A machine learning-based intrusion detection system for securing remote desktop connections to electronic flight bag servers

R Bitton, A Shabtai - IEEE Transactions on Dependable and …, 2019 - ieeexplore.ieee.org
Remote desktop protocols (RDP) are commonly used for connecting and interacting with
computers remotely. In this case, a server component runs on the remote computer and …

[PDF][PDF] Flow-based detection of RDP brute-force attacks

M Vizváry, J Vykopal - Proceedings of 7th International Conference on …, 2013 - is.muni.cz
Abstract The Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Microsoft, which provides a remote access to a computer over a network connection …

Experimental cyber attack detection framework

C Mironeanu, A Archip, CM Amarandei, M Craus - Electronics, 2021 - mdpi.com
Digital security plays an ever-increasing, crucial role in today's information-based society.
The variety of threats and attack patterns has dramatically increased with the advent of …

[HTML][HTML] Cyber attack evaluation dataset for deep packet inspection and analysis

SK Shandilya, C Ganguli, I Izonin, AK Nagar - Data in Brief, 2023 - Elsevier
To determine the effectiveness of any defense mechanism, there is a need for
comprehensive real-time network data that solely references various attack scenarios based …

LR-HIDS: logistic regression host-based intrusion detection system for cloud environments

E Besharati, M Naderan, E Namjoo - Journal of Ambient Intelligence and …, 2019 - Springer
Cloud computing is an Internet based computing environment, where storage and
computing resources are assigned dynamically among users according to their needs, using …

Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues

S Shamshirband, M Fathi, AT Chronopoulos… - Journal of Information …, 2020 - Elsevier
With the increasing utilization of the Internet and its provided services, an increase in cyber-
attacks to exploit the information occurs. A technology to store and maintain user's …

[Retracted] Adaptive Anomaly Detection Framework Model Objects in Cyberspace

H Alkahtani, THH Aldhyani… - Applied Bionics and …, 2020 - Wiley Online Library
Telecommunication has registered strong and rapid growth in the past decade. Accordingly,
the monitoring of computers and networks is too complicated for network administrators …

Hybrid intrusion detection system using machine learning

A Meryem, BEL Ouahidi - Network Security, 2020 - Elsevier
Recent technologies and innovations have encouraged users to adopt cloud-based
architectures. 1, 2 This has reduced IT barriers and provided new capabilities of dynamic …

Study of machine learning for cloud assisted iot security as a service

M Alsharif, DB Rawat - Sensors, 2021 - mdpi.com
Machine learning (ML) has been emerging as a viable solution for intrusion detection
systems (IDS) to secure IoT devices against different types of attacks. ML based IDS (ML …

A supervised intrusion detection system for smart home IoT devices

E Anthi, L Williams, M Słowińska… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The proliferation in Internet of Things (IoT) devices, which routinely collect sensitive
information, is demonstrated by their prominence in our daily lives. Although such devices …