A cloud based optimization method for zero-day threats detection using genetic algorithm and ensemble learning

M Nkongolo, JP Van Deventer, SM Kasongo, SR Zahra… - Electronics, 2022 - mdpi.com
This article presents a cloud-based method to classify 0-day attacks from a novel dataset
called UGRansome1819. The primary objective of the research is to classify potential …

Arcade: Adversarially regularized convolutional autoencoder for network anomaly detection

WT Lunardi, MA Lopez… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
As the number of heterogenous IP-connected devices and traffic volume increase, so does
the potential for security breaches. The undetected exploitation of these breaches can bring …

VeriDevOps Software Methodology: Security Verification and Validation for DevOps Practices

EP Enoiu, D Truscan, A Sadovykh… - Proceedings of the 18th …, 2023 - dl.acm.org
VeriDevOps offers a methodology and a set of integrated mechanisms that significantly
improve automation in DevOps to protect systems at operations time and prevent security …

Detecting Cyber Threats in Real-Time: A Supervised Learning Perspective on the CTU-13 Dataset

A Sharma, H Babbar - 2024 5th International Conference for …, 2024 - ieeexplore.ieee.org
This Paper uses the CTU-13 dataset, a large and varied database containing network traffic
events, to investigate the use of machine learning (ML) methods for the detection of …

On early detection of anomalous network flows

GT Fox, RV Boppana - IEEE Access, 2023 - ieeexplore.ieee.org
There are numerous methods of identifying network-based attacks using machine learning,
but processing complexity often constrains it to analyses of previously captured traffic to …

Decoupled early time series classification using varied-length feature augmentation and gradient projection technique

H Chen, Y Zhang, A Tian, Y Hou, C Ma, S Zhou - Entropy, 2022 - mdpi.com
Early time series classification (ETSC) is crucial for real-world time-sensitive applications.
This task aims to classify time series data with least timestamps at the desired accuracy …

ALOC: Attack-Aware by Utilizing the Adversarially Learned One-Class Classifier for SCADA System

W Li, Y Yao, C Sheng, N Zhang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
As the volume of network attacks on Supervisory Control and Data Acquisition (SCADA)
systems increases, the existing supervised methods that over-rely on priori knowledge can …

Learn-IDS: Bridging Gaps between Datasets and Learning-Based Network Intrusion Detection

M Wang, N Yang, Y Guo, N Weng - Electronics, 2024 - mdpi.com
In an era marked by the escalating architectural complexity of the Internet, network intrusion
detection stands as a pivotal element in cybersecurity. This paper introduces Learn-IDS, an …

Prevention and Detection of Network Attacks: A Comprehensive Study

P Addai, R Freas, EM Tesfa, M Sellers… - … Conference on Decision …, 2023 - Springer
Cybersecurity is currently a topic of utmost significance in tech sectors. The ever-evolving
landscape of this field makes it particularly difficult to navigate. This paper aims to help the …

Efficient early anomaly detection of network security attacks using deep learning

T Ahmad, D Truscan - … on Cyber Security and Resilience (CSR), 2023 - ieeexplore.ieee.org
We present a deep-learning (DL) anomaly-based Intrusion Detection System (IDS) for
networked systems, which is able to detect in realtime anomalous network traffic …