A Systematic Literature Review on Penetration Testing in Networks: Future Research Directions
M Alhamed, MMH Rahman - Applied Sciences, 2023 - mdpi.com
Given the widespread use of the internet at the individual, governmental, and
nongovernmental levels, and the opportunities it offers, such as online shop**, security …
nongovernmental levels, and the opportunities it offers, such as online shop**, security …
Machine learning and port scans: A systematic review
JM Pittman - arxiv preprint arxiv:2301.13581, 2023 - arxiv.org
Port scanning is the process of attempting to connect to various network ports on a
computing endpoint to determine which ports are open and which services are running on …
computing endpoint to determine which ports are open and which services are running on …
Automated Network Incident Identification through Genetic Algorithm-Driven Feature Selection
A Aksoy, L Valle, G Kar - Electronics, 2024 - mdpi.com
The cybersecurity landscape presents daunting challenges, particularly in the face of Denial
of Service (DoS) attacks such as DoS Http Unbearable Load King (HULK) attacks and DoS …
of Service (DoS) attacks such as DoS Http Unbearable Load King (HULK) attacks and DoS …
Detection of slow port scanning attacks
Cyber Security can be thought of as a set of techniques used to protect the secrecy, integrity,
and availability of computer data against threats. Scanning attack itself is not a technique; In …
and availability of computer data against threats. Scanning attack itself is not a technique; In …
Network transmission flags data affinity-based classification by K-nearest neighbor
N Aljojo - Aro-The Scientific Journal of Koya University, 2022 - aro.koyauniversity.org
This research is concerned with the data generated during a network transmission session
to understand how to extract value from the data generated and be able to conduct tasks …
to understand how to extract value from the data generated and be able to conduct tasks …
NEP-IDS: a Network Intrusion Detection System Based on Entropy Prediction Error
Intrusion Detection Systems (IDSs) are used to intercept unauthorized access and malicious
activity in computer networks. However, cyber-attacks are becoming more sophisticated …
activity in computer networks. However, cyber-attacks are becoming more sophisticated …
A Novel Dataset for Experimentation with Intrusion Detection Systems in SCADA Networks using IEC 60870-5-104 Standard
Supervisory Control and Data Acquisition (SCADA) systems, particularly Remote Terminal
Units (RTUs), are vulnerable to cyber-attacks due to their limited computing resources. This …
Units (RTUs), are vulnerable to cyber-attacks due to their limited computing resources. This …
[HTML][HTML] Deep learning for network intrusion: A hierarchical approach to reduce false alarms
Computer networks form much of the infrastructure supporting day-to-day life in this digital
age. Computer networks, however, are prone to attack and therefore require intrusion …
age. Computer networks, however, are prone to attack and therefore require intrusion …
Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870‐5‐104
MAS Arifin, D Stiawan… - IET Cyber‐Physical …, 2024 - Wiley Online Library
Supervisory control and data acquisition systems are critical in Industry 4.0 for controlling
and monitoring industrial processes. However, these systems are vulnerable to various …
and monitoring industrial processes. However, these systems are vulnerable to various …
Hybrid of Deep Auto-Encoder and Maximum Mean Discrepancy for Cyber Reconnaissance Detection
Detection of cyber-reconnaissance attacks plays a vital role in planning to prevent further
attack stages as well as incident response. Although much effort has been made in the …
attack stages as well as incident response. Although much effort has been made in the …