The role of machine learning in cybersecurity
Machine Learning (ML) represents a pivotal technology for current and future information
systems, and many domains already leverage the capabilities of ML. However, deployment …
systems, and many domains already leverage the capabilities of ML. However, deployment …
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
MA Bouke, A Abdullah, SH ALshatebi… - Microprocessors and …, 2023 - Elsevier
Cyber security has recently garnered enormous attention due to the popularity of the Internet
of Things (IoT), intelligent devices' rapid growth, and a vast number of real-life applications …
of Things (IoT), intelligent devices' rapid growth, and a vast number of real-life applications …
Efficient detection of botnet traffic by features selection and decision trees
J Velasco-Mata, V González-Castro… - IEEE …, 2021 - ieeexplore.ieee.org
Botnets are one of the online threats with the most significant presence, causing billionaire
losses to global economies. Nowadays, the increasing number of devices connected to the …
losses to global economies. Nowadays, the increasing number of devices connected to the …
Comprehensive review of advanced machine learning techniques for detecting and mitigating zero-day exploits
N Mohamed, H Taherdoost… - … on Scalable Information …, 2025 - publications.eai.eu
This paper provides an in-depth examination of the latest machine learning (ML)
methodologies applied to the detection and mitigation of zero-day exploits, which represent …
methodologies applied to the detection and mitigation of zero-day exploits, which represent …
[HTML][HTML] A GPU-based machine learning approach for detection of botnet attacks
Rapid development and adaptation of the Internet of Things (IoT) has created new problems
for securing these interconnected devices and networks. There are hundreds of thousands …
for securing these interconnected devices and networks. There are hundreds of thousands …
An ai-powered network threat detection system
BX Wang, JL Chen, CL Yu - IEEE Access, 2022 - ieeexplore.ieee.org
The work develops a network threat detection system, AI@ NTDS, that uses the behavioral
features of attackers and intelligent techniques. The proposed AI@ NTDS system combines …
features of attackers and intelligent techniques. The proposed AI@ NTDS system combines …
A survey on botnets, issues, threats, methods, detection and prevention
Botnets have become increasingly common and progressively dangerous to both business
and domestic networks alike. Due to the Covid-19 pandemic, a large quantity of the …
and domestic networks alike. Due to the Covid-19 pandemic, a large quantity of the …
A deep learning approach for botnet detection using raw network traffic data
M Shahhosseini, H Mashayekhi, M Rezvani - Journal of Network and …, 2022 - Springer
Botnets are considered to be one of the most serious cybersecurity threats in recent years.
While botnets have been widely studied, they are constantly evolving, becoming more …
While botnets have been widely studied, they are constantly evolving, becoming more …
Machine learning to combat cyberattack: a survey of datasets and challenges
A Prasad, S Chandra - The Journal of Defense Modeling and …, 2023 - journals.sagepub.com
The ever-increasing number of multi-vector cyberattacks has become a concern for all levels
of organizations. Attackers are infecting Internet-enabled devices and exploiting them to …
of organizations. Attackers are infecting Internet-enabled devices and exploiting them to …
[PDF][PDF] How to Mock a Bear: Honeypot, Honeynet, Honeywall & Honeytoken: A Survey.
P Lackner - ICEIS (2), 2021 - scitepress.org
In a digitized world even critical infrastructure relies on computers controlled via networks.
Attacking these sensitive infrastructures is highly attractive for intruders, who are frequently a …
Attacking these sensitive infrastructures is highly attractive for intruders, who are frequently a …