Zero-day attack detection: a systematic literature review

R Ahmad, I Alsmadi, W Alhamdani… - Artificial Intelligence …, 2023 - Springer
With the continuous increase in cyberattacks over the past few decades, the quest to
develop a comprehensive, robust, and effective intrusion detection system (IDS) in the …

Comparative evaluation of ai-based techniques for zero-day attacks detection

S Ali, SU Rehman, A Imran, G Adeem, Z Iqbal, KI Kim - Electronics, 2022 - mdpi.com
Many intrusion detection and prevention systems (IDPS) have been introduced to identify
suspicious activities. However, since attackers are exploiting new vulnerabilities in systems …

A framework for malicious traffic detection in IoT healthcare environment

F Hussain, SG Abbas, GA Shah, IM Pires, UU Fayyaz… - Sensors, 2021 - mdpi.com
The Internet of things (IoT) has emerged as a topic of intense interest among the research
and industrial community as it has had a revolutionary impact on human life. The rapid …

[PDF][PDF] Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning

S Lee, A Abdullah, N Jhanjhi, S Kok - PeerJ Computer Science, 2021 - peerj.com
Abstract The Industrial Revolution 4.0 began with the breakthrough technological advances
in 5G, and artificial intelligence has innovatively transformed the manufacturing industry from …

Edge intelligence (EI)-enabled HTTP anomaly detection framework for the Internet of Things (IoT)

Y An, FR Yu, J Li, J Chen… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In recent years, with the rapid development of the Internet of Things (IoT), various
applications based on IoT have become more and more popular in industrial and living …

A robust intelligent zero-day cyber-attack detection technique

V Kumar, D Sinha - Complex & Intelligent Systems, 2021 - Springer
With the introduction of the Internet to the mainstream like e-commerce, online banking,
health system and other day-to-day essentials, risk of being exposed to various are …

The promise of machine learning in cybersecurity

JB Fraley, J Cannady - SoutheastCon 2017, 2017 - ieeexplore.ieee.org
Over the last few years' machine learning has migrated from the laboratory to the forefront of
operational systems. Amazon, Google and Facebook use machine learning every day to …

Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation

V Balamurugan, R Saravanan - Cluster Computing, 2019 - Springer
Cloud environment is an assembly of resources for furnishing on-demand services to cloud
customers. Here access to cloud environment is via internet services in which data stored on …

A closer look at intrusion detection system for web applications

N Agarwal, SZ Hussain - Security and Communication …, 2018 - Wiley Online Library
Intrusion Detection System (IDS) acts as a defensive tool to detect the security attacks on the
web. IDS is a known methodology for detecting network‐based attacks but is still immature …

Apt-attack detection based on multi-stage autoencoders

H Neuschmied, M Winter, B Stojanović… - Applied Sciences, 2022 - mdpi.com
In the face of emerging technological achievements, cyber security remains a significant
issue. Despite the new possibilities that arise with such development, these do not come …