Supervised feature selection techniques in network intrusion detection: A critical review
Abstract Machine Learning (ML) techniques are becoming an invaluable support for network
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …
[HTML][HTML] A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks
Abstract Denial of Service and Distributed Denial of Service (DoS/DDoS) attacks have been
one of the biggest threats against communication networks and applications throughout the …
one of the biggest threats against communication networks and applications throughout the …
Hybrid optimization algorithm for security aware cluster head selection process to aid hierarchical routing in wireless sensor network
DL Reddy, CG Puttamadappa… - IET …, 2021 - Wiley Online Library
In wireless sensor networks, clustering is said to be the most noteworthy technique for
increasing the lifetime of network that directly leads a better routing mechanism. This …
increasing the lifetime of network that directly leads a better routing mechanism. This …
BotCluster: A session-based P2P botnet clustering system on NetFlow
CY Wang, CL Ou, YE Zhang, FM Cho, PH Chen… - Computer Networks, 2018 - Elsevier
This study presents a session-based P2P botnet clustering system implemented on
MapReduce for aggregating malicious hosts within NetFlow traffic logs. The proposed botnet …
MapReduce for aggregating malicious hosts within NetFlow traffic logs. The proposed botnet …
Botnet identification in DDoS attacks with multiple emulation dictionaries
In a Distributed Denial of Service (DDoS) attack, a network (botnet) of dispersed agents
(bots) sends requests to a website to saturate its resources. Since the requests are sent by …
(bots) sends requests to a website to saturate its resources. Since the requests are sent by …
Adversarial Kendall's model towards containment of distributed cyber-threats
This work examines propagation of cyber-threats over networks under an adversarial
formulation. Exploiting Kendall's birth-death-immigration model, we propose an analytical …
formulation. Exploiting Kendall's birth-death-immigration model, we propose an analytical …
Analysis on dual algorithms for optimal cluster head selection in wireless sensor network
Clustering is the approach, which is utilized for aggregating the nodes as a group called
clusters, which is used for reducing the routing overheads. This is a fundamental approach …
clusters, which is used for reducing the routing overheads. This is a fundamental approach …
PeerRemove: An adaptive node removal strategy for P2P botnet based on deep reinforcement learning
Y **ng, H Shu, F Kang - Computers & Security, 2023 - Elsevier
Botnets have become one of the major intrusion threats to cybersecurity. P2P botnets have
high concealment and resilience because of their distributed structure, which are difficult to …
high concealment and resilience because of their distributed structure, which are difficult to …
Elliptic curve cryptography based authentication protocol enabled with optimized neural network based DoS mitigation
In WSN based real-time applications, the authentication scheme is not yet defined properly
under the consideration of user privacy. Even though lot of attempts have been made for …
under the consideration of user privacy. Even though lot of attempts have been made for …
[HTML][HTML] Neurosymbolic learning and domain knowledge-driven explainable AI for enhanced IoT network attack detection and response
In the dynamic landscape of network security, where cyberattacks continuously evolve,
robust and adaptive detection mechanisms are essential, particularly for safeguarding …
robust and adaptive detection mechanisms are essential, particularly for safeguarding …