A modified grey wolf optimization algorithm for an intrusion detection system

A Alzaqebah, I Aljarah, O Al-Kadi, R Damaševičius - Mathematics, 2022 - mdpi.com
Cyber-attacks and unauthorized application usage have increased due to the extensive use
of Internet services and applications over computer networks, posing a threat to the service's …

Threat analysis and distributed denial of service (DDoS) attack recognition in the internet of things (IoT)

MH Ali, MM Jaber, SK Abd, A Rehman, MJ Awan… - Electronics, 2022 - mdpi.com
The Internet of Things (IoT) plays a crucial role in various sectors such as automobiles and
the logistic tracking medical field because it consists of distributed nodes, servers, and …

smote-drnn: A deep learning algorithm for botnet detection in the internet-of-things networks

SI Popoola, B Adebisi, R Ande, M Hammoudeh… - Sensors, 2021 - mdpi.com
Nowadays, hackers take illegal advantage of distributed resources in a network of
computing devices (ie, botnet) to launch cyberattacks against the Internet of Things (IoT) …

A comprehensive review of deep learning techniques for the detection of (distributed) denial of service attacks

S Malliga, PS Nandhini, SV Kogilavani - Information Technology and Control, 2022 - itc.ktu.lt
A Comprehensive Review of Deep Learning Techniques for the Detection of (Distributed)
Denial of Service Attacks Page 1 Information Technology and Control 2022/1/51 180 A …

Secured communication using virtual private network (VPN)

PJ Ezra, S Misra, A Agrawal, J Oluranti… - Cyber Security and …, 2022 - Springer
The evolution and era of the latest programs and services, collectively with the enlargement
of encrypted communications, make it difficult for site visitors within a safety enterprise …

LITNET-2020: An annotated real-world network flow dataset for network intrusion detection

R Damasevicius, A Venckauskas, S Grigaliunas… - Electronics, 2020 - mdpi.com
Network intrusion detection is one of the main problems in ensuring the security of modern
computer networks, Wireless Sensor Networks (WSN), and the Internet-of-Things (IoT). In …

[HTML][HTML] A Fuzzy Logic based feature engineering approach for Botnet detection using ANN

C Joshi, RK Ranjan, V Bharti - Journal of King Saud University-Computer …, 2022 - Elsevier
In recent years, Botnet has become one of the most dreadful type of malicious entity.
Because of the hidden and carrying capacity of Botnet, the detection task has become a real …

[HTML][HTML] Enhanced threat intelligence framework for advanced cybersecurity resilience

M Alazab, RA Khurma, M García-Arenas… - Egyptian Informatics …, 2024 - Elsevier
The increasing severity of cyber-attacks against organizations emphasizes the necessity for
efficient threat intelligence. This article presents a novel multi-layered architecture for threat …

Network intrusion detection with a hashing based apriori algorithm using Hadoop MapReduce

NA Azeez, TJ Ayemobola, S Misra, R Maskeliūnas… - Computers, 2019 - mdpi.com
Ubiquitous nature of Internet services across the globe has undoubtedly expanded the
strategies and operational mode being used by cybercriminals to perpetrate their unlawful …

Performance improvement of intrusion detection system for detecting attacks on internet of things and edge of things

YK Saheed - Artificial Intelligence for Cloud and Edge Computing, 2022 - Springer
Edge computing (EC) is a computing methodology that is distributed in nature that brings
data storage and computation closer to the place where it is to be used to accelerate …