An LSTM-based deep learning approach for classifying malicious traffic at the packet level

RH Hwang, MC Peng, VL Nguyen, YL Chang - Applied Sciences, 2019 - mdpi.com
Recently, deep learning has been successfully applied to network security assessments and
intrusion detection systems (IDSs) with various breakthroughs such as using Convolutional …

Tiki-taka: Attacking and defending deep learning-based intrusion detection systems

C Zhang, X Costa-Pérez, P Patras - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
Neural networks are increasingly important in the development of Network Intrusion
Detection Systems (NIDS), as they have the potential to achieve high detection accuracy …

Adaptative perturbation patterns: Realistic adversarial learning for robust intrusion detection

J Vitorino, N Oliveira, I Praça - Future Internet, 2022 - mdpi.com
Adversarial attacks pose a major threat to machine learning and to the systems that rely on
it. In the cybersecurity domain, adversarial cyber-attack examples capable of evading …

Defeating {DNN-Based} traffic analysis systems in {Real-Time} with blind adversarial perturbations

M Nasr, A Bahramali, A Houmansadr - 30th USENIX Security …, 2021 - usenix.org
Deep neural networks (DNNs) are commonly used for various traffic analysis problems, such
as website fingerprinting and flow correlation, as they outperform traditional (eg, statistical) …

Improving intrusion detection for imbalanced network traffic using generative deep learning

AA Alqarni, ESM El-Alfy - International Journal of Advanced …, 2022 - search.proquest.com
Network security has become a serious issue since networks are vulnerable and subject to
increasing intrusive activities. Therefore, network intrusion detection systems (IDSs) are an …

Unbalanced network attack traffic detection based on feature extraction and GFDA-WGAN

K Li, W Ma, H Duan, H Xie, J Zhu, R Liu - Computer Networks, 2022 - Elsevier
Detecting various types of attack traffic is critical to computer network security. The current
detection methods require massive amounts of data to detect attack traffic. However, in most …

Mitigation of black-box attacks on intrusion detection systems-based ml

S Alahmed, Q Alasad, MM Hammood, JS Yuan… - Computers, 2022 - mdpi.com
Intrusion detection systems (IDS) are a very vital part of network security, as they can be
used to protect the network from illegal intrusions and communications. To detect malicious …

Design and implementation of an anomaly network traffic detection model integrating temporal and spatial features

M Li, D Han, X Yin, H Liu, D Li - Security and Communication …, 2021 - Wiley Online Library
With the rapid development and widespread application of cloud computing, cloud
computing open networks and service sharing scenarios have become more complex and …

Tsfn: A novel malicious traffic classification method using bert and lstm

Z Shi, N Luktarhan, Y Song, H Yin - Entropy, 2023 - mdpi.com
Traffic classification is the first step in network anomaly detection and is essential to network
security. However, existing malicious traffic classification methods have several limitations; …

Packet-level adversarial network traffic crafting using sequence generative adversarial networks

Q Cheng, S Zhou, Y Shen, D Kong, C Wu - arXiv preprint arXiv …, 2021 - arxiv.org
The surge in the internet of things (IoT) devices seriously threatens the current IoT security
landscape, which requires a robust network intrusion detection system (NIDS). Despite …