A deep learning approach to network intrusion detection

N Shone, TN Ngoc, VD Phai… - IEEE transactions on …, 2018‏ - ieeexplore.ieee.org
Network intrusion detection systems (NIDSs) play a crucial role in defending computer
networks. However, there are concerns regarding the feasibility and sustainability of current …

ICMPv6-based DoS and DDoS attacks detection using machine learning techniques, open challenges, and blockchain applicability: A review

M Tayyab, B Belaton, M Anbar - IEEE Access, 2020‏ - ieeexplore.ieee.org
Although the launch of Internet Protocol version six (IPv6) addressed the issue of IPv4's
address depletion, but also mandated the use of Internet Control Message Protocol version …

Intrusion detection systems using blockchain technology: A review, issues and challenges.

S Al-E'mari, M Anbar, Y Sanjalawe… - … Systems Science & …, 2022‏ - search.ebscohost.com
Intrusion detection systems that have emerged in recent decades can identify a variety of
malicious attacks that target networks by employing several detection approaches. However …

VARMAN: Multi-plane security framework for software defined networks

P Krishnan, S Duttagupta, K Achuthan - Computer communications, 2019‏ - Elsevier
In the context of future networking technologies, Software-Defined paradigm offers
compelling solutions and advantages for traffic orchestration and sha**, flexible and …

Intrusion detection system based on a modified binary grey wolf optimisation

QM Alzubi, M Anbar, ZNM Alqattan, MA Al-Betar… - Neural computing and …, 2020‏ - Springer
One critical issue within network security refers to intrusion detection. The nature of intrusion
attempts appears to be nonlinear, wherein the network traffic performance is unpredictable …

Renyi joint entropy-based dynamic threshold approach to detect DDoS attacks against SDN controller with various traffic rates

MA Aladaileh, M Anbar, AJ Hintaw, IH Hasbullah… - Applied Sciences, 2022‏ - mdpi.com
The increasing incidence of distributed denial-of-service (DDoS) attacks has made software-
defined networking (SDN) more vulnerable to the depletion of controller resources. DDoS …

A labeled transactions-based dataset on the ethereum network

S Al-E'mari, M Anbar, Y Sanjalawe… - … Conference on Advances …, 2020‏ - Springer
A few datasets of blockchain networks are available to be used in evaluating intrusion
detection systems, and some of the proposed detection systems are evaluated as self …

Deep learning approach for detecting router advertisement flooding-based DDoS attacks

AH Hasan, M Anbar, TA Alamiedy - Journal of Ambient Intelligence and …, 2023‏ - Springer
The proliferation of connected devices under the Internet of things makes the adoption of
Internet protocol version 6 (IPv6) is occurring faster and become more needed. It was …

Flow-based IDS for ICMPv6-based DDoS attacks detection

OE Elejla, M Anbar, B Belaton, BO Alijla - Arabian Journal for Science and …, 2018‏ - Springer
Abstract The Internet Control Message Protocol version Six (ICMPv6) is categorized as the
most important part of the Internet Protocol version Six (IPv6) due to its core functionalities …

Machine learning for network-based intrusion detection systems: an analysis of the CIDDS-001 dataset

J Carneiro, N Oliveira, N Sousa, E Maia… - … symposium on distributed …, 2021‏ - Springer
With the increasing amount of reliance on digital data and computer networks by
corporations and the public in general, the occurrence of cyber attacks has become a great …