Survey of attack projection, prediction, and forecasting in cyber security

M Husák, J Komárková, E Bou-Harb… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …

Intrusion detection system: A comprehensive review

HJ Liao, CHR Lin, YC Lin, KY Tung - Journal of network and computer …, 2013 - Elsevier
With the increasing amount of network throughput and security threat, the study of intrusion
detection systems (IDSs) has received a lot of attention throughout the computer science …

A comprehensive survey on DDoS defense systems: New trends and challenges

Q Li, H Huang, R Li, J Lv, Z Yuan, L Ma, Y Han… - Computer Networks, 2023 - Elsevier
In the past ten years, the source of DDoS has migrated to botnets composed of IoT devices.
The scale of DDoS attacks increases dramatically with the number of IoT devices. New …

Real-time multistep attack prediction based on hidden markov models

P Holgado, VA Villagrá… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
A novel method based on the Hidden Markov Model is proposed to predict multistep attacks
using IDS alerts. We consider the hidden states as similar phases of a particular type of …

CyberSecurity attack prediction: a deep learning approach

O Ben Fredj, A Mihoub, M Krichen… - … conference on security …, 2020 - dl.acm.org
Cybersecurity attacks are exponentially increasing, making existing detection mechanisms
insufficient and enhancing the necessity to design more relevant prediction models and …

Hidden markov model and cyber deception for the prevention of adversarial lateral movement

MAR Al Amin, S Shetty, L Njilla, DK Tosh… - IEEE …, 2021 - ieeexplore.ieee.org
Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted
nation-states and their associated entities, including private and corporate sectors. Cyber …

[PDF][PDF] Intrusion response systems: survey and taxonomy

A Shameli-Sendi, N Ezzati-Jivan… - Int. J. Comput. Sci …, 2012 - researchgate.net
This paper presents a taxonomy of intrusion response systems (IRS), classifying a number of
research papers published during the past decade that provide us with many valuable …

Analysis of DDoS attacks and an introduction of a hybrid statistical model to detect DDoS attacks on cloud computing environment

A Girma, M Garuba, J Li, C Liu - 2015 12th International …, 2015 - ieeexplore.ieee.org
Cloud service availability has been one of the major concerns of cloud service providers
(CSP), while hosting different cloud based information technology services by managing …

Taxonomy of intrusion risk assessment and response system

A Shameli-Sendi, M Cheriet, A Hamou-Lhadj - Computers & Security, 2014 - Elsevier
In recent years, we have seen notable changes in the way attackers infiltrate computer
systems compromising their functionality. Research in intrusion detection systems aims to …

Ban: Predicting apt attack based on bayesian network with mitre att&ck framework

Y Kim, I Lee, H Kwon, K Lee, J Yoon - IEEE Access, 2023 - ieeexplore.ieee.org
Since cyberattacks have become sophisticated in the form of advanced persistent threats
(APTs), predicting and defending the APT attacks have drawn lots of attention. Although …