[HTML][HTML] A systematic literature review of methods and datasets for anomaly-based network intrusion detection
As network techniques rapidly evolve, attacks are becoming increasingly sophisticated and
threatening. Network intrusion detection has been widely accepted as an effective method to …
threatening. Network intrusion detection has been widely accepted as an effective method to …
A survey of DDoS attacking techniques and defence mechanisms in the IoT network
R Vishwakarma, AK Jain - Telecommunication systems, 2020 - Springer
Internet-of-things has emerged out as an important invention towards employing the
tremendous power of wireless media in the real world. We can control our surroundings by …
tremendous power of wireless media in the real world. We can control our surroundings by …
Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions
A Singh, BB Gupta - International Journal on Semantic Web and …, 2022 - igi-global.com
The demand for Internet security has escalated in the last two decades because the rapid
proliferation in the number of Internet users has presented attackers with new detrimental …
proliferation in the number of Internet users has presented attackers with new detrimental …
“why should i trust your ids?”: An explainable deep learning framework for intrusion detection systems in internet of things networks
Z Abou El Houda, B Brik… - IEEE Open Journal of the …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is an emerging paradigm that is turning and revolutionizing
worldwide cities into smart cities. However, this emergence is accompanied with several …
worldwide cities into smart cities. However, this emergence is accompanied with several …
Real-time big data processing for anomaly detection: A survey
The advent of connected devices and omnipresence of Internet have paved way for
intruders to attack networks, which leads to cyber-attack, financial loss, information theft in …
intruders to attack networks, which leads to cyber-attack, financial loss, information theft in …
A holistic review of network anomaly detection systems: A comprehensive survey
N Moustafa, J Hu, J Slay - Journal of Network and Computer Applications, 2019 - Elsevier
Abstract Network Anomaly Detection Systems (NADSs) are gaining a more important role in
most network defense systems for detecting and preventing potential threats. The paper …
most network defense systems for detecting and preventing potential threats. The paper …
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …
to grow further with the improved technological innovations. However, the associated …
Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and …
Distributed denial of service (DDoS) attacks in cloud computing environments are growing
due to the essential characteristics of cloud computing. With recent advances in software …
due to the essential characteristics of cloud computing. With recent advances in software …
The rise of “big data” on cloud computing: Review and open research issues
Cloud computing is a powerful technology to perform massive-scale and complex
computing. It eliminates the need to maintain expensive computing hardware, dedicated …
computing. It eliminates the need to maintain expensive computing hardware, dedicated …
Performance evaluation of Botnet DDoS attack detection using machine learning
Botnet is regarded as one of the most sophisticated vulnerability threats nowadays. A large
portion of network traffic is dominated by Botnets. Botnets are conglomeration of trade PCs …
portion of network traffic is dominated by Botnets. Botnets are conglomeration of trade PCs …