The role of machine learning in cybersecurity

G Apruzzese, P Laskov, E Montes de Oca… - … Threats: Research and …, 2023 - dl.acm.org
Machine Learning (ML) represents a pivotal technology for current and future information
systems, and many domains already leverage the capabilities of ML. However, deployment …

Sok: Pragmatic assessment of machine learning for network intrusion detection

G Apruzzese, P Laskov… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Machine Learning (ML) has become a valuable asset to solve many real-world tasks. For
Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …

Face detection in security monitoring based on artificial intelligence video retrieval technology

Z Dong, J Wei, X Chen, P Zheng - IEEE access, 2020 - ieeexplore.ieee.org
With the rapid development of video monitoring, the massive information of the monitoring
image has far exceeded the effective processing range of human resources. Intelligent video …

A survey of interest flooding attack in named-data networking: Taxonomy, performance and future research challenges

RT Lee, YB Leau, YJ Park, M Anbar - IETE Technical Review, 2022 - Taylor & Francis
ABSTRACT Internet of Things (IoT) allows all entities such as computing devices, machines,
objects, people, etc., to interact with each other through their Internet Protocol (IP) addresses …

Security and integrity attacks in named data networking: a survey

MSM Shah, YB Leau, M Anbar, AA Bin-Salem - IEEE Access, 2023 - ieeexplore.ieee.org
The notion of Information-Centric Networking (ICN) specifies a new communication model
that emphasis on the content exchanged rather than the devices connected. ICN …

Blockchain-based cache poisoning security protection and privacy-aware access control in NDN vehicular edge computing networks

K Lei, J Fang, Q Zhang, J Lou, M Du, J Huang… - Journal of Grid …, 2020 - Springer
Recent advances in artificial intelligence, big data, mobile edge computing and embedded
systems have successfully driven the emergence and adoption of smart vehicles and vehicle …

Reliable detection of interest flooding attack in real deployment of named data networking

T Nguyen, HL Mai, R Cogranne… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Named data networking (NDN) is a disruptive yet promising architecture for the future
Internet, in which the content diffusion mechanisms are shifted from the conventional host …

ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN

A Benarfa, M Hassan, E Losiouk, A Compagno… - International Journal of …, 2021 - Springer
Several ongoing research efforts aim to design potential Future Internet Architectures,
among which Named-Data Networking (NDN) introduces a shift from the existing host …

A security certification scheme for information-centric networks

M Anisetti, CA Ardagna, F Berto… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Information-Centric Networking is an emerging alternative to host-centric networking
designed for large-scale content distribution and stricter privacy requirements. Recent …

Mitigating content poisoning attacks in named data networking: a survey of recent solutions, limitations, challenges and future research directions

SS Ullah, S Hussain, I Ali, H Khattak… - Artificial Intelligence …, 2024 - Springer
Abstract Named Data Networking (NDN) is one of the capable applicants for the future
Internet architecture, where communications focus on content rather than providing content …