An entropy-based network anomaly detection method

P Bereziński, B Jasiul, M Szpyrka - Entropy, 2015 - mdpi.com
Data mining is an interdisciplinary subfield of computer science involving methods at the
intersection of artificial intelligence, machine learning and statistics. One of the data mining …

Detection of network attacks using machine learning and deep learning models

KA Dhanya, S Vajipayajula, K Srinivasan… - Procedia Computer …, 2023 - Elsevier
Anomaly-based network intrusion detection systems are highly significant in detecting
network attacks. Robust machine learning and deep learning models for identifying network …

NE-GConv: A lightweight node edge graph convolutional network for intrusion detection

T Altaf, X Wang, W Ni, RP Liu, R Braun - Computers & Security, 2023 - Elsevier
Resource constraint devices are now the first choice of cyber criminals for launching
cyberattacks. Network Intrusion Detection Systems (NIDS) play a critical role in the detection …

Attack detection/prevention system against cyber attack in industrial control systems

EN Yılmaz, S Gönen - Computers & Security, 2018 - Elsevier
Industrial control systems (ICS) are vital for countries' industrial facilities and critical
infrastructures. However, there are not enough security assessments against cyber attacks …

A hybrid anomaly classification with deep learning (DL) and binary algorithms (BA) as optimizer in the intrusion detection system (IDS)

K Atefi, H Hashim, T Khodadadi - 2020 16th IEEE international …, 2020 - ieeexplore.ieee.org
Nowadays, along with network development, due to the threats of unknown sources,
information communication is more vulnerable, and thus, more secured information is …

Variables influencing the effectiveness of signature-based network intrusion detection systems

T Sommestad, H Holm, D Steinvall - Information security journal: a …, 2022 - Taylor & Francis
Contemporary organizations often employ signature-based network intrusion detection
systems to increase the security of their computer networks. The effectiveness of a signature …

How does Endpoint Detection use the {MITRE}{ATT&CK} Framework?

A Virkud, MA Inam, A Riddle, J Liu, G Wang… - 33rd USENIX Security …, 2024 - usenix.org
MITRE ATT&CK is an open-source taxonomy of adversary tactics, techniques, and
procedures based on real-world observations. Increasingly, organizations leverage ATT&CK …

Flow-based IDS for ICMPv6-based DDoS attacks detection

OE Elejla, M Anbar, B Belaton, BO Alijla - Arabian Journal for Science and …, 2018 - Springer
Abstract The Internet Control Message Protocol version Six (ICMPv6) is categorized as the
most important part of the Internet Protocol version Six (IPv6) due to its core functionalities …

SYNTROPY: TCP SYN DDoS attack detection for Software Defined Network based on Rényi entropy

VA Shirsath, MM Chandane, C Lal, M Conti - Computer Networks, 2024 - Elsevier
The rapidly evolving landscape of network security, particularly in Software Defined
Networks (SDNs), presents a critical need for efficient and adaptive DDoS attack detection …

Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection

OE Elejla, M Anbar, S Hamouda, B Belaton… - Symmetry, 2022 - mdpi.com
Internet Protocol version 6 (IPv6) and its core protocol, Internet Control Message Protocol
version 6 (ICMPv6), need to be secured from attacks, such as Denial of Service (DoS) and …