G-networks can detect different types of cyberattacks
Malicious network attacks are a serious source of concern, and machine learning
techniques are widely used to build Attack Detectors with off-line training with real attack and …
techniques are widely used to build Attack Detectors with off-line training with real attack and …
Learning nonstationary models of normal network traffic for detecting novel attacks
MV Mahoney, PK Chan - Proceedings of the eighth ACM SIGKDD …, 2002 - dl.acm.org
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to
signatures of known attacks. One main drawback is the inability of detecting new attacks …
signatures of known attacks. One main drawback is the inability of detecting new attacks …
Attack detection from network traffic using machine learning
M Nawaz, MA Paracha, A Majid, H Durad - VFAST Transactions on …, 2020 - vfast.org
Abstract Network Security Management is not only becoming difficult but also becoming
impossible as size of networks grow. Attacks grow beyond the current ability of security …
impossible as size of networks grow. Attacks grow beyond the current ability of security …
Classifying denial of service attacks using fast machine learning algorithms
Denial of service attacks are harmful cyberattacks that diminish Internet resources and
services. Hence, detecting these cyberattacks is a topic of great interest in cybersecurity …
services. Hence, detecting these cyberattacks is a topic of great interest in cybersecurity …
[PDF][PDF] Flow-based brute-force attack detection in large and high-speed networks
J Vykopal - Masaryk University (Brno, Czech Republic), PhD …, 2013 - is.muni.cz
Network-based intrusion detection is traditionally bound to deep packet inspection, ie
searching for known signatures of attacks in the packet payload. With the rise of connected …
searching for known signatures of attacks in the packet payload. With the rise of connected …
SCADA networks anomaly-based intrusion detection system
A Almehmadi - Proceedings of the 11th International Conference on …, 2018 - dl.acm.org
Intentional attacks1 that cause country wide blackouts, gas and water systems malfunction
are actions that can be carried out by a nation to impact on another nation in a mean of war …
are actions that can be carried out by a nation to impact on another nation in a mean of war …
Classifying anomalies for network security
EH Do, VN Gadepally - ICASSP 2020-2020 IEEE International …, 2020 - ieeexplore.ieee.org
Detecting and classifying anomalous behaviors in computer networks remains a formidable
challenge. This work outlines a machine learning technique that uses deep neural networks …
challenge. This work outlines a machine learning technique that uses deep neural networks …
Data-driven network analysis for anomaly traffic detection
Cybersecurity is a critical issue in today's internet world. Classical security systems, such as
firewalls based on signature detection, cannot detect today's sophisticated zero-day attacks …
firewalls based on signature detection, cannot detect today's sophisticated zero-day attacks …
[PDF][PDF] Compromising PCA-based anomaly detectors for network-wide traffic
BIP Rubinstein, B Nelson, L Huang… - Dept. Elect. Eng …, 2008 - academia.edu
The use of machine learning techniques to improve network design is gaining popularity.
When these techniques are applied to security problems, a fundamental problem arises; …
When these techniques are applied to security problems, a fundamental problem arises; …
An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection
T Aldwairi, D Perera, MA Novotny - Computer Networks, 2018 - Elsevier
The continuous increase in the number of attacks on computer networks has raised serious
concerns regarding the importance of establishing a methodology that can learn and adapt …
concerns regarding the importance of establishing a methodology that can learn and adapt …