Network Security and Intrusion Detection
Network security and intrusion detection is concerned with identifying and responding to unauthorized or malicious activity in computer networks, ranging from targeted intrusions by individual attackers to large-scale distributed denial-of-service campaigns that can knock critical infrastructure offline. As networks grow more complex — particularly with the proliferation of Internet of Things devices that often lack robust built-in defenses — the attack surface expands faster than traditional rule-based detection methods can keep pace with, pushing researchers toward machine learning and data mining approaches that can spot anomalous behavior without requiring explicit knowledge of every threat. A central open challenge is distinguishing genuine attacks from the noise of ordinary irregular traffic with high precision, since both false positives and missed detections carry real costs. Active research directions include building detection systems that remain accurate as attackers deliberately adapt their behavior to evade them, and designing lightweight models that can run effectively on resource-constrained edge devices.
- Works
- 143,527
- Total citations
- 1,414,794
- Keywords
- Intrusion DetectionNetwork SecurityMachine LearningDDoS AttacksAnomaly DetectionIoT Security
Top papers in Network Security and Intrusion Detection
Ordered by total citation count.
- Anomaly detection↗ 10,951
- Data networks↗ 5,589
- An Architecture for Differentiated Service↗ 5,526
- A detailed analysis of the KDD CUP 99 data set↗ 4,672OA
- Cryptography and Network Security: Principles and Practice↗ 4,420
- Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization↗ 4,097OA
- Tor: The Second-Generation Onion Router↗ 4,020
- UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)↗ 3,479
- An Intrusion-Detection Model↗ 3,332
- Snort - Lightweight Intrusion Detection for Networks↗ 3,111
- A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection↗ 2,980
- Proceedings of the 11th USENIX Security Symposium↗ 2,514
Active researchers
Top authors in this area, ranked by h-index.