Understanding O-RAN: Architecture, interfaces, algorithms, security, and research challenges

M Polese, L Bonati, S D'oro, S Basagni… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The Open Radio Access Network (RAN) and its embodiment through the O-RAN Alliance
specifications are poised to revolutionize the telecom ecosystem. O-RAN promotes …

[HTML][HTML] Cyber-attack prediction based on network intrusion detection systems for alert correlation techniques: a survey

H Albasheer, M Md Siraj, A Mubarakali… - Sensors, 2022 - mdpi.com
Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of
enterprise networks against cyber-attacks. However, NIDS networks suffer from several …

Dual-IDS: A bagging-based gradient boosting decision tree model for network anomaly intrusion detection system

MHL Louk, BA Tama - Expert Systems with Applications, 2023 - Elsevier
The mission of an intrusion detection system (IDS) is to monitor network activities and
assess whether or not they are malevolent. Specifically, anomaly-based IDS can discover …

[HTML][HTML] Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection

T Zoppi, A Ceccarelli, T Puccetti, A Bondavalli - Computers & Security, 2023 - Elsevier
There is an astounding growth in the adoption of machine learners (MLs) to craft intrusion
detection systems (IDSs). These IDSs model the behavior of a target system during a …

A novel two-stage deep learning model for network intrusion detection: LSTM-AE

V Hnamte, H Nhung-Nguyen, J Hussain… - IEEE Access, 2023 - ieeexplore.ieee.org
Machine learning and deep learning techniques are widely used to evaluate intrusion
detection systems (IDS) capable of rapidly and automatically recognizing and classifying …

Sin-Cos-bIAVOA: A new feature selection method based on improved African vulture optimization algorithm and a novel transfer function to DDoS attack detection

Z Sharifian, B Barekatain, AA Quintana… - Expert Systems with …, 2023 - Elsevier
Abstract Internet of Things (IoT) services and devices have raised numerous challenges
such as connectivity, computation, and security. Therefore, networks should provide and …

SoK: Pragmatic assessment of machine learning for network intrusion detection

G Apruzzese, P Laskov… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Machine Learning (ML) has become a valuable asset to solve many real-world tasks. For
Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …

MEMBER: A multi-task learning model with hybrid deep features for network intrusion detection

J Lan, X Liu, B Li, J Sun, B Li, J Zhao - Computers & Security, 2022 - Elsevier
With the continuous occurrence of cybersecurity incidents, network intrusion detection has
become one of the most critical issues in cyber ecosystems. Although previous machine …

SQL Injection Attack: Quick View

V Abdullayev, AS Chauhan - Mesopotamian Journal of …, 2023 - mesopotamian.press
SQL injection is a type of security vulnerability that occurs in database-driven web
applications where an attacker injects malicious code into the application to gain …

[HTML][HTML] Collaborative detection of black hole and gray hole attacks for secure data communication in VANETs

S Younas, F Rehman, T Maqsood, S Mustafa… - Applied Sciences, 2022 - mdpi.com
Vehicle ad hoc networks (VANETs) are vital towards the success and comfort of self-driving
as well as semi-automobile vehicles. Such vehicles rely heavily on data management and …