A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
A Khraisat, A Alazab - Cybersecurity, 2021 - Springer
Abstract The Internet of Things (IoT) has been rapidly evolving towards making a greater
impact on everyday life to large industrial systems. Unfortunately, this has attracted the …
impact on everyday life to large industrial systems. Unfortunately, this has attracted the …
Survey of intrusion detection systems: techniques, datasets and challenges
Cyber-attacks are becoming more sophisticated and thereby presenting increasing
challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade …
challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade …
Anomaly traffic detection based on communication-efficient federated learning in space-air-ground integration network
In this paper, we study the architectures of space-air-ground integration network (SAGIN)
proposed by domestic scientific research institutes, and put forward an collaborative federal …
proposed by domestic scientific research institutes, and put forward an collaborative federal …
A survey on encrypted network traffic analysis applications, techniques, and countermeasures
E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …
encryption protocols to secure communications and protect the privacy of users. In addition …
SwiftIDS: Real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism
D Jin, Y Lu, J Qin, Z Cheng, Z Mao - Computers & Security, 2020 - Elsevier
High-speed networks are becoming common nowadays. Naturally, a challenge that arises is
that the intrusion detection system (IDS) should timely detect attacks in huge volumes of …
that the intrusion detection system (IDS) should timely detect attacks in huge volumes of …
Software {Defined}{Traffic} Measurement with {OpenSketch}
Most network management tasks in software-defined networks (SDN) involve two stages:
measurement and control. While many efforts have been focused on network control APIs for …
measurement and control. While many efforts have been focused on network control APIs for …
Analog content-addressable memories with memristors
A content-addressable memory compares an input search word against all rows of stored
words in an array in a highly parallel manner. While supplying a very powerful functionality …
words in an array in a highly parallel manner. While supplying a very powerful functionality …
A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms
Deep packet inspection (DPI) is widely used in content-aware network applications such as
network intrusion detection systems, traffic billing, load balancing, and government …
network intrusion detection systems, traffic billing, load balancing, and government …
Deep packet inspection as a service
Middleboxes play a major role in contemporary networks, as forwarding packets is often not
enough to meet operator demands, and other functionalities (such as security, QoS/QoE …
enough to meet operator demands, and other functionalities (such as security, QoS/QoE …
Kargus: a highly-scalable software-based intrusion detection system
As high-speed networks are becoming commonplace, it is increasingly challenging to
prevent the attack attempts at the edge of the Internet. While many high-performance …
prevent the attack attempts at the edge of the Internet. While many high-performance …