A comprehensive survey of clustering algorithms: State-of-the-art machine learning applications, taxonomy, challenges, and future research prospects

AE Ezugwu, AM Ikotun, OO Oyelade… - … Applications of Artificial …, 2022 - Elsevier
Clustering is an essential tool in data mining research and applications. It is the subject of
active research in many fields of study, such as computer science, data science, statistics …

A deep learning framework for predicting cyber attacks rates

X Fang, M Xu, S Xu, P Zhao - EURASIP Journal on Information security, 2019 - Springer
Like how useful weather forecasting is, the capability of forecasting or predicting cyber
threats can never be overestimated. Previous investigations show that cyber attack data …

Modeling multivariate cybersecurity risks

C Peng, M Xu, S Xu, T Hu - Journal of Applied Statistics, 2018 - Taylor & Francis
Modeling cybersecurity risks is an important, yet challenging, problem. In this paper, we
initiate the study of modeling multivariate cybersecurity risks. We develop the first statistical …

Detection of HTTP-GET flood attack based on analysis of page access behavior

T Yatagai, T Isohara, I Sasase - 2007 IEEE Pacific rim …, 2007 - ieeexplore.ieee.org
Recently, there are many denial-of-service (DoS) attacks by computer viruses or botnet. DoS
attacks to Web services are called HTTP-GET flood attack and threats of them increase day …

A vine copula model for predicting the effectiveness of cyber defense early-warning

M Xu, L Hua, S Xu - Technometrics, 2017 - Taylor & Francis
abstract Internet-based computer information systems play critical roles in many aspects of
modern society. However, these systems are constantly under cyber attacks that can cause …

Forecasting network events to estimate attack risk: Integration of wavelet transform and vector auto regression with exogenous variables

SY Ji, BK Jeong, C Kamhoua, N Leslie… - Journal of Network and …, 2022 - Elsevier
Analyzing network traffic data to detect suspicious network activities (ie, intrusions) requires
tremendous effort due to the variability of the data and constant changes in network traffic …

[HTML][HTML] ARTP: Anomaly based real time prevention of Distributed Denial of Service attacks on the web using machine learning approach

PK Kishore, S Ramamoorthy… - International Journal of …, 2023 - Elsevier
Abstract Distributed Denial of Service (DDoS) attack is one of the most destructive internet
network attacks, denying legitimate users access to resources and networks by maliciously …

Intrusion prediction systems

M Abdlhamed, K Kifayat, Q Shi, W Hurst - Information fusion for cyber …, 2017 - Springer
In recent years, cyberattacks have increased rapidly in huge volumes and diversity. Despite
the existence of advanced cyber-defence systems, attacks and intrusions still occur. Defence …

Early-stage detection of cyber attacks

M Pivarníková, P Sokol, T Bajtoš - Information, 2020 - mdpi.com
Nowadays, systems around the world face many cyber attacks every day. These attacks
consist of numerous steps that may occur over an extended period of time. We can learn …

Hidden-Markov-model-enabled prediction and visualization of cyber agility in IoT era

E Muhati, DB Rawat - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Cyberthreats are continually evolving and growing in numbers and extreme complexities
with the increasing connectivity of the Internet of Things (IoT). Existing cyber-defense tools …