[HTML][HTML] A systematic literature review of methods and datasets for anomaly-based network intrusion detection

Z Yang, X Liu, T Li, D Wu, J Wang, Y Zhao, H Han - Computers & Security, 2022 - Elsevier
As network techniques rapidly evolve, attacks are becoming increasingly sophisticated and
threatening. Network intrusion detection has been widely accepted as an effective method to …

A survey of DDoS attacking techniques and defence mechanisms in the IoT network

R Vishwakarma, AK Jain - Telecommunication systems, 2020 - Springer
Internet-of-things has emerged out as an important invention towards employing the
tremendous power of wireless media in the real world. We can control our surroundings by …

Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions

A Singh, BB Gupta - International Journal on Semantic Web and …, 2022 - igi-global.com
The demand for Internet security has escalated in the last two decades because the rapid
proliferation in the number of Internet users has presented attackers with new detrimental …

“why should i trust your ids?”: An explainable deep learning framework for intrusion detection systems in internet of things networks

Z Abou El Houda, B Brik… - IEEE Open Journal of the …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is an emerging paradigm that is turning and revolutionizing
worldwide cities into smart cities. However, this emergence is accompanied with several …

Real-time big data processing for anomaly detection: A survey

RAA Habeeb, F Nasaruddin, A Gani… - International Journal of …, 2019 - Elsevier
The advent of connected devices and omnipresence of Internet have paved way for
intruders to attack networks, which leads to cyber-attack, financial loss, information theft in …

A holistic review of network anomaly detection systems: A comprehensive survey

N Moustafa, J Hu, J Slay - Journal of Network and Computer Applications, 2019 - Elsevier
Abstract Network Anomaly Detection Systems (NADSs) are gaining a more important role in
most network defense systems for detecting and preventing potential threats. The paper …

On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and …

Q Yan, FR Yu, Q Gong, J Li - IEEE communications surveys & …, 2015 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attacks in cloud computing environments are growing
due to the essential characteristics of cloud computing. With recent advances in software …

The rise of “big data” on cloud computing: Review and open research issues

IAT Hashem, I Yaqoob, NB Anuar, S Mokhtar, A Gani… - Information systems, 2015 - Elsevier
Cloud computing is a powerful technology to perform massive-scale and complex
computing. It eliminates the need to maintain expensive computing hardware, dedicated …

Performance evaluation of Botnet DDoS attack detection using machine learning

TA Tuan, HV Long, LH Son, R Kumar… - Evolutionary …, 2020 - Springer
Botnet is regarded as one of the most sophisticated vulnerability threats nowadays. A large
portion of network traffic is dominated by Botnets. Botnets are conglomeration of trade PCs …