Distributed denial of service attack detection for the Internet of Things using hybrid deep learning model

A Ahmim, F Maazouzi, M Ahmim, S Namane… - IEEE …, 2023 - ieeexplore.ieee.org
As a result of the widespread adoption of the Internet of Things, there are now hundreds of
millions of connected devices, increasing the likelihood that they may be vulnerable to …

Distributed anomaly detection using concept drift detection based hybrid ensemble techniques in streamed network data

M Jain, G Kaur - Cluster Computing, 2021 - Springer
Ever since the internet became part of the everyday lives of humans providing network
security has been considered of utmost importance. Over the years lot of time and energy …

A comparison of two hybrid ensemble techniques for network anomaly detection in spark distributed environment

G Kaur - Journal of Information Security and Applications, 2020 - Elsevier
In this paper, the authors have compared ensemble methods in Spark supported distributed
environment. With ever changing attack trends traditional machine learning algorithms fail to …

HTTP request pattern based signatures for early application layer DDoS detection: A firewall agnostic approach

A Praseed, PS Thilagam - Journal of Information Security and Applications, 2022 - Elsevier
Abstract Application Layer DDoS (AL-DDoS) attacks are an extremely dangerous variety of
DDoS attacks that started becoming popular recently. They are executed using very few …

[PDF][PDF] MTA-KDD'19: A Dataset for Malware Traffic Detection.

I Letteri, G Della Penna, L Di Vita, MT Grifa - Itasec, 2020 - ricerca.univaq.it
In the present paper we describe a new, updated and refined dataset specifically tailored to
train and evaluate machine learning based malware traffic analysis algorithms. To generate …

Botnet detection techniques and research challenges

S Kumar - … International Conference on Recent Advances in …, 2019 - ieeexplore.ieee.org
The botnet, a network of compromise internet connected devices, controlled by an attacker is
considered to be the most catastrophic cybersecurity threat. In the large-scale cyberattacks …

A survey of feature extraction and feature selection techniques used in machine learning-based botnet detection schemes

AM Oyelakin - VAWKUM Transactions on Computer Sciences, 2021 - vfast.org
Abstract Machine learning techniques have been widely used for the classification of botnets
as they have been argued to have improved strengths compared to signature-based …

Network Intrusion System Detection Using Machine and Deep Learning Models: A Comparative Study

A Benchama, R Bensoltane, K Zebbara - The International Conference on …, 2023 - Springer
As Internet technology advances, the exponential growth of network security risks is
becoming increasingly apparent. Safeguarding the network poses a significant challenge in …

Malware Classification Using Open Set Recognition and HTTP Protocol Requests

P Białczak, W Mazurczyk - … Symposium on Research in Computer Security, 2023 - Springer
Malware is a serious threat to the modern Internet, as it is used to, eg, sending spam or
stealing bank login credentials. Typically, to communicate with the attacker, it utilizes …

A comparison of two blending-based ensemble techniques for network anomaly detection in Spark distributed environment

G Kaur, M Jain - International Journal of Ad Hoc and …, 2020 - inderscienceonline.com
In this paper, two blending-based ensemble models, namely, logistic regression-based
blending ensemble and SVM-based blending ensemble have been compared in terms of …