[HTML][HTML] Deep-learning-based approach to detect ICMPv6 flooding DDoS attacks on IPv6 networks

OE Elejla, M Anbar, S Hamouda, S Faisal… - Applied Sciences, 2022 - mdpi.com
Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol
version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control …

Experimental analysis of trustworthy in-vehicle intrusion detection system using explainable artificial intelligence (xai)

H Lundberg, NI Mowla, SF Abedin, K Thar… - IEEE …, 2022 - ieeexplore.ieee.org
Anomaly-based In-Vehicle Intrusion Detection System (IV-IDS) is one of the protection
mechanisms to detect cyber attacks on automotive vehicles. Using artificial intelligence (AI) …

[HTML][HTML] Enhanced cyber attack detection process for internet of health things (IoHT) devices using deep neural network

KP Vijayakumar, K Pradeep, A Balasundaram… - Processes, 2023 - mdpi.com
Internet of Health Things plays a vital role in day-to-day life by providing electronic
healthcare services and has the capacity to increase the quality of patient care. Internet of …

Intrusion Detection System in Software-Defined Networks Using Machine Learning and Deep Learning Techniques--A Comprehensive Survey

MR Ahmed, S Shatabda, AKMM Islam, MTI Robin - Authorea Preprints, 2023 - techrxiv.org
At present, the Internet is facing numerous attacks of different kinds that put its data at risk.
The safety of information within the network is, therefore, a significant concern. To prevent …

DFE: efficient IoT network intrusion detection using deep feature extraction

A Basati, MM Faghih - Neural Computing and Applications, 2022 - Springer
In recent years, the Internet of Things (IoT) has received a lot of attention. It has been used in
many applications such as the control industry, industrial plants, and medicine. In this …

Random forest based on federated learning for intrusion detection

T Markovic, M Leon, D Buffoni, S Punnekkat - … International Conference on …, 2022 - Springer
Vulnerability of important data is increasing everyday with the constant evolution and
increase of sophisticated cyber security threats that can seriously affect the business …

Training fuzzy deep neural network with honey badger algorithm for intrusion detection in cloud environment

DK Jain, W Ding, K Kotecha - International Journal of Machine Learning …, 2023 - Springer
Cloud computing (CC) has become one of the prominent technologies because of the
significant utility services, which focus on outsourcing data to companies and individual …

[HTML][HTML] A survey on 6G enabled light weight authentication protocol for UAVs, security, open research issues and future directions

AS Khan, MA Sattar, K Nisar, AAA Ibrahim, NB Annuar… - Applied Sciences, 2022 - mdpi.com
This paper demonstrates a broad exploration of existing authentication and secure
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …

Intrusion detection using enhanced genetic sine swarm algorithm based deep meta-heuristic ANN classifier on UNSW-NB15 and NSL-KDD dataset

A Kayyidavazhiyil - Journal of Intelligent & Fuzzy Systems, 2023 - content.iospress.com
Prediction of malicious attacks and monitoring of network behaviour is significant for
providing security and mitigating the loss of credential information. In order to monitor …

[HTML][HTML] Network threat detection using machine/deep learning in sdn-based platforms: a comprehensive analysis of state-of-the-art solutions, discussion, challenges …

N Ahmed, A Ngadi, JM Sharif, S Hussain, M Uddin… - Sensors, 2022 - mdpi.com
A revolution in network technology has been ushered in by software defined networking
(SDN), which makes it possible to control the network from a central location and provides …