A comprehensive survey on machine learning for networking: evolution, applications and research opportunities

R Boutaba, MA Salahuddin, N Limam, S Ayoubi… - Journal of Internet …, 2018 - Springer
Abstract Machine Learning (ML) has been enjoying an unprecedented surge in applications
that solve problems and enable automation in diverse domains. Primarily, this is due to the …

Host-based IDS: A review and open issues of an anomaly detection system in IoT

I Martins, JS Resende, PR Sousa, S Silva… - Future Generation …, 2022 - Elsevier
Abstract The Internet of Things (IoT) envisions a smart environment powered by connectivity
and heterogeneity where ensuring reliable services and communications across multiple …

Deep learning based attack detection for cyber-physical system cybersecurity: A survey

J Zhang, L Pan, QL Han, C Chen… - IEEE/CAA Journal of …, 2021 - ieeexplore.ieee.org
With the booming of cyber attacks and cyber criminals against cyber-physical systems
(CPSs), detecting these attacks remains challenging. It might be the worst of times, but it …

Dos and don'ts of machine learning in computer security

D Arp, E Quiring, F Pendlebury, A Warnecke… - 31st USENIX Security …, 2022 - usenix.org
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …

A survey of physics-based attack detection in cyber-physical systems

J Giraldo, D Urbina, A Cardenas, J Valente… - ACM Computing …, 2018 - dl.acm.org
Monitoring the “physics” of cyber-physical systems to detect attacks is a growing area of
research. In its basic form, a security monitor creates time-series models of sensor readings …

Electricity theft detection in AMI using customers' consumption patterns

P Jokar, N Arianpoo, VCM Leung - IEEE Transactions on Smart …, 2015 - ieeexplore.ieee.org
As one of the key components of the smart grid, advanced metering infrastructure brings
many potential advantages such as load management and demand response. However …

Insomnia: Towards concept-drift robustness in network intrusion detection

G Andresini, F Pendlebury, F Pierazzi… - Proceedings of the 14th …, 2021 - dl.acm.org
Despite decades of research in network traffic analysis and incredible advances in artificial
intelligence, network intrusion detection systems based on machine learning (ML) have yet …

Nodoze: Combatting threat alert fatigue with automated provenance triage

WU Hassan, S Guo, D Li, Z Chen, K Jee, Z Li… - network and distributed …, 2019 - par.nsf.gov
Large enterprises are increasingly relying on threat detection softwares (eg, Intrusion
Detection Systems) to allow them to spot suspicious activities. These softwares generate …

Limiting the impact of stealthy attacks on industrial control systems

DI Urbina, JA Giraldo, AA Cardenas… - Proceedings of the …, 2016 - dl.acm.org
While attacks on information systems have for most practical purposes binary outcomes
(information was manipulated/eavesdropped, or not), attacks manipulating the sensor or …

Network anomaly detection: methods, systems and tools

MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …