A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges

A Khraisat, A Alazab - Cybersecurity, 2021 - Springer
Abstract The Internet of Things (IoT) has been rapidly evolving towards making a greater
impact on everyday life to large industrial systems. Unfortunately, this has attracted the …

Survey of intrusion detection systems: techniques, datasets and challenges

A Khraisat, I Gondal, P Vamplew, J Kamruzzaman - Cybersecurity, 2019 - Springer
Cyber-attacks are becoming more sophisticated and thereby presenting increasing
challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade …

Anomaly traffic detection based on communication-efficient federated learning in space-air-ground integration network

H Xu, S Han, X Li, Z Han - IEEE Transactions on Wireless …, 2023 - ieeexplore.ieee.org
In this paper, we study the architectures of space-air-ground integration network (SAGIN)
proposed by domestic scientific research institutes, and put forward an collaborative federal …

A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

SwiftIDS: Real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism

D Jin, Y Lu, J Qin, Z Cheng, Z Mao - Computers & Security, 2020 - Elsevier
High-speed networks are becoming common nowadays. Naturally, a challenge that arises is
that the intrusion detection system (IDS) should timely detect attacks in huge volumes of …

Software {Defined}{Traffic} Measurement with {OpenSketch}

M Yu, L Jose, R Miao - 10th USENIX symposium on networked systems …, 2013 - usenix.org
Most network management tasks in software-defined networks (SDN) involve two stages:
measurement and control. While many efforts have been focused on network control APIs for …

Analog content-addressable memories with memristors

C Li, CE Graves, X Sheng, D Miller, M Foltin… - Nature …, 2020 - nature.com
A content-addressable memory compares an input search word against all rows of stored
words in an array in a highly parallel manner. While supplying a very powerful functionality …

A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms

C Xu, S Chen, J Su, SM Yiu… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
Deep packet inspection (DPI) is widely used in content-aware network applications such as
network intrusion detection systems, traffic billing, load balancing, and government …

Deep packet inspection as a service

A Bremler-Barr, Y Harchol, D Hay, Y Koral - Proceedings of the 10th …, 2014 - dl.acm.org
Middleboxes play a major role in contemporary networks, as forwarding packets is often not
enough to meet operator demands, and other functionalities (such as security, QoS/QoE …

Kargus: a highly-scalable software-based intrusion detection system

MA Jamshed, J Lee, S Moon, I Yun, D Kim… - Proceedings of the …, 2012 - dl.acm.org
As high-speed networks are becoming commonplace, it is increasingly challenging to
prevent the attack attempts at the edge of the Internet. While many high-performance …