Advancing Network Security in Industrial IoT: A Deep Dive into AI-Enabled Intrusion Detection Systems

M Shahin, M Maghanaki, A Hosseinzadeh… - Advanced Engineering …, 2024 - Elsevier
The increasing use of Industrial Internet of Things (IIoT) devices has heightened concerns
about cybersecurity threats, particularly botnet attacks. Traditional internet communication …

5g-nidd: A comprehensive network intrusion detection dataset generated over 5g wireless network

S Samarakoon, Y Siriwardhana, P Porambage… - arXiv preprint arXiv …, 2022 - arxiv.org
With a plethora of new connections, features, and services introduced, the 5th generation
(5G) wireless technology reflects the development of mobile communication networks and is …

Semantic metric 3d reconstruction for concrete inspection

L Yang, B Li, W Li, B Jiang… - Proceedings of the IEEE …, 2018 - openaccess.thecvf.com
In this paper, we exploit the concrete surface flaw inspection through the fusion of visual
positioning and semantic segmentation approach. The fused inspection result is …

Exploring a service-based normal behaviour profiling system for botnet detection

W Chen, X Luo… - 2017 IFIP/IEEE …, 2017 - ieeexplore.ieee.org
Effective detection of botnet traffic becomes difficult as the attackers use encrypted payload
and dynamically changing port numbers (protocols) to bypass signature based detection …

Review of deep learning-based malware detection for android and windows system

N Islam, S Shin - arXiv preprint arXiv:2307.01494, 2023 - arxiv.org
Differentiating malware is important to determine their behaviors and level of threat; as well
as to devise defensive strategy against them. In response, various anti-malware systems …

Multivariate statistical network monitoring for network security based on principal component analysis

NM Fuentes García - 2021 - digibug.ugr.es
Currently we live in hyper-connected world, which is one of the main causes for the fast
propagation of Information Technology (IT) Security attacks. An IT Security incident can …

Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers

TJ Liu - The Computer Journal, 2024 - academic.oup.com
This paper studies adversarial attacks on network intrusion detection systems (IDSs) based
on deep or machine learning algorithms. Adversarial attacks on network IDSs must maintain …

[PDF][PDF] The hybrid machine learning support for entropy based network traffic anomaly detection

V Timčenko, J Ibrahim, S Gajin - ICIST, 2019 - eventiotic.com
This research relies on the proposed comprehensive flow based anomaly detection
architecture, which is a complex solution that encompasses support modules for entropy …

Evaluating bad hosts using adaptive blacklist filter

K Hynek, T Čejka, M Žádník… - 2020 9th Mediterranean …, 2020 - ieeexplore.ieee.org
Publicly available blacklists are popular tools to capture and spread information about
misbehaving entities on the Internet. In some cases, their straight-forward utilization leads to …

Analysis of Network Intrusion Detection and Potential Botnets Identification Using Selected Machine Learning Techniques

P Zabawa, M Kedziora - International Conference on Computational …, 2024 - Springer
The paper presented here is centered around the analysis of network attack detection using
machine learning. It starts by examining the development and categorization of network …