Machine learning-enabled iot security: Open issues and challenges under advanced persistent threats
Despite its technological benefits, the Internet of Things (IoT) has cyber weaknesses due to
vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely …
vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely …
Internet of Things backdoors: Resource management issues, security challenges, and detection methods
Abstract Internet of Things (IoT) technology is one of the successful and interesting products
of ubiquitous wireless networks that beneficiate human life with the make use of smart …
of ubiquitous wireless networks that beneficiate human life with the make use of smart …
Intrusion detection system based on fast hierarchical deep convolutional neural network
Currently, with the increasing number of devices connected to the Internet, search for
network vulnerabilities to attackers has increased, and protection systems have become …
network vulnerabilities to attackers has increased, and protection systems have become …
Big data analytics framework for peer-to-peer botnet detection using random forests
Network traffic monitoring and analysis-related research has struggled to scale for massive
amounts of data in real time. Some of the vertical scaling solutions provide good …
amounts of data in real time. Some of the vertical scaling solutions provide good …
IoT security: A layered approach for attacks & defenses
Internet of Things (IoT) has been a massive advancement in the Information and
Communication Technology (ICT). It is projected that over 50 billion devices will become …
Communication Technology (ICT). It is projected that over 50 billion devices will become …
A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions
Recently in the connected digital world, targeted attack has become one of the most serious
threats to conventional computing systems. Advanced persistent threat (APT) is currently …
threats to conventional computing systems. Advanced persistent threat (APT) is currently …
Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: present and future challenges
In this paper, we present comprehensive survey of secured web application by identifying
numerous serious threats faced by several-related organizations. Based on this, we have …
numerous serious threats faced by several-related organizations. Based on this, we have …
Cyber forensics framework for big data analytics in IoT environment using machine learning
Forensic analyst skills are at stake for processing of growing data from IoT based
environment platforms. Tangible sources often have the size limits, but that's not the case for …
environment platforms. Tangible sources often have the size limits, but that's not the case for …
A closer look at intrusion detection system for web applications
N Agarwal, SZ Hussain - Security and Communication …, 2018 - Wiley Online Library
Intrusion Detection System (IDS) acts as a defensive tool to detect the security attacks on the
web. IDS is a known methodology for detecting network‐based attacks but is still immature …
web. IDS is a known methodology for detecting network‐based attacks but is still immature …
Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks
In this work, we propose a novel framework of autonomic intrusion detection that fulfills
online and adaptive intrusion detection over unlabeled HTTP traffic streams in computer …
online and adaptive intrusion detection over unlabeled HTTP traffic streams in computer …