Survey of network intrusion detection methods from the perspective of the knowledge discovery in databases process
B Molina-Coronado, U Mori… - … on Network and …, 2020 - ieeexplore.ieee.org
The identification of network attacks which target information and communication systems
has been a focus of the research community for years. Network intrusion detection is a …
has been a focus of the research community for years. Network intrusion detection is a …
A review of intrusion detection and blockchain applications in the cloud: approaches, challenges and solutions
This paper reviews the background and related studies in the areas of cloud systems,
intrusion detection and blockchain applications against cyber attacks. This work aims to …
intrusion detection and blockchain applications against cyber attacks. This work aims to …
A survey of deep learning-based network anomaly detection
A great deal of attention has been given to deep learning over the past several years, and
new deep learning techniques are emerging with improved functionality. Many computer …
new deep learning techniques are emerging with improved functionality. Many computer …
Machine learning in network anomaly detection: A survey
S Wang, JF Balarezo, S Kandeepan… - IEEE …, 2021 - ieeexplore.ieee.org
Anomalies could be the threats to the network that have ever/never happened. To protect
networks against malicious access is always challenging even though it has been studied …
networks against malicious access is always challenging even though it has been studied …
Network anomaly detection using deep learning techniques
MK Hooshmand, D Hosahalli - CAAI Transactions on …, 2022 - Wiley Online Library
Convolutional neural networks (CNNs) are the specific architecture of feed‐forward artificial
neural networks. It is the de‐facto standard for various operations in machine learning and …
neural networks. It is the de‐facto standard for various operations in machine learning and …
SDN-enabled hybrid DL-driven framework for the detection of emerging cyber threats in IoT
The Internet of Things (IoT) has proven to be a billion-dollar industry. Despite offering
numerous benefits, the prevalent nature of IoT makes it vulnerable and a possible target for …
numerous benefits, the prevalent nature of IoT makes it vulnerable and a possible target for …
An empirical study on network anomaly detection using convolutional neural networks
D Kwon, K Natarajan, SC Suh, H Kim… - 2018 IEEE 38th …, 2018 - ieeexplore.ieee.org
Deep learning has been widely applied to network anomaly detection to improve
performance. In our past research, we empirically evaluated a set of deep learning models …
performance. In our past research, we empirically evaluated a set of deep learning models …
A software deep packet inspection system for network traffic analysis and anomaly detection
W Song, M Beshley, K Przystupa, H Beshley, O Kochan… - Sensors, 2020 - mdpi.com
In this paper, to solve the problem of detecting network anomalies, a method of forming a set
of informative features formalizing the normal and anomalous behavior of the system on the …
of informative features formalizing the normal and anomalous behavior of the system on the …
A systematic review of defensive and offensive cybersecurity with machine learning
This is a systematic review of over one hundred research papers about machine learning
methods applied to defensive and offensive cybersecurity. In contrast to previous reviews …
methods applied to defensive and offensive cybersecurity. In contrast to previous reviews …
Hybrid intrusion detection system using machine learning techniques in cloud computing environments
I Aljamal, A Tekeoğlu, K Bekiroglu… - 2019 IEEE 17th …, 2019 - ieeexplore.ieee.org
Intrusion detection is one essential tool towards building secure and trustworthy Cloud
computing environment, given the ubiquitous presence of cyber attacks that proliferate …
computing environment, given the ubiquitous presence of cyber attacks that proliferate …