Distributed denial of service attack detection for the Internet of Things using hybrid deep learning model

A Ahmim, F Maazouzi, M Ahmim, S Namane… - IEEE …, 2023 - ieeexplore.ieee.org
As a result of the widespread adoption of the Internet of Things, there are now hundreds of
millions of connected devices, increasing the likelihood that they may be vulnerable to …

BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning

B Bowen, A Chennamaneni, A Goulart… - International Journal of …, 2023 - Springer
Intrusion detection systems (IDS) identify cyber attacks given a sample of network traffic
collected from real-world computer networks. As a powerful classification tool, deep learning …

[HTML][HTML] A holistic and proactive approach to forecasting cyber threats

Z Almahmoud, PD Yoo, O Alhussein, I Farhat… - Scientific Reports, 2023 - nature.com
Traditionally, cyber-attack detection relies on reactive, assistive techniques, where pattern-
matching algorithms help human experts to scan system logs and network traffic for known …

Unbalanced network attack traffic detection based on feature extraction and GFDA-WGAN

K Li, W Ma, H Duan, H Xie, J Zhu, R Liu - Computer Networks, 2022 - Elsevier
Detecting various types of attack traffic is critical to computer network security. The current
detection methods require massive amounts of data to detect attack traffic. However, in most …

[HTML][HTML] Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle

A Zacharis, V Katos, C Patsakis - International Journal of Information …, 2024 - Springer
The escalating complexity and impact of cyber threats require organisations to rehearse
responses to cyber-attacks by routinely conducting cyber security exercises. However, the …

Preliminary results in using attention for increasing attack identification efficiency

T Ahmad, D Truscan, J Vain - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
In previous work, we proposed an end-to-end intrusion early detection system to identify
network attacks in real-time before they complete and could cause more damage to the …

Improving Malicious Traffic Detection with the Integration of Deep Neural Networks and Leveraging Hierarchical Attention Mechanism

C Gupta, A Khang - Revolutionizing the AI-Digital Landscape, 2024 - taylorfrancis.com
The objective of this research is to improve the efficiency in identifying malicious traffic by
integrating a deep neural network that utilizes a hierarchical attention mechanism. The …

[PDF][PDF] Detecting malicious IoT traffic using machine learning techniques

B Jayaraman, M Thai, A Anand… - Romanian Journal of …, 2023 - rria.ici.ro
Internet of Things (IoT) generates huge amount of data, that needs to communicate between
the IoT enabled devices. These communications are vulnerable to security attacks and are …

An Accurate And Lightweight Intrusion Detection Model Deployed on Edge Network Devices

Y Ao, J Tao, D Zou, W Sun, L Yu - 2024 International Joint …, 2024 - ieeexplore.ieee.org
Edge network devices are typically resource-constrained, but intrusion detection requires
real-time capabilities. Currently deep learning detection models for raw traffic data require …

基于超图神经网络的恶意流量分类模型

赵文博, 马紫彤, 杨哲 - 网络与信息安全学报, 2023 - infocomm-journal.com
随着网络的普及和依赖程度的不断增加, 恶意流量的泛滥已经成为网络安全领域的严重挑战.
在这个数字时代, 网络攻击者不断寻找新的方式来侵入系统, 窃取数据和破坏网络服务 …