Zero trust architecture (zta): A comprehensive survey

NF Syed, SW Shah, A Shaghaghi, A Anwar… - IEEE …, 2022 - ieeexplore.ieee.org
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …

Recent advances in anomaly detection methods applied to aviation

L Basora, X Olive, T Dubot - Aerospace, 2019 - mdpi.com
Anomaly detection is an active area of research with numerous methods and applications.
This survey reviews the state-of-the-art of data-driven anomaly detection techniques and …

Adbench: Anomaly detection benchmark

S Han, X Hu, H Huang, M Jiang… - Advances in Neural …, 2022 - proceedings.neurips.cc
Given a long list of anomaly detection algorithms developed in the last few decades, how do
they perform with regard to (i) varying levels of supervision,(ii) different types of anomalies …

Deep learning methods in network intrusion detection: A survey and an objective comparison

S Gamage, J Samarabandu - Journal of Network and Computer …, 2020 - Elsevier
The use of deep learning models for the network intrusion detection task has been an active
area of research in cybersecurity. Although several excellent surveys cover the growing …

Logbert: Log anomaly detection via bert

H Guo, S Yuan, X Wu - 2021 international joint conference on …, 2021 - ieeexplore.ieee.org
Detecting anomalous events in online computer systems is crucial to protect the systems
from malicious attacks or malfunctions. System logs, which record detailed information of …

Deep learning for anomaly detection: A survey

R Chalapathy, S Chawla - arXiv preprint arXiv:1901.03407, 2019 - arxiv.org
Anomaly detection is an important problem that has been well-studied within diverse
research areas and application domains. The aim of this survey is two-fold, firstly we present …

Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues

A Aldweesh, A Derhab, AZ Emam - Knowledge-Based Systems, 2020 - Elsevier
The massive growth of data that are transmitted through a variety of devices and
communication protocols have raised serious security concerns, which have increased the …

A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks

O Alkadi, N Moustafa, B Turnbull… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
There has been significant research in incorporating both blockchain and intrusion detection
to improve data privacy and detect existing and emerging cyberattacks, respectively. In …

LUCID: A practical, lightweight deep learning solution for DDoS attack detection

R Doriguzzi-Corin, S Millar… - … on Network and …, 2020 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks are one of the most harmful threats in today's
Internet, disrupting the availability of essential services. The challenge of DDoS detection is …

GAN augmentation to deal with imbalance in imaging-based intrusion detection

G Andresini, A Appice, L De Rose, D Malerba - Future Generation …, 2021 - Elsevier
Nowadays attacks on computer networks continue to advance at a rate outpacing cyber
defenders' ability to write new attack signatures. This paper illustrates a deep learning …