Distributed denial of service attack detection for the Internet of Things using hybrid deep learning model
As a result of the widespread adoption of the Internet of Things, there are now hundreds of
millions of connected devices, increasing the likelihood that they may be vulnerable to …
millions of connected devices, increasing the likelihood that they may be vulnerable to …
BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning
B Bowen, A Chennamaneni, A Goulart… - International Journal of …, 2023 - Springer
Intrusion detection systems (IDS) identify cyber attacks given a sample of network traffic
collected from real-world computer networks. As a powerful classification tool, deep learning …
collected from real-world computer networks. As a powerful classification tool, deep learning …
[HTML][HTML] A holistic and proactive approach to forecasting cyber threats
Traditionally, cyber-attack detection relies on reactive, assistive techniques, where pattern-
matching algorithms help human experts to scan system logs and network traffic for known …
matching algorithms help human experts to scan system logs and network traffic for known …
Unbalanced network attack traffic detection based on feature extraction and GFDA-WGAN
K Li, W Ma, H Duan, H Xie, J Zhu, R Liu - Computer Networks, 2022 - Elsevier
Detecting various types of attack traffic is critical to computer network security. The current
detection methods require massive amounts of data to detect attack traffic. However, in most …
detection methods require massive amounts of data to detect attack traffic. However, in most …
[HTML][HTML] Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle
A Zacharis, V Katos, C Patsakis - International Journal of Information …, 2024 - Springer
The escalating complexity and impact of cyber threats require organisations to rehearse
responses to cyber-attacks by routinely conducting cyber security exercises. However, the …
responses to cyber-attacks by routinely conducting cyber security exercises. However, the …
Preliminary results in using attention for increasing attack identification efficiency
In previous work, we proposed an end-to-end intrusion early detection system to identify
network attacks in real-time before they complete and could cause more damage to the …
network attacks in real-time before they complete and could cause more damage to the …
Improving Malicious Traffic Detection with the Integration of Deep Neural Networks and Leveraging Hierarchical Attention Mechanism
The objective of this research is to improve the efficiency in identifying malicious traffic by
integrating a deep neural network that utilizes a hierarchical attention mechanism. The …
integrating a deep neural network that utilizes a hierarchical attention mechanism. The …
[PDF][PDF] Detecting malicious IoT traffic using machine learning techniques
B Jayaraman, M Thai, A Anand… - Romanian Journal of …, 2023 - rria.ici.ro
Internet of Things (IoT) generates huge amount of data, that needs to communicate between
the IoT enabled devices. These communications are vulnerable to security attacks and are …
the IoT enabled devices. These communications are vulnerable to security attacks and are …
An Accurate And Lightweight Intrusion Detection Model Deployed on Edge Network Devices
Y Ao, J Tao, D Zou, W Sun, L Yu - 2024 International Joint …, 2024 - ieeexplore.ieee.org
Edge network devices are typically resource-constrained, but intrusion detection requires
real-time capabilities. Currently deep learning detection models for raw traffic data require …
real-time capabilities. Currently deep learning detection models for raw traffic data require …
基于超图神经网络的恶意流量分类模型
赵文博, 马紫彤, 杨哲 - 网络与信息安全学报, 2023 - infocomm-journal.com
随着网络的普及和依赖程度的不断增加, 恶意流量的泛滥已经成为网络安全领域的严重挑战.
在这个数字时代, 网络攻击者不断寻找新的方式来侵入系统, 窃取数据和破坏网络服务 …
在这个数字时代, 网络攻击者不断寻找新的方式来侵入系统, 窃取数据和破坏网络服务 …