[HTML][HTML] A model for multi-attack classification to improve intrusion detection performance using deep learning approaches
This proposed model introduces novel deep learning methodologies. The objective here is
to create a reliable intrusion detection mechanism to help identify malicious attacks. Deep …
to create a reliable intrusion detection mechanism to help identify malicious attacks. Deep …
Network Intrusion Detection and Prevention System Using Hybrid Machine Learning with Supervised Ensemble Stacking Model
Network intrusion detection systems play a critical role in protecting a variety of services
ranging from economic through social to commerce. However, the growing level and …
ranging from economic through social to commerce. However, the growing level and …
A Secure Lightweight Cryptographic Algorithm for the Internet of Things (IoT) Based on Deoxyribonucleic Acid (DNA) Sequences
AS Nadhan, J Jacob I - Engineering Proceedings, 2023 - mdpi.com
The widespread adoption of the Internet of Things (IoT) across various domains has ushered
numerous applications into our daily lives. Ensuring the security of sensitive data, including …
numerous applications into our daily lives. Ensuring the security of sensitive data, including …
[HTML][HTML] Analysis of Attack Detection on Log Access Servers Using Machine Learning Classification: Integrating Expert Labeling and Optimal Model Selection
Purpose: As the complexity and diversity of cyberattacks continue to grow, traditional
security measures fall short in effectively countering these threats within web-based …
security measures fall short in effectively countering these threats within web-based …
The importance of the clustering model to detect new types of intrusion in data traffic
NS Abd, K Karoui - arXiv preprint arXiv:2411.14550, 2024 - arxiv.org
In the current digital age, the volume of data generated by various cyber activities has
become enormous and is constantly increasing. The data may contain valuable insights that …
become enormous and is constantly increasing. The data may contain valuable insights that …
Firefly-Driven Feature Selection for Enhanced DDoS Detection in IoT Networks
M Suggala, S Hari… - … Conference on Emerging …, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) applications are experiencing a significant surge in popularity.
However, this rapid growth is accompanied by various challenges, for example, the gigantic …
However, this rapid growth is accompanied by various challenges, for example, the gigantic …
DDoS Attack Classification Leveraging Data Balancing and Hyperparameter Tuning Approach Using Ensemble Machine Learning with XAI
ZM Jiyad, A Al Maruf, MM Haque… - … on Power, Control …, 2024 - ieeexplore.ieee.org
A distributed denial-of-service (DDoS) attack is a cyber-attack that aims to disrupt the regular
traffic of a targeted server, service, or network by inundating the target or its surrounding …
traffic of a targeted server, service, or network by inundating the target or its surrounding …
Semi-supervised learning with data augmentation for raw network traffic detection
RC Bhoo, ND Bastian - Artificial Intelligence and Machine …, 2024 - spiedigitallibrary.org
Deep learning (DL) has revolutionized machine learning tasks in various domains, but
conventional DL methods often demand substantial amounts of labeled data. Semi …
conventional DL methods often demand substantial amounts of labeled data. Semi …
EXPLORING A NOVEL FRAMEWORK FOR DOS/DDOS ATTACK DETECTION AND SIMULATION IN CONTEMPORARY NETWORKS.
GS Rao, PK SUBBARAO - i-manager's Journal on Software …, 2024 - search.ebscohost.com
Currently, the internet serves as the predominant means of communication and is utilized by
a vast number of individuals worldwide. Simultaneously, the commercial aspect of the …
a vast number of individuals worldwide. Simultaneously, the commercial aspect of the …
The Use of Artificial Intelligence for Safeguarding Cyber-Physical Business Systems
ZL Naser, M Adile, AK Hussain… - … on Smart Systems …, 2024 - ieeexplore.ieee.org
Several security issues, such as the forgery of information-sharing channels, hardware
components, and operating systems, hampered the steady expansion of cyber-physical …
components, and operating systems, hampered the steady expansion of cyber-physical …