Anomaly detection in dynamic networks: a survey

S Ranshous, S Shen, D Koutra… - Wiley …, 2015 - Wiley Online Library
Anomaly detection is an important problem with multiple applications, and thus has been
studied for decades in various research domains. In the past decade there has been a …

Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization

C Fachkha, M Debbabi - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …

Attack graph model for cyber-physical power systems using hybrid deep learning

A Presekal, A Ştefanov, VS Rajkumar… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Electrical power grids are vulnerable to cyber attacks, as seen in Ukraine in 2015 and 2016.
However, existing attack detection methods are limited. Most of them are based on power …

Enhancing network management using code generated by large language models

SK Mani, Y Zhou, K Hsieh, S Segarra, T Eberl… - Proceedings of the …, 2023 - dl.acm.org
Analyzing network topologies and communication graphs is essential in modern network
management. However, the lack of a cohesive approach results in a steep learning curve …

Netspot: Spotting significant anomalous regions on dynamic networks

M Mongiovi, P Bogdanov, R Ranca… - Proceedings of the 2013 …, 2013 - SIAM
How to spot and summarize anomalies in dynamic networks such as road networks,
communication networks and social networks? An anomalous event, such as a traffic …

基于大数据分析的APT 攻击检测研究综述

付钰, 李洪成, 吴晓平, 王甲生 - 通信学报, 2015 - infocomm-journal.com
高级持续性威胁(APT, advanced persistent threat) 已成为高安全等级网络的最主要威胁之一,
其极强的针对性, 伪装性和阶段性使传统检测技术无法有效识别, 因此新型攻击检测技术成为 …

A fast all-packets-based DDoS attack detection approach based on network graph and graph kernel

X Liu, J Ren, H He, B Zhang, C Song… - Journal of Network and …, 2021 - Elsevier
DDoS attack detection methods play a very important role in protecting computer network
security. However, the existing flow-based DDoS attack detection methods face the non …

FIDS: Detecting DDoS through federated learning based method

J Li, Z Zhang, Y Li, X Guo, H Li - 2021 IEEE 20th International …, 2021 - ieeexplore.ieee.org
Recently, federated learning has been used by Network Intrusion Detection Systems
(NIDSs) to expanding data features while preserving data privacy. However, non …

Graph mining for cybersecurity: A survey

B Yan, C Yang, C Shi, Y Fang, Q Li, Y Ye… - ACM Transactions on …, 2023 - dl.acm.org
The explosive growth of cyber attacks today, such as malware, spam, and intrusions, has
caused severe consequences on society. Securing cyberspace has become a great concern …

Software defined network based architecture to improve security in a swarm of drones

C Guerber, N Larrieu, M ROYER - … International Conference on …, 2019 - ieeexplore.ieee.org
With the trend of developing more and more applications for Unmanned Aerial Vehicles
(UAV), several research projects have considered new missions where single UAVs are …