N Chaabouni, M Mosbah, A Zemmari… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn cyberattack exposed the critical fault-lines among smart networks. Security of IoT has …
Pervasive growth and usage of the Internet and mobile applications have expanded cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
Nowadays, network attacks are the most crucial problem of modern society. All networks, from small to large, are vulnerable to network threats. An intrusion detection (ID) system is …
Intrusion detection is one of the important security problems in todays cyber world. A significant number of techniques have been developed which are based on machine …
In severely imbalanced datasets, using traditional binary or multi-class classification typically leads to bias towards the class (es) with the much larger number of instances. Under such …
Internet-of-things has emerged out as an important invention towards employing the tremendous power of wireless media in the real world. We can control our surroundings by …
This paper investigates graph neural networks (GNNs) applied for self-supervised intrusion and anomaly detection in computer networks. GNNs are a deep learning approach for graph …
D Chou, M Jiang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Data-driven network intrusion detection (NID) has a tendency towards minority attack classes compared to normal traffic. Many datasets are collected in simulated environments …
While machine learning and artificial intelligence have long been applied in networking research, the bulk of such works has focused on supervised learning. Recently, there has …