An ensemble deep learning based IDS for IoT using Lambda architecture

R Alghamdi, M Bellaiche - Cybersecurity, 2023 - Springer
Abstract The Internet of Things (IoT) has revolutionized our world today by providing greater
levels of accessibility, connectivity and ease to our everyday lives. It enables massive …

Anomaly detection in multivariate time series data using deep ensemble models

A Iqbal, R Amin, FS Alsubaei, A Alzahrani - Plos one, 2024 - journals.plos.org
Anomaly detection in time series data is essential for fraud detection and intrusion
monitoring applications. However, it poses challenges due to data complexity and high …

Toward a monitoring and threat detection system based on stream processing as a virtual network function for big data

M Andreoni Lopez, DMF Mattos… - Concurrency and …, 2019 - Wiley Online Library
The late detection of security threats causes a significant increase in the risk of irreparable
damages and restricts any defense attempt. In this paper, we propose a sCAlable TRAffic …

[HTML][HTML] Anomaly detection in time series: current focus and future challenges

F Arslan, A Javaid, MDZ Awan - Anomaly Detection-Recent …, 2023 - intechopen.com
Anomaly detection in time series has become an increasingly vital task, with applications
such as fraud detection and intrusion monitoring. Tackling this problem requires an array of …

Improving threat detection in networks using deep learning

FC Schuartz, M Fonseca, A Munaretto - Annals of Telecommunications, 2020 - Springer
Detecting threats on the Internet is a key factor in maintaining data and information security.
An intrusion detection system tries to prevent such attacks from occurring through the …

Real-time cyber analytics data collection framework

H Maosa, K Ouazzane… - International Journal of …, 2022 - igi-global.com
In cyber security, it is critical that event data is collected in as near real time as possible to
enable early detection and response to threats. Performing analytics from event logs stored …

A hierarchical security event correlation model for real-time threat detection and response

H Maosa, K Ouazzane, MC Ghanem - Network, 2024 - mdpi.com
An intrusion detection system (IDS) perform postcompromise detection of security breaches
whenever preventive measures such as firewalls do not avert an attack. However, these …

Securing industrial wireless networks: Enhancing SDN with PhySec

C Lipps, D Krummacker… - 2019 Conference on Next …, 2019 - ieeexplore.ieee.org
The requirements regarding network management defined by the continuously rising
amount of interconnected devices in the industrial landscape turns it into an increasingly …

A monitoring and threat detection system using stream processing as a virtual function for big data

MEA Lopez - 2018 - pantheon.ufrj.br
The late detection of security threats causes a significant increase in the risk of irreparable
damages, disabling any defense attempt. As a consequence, fast realtime threat detection is …

Aprendizado de máquina em plataformas de processamento distribuído de fluxo: Análise e detecção de ameaças em tempo real

MA Lopez, IJ Sanz, AGP Lobato - Simpósio Brasileiro de Redes de …, 2018 - 143.54.25.88
In this chapter, we focus on stream processing architectures for real-time threat detection in
networks. We present and compare Apache Storm, Apache Spark Streaming, and Apache …