GRU-based deep learning approach for network intrusion alert prediction

MS Ansari, V Bartoš, B Lee - Future Generation Computer Systems, 2022 - Elsevier
The exponential growth in the number of cyber attacks in the recent past has necessitated
active research on network intrusion detection, prediction and mitigation systems. While …

SoK: applications and challenges of using recommender systems in cybersecurity incident handling and response

M Husák, M Čermák - Proceedings of the 17th International Conference …, 2022 - dl.acm.org
Incident handling, a fundamental activity of a cybersecurity incident response team, is a
complex discipline that consumes a significant amount of personnel's time and costs. There …

Attack projection

SJ Yang, H Du, J Holsopple, M Sudit - Cyber Defense and Situational …, 2014 - Springer
Having dedicated the previous chapter to the second level of SA, we now proceed to the
third level. The highest level of SA—projection—involves envisioning how the current …

An automated approach for complementing ad blockers' blacklists

D Gugelmann, M Happe, B Ager… - Proceedings on Privacy …, 2015 - petsymposium.org
Privacy in the Web has become a major concern resulting in the popular use of various tools
for blocking tracking services. Most of these tools rely on manually maintained blacklists …

Network entity characterization and attack prediction

V Bartos, M Zadnik, SM Habib… - Future Generation …, 2019 - Elsevier
The devastating effects of cyber-attacks, highlight the need for novel attack detection and
prevention techniques. Over the last years, considerable work has been done in the areas of …

Shallow and deep learning approaches for network intrusion alert prediction

MS Ansari, V Bartos, B Lee - Procedia Computer Science, 2020 - Elsevier
The ever-increasing frequency and intensity of intrusion attacks on computer networks
worldwide has necessitated intense research efforts towards the design of attack detection …

A unified approach for detecting and eliminating selfish nodes in MANETs using TBUT

JMSP Josh Kumar, A Kathirvel, N Kirubakaran… - EURASIP Journal on …, 2015 - Springer
Recent years have witnessed the increasing efforts toward making architecture
standardization for the secured wireless mobile ad hoc networks. In this scenario when a …

PIF: A personalized fine-grained spam filtering scheme with privacy preservation in mobile social networks

K Zhang, X Liang, R Lu, X Shen - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Mobile social network (MSN) emerges as a promising social network paradigm that enables
mobile users' information sharing in the proximity and facilitates their cyber-physical-social …

Prediction of attacks against honeynet based on time series modeling

P Sokol, A Gajdoš - … Methods: Computational Methods in Systems and …, 2018 - Springer
Honeypots are unconventional tools to study methods, tools, and goals of attackers. In
addition to IP addresses, these tools collect also timestamps. Therefore, time series analysis …

A word-level analytical approach for identifying malicious domain names caused by dictionary-based DGA malware

A Satoh, Y Fukuda, G Kitagata, Y Nakamura - Electronics, 2021 - mdpi.com
Computer networks are facing serious threats from the emergence of malware with
sophisticated DGAs (Domain Generation Algorithms). This type of DGA malware …