From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods

A Nisioti, A Mylonas, PD Yoo… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last five years there has been an increase in the frequency and diversity of network
attacks. This holds true, as more and more organizations admit compromises on a daily …

A survey of stealth malware attacks, mitigation measures, and steps toward autonomous open world solutions

EM Rudd, A Rozsa, M Günther… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As our professional, social, and financial existences become increasingly digitized and as
our government, healthcare, and military infrastructures rely more on computer technologies …

Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection …

RA Disha, S Waheed - Cybersecurity, 2022 - Springer
To protect the network, resources, and sensitive data, the intrusion detection system (IDS)
has become a fundamental component of organizations that prevents cybercriminal …

Effective intrusion detection system using XGBoost

SS Dhaliwal, AA Nahid, R Abbas - Information, 2018 - mdpi.com
As the world is on the verge of venturing into fifth-generation communication technology and
embracing concepts such as virtualization and cloudification, the most crucial aspect …

Flow-based network traffic generation using generative adversarial networks

M Ring, D Schlör, D Landes, A Hotho - Computers & Security, 2019 - Elsevier
Flow-based data sets are necessary for evaluating network-based intrusion detection
systems (NIDS). In this work, we propose a novel methodology for generating realistic flow …

5g-nidd: A comprehensive network intrusion detection dataset generated over 5g wireless network

S Samarakoon, Y Siriwardhana, P Porambage… - arXiv preprint arXiv …, 2022 - arxiv.org
With a plethora of new connections, features, and services introduced, the 5th generation
(5G) wireless technology reflects the development of mobile communication networks and is …

Applying big data based deep learning system to intrusion detection

W Zhong, N Yu, C Ai - Big Data Mining and Analytics, 2020 - ieeexplore.ieee.org
With vast amounts of data being generated daily and the ever increasing interconnectivity of
the world's internet infrastructures, a machine learning based Intrusion Detection Systems …

Datasets are not enough: Challenges in labeling network traffic

JL Guerra, C Catania, E Veas - Computers & Security, 2022 - Elsevier
In contrast to previous surveys, the present work is not focused on reviewing the datasets
used in the network security field. The fact is that many of the available public labeled …

An analysis of recurrent neural networks for botnet detection behavior

P Torres, C Catania, S Garcia… - 2016 IEEE biennial …, 2016 - ieeexplore.ieee.org
A Botnet can be conceived as a group of compromised computers which can be controlled
remotely to execute coordinated attacks or commit fraudulent acts. The fact that Botnets keep …

Intrusion detection techniques for mobile cloud computing in heterogeneous 5G

K Gai, M Qiu, L Tao, Y Zhu - Security and communication …, 2016 - Wiley Online Library
Mobile cloud computing is applied in multiple industries to obtain cloud‐based services by
leveraging mobile technologies. With the development of the wireless networks, defending …