Advancing Network Security in Industrial IoT: A Deep Dive into AI-Enabled Intrusion Detection Systems
The increasing use of Industrial Internet of Things (IIoT) devices has heightened concerns
about cybersecurity threats, particularly botnet attacks. Traditional internet communication …
about cybersecurity threats, particularly botnet attacks. Traditional internet communication …
5g-nidd: A comprehensive network intrusion detection dataset generated over 5g wireless network
With a plethora of new connections, features, and services introduced, the 5th generation
(5G) wireless technology reflects the development of mobile communication networks and is …
(5G) wireless technology reflects the development of mobile communication networks and is …
Semantic metric 3d reconstruction for concrete inspection
In this paper, we exploit the concrete surface flaw inspection through the fusion of visual
positioning and semantic segmentation approach. The fused inspection result is …
positioning and semantic segmentation approach. The fused inspection result is …
Exploring a service-based normal behaviour profiling system for botnet detection
Effective detection of botnet traffic becomes difficult as the attackers use encrypted payload
and dynamically changing port numbers (protocols) to bypass signature based detection …
and dynamically changing port numbers (protocols) to bypass signature based detection …
Review of deep learning-based malware detection for android and windows system
Differentiating malware is important to determine their behaviors and level of threat; as well
as to devise defensive strategy against them. In response, various anti-malware systems …
as to devise defensive strategy against them. In response, various anti-malware systems …
Multivariate statistical network monitoring for network security based on principal component analysis
NM Fuentes García - 2021 - digibug.ugr.es
Currently we live in hyper-connected world, which is one of the main causes for the fast
propagation of Information Technology (IT) Security attacks. An IT Security incident can …
propagation of Information Technology (IT) Security attacks. An IT Security incident can …
Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers
TJ Liu - The Computer Journal, 2024 - academic.oup.com
This paper studies adversarial attacks on network intrusion detection systems (IDSs) based
on deep or machine learning algorithms. Adversarial attacks on network IDSs must maintain …
on deep or machine learning algorithms. Adversarial attacks on network IDSs must maintain …
[PDF][PDF] The hybrid machine learning support for entropy based network traffic anomaly detection
This research relies on the proposed comprehensive flow based anomaly detection
architecture, which is a complex solution that encompasses support modules for entropy …
architecture, which is a complex solution that encompasses support modules for entropy …
Evaluating bad hosts using adaptive blacklist filter
Publicly available blacklists are popular tools to capture and spread information about
misbehaving entities on the Internet. In some cases, their straight-forward utilization leads to …
misbehaving entities on the Internet. In some cases, their straight-forward utilization leads to …
Analysis of Network Intrusion Detection and Potential Botnets Identification Using Selected Machine Learning Techniques
P Zabawa, M Kedziora - International Conference on Computational …, 2024 - Springer
The paper presented here is centered around the analysis of network attack detection using
machine learning. It starts by examining the development and categorization of network …
machine learning. It starts by examining the development and categorization of network …