Adversarial machine learning for network intrusion detection systems: A comprehensive survey

K He, DD Kim, MR Asghar - IEEE Communications Surveys & …, 2023 - ieeexplore.ieee.org
Network-based Intrusion Detection System (NIDS) forms the frontline defence against
network attacks that compromise the security of the data, systems, and networks. In recent …

Toward proactive, adaptive defense: A survey on moving target defense

JH Cho, DP Sharma, H Alavizadeh… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …

The roadmap to 6G security and privacy

P Porambage, G Gür, DPM Osorio… - IEEE Open Journal …, 2021 - ieeexplore.ieee.org
Although the fifth generation (5G) wireless networks are yet to be fully investigated, the
visionaries of the 6th generation (6G) echo systems have already come into the discussion …

A survey on security threats and defensive techniques of machine learning: A data driven view

Q Liu, P Li, W Zhao, W Cai, S Yu, VCM Leung - IEEE access, 2018 - ieeexplore.ieee.org
Machine learning is one of the most prevailing techniques in computer science, and it has
been widely applied in image processing, natural language processing, pattern recognition …

A survey of moving target defenses for network security

S Sengupta, A Chowdhary, A Sabur… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Network defenses based on traditional tools, techniques, and procedures (TTP) fail to
account for the attacker's inherent advantage present due to the static nature of network …

Three decades of deception techniques in active cyber defense-retrospect and outlook

L Zhang, VLL Thing - Computers & Security, 2021 - Elsevier
Deception techniques have been widely seen as a game changer in cyber defense. In this
paper, we review representative techniques in honeypots, honeytokens, and moving target …

A survey: When moving target defense meets game theory

J Tan, H **, H Zhang, Y Zhang, D Chang, X Liu… - Computer Science …, 2023 - Elsevier
Moving target defense (MTD) can break through asymmetry between attackers and
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …

Leveraging computational intelligence techniques for defensive deception: a review, recent advances, open problems and future directions

PV Mohan, S Dixit, A Gyaneshwar, U Chadha… - Sensors, 2022 - mdpi.com
With information systems worldwide being attacked daily, analogies from traditional warfare
are apt, and deception tactics have historically proven effective as both a strategy and a …

Democratizing container live migration for enhanced future networks-a survey

W Soussi, G Gür, B Stiller - ACM Computing Surveys, 2024 - dl.acm.org
Emerging cloud-centric networks span from edge clouds to large-scale datacenters with
shared infrastructure among multiple tenants and applications with high availability …

The Hexa-X project vision on Artificial Intelligence and Machine Learning-driven Communication and Computation co-design for 6G

M Merluzzi, T Borsos, N Rajatheva, AA Benczúr… - IEEE …, 2023 - ieeexplore.ieee.org
This paper provides an overview of the most recent advancements and outcomes of the
European 6G flagship project Hexa-X, on the topic of in-network Artificial Intelligence (AI) …