A survey on data-driven network intrusion detection

D Chou, M Jiang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Data-driven network intrusion detection (NID) has a tendency towards minority attack
classes compared to normal traffic. Many datasets are collected in simulated environments …

On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

Adversarial attacks against network intrusion detection in IoT systems

H Qiu, T Dong, T Zhang, J Lu… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Deep learning (DL) has gained popularity in network intrusion detection, due to its strong
capability of recognizing subtle differences between normal and malicious network activities …

Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review

SW Lee, M Mohammadi, S Rashidi… - Journal of Network and …, 2021 - Elsevier
Providing a high-performance Intrusion Detection System (IDS) can be very effective in
controlling malicious behaviors and cyber-attacks. Regarding the ever-growing negative …

Reliability and high availability in cloud computing environments: a reference roadmap

MR Mesbahi, AM Rahmani… - Human-centric Computing …, 2018 - Springer
Reliability and high availability have always been a major concern in distributed systems.
Providing highly available and reliable services in cloud computing is essential for …

IoT malware network traffic classification using visual representation and deep learning

G Bendiab, S Shiaeles, A Alruban… - 2020 6th IEEE …, 2020 - ieeexplore.ieee.org
With the increase of IoT devices and technologies coming into service, Malware has risen as
a challenging threat with increased infection rates and levels of sophistication. Without …

Deep generative learning models for cloud intrusion detection systems

L Vu, QU Nguyen, DN Nguyen… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Intrusion detection (ID) on the cloud environment has received paramount interest over the
last few years. Among the latest approaches, machine learning-based ID methods allow us …

Internet of Things architecture challenges: A systematic review

T Samizadeh Nikoui, AM Rahmani… - International Journal …, 2021 - Wiley Online Library
Summary The Internet of Things (IoT) is a rapidly growing trend within many domains, such
as automotive, avionics, automation, energy, and health. IoT architecture is the system of …

Towards effective network intrusion detection: from concept to creation on Azure cloud

S Rajagopal, PP Kundapur, KS Hareesha - IEEE Access, 2021 - ieeexplore.ieee.org
Network Intrusion Detection is one of the most researched topics in the field of computer
security. Hacktivists use sophisticated tools to launch numerous attacks that hamper the …

Intrusion detection in Edge-of-Things computing

AS Almogren - Journal of Parallel and Distributed Computing, 2020 - Elsevier
Abstract Edge-of-Things (EoT) is a new evolving computing model driven by the Internet of
Things (IoT). It enables data processing, storage, and service to be shifted from the Cloud to …