A deep learning approach to network intrusion detection
Network intrusion detection systems (NIDSs) play a crucial role in defending computer
networks. However, there are concerns regarding the feasibility and sustainability of current …
networks. However, there are concerns regarding the feasibility and sustainability of current …
ICMPv6-based DoS and DDoS attacks detection using machine learning techniques, open challenges, and blockchain applicability: A review
Although the launch of Internet Protocol version six (IPv6) addressed the issue of IPv4's
address depletion, but also mandated the use of Internet Control Message Protocol version …
address depletion, but also mandated the use of Internet Control Message Protocol version …
Intrusion detection systems using blockchain technology: A review, issues and challenges.
Intrusion detection systems that have emerged in recent decades can identify a variety of
malicious attacks that target networks by employing several detection approaches. However …
malicious attacks that target networks by employing several detection approaches. However …
VARMAN: Multi-plane security framework for software defined networks
In the context of future networking technologies, Software-Defined paradigm offers
compelling solutions and advantages for traffic orchestration and sha**, flexible and …
compelling solutions and advantages for traffic orchestration and sha**, flexible and …
Intrusion detection system based on a modified binary grey wolf optimisation
One critical issue within network security refers to intrusion detection. The nature of intrusion
attempts appears to be nonlinear, wherein the network traffic performance is unpredictable …
attempts appears to be nonlinear, wherein the network traffic performance is unpredictable …
Renyi joint entropy-based dynamic threshold approach to detect DDoS attacks against SDN controller with various traffic rates
The increasing incidence of distributed denial-of-service (DDoS) attacks has made software-
defined networking (SDN) more vulnerable to the depletion of controller resources. DDoS …
defined networking (SDN) more vulnerable to the depletion of controller resources. DDoS …
A labeled transactions-based dataset on the ethereum network
A few datasets of blockchain networks are available to be used in evaluating intrusion
detection systems, and some of the proposed detection systems are evaluated as self …
detection systems, and some of the proposed detection systems are evaluated as self …
Deep learning approach for detecting router advertisement flooding-based DDoS attacks
The proliferation of connected devices under the Internet of things makes the adoption of
Internet protocol version 6 (IPv6) is occurring faster and become more needed. It was …
Internet protocol version 6 (IPv6) is occurring faster and become more needed. It was …
Flow-based IDS for ICMPv6-based DDoS attacks detection
Abstract The Internet Control Message Protocol version Six (ICMPv6) is categorized as the
most important part of the Internet Protocol version Six (IPv6) due to its core functionalities …
most important part of the Internet Protocol version Six (IPv6) due to its core functionalities …
Machine learning for network-based intrusion detection systems: an analysis of the CIDDS-001 dataset
With the increasing amount of reliance on digital data and computer networks by
corporations and the public in general, the occurrence of cyber attacks has become a great …
corporations and the public in general, the occurrence of cyber attacks has become a great …