G-networks can detect different types of cyberattacks

E Gelenbe, M Nakɩp - 2022 30th International Symposium on …, 2022 - ieeexplore.ieee.org
Malicious network attacks are a serious source of concern, and machine learning
techniques are widely used to build Attack Detectors with off-line training with real attack and …

Learning nonstationary models of normal network traffic for detecting novel attacks

MV Mahoney, PK Chan - Proceedings of the eighth ACM SIGKDD …, 2002 - dl.acm.org
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to
signatures of known attacks. One main drawback is the inability of detecting new attacks …

Attack detection from network traffic using machine learning

M Nawaz, MA Paracha, A Majid, H Durad - VFAST Transactions on …, 2020 - vfast.org
Abstract Network Security Management is not only becoming difficult but also becoming
impossible as size of networks grow. Attacks grow beyond the current ability of security …

Classifying denial of service attacks using fast machine learning algorithms

Z Li, ALG Rios, L Trajković - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Denial of service attacks are harmful cyberattacks that diminish Internet resources and
services. Hence, detecting these cyberattacks is a topic of great interest in cybersecurity …

[PDF][PDF] Flow-based brute-force attack detection in large and high-speed networks

J Vykopal - Masaryk University (Brno, Czech Republic), PhD …, 2013 - is.muni.cz
Network-based intrusion detection is traditionally bound to deep packet inspection, ie
searching for known signatures of attacks in the packet payload. With the rise of connected …

SCADA networks anomaly-based intrusion detection system

A Almehmadi - Proceedings of the 11th International Conference on …, 2018 - dl.acm.org
Intentional attacks1 that cause country wide blackouts, gas and water systems malfunction
are actions that can be carried out by a nation to impact on another nation in a mean of war …

Classifying anomalies for network security

EH Do, VN Gadepally - ICASSP 2020-2020 IEEE International …, 2020 - ieeexplore.ieee.org
Detecting and classifying anomalous behaviors in computer networks remains a formidable
challenge. This work outlines a machine learning technique that uses deep neural networks …

Data-driven network analysis for anomaly traffic detection

S Alam, Y Alam, S Cui, C Akujuobi - Sensors, 2023 - mdpi.com
Cybersecurity is a critical issue in today's internet world. Classical security systems, such as
firewalls based on signature detection, cannot detect today's sophisticated zero-day attacks …

[PDF][PDF] Compromising PCA-based anomaly detectors for network-wide traffic

BIP Rubinstein, B Nelson, L Huang… - Dept. Elect. Eng …, 2008 - academia.edu
The use of machine learning techniques to improve network design is gaining popularity.
When these techniques are applied to security problems, a fundamental problem arises; …

An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection

T Aldwairi, D Perera, MA Novotny - Computer Networks, 2018 - Elsevier
The continuous increase in the number of attacks on computer networks has raised serious
concerns regarding the importance of establishing a methodology that can learn and adapt …