[HTML][HTML] Open RAN security: Challenges and opportunities
Abstract Open RAN (ORAN, O-RAN) represents a novel industry-level standard for RAN
(Radio Access Network), which defines interfaces that support inter-operation between …
(Radio Access Network), which defines interfaces that support inter-operation between …
An asynchronous federated learning arbitration model for low-rate ddos attack detection
Z Liu, C Guo, D Liu, X Yin - IEEE Access, 2023 - ieeexplore.ieee.org
Low-rate Distributed Denial of Service (LDDoS) attacks have been one of the most notorious
network security threats, which use periodic slight multi-variate time series pulse flows to …
network security threats, which use periodic slight multi-variate time series pulse flows to …
Reinforcement learning meets network intrusion detection: a transferable and adaptable framework for anomaly behavior identification
M He, X Wang, P Wei, L Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Anomaly detection plays an essential role in network security and traffic classification. Many
studies have focused on anomaly detection to improve network security, including machine …
studies have focused on anomaly detection to improve network security, including machine …
Real-time clustering based on deep embeddings for threat detection in 6G networks
Trials and deployments of sixth Generation (6G) wireless networks, delivering extreme
capacity, reliability, and efficiency, are expected as early as 2030. Attempts from both …
capacity, reliability, and efficiency, are expected as early as 2030. Attempts from both …
MRFM: A timely detection method for DDoS attacks in IoT with multidimensional reconstruction and function map**
To address the slow response time of existing detection modules to the Internet of Things
(IoT) Distributed Denial of Service (DDoS) attacks, along with their low feature differentiation …
(IoT) Distributed Denial of Service (DDoS) attacks, along with their low feature differentiation …
Empowering 5G SBA security: Time series transformer for HTTP/2 anomaly detection
Fifth Generation (5G) networks adopt the security-by-design principle to provide highly
secure and robust services. 5G Core (5GC) uses the Hypertext Transfer Protocol version 2 …
secure and robust services. 5G Core (5GC) uses the Hypertext Transfer Protocol version 2 …
Real-time DDoS defense in 5G-enabled IoT: a multidomain collaboration perspective
While 5G networks have accelerated the development of the Internet of Things (IoT), they
have also introduced a large number of vulnerable IoT devices into the network, which …
have also introduced a large number of vulnerable IoT devices into the network, which …
A novel methodology for anomaly detection in smart home networks via Fractional Stochastic Gradient Descent
With the rising integration of IoT devices within smart home environments, securing these
interconnected systems against unauthorized access and cyber threats has become …
interconnected systems against unauthorized access and cyber threats has become …
Spotting anomalies at the edge: Outlier exposure-based cross-silo federated learning for ddos detection
Distributed Denial-of-Service (DDoS) attacks are expected to continue plaguing service
availability in emerging networks which rely on distributed edge clouds to offer critical …
availability in emerging networks which rely on distributed edge clouds to offer critical …
BDDTPA: Blockchain-driven deep traffic pattern analysis for enhanced security in cognitive radio ad-hoc networks
Cognitive Radio Ad-hoc Networks (CRAHNs) combines characteristics of ad-hoc networks
with cognitive radios to facilitate a variety of communication scenarios. However, these …
with cognitive radios to facilitate a variety of communication scenarios. However, these …