[HTML][HTML] Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey

X Etxezarreta, I Garitano, M Iturbe… - International Journal of …, 2023 - Elsevier
Abstract Industrial Control Systems (ICSs) are a key technology for life-sustainability, social
development and economic progress used in a wide range of industrial solutions, including …

Intrusion detection for Industrial Internet of Things based on deep learning

Y Lu, S Chai, Y Suo, F Yao, C Zhang - Neurocomputing, 2024 - Elsevier
Intrusion detection technology can actively detect abnormal behaviors in the network and is
important to the security of Industrial Internet of Things (IIOT). However, there are some …

A comprehensive survey on deep packet inspection for advanced network traffic analysis: issues and challenges

M Çelebi, A Özbilen, U Yavanoğlu - Niğde Ömer Halisdemir …, 2023 - dergipark.org.tr
Deep Packet Inspection (DPI) provides full visibility into network traffic by performing
detailed analysis on both packet header and packet payload. Accordingly, DPI has critical …

Towards autonomous defense of sdn networks using muzero based intelligent agents

J Gabirondo-Lopez, J Egana, J Miguel-Alonso… - Ieee …, 2021 - ieeexplore.ieee.org
The Software Defined Networking (SDN) paradigm enables the development of systems that
centrally monitor and manage network traffic, providing support for the deployment of …

A Few‐Shot Malicious Encrypted Traffic Detection Approach Based on Model‐Agnostic Meta‐Learning

Z Wang, M Li, H Ou, S Pang… - Security and …, 2023 - Wiley Online Library
Existing malicious encrypted traffic detection approaches need to be trained with many
samples to achieve effective detection of a specified class of encrypted traffic data. With the …

On aggregation and prediction of cybersecurity incident reports

MV Carriegos, ÁLM Castañeda, MT Trobajo… - IEEE …, 2021 - ieeexplore.ieee.org
The study of cybersecurity incidents is an active research field. The purpose of this work is to
determine accurate measures of cybersecurity incidents. An effective method to aggregate …

Pratd: A phased remote access trojan detection method with double-sided features

C Guo, Z Song, Y **, G Shen, Y Cui, C Jiang - Electronics, 2020 - mdpi.com
Remote Access Trojan (RAT) is one of the most terrible security threats that organizations
face today. At present, two major RAT detection methods are host-based and network-based …

Parallel-SWSA: Automated Extraction for Feature Sequences from Remote Access Trojan Attack Packets

X Li, H Yan, B Lang, Y Zhang - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Remote Access Trojans (RATs) are malware that allow attackers to remotely control infected
systems and steal sensitive user data via the internet. Although current detection methods …

Towards forecasting time-series of cyber-security data aggregates

MV Carriegos, RÁ Fernández-Díaz - Computational Intelligence in …, 2019 - Springer
Cybersecurity aggregates are defined as relevant numerical data describing a database of
cybersecurity reports of activity. It is shown how to obtain time-series of aggregates from a …

[PDF][PDF] Proposed New SD-WAN Architecture to Facilitate Dynamic Load Balancing

ID EMMANUEL - 2023 - salford-repository.worktribe.com
One of the greatest joy in my academic journey is reaching this academic level. This
achievement is not just a personal milestone for me and my entire family; but for everyone …