A cloud based optimization method for zero-day threats detection using genetic algorithm and ensemble learning
This article presents a cloud-based method to classify 0-day attacks from a novel dataset
called UGRansome1819. The primary objective of the research is to classify potential …
called UGRansome1819. The primary objective of the research is to classify potential …
Arcade: Adversarially regularized convolutional autoencoder for network anomaly detection
As the number of heterogenous IP-connected devices and traffic volume increase, so does
the potential for security breaches. The undetected exploitation of these breaches can bring …
the potential for security breaches. The undetected exploitation of these breaches can bring …
VeriDevOps Software Methodology: Security Verification and Validation for DevOps Practices
VeriDevOps offers a methodology and a set of integrated mechanisms that significantly
improve automation in DevOps to protect systems at operations time and prevent security …
improve automation in DevOps to protect systems at operations time and prevent security …
Detecting Cyber Threats in Real-Time: A Supervised Learning Perspective on the CTU-13 Dataset
This Paper uses the CTU-13 dataset, a large and varied database containing network traffic
events, to investigate the use of machine learning (ML) methods for the detection of …
events, to investigate the use of machine learning (ML) methods for the detection of …
On early detection of anomalous network flows
GT Fox, RV Boppana - IEEE Access, 2023 - ieeexplore.ieee.org
There are numerous methods of identifying network-based attacks using machine learning,
but processing complexity often constrains it to analyses of previously captured traffic to …
but processing complexity often constrains it to analyses of previously captured traffic to …
Decoupled early time series classification using varied-length feature augmentation and gradient projection technique
H Chen, Y Zhang, A Tian, Y Hou, C Ma, S Zhou - Entropy, 2022 - mdpi.com
Early time series classification (ETSC) is crucial for real-world time-sensitive applications.
This task aims to classify time series data with least timestamps at the desired accuracy …
This task aims to classify time series data with least timestamps at the desired accuracy …
ALOC: Attack-Aware by Utilizing the Adversarially Learned One-Class Classifier for SCADA System
As the volume of network attacks on Supervisory Control and Data Acquisition (SCADA)
systems increases, the existing supervised methods that over-rely on priori knowledge can …
systems increases, the existing supervised methods that over-rely on priori knowledge can …
Learn-IDS: Bridging Gaps between Datasets and Learning-Based Network Intrusion Detection
In an era marked by the escalating architectural complexity of the Internet, network intrusion
detection stands as a pivotal element in cybersecurity. This paper introduces Learn-IDS, an …
detection stands as a pivotal element in cybersecurity. This paper introduces Learn-IDS, an …
Prevention and Detection of Network Attacks: A Comprehensive Study
P Addai, R Freas, EM Tesfa, M Sellers… - … Conference on Decision …, 2023 - Springer
Cybersecurity is currently a topic of utmost significance in tech sectors. The ever-evolving
landscape of this field makes it particularly difficult to navigate. This paper aims to help the …
landscape of this field makes it particularly difficult to navigate. This paper aims to help the …
Efficient early anomaly detection of network security attacks using deep learning
We present a deep-learning (DL) anomaly-based Intrusion Detection System (IDS) for
networked systems, which is able to detect in realtime anomalous network traffic …
networked systems, which is able to detect in realtime anomalous network traffic …