Supervised feature selection techniques in network intrusion detection: A critical review

M Di Mauro, G Galatro, G Fortino, A Liotta - Engineering Applications of …, 2021 - Elsevier
Abstract Machine Learning (ML) techniques are becoming an invaluable support for network
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …

[HTML][HTML] A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks

JF Balarezo, S Wang, KG Chavez, A Al-Hourani… - … Science and Technology …, 2022 - Elsevier
Abstract Denial of Service and Distributed Denial of Service (DoS/DDoS) attacks have been
one of the biggest threats against communication networks and applications throughout the …

Hybrid optimization algorithm for security aware cluster head selection process to aid hierarchical routing in wireless sensor network

DL Reddy, CG Puttamadappa… - IET …, 2021 - Wiley Online Library
In wireless sensor networks, clustering is said to be the most noteworthy technique for
increasing the lifetime of network that directly leads a better routing mechanism. This …

BotCluster: A session-based P2P botnet clustering system on NetFlow

CY Wang, CL Ou, YE Zhang, FM Cho, PH Chen… - Computer Networks, 2018 - Elsevier
This study presents a session-based P2P botnet clustering system implemented on
MapReduce for aggregating malicious hosts within NetFlow traffic logs. The proposed botnet …

Botnet identification in DDoS attacks with multiple emulation dictionaries

M Cirillo, M Di Mauro, V Matta… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In a Distributed Denial of Service (DDoS) attack, a network (botnet) of dispersed agents
(bots) sends requests to a website to saturate its resources. Since the requests are sent by …

Adversarial Kendall's model towards containment of distributed cyber-threats

P Addesso, M Barni, M Di Mauro… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This work examines propagation of cyber-threats over networks under an adversarial
formulation. Exploiting Kendall's birth-death-immigration model, we propose an analytical …

Analysis on dual algorithms for optimal cluster head selection in wireless sensor network

A Sarkar, TS Murugan - Evolutionary Intelligence, 2022 - Springer
Clustering is the approach, which is utilized for aggregating the nodes as a group called
clusters, which is used for reducing the routing overheads. This is a fundamental approach …

PeerRemove: An adaptive node removal strategy for P2P botnet based on deep reinforcement learning

Y **ng, H Shu, F Kang - Computers & Security, 2023 - Elsevier
Botnets have become one of the major intrusion threats to cybersecurity. P2P botnets have
high concealment and resilience because of their distributed structure, which are difficult to …

Elliptic curve cryptography based authentication protocol enabled with optimized neural network based DoS mitigation

SX Pushpa, SKS Raja - Wireless Personal Communications, 2022 - Springer
In WSN based real-time applications, the authentication scheme is not yet defined properly
under the consideration of user privacy. Even though lot of attempts have been made for …

[HTML][HTML] Neurosymbolic learning and domain knowledge-driven explainable AI for enhanced IoT network attack detection and response

CS Kalutharage, X Liu, C Chrysoulas - Computers & Security, 2025 - Elsevier
In the dynamic landscape of network security, where cyberattacks continuously evolve,
robust and adaptive detection mechanisms are essential, particularly for safeguarding …