Smart anomaly detection in sensor systems: A multi-perspective review

L Erhan, M Ndubuaku, M Di Mauro, W Song, M Chen… - Information …, 2021‏ - Elsevier
Anomaly detection is concerned with identifying data patterns that deviate remarkably from
the expected behavior. This is an important research problem, due to its broad set of …

Intrusion detection systems: A cross-domain overview

LN Tidjon, M Frappier… - … Communications Surveys & …, 2019‏ - ieeexplore.ieee.org
Nowadays, network technologies are essential for transferring and storing various
information of users, companies, and industries. However, the growth of the information …

[HTML][HTML] Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms

M Mazini, B Shirazi, I Mahdavi - Journal of King Saud University-Computer …, 2019‏ - Elsevier
Intrusion detection systems (IDSs) has been considered as the main component of a safe
network. One of the problems of these security systems is false alarm report of intrusion to …

Multilayer framework for botnet detection using machine learning algorithms

WNH Ibrahim, S Anuar, A Selamat, O Krejcar… - IEEe …, 2021‏ - ieeexplore.ieee.org
A botnet is a malware program that a hacker remotely controls called a botmaster. Botnet
can perform massive cyber-attacks such as DDOS, SPAM, click-fraud, information, and …

DDoS attack dataset (CICEV2023) against EV authentication in charging infrastructure

Y Kim, S Hakak, A Ghorbani - 2023 20th Annual international …, 2023‏ - ieeexplore.ieee.org
Denial-of-Service (DoS) or Distributed DoS (DDoS) attacks are on the rise in smart grid-
based electric vehicle (EV) charging facilities. To develop effective mitigation solutions …

Sin-Cos-bIAVOA: A new feature selection method based on improved African vulture optimization algorithm and a novel transfer function to DDoS attack detection

Z Sharifian, B Barekatain, AA Quintana… - Expert Systems with …, 2023‏ - Elsevier
Abstract Internet of Things (IoT) services and devices have raised numerous challenges
such as connectivity, computation, and security. Therefore, networks should provide and …

AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis

SK Shandilya, S Upadhyay, A Kumar… - Future Generation …, 2022‏ - Elsevier
In the current ever-changing cybersecurity scenario, active cyber defense strategies are
imperative. In this work, we present a standard testbed to measure the efficacy and efficiency …

Botnet business models, takedown attempts, and the darkweb market: A survey

D Georgoulias, JM Pedersen, M Falch… - ACM Computing …, 2023‏ - dl.acm.org
Botnets account for a substantial portion of cybercrime. Botmasters utilize darkweb
marketplaces to promote and provide their services, which can vary from renting or buying a …

Defense against distributed DoS attack detection by using intelligent evolutionary algorithm

S Dwivedi, M Vardhan, S Tripathi - International Journal of …, 2022‏ - Taylor & Francis
Modern society is prominently dependent on information and communication technology
over the last few decades has carried it with more vulnerability to an enormous variety of …

Real-time detection schemes for memory DoS (M-DoS) attacks on cloud computing applications

U Islam, A Al-Atawi, HS Alwageed, M Ahsan… - IEEE …, 2023‏ - ieeexplore.ieee.org
Memory Denial of Service (M-DoS) attacks refer to a class of cyber-attacks that aim to
exhaust the memory resources of a system, rendering it unavailable to legitimate users. This …