A holistic review of network anomaly detection systems: A comprehensive survey

N Moustafa, J Hu, J Slay - Journal of Network and Computer Applications, 2019 - Elsevier
Abstract Network Anomaly Detection Systems (NADSs) are gaining a more important role in
most network defense systems for detecting and preventing potential threats. The paper …

A review on machine learning approaches for network malicious behavior detection in emerging technologies

M Rabbani, Y Wang, R Khoshkangini, H Jelodar… - Entropy, 2021 - mdpi.com
Network anomaly detection systems (NADSs) play a significant role in every network
defense system as they detect and prevent malicious activities. Therefore, this paper offers …

Detecting attacks against robotic vehicles: A control invariant approach

H Choi, WC Lee, Y Aafer, F Fei, Z Tu, X Zhang… - Proceedings of the …, 2018 - dl.acm.org
Robotic vehicles (RVs), such as drones and ground rovers, are a type of cyber-physical
systems that operate in the physical world under the control of computing components in the …

Generating network intrusion detection dataset based on real and encrypted synthetic attack traffic

A Ferriyan, AH Thamrin, K Takeda, J Murai - applied sciences, 2021 - mdpi.com
The lack of publicly available up-to-date datasets contributes to the difficulty in evaluating
intrusion detection systems. This paper introduces HIKARI-2021, a dataset that contains …

Hybrid intrusion detection and signature generation using deep recurrent neural networks

S Kaur, M Singh - Neural Computing and Applications, 2020 - Springer
Automated signature generation for Intrusion Detection Systems (IDSs) for proactive security
of networks is a promising area of research. An IDS monitors a system or activities of a …

Software-based realtime recovery from sensor attacks on robotic vehicles

H Choi, S Kate, Y Aafer, X Zhang, D Xu - 23rd International Symposium …, 2020 - usenix.org
We present a novel technique to recover robotic vehicles (RVs) from various sensor attacks
with so-called software sensors. Specifically, our technique builds a predictive state-space …

Real-time adaptive sensor attack detection in autonomous cyber-physical systems

F Akowuah, F Kong - 2021 IEEE 27th real-time and embedded …, 2021 - ieeexplore.ieee.org
Cyber-Physical Systems (CPS) tightly couple information technology with physical
processes, which rises new vulnerabilities such as physical attacks that are beyond …

Dynamical analysis of diversity in rule-based open source network intrusion detection systems

H Asad, I Gashi - Empirical Software Engineering, 2022 - Springer
Diverse layers of defence play an important role in the design of defence-in-depth
architectures. The use of Intrusion Detection Systems (IDSs) are ubiquitous in this design …

SoftSwitch: A centralized honeypot-based security approach using software-defined switching for secure management of VLAN networks

M Baykara, R Daş - Turkish Journal of Electrical Engineering …, 2019 - journals.tubitak.gov.tr
Honeypot systems are traps for intruders which simulate real systems such as web,
application, and database servers used in information systems. Using these systems …

SWAF: a smart web application firewall based on convolutional neural network

I Jemal, MA Haddar, O Cheikhrouhou… - … on Security of …, 2022 - ieeexplore.ieee.org
Internet network carries a huge stream of HTTP requests and responses between users and
servers. Securing server data access is primordial for internet users to enhance confidence …