Reactions

  • Mohamed Elsayed,
  • René Zeiss,
  • Maximilian Gahr,
  • Bernhard J. Connemann and
  • Carlos Schönfeldt-Lecuona

13 November 2019

Background: It is repeatedly reported that pregabalin (PRG) and gabapentin feature a potential for abuse/misuse, predominantly in patients with former or active substance use disorder. The most common route of use is oral, though reports of sublingua...

  • Article
  • Open Access
14 Citations
7,224 Views
19 Pages

A Distributed Signature Detection Method for Detecting Intrusions in Sensor Systems

  • Ilkyu Kim,
  • Doohwan Oh,
  • Myung Kuk Yoon,
  • Kyueun Yi and
  • Won Woo Ro

25 March 2013

Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, mos...

  • Article
  • Open Access
74 Citations
11,963 Views
16 Pages

On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks

  • Jesús Díaz-Verdejo,
  • Javier Muñoz-Calle,
  • Antonio Estepa Alonso,
  • Rafael Estepa Alonso and
  • Germán Madinabeitia

14 January 2022

Signature-based Intrusion Detection Systems (SIDS) play a crucial role within the arsenal of security components of most organizations. They can find traces of known attacks in the network traffic or host events for which patterns or signatures have...

  • Article
  • Open Access
30 Citations
4,109 Views
20 Pages

Effectiveness Evaluation of Different IDSs Using Integrated Fuzzy MCDM Model

  • Hashem Alyami,
  • Md Tarique Jamal Ansari,
  • Abdullah Alharbi,
  • Wael Alosaimi,
  • Majid Alshammari,
  • Dhirendra Pandey,
  • Alka Agrawal,
  • Rajeev Kumar and
  • Raees Ahmad Khan

Cyber-attacks are becoming progressively complicated; hence, the functional issues of intrusion-detection systems (IDSs) present ever-growing challenges. Failing to detect intrusions may jeopardize the trustworthiness of security services, such as pr...

  • Article
  • Open Access
15 Citations
5,932 Views
18 Pages

SDToW: A Slowloris Detecting Tool for WMNs

  • Vinicius da Silva Faria,
  • Jéssica Alcântara Gonçalves,
  • Camilla Alves Mariano da Silva,
  • Gabriele de Brito Vieira and
  • Dalbert Matos Mascarenhas

25 November 2020

Denial of service (DoS) attacks play a significant role in contemporary cyberspace scenarios. A variety of different DoS attacks pollute networks by exploring various vulnerabilities. A group of DoS called application DoS attacks explore application...

  • Article
  • Open Access
4 Citations
6,740 Views
13 Pages

24 May 2017

As part of network security processes, network intrusion detection systems (NIDSs) determine whether incoming packets contain malicious patterns. Pattern matching, the key NIDS component, consumes large amounts of execution time. One of several trend...

  • Article
  • Open Access
8 Citations
5,408 Views
21 Pages

Labeling Network Intrusion Detection System (NIDS) Rules with MITRE ATT&CK Techniques: Machine Learning vs. Large Language Models

  • Nir Daniel,
  • Florian Klaus Kaiser,
  • Shay Giladi,
  • Sapir Sharabi,
  • Raz Moyal,
  • Shalev Shpolyansky,
  • Andres Murillo,
  • Aviad Elyashar and
  • Rami Puzis

Analysts in Security Operations Centers (SOCs) are often occupied with time-consuming investigations of alerts from Network Intrusion Detection Systems (NIDSs). Many NIDS rules lack clear explanations and associations with attack techniques, complica...

  • Article
  • Open Access
1 Citations
3,763 Views
13 Pages

The Perceptions of Domestic Violence by a Family Member Who Uses Crack or Cocaine: A Secondary Retrospective Cross-Sectional Study

  • Gilmar Manoel de Barros,
  • Alessandra Diehl,
  • Adaene Alves Machado de Moura,
  • Adriana Inocenti Miasso,
  • Ronaldo Laranjeira,
  • Cláudio Jerônimo da Silva,
  • Sandra Cristina Pillon,
  • Christopher Wagstaff and
  • Ana Lucia de Moraes Horta

Objective: To evaluate the relationship between crack/cocaine use and domestic violence perpetration from the perspective of substance users’ families. A secondary retrospective cross-sectional study, with 3162 family members of crack/cocaine u...

  • Article
  • Open Access
8 Citations
7,797 Views
17 Pages

26 November 2019

A denial of service (DoS) attack in a computer network is an attack on the availability of computer resources to prevent users from having access to those resources over the network. Denial of service attacks can be costly, capable of reaching $100,0...

  • Article
  • Open Access
11 Citations
4,293 Views
9 Pages

13 May 2021

It is dangerous for both riders and horses when a horse suddenly startles. Sometimes horses do this in familiar environments because familiar objects may look different when rotated. The purpose of this study was to determine whether horses that had...

  • Review
  • Open Access
102 Citations
62,861 Views
25 Pages

Cocaine: An Updated Overview on Chemistry, Detection, Biokinetics, and Pharmacotoxicological Aspects including Abuse Pattern

  • Rita Roque Bravo,
  • Ana Carolina Faria,
  • Andreia Machado Brito-da-Costa,
  • Helena Carmo,
  • Přemysl Mladěnka,
  • Diana Dias da Silva,
  • Fernando Remião and
  • on behalf of The OEMONOM Researchers

13 April 2022

Cocaine is one of the most consumed stimulants throughout the world, as official sources report. It is a naturally occurring sympathomimetic tropane alkaloid derived from the leaves of Erythroxylon coca, which has been used by South American locals f...

  • Article
  • Open Access
2 Citations
1,826 Views
22 Pages

30 April 2025

With the continuous growth of network traffic scale, traditional software-based intrusion detection systems (IDS) constrained by CPU-processing capabilities struggle to meet the requirements of 100 Gbps high-speed network environments. While existing...

  • Article
  • Open Access
24 Citations
10,166 Views
20 Pages

Substance misuse services need to meet the growing demand and needs of individuals using new psychoactive substances (NPS). A review of the literature identified a paucity of research regarding NPS use by these individuals and UK guidelines outline t...

  • Article
  • Open Access
2 Citations
2,857 Views
28 Pages

Plant and Salamander Inspired Network Attack Detection and Data Recovery Model

  • Rupam Kumar Sharma,
  • Biju Issac,
  • Qin Xin,
  • Thippa Reddy Gadekallu and
  • Keshab Nath

14 June 2023

The number of users of the Internet has been continuously rising, with an estimated 5.1 billion users in 2023, which comprises around 64.7% of the total world population. This indicates the rise of more connected devices to the network. On average, 3...

  • Article
  • Open Access
15 Citations
12,656 Views
20 Pages

An Integral Model to Provide Reactive and Proactive Services in an Academic CSIRT Based on Business Intelligence

  • Walter Fuertes,
  • Francisco Reyes,
  • Paúl Valladares,
  • Freddy Tapia,
  • Theofilos Toulkeridis and
  • Ernesto Pérez

23 November 2017

Cyber-attacks have increased in severity and complexity. That requires, that the CERT/CSIRT research and develops new security tools. Therefore, our study focuses on the design of an integral model based on Business Intelligence (BI), which provides...

  • Article
  • Open Access
1,867 Views
21 Pages

ARGUS: An Autonomous Robotic Guard System for Uncovering Security Threats in Cyber-Physical Environments

  • Edi Marian Timofte,
  • Mihai Dimian,
  • Alin Dan Potorac,
  • Doru Balan,
  • Daniel-Florin Hrițcan,
  • Marcel Pușcașu and
  • Ovidiu Chiraș

Cyber-physical infrastructures such as hospitals and smart campuses face hybrid threats that target both digital and physical domains. Traditional security solutions separate surveillance from network monitoring, leaving blind spots when attackers co...

  • Article
  • Open Access
35 Citations
6,029 Views
22 Pages

Cyber Threat Intelligence for IoT Using Machine Learning

  • Shailendra Mishra,
  • Aiman Albarakati and
  • Sunil Kumar Sharma

12 December 2022

The Internet of Things (IoT) is a technological revolution that enables human-to-human and machine-to-machine communication for virtual data exchange. The IoT allows us to identify, locate, and access the various things and objects around us using lo...

  • Article
  • Open Access
19 Citations
4,898 Views
24 Pages

6 October 2024

In this research, we investigate the integration of an Intrusion Detection System (IDS) with a Digital Twin (DT) to enhance the cybersecurity of physical devices in cyber–physical systems. Using Eclipse Ditto as the DT platform and Snort as the...

  • Article
  • Open Access
51 Citations
5,624 Views
27 Pages

Entropy Based Features Distribution for Anti-DDoS Model in SDN

  • Raja Majid Ali Ujjan,
  • Zeeshan Pervez,
  • Keshav Dahal,
  • Wajahat Ali Khan,
  • Asad Masood Khattak and
  • Bashir Hayat

1 February 2021

In modern network infrastructure, Distributed Denial of Service (DDoS) attacks are considered as severe network security threats. For conventional network security tools it is extremely difficult to distinguish between the higher traffic volume of a...

  • Article
  • Open Access
7 Citations
6,024 Views
23 Pages

iKern: Advanced Intrusion Detection and Prevention at the Kernel Level Using eBPF

  • Hassan Jalil Hadi,
  • Mubashir Adnan,
  • Yue Cao,
  • Faisal Bashir Hussain,
  • Naveed Ahmad,
  • Mohammed Ali Alshara and
  • Yasir Javed

The development of new technologies has significantly enhanced the monitoring and analysis of network traffic. Modern solutions like the Extended Berkeley Packet Filter (eBPF) demonstrate a clear advancement over traditional techniques, allowing for...

  • Review
  • Open Access
9 Citations
13,995 Views
12 Pages

Metaphedrone (3-Methylmethcathinone): Pharmacological, Clinical, and Toxicological Profile

  • Igor Kelečević,
  • Ana-Marija Vejnović,
  • Jovan Javorac,
  • Nemanja Gvozdenović,
  • Nataša Janjić and
  • Vesna Mijatović Jovin

12 March 2024

Introduction: Synthetic cathinones are a group of novel psychoactive substances used as an alternative to classical recreational drugs. As a result of legal prohibitions on older generations of these compounds, new formulations appeared on the drug m...

  • Article
  • Open Access
25 Citations
8,742 Views
36 Pages

Cyber security has made an impact and has challenged Small and Medium Enterprises (SMEs) in their approaches towards how they protect and secure data. With an increase in more wired and wireless connections and devices on SME networks, unpredictable...