Explainable intrusion detection for cyber defences in the internet of things: Opportunities and solutions

N Moustafa, N Koroniotis, M Keshk… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The field of Explainable Artificial Intelligence (XAI) has garnered considerable research
attention in recent years, aiming to provide interpretability and confidence to the inner …

A holistic review of network anomaly detection systems: A comprehensive survey

N Moustafa, J Hu, J Slay - Journal of Network and Computer Applications, 2019 - Elsevier
Abstract Network Anomaly Detection Systems (NADSs) are gaining a more important role in
most network defense systems for detecting and preventing potential threats. The paper …

Protocol-based deep intrusion detection for dos and ddos attacks using unsw-nb15 and bot-iot data-sets

M Zeeshan, Q Riaz, MA Bilal, MK Shahzad… - IEEE …, 2021 - ieeexplore.ieee.org
Since its inception, the Internet of Things (IoT) has witnessed mushroom growth as a
breakthrough technology. In a nutshell, IoT is the integration of devices and data such that …

An intrusion detection and prevention system in cloud computing: A systematic review

A Patel, M Taghavi, K Bakhtiyari, JC Júnior - Journal of network and …, 2013 - Elsevier
The distributed and open structure of cloud computing and services becomes an attractive
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …

Voting extreme learning machine based distributed denial of service attack detection in cloud computing

GS Kushwah, V Ranga - Journal of Information Security and Applications, 2020 - Elsevier
Distributed denial of service attack is one of the most dangerous attacks in cloud computing.
This attack makes the cloud services inaccessible to the end-users by exhausting resources …

A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing

M Rabbani, YL Wang, R Khoshkangini… - Journal of Network and …, 2020 - Elsevier
The rapid growth of new emerging computing technologies has encouraged many
organizations to outsource their data and computational requirements. Such services are …

Toward zero trust security in 5g open architecture network slices

HA Kholidy, A Karam, J Sidoran… - MILCOM 2022-2022 …, 2022 - ieeexplore.ieee.org
Develo** trust in 5G network slicing is an important issue since as mobile networks evolve
the number of internal components, network functions, and the use of virtualized elements …

Intrusion response systems: Foundations, design, and challenges

Z Inayat, A Gani, NB Anuar, MK Khan… - Journal of Network and …, 2016 - Elsevier
In the last few decades, various network attacks have emerged. This phenomenon requires
serious consideration to address its extensive consequences. To overcome the effects of …

A review of intrusion detection and blockchain applications in the cloud: approaches, challenges and solutions

O Alkadi, N Moustafa, B Turnbull - IEEE Access, 2020 - ieeexplore.ieee.org
This paper reviews the background and related studies in the areas of cloud systems,
intrusion detection and blockchain applications against cyber attacks. This work aims to …

5g network slicing: Analysis of multiple machine learning classifiers

M Malkoc, HA Kholidy - arxiv preprint arxiv:2310.01747, 2023 - arxiv.org
The division of one physical 5G communications infrastructure into several virtual network
slices with distinct characteristics such as bandwidth, latency, reliability, security, and service …