Zero-day attack detection: a systematic literature review
With the continuous increase in cyberattacks over the past few decades, the quest to
develop a comprehensive, robust, and effective intrusion detection system (IDS) in the …
develop a comprehensive, robust, and effective intrusion detection system (IDS) in the …
Comparative evaluation of ai-based techniques for zero-day attacks detection
Many intrusion detection and prevention systems (IDPS) have been introduced to identify
suspicious activities. However, since attackers are exploiting new vulnerabilities in systems …
suspicious activities. However, since attackers are exploiting new vulnerabilities in systems …
A framework for malicious traffic detection in IoT healthcare environment
The Internet of things (IoT) has emerged as a topic of intense interest among the research
and industrial community as it has had a revolutionary impact on human life. The rapid …
and industrial community as it has had a revolutionary impact on human life. The rapid …
[PDF][PDF] Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning
Abstract The Industrial Revolution 4.0 began with the breakthrough technological advances
in 5G, and artificial intelligence has innovatively transformed the manufacturing industry from …
in 5G, and artificial intelligence has innovatively transformed the manufacturing industry from …
Edge intelligence (EI)-enabled HTTP anomaly detection framework for the Internet of Things (IoT)
In recent years, with the rapid development of the Internet of Things (IoT), various
applications based on IoT have become more and more popular in industrial and living …
applications based on IoT have become more and more popular in industrial and living …
A robust intelligent zero-day cyber-attack detection technique
With the introduction of the Internet to the mainstream like e-commerce, online banking,
health system and other day-to-day essentials, risk of being exposed to various are …
health system and other day-to-day essentials, risk of being exposed to various are …
The promise of machine learning in cybersecurity
JB Fraley, J Cannady - SoutheastCon 2017, 2017 - ieeexplore.ieee.org
Over the last few years' machine learning has migrated from the laboratory to the forefront of
operational systems. Amazon, Google and Facebook use machine learning every day to …
operational systems. Amazon, Google and Facebook use machine learning every day to …
Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation
Cloud environment is an assembly of resources for furnishing on-demand services to cloud
customers. Here access to cloud environment is via internet services in which data stored on …
customers. Here access to cloud environment is via internet services in which data stored on …
A closer look at intrusion detection system for web applications
Intrusion Detection System (IDS) acts as a defensive tool to detect the security attacks on the
web. IDS is a known methodology for detecting network‐based attacks but is still immature …
web. IDS is a known methodology for detecting network‐based attacks but is still immature …
Apt-attack detection based on multi-stage autoencoders
In the face of emerging technological achievements, cyber security remains a significant
issue. Despite the new possibilities that arise with such development, these do not come …
issue. Despite the new possibilities that arise with such development, these do not come …