Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review

N Mishra, S Pandya - IEEE Access, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) technology is prospering and entering every part of our lives, be it
education, home, vehicles, or healthcare. With the increase in the number of connected …

A survey of network-based intrusion detection data sets

M Ring, S Wunderlich, D Scheuring, D Landes… - Computers & …, 2019 - Elsevier
Labeled data sets are necessary to train and evaluate anomaly-based network intrusion
detection systems. This work provides a focused literature survey of data sets for network …

A systematic review on machine learning and deep learning models for electronic information security in mobile networks

C Gupta, I Johri, K Srinivasan, YC Hu, SM Qaisar… - Sensors, 2022 - mdpi.com
Today's advancements in wireless communication technologies have resulted in a
tremendous volume of data being generated. Most of our information is part of a widespread …

A taxonomy of network threats and the effect of current datasets on intrusion detection systems

H Hindy, D Brosset, E Bayne, AK Seeam… - IEEE …, 2020 - ieeexplore.ieee.org
As the world moves towards being increasingly dependent on computers and automation,
building secure applications, systems and networks are some of the main challenges faced …

Unified authentication and access control for future mobile communication‐based lightweight IoT systems using blockchain

S Joshi, S Stalin, PK Shukla, PK Shukla… - Wireless …, 2021 - Wiley Online Library
The Internet of Things (IoT) is a new revolution defined by heterogeneous devices made up
of intelligent, omnipresent items that are all hooked up to The internet. These devices are …

GraphOne A Data Store for Real-time Analytics on Evolving Graphs

P Kumar, HH Huang - ACM Transactions on Storage (TOS), 2020 - dl.acm.org
There is a growing need to perform a diverse set of real-time analytics (batch and stream
analytics) on evolving graphs to deliver the values of big data to users. The key requirement …

A survey of intrusion detection systems leveraging host data

RA Bridges, TR Glass-Vanderlan… - ACM computing …, 2019 - dl.acm.org
This survey focuses on intrusion detection systems (IDS) that leverage host-based data
sources for detecting attacks on enterprise network. The host-based IDS (HIDS) literature is …

Deepran: Attention-based bilstm and crf for ransomware early detection and classification

KC Roy, Q Chen - Information Systems Frontiers, 2021 - Springer
Ransomware is a self-propagating malware encrypting file systems of the compromised
computers to extort victims for financial gains. Hundreds of schools, hospitals, and local …

Are public intrusion datasets fit for purpose characterising the state of the art in intrusion event datasets

A Kenyon, L Deka, D Elizondo - Computers & Security, 2020 - Elsevier
In recent years cybersecurity attacks have caused major disruption and information loss for
online organisations, with high profile incidents in the news. One of the key challenges in …

[PDF][PDF] Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data.

M Komisarek, M Pawlicki, R Kozik… - J. Wirel. Mob. Networks …, 2021 - isyou.info
In this paper, the performance of a solution providing stream processing is evaluated, and its
accuracy in the classification of suspicious flows in simulated network traffic is investigated …