A systematic review of iot security: Research potential, challenges, and future directions

W Fei, H Ohno, S Sampalli - ACM computing surveys, 2023‏ - dl.acm.org
The Internet of Things (IoT) encompasses a network of physical objects embedded with
sensors, software, and data processing technologies that can establish connections and …

SBI model for the detection of advanced persistent threat based on strange behavior of using credential dum** technique

N Mohamed, B Belaton - IEEE Access, 2021‏ - ieeexplore.ieee.org
This study investigated the shift from the manual approach of processing data to the digitized
method making organizational data prone to attack by cybercriminals. The latest threat …

Explainable AI and random forest based reliable intrusion detection system

S Wali, I Khan - Authorea Preprints, 2021‏ - techrxiv.org
Emerging Cyber threats with an increased dependency on vulnerable cyber-networks have
jeopardized all stakeholders, making Intrusion Detection Systems (IDS) the essential …

Network Detection of Interactive {SSH} Impostors Using Deep Learning

J Piet, A Sharma, V Paxson, D Wagner - 32nd USENIX Security …, 2023‏ - usenix.org
Impostors who have stolen a user's SSH login credentials can inflict significant harm to the
systems to which the user has remote access. We consider the problem of identifying such …

Attack detection based on machine learning techniques to safe and secure for CPS—A review

DM Sharma, SK Shandilya - … Conference on IoT, Intelligent Computing and …, 2023‏ - Springer
Technological progression in communication and computing domains has led to the advent
of cyber-physical systems (CPS). As an emerging technological advancement, CPS security …

Leveraging siamese networks for one-shot intrusion detection model

H Hindy, C Tachtatzis, R Atkinson, D Brosset… - Journal of Intelligent …, 2023‏ - Springer
The use of supervised Machine Learning (ML) to enhance Intrusion Detection Systems (IDS)
has been the subject of significant research. Supervised ML is based upon learning by …

[PDF][PDF] Optimasi Keamanan Web Server Terhadap Serangan Brute-Force Menggunakan Penetration Testing

F Fachri - Jurnal Teknologi Informasi dan Ilmu Komputer …, 2023‏ - pdfs.semanticscholar.org
Peningkatan serangan siber dan pencurian data sensitive menjadi topik utama yang sering
dibahas saat ini, karena semakin banyak aplikasi berorientasi pengguna dengan …

Comparing FTP and SSH password brute force attack detection using k-nearest neighbour (k-NN) and Decision Tree in cloud computing

MFK Shah, M Md-Arshad, AA Samad… - International Journal of …, 2023‏ - ijic.utm.my
Cloud computing represents a new epoch in computing. From huge enterprises to individual
use, cloud computing always provides an answer. Therefore, cloud computing must be …

[HTML][HTML] Detection of username enumeration attack on ssh protocol: Machine learning approach

AZ Agghey, LJ Mwinuka, SM Pandhare, MA Dida… - Symmetry, 2021‏ - mdpi.com
Over the last two decades (2000–2020), the Internet has rapidly evolved, resulting in
symmetrical and asymmetrical Internet consumption patterns and billions of users …

Develo** a siamese network for intrusion detection systems

H Hindy, C Tachtatzis, R Atkinson, E Bayne… - Proceedings of the 1st …, 2021‏ - dl.acm.org
Machine Learning (ML) for develo** Intrusion Detection Systems (IDS) is a fast-evolving
research area that has many unsolved domain challenges. Current IDS models face two …