Machine learning and deep learning techniques for cybersecurity: a review

SA Salloum, M Alshurideh, A Elnagar… - … Conference on Artificial …, 2020 - Springer
In this review, significant literature surveys on machine learning (ML) and deep learning
(DL) techniques for network analysis of intrusion detection are explained. In addition, it …

A review on cyber security datasets for machine learning algorithms

O Yavanoglu, M Aydos - … conference on big data (big data), 2017 - ieeexplore.ieee.org
It is an undeniable fact that currently information is a pretty significant presence for all
companies or organizations. Therefore protecting its security is crucial and the security …

Adaptive machine learning based distributed denial-of-services attacks detection and mitigation system for SDN-enabled IoT

M Aslam, D Ye, A Tariq, M Asad, M Hanif, D Ndzi… - Sensors, 2022 - mdpi.com
The development of smart network infrastructure of the Internet of Things (IoT) faces the
immense threat of sophisticated Distributed Denial-of-Services (DDoS) security attacks. The …

An investigation into the performances of the state-of-the-art machine learning approaches for various cyber-attack detection: A survey

T Ige, C Kiekintveld, A Piplai - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
In this research, we analyzed the suitability of each of the current state-of-the-art machine
learning models for various cyberattack detection from the past 5 years with a major …

Privacy-preserving DDoS attack detection using cross-domain traffic in software defined networks

L Zhu, X Tang, M Shen, X Du… - IEEE Journal on Selected …, 2018 - ieeexplore.ieee.org
Existing distributed denial-of-service attack detection in software defined networks (SDNs)
typically perform detection in a single domain. In reality, abnormal traffic usually affects …

Black hole attack detection using K‐nearest neighbor algorithm and reputation calculation in mobile ad hoc networks

G Farahani - Security and communication Networks, 2021 - Wiley Online Library
The characteristics of the mobile ad hoc network (MANET), such as no need for
infrastructure, high speed in setting up the network, and no need for centralized …

SAD-IoT: Security analysis of DDoS attacks in IoT networks

P Kumar, H Bagga, BS Netam… - Wireless Personal …, 2022 - Springer
Internet of Things is one of the most versatile technologies in existence today. It has taken
over our day to day activities and thus has many applications that are designed to make life …

Active learning to detect DDoS attack using ranked features

RK Deka, DK Bhattacharyya, JK Kalita - Computer Communications, 2019 - Elsevier
Network traffic classification to detect DDoS attacks is challenging in the context of high-
speed networks. In this paper, we discuss the need for distributed feature selection in …

SmartDefense: A distributed deep defense against DDoS attacks with edge computing

S Myneni, A Chowdhary, D Huang, A Alshamrani - Computer Networks, 2022 - Elsevier
The growing number of IoT edge devices have inflicted a change in the cyber-attack space.
The DDoS attacks, in particular, have significantly increased in magnitude and intensity. Of …

Adaptive feature selection for denial of services (DoS) attack

AR Yusof, NI Udzir, A Selamat… - … IEEE conference on …, 2017 - ieeexplore.ieee.org
Adaptive detection is the learning ability to detect any changes in patterns in intrusion
detection systems. In this paper, we propose combining two techniques in feature selection …