Pre-trained language model-enhanced conditional generative adversarial networks for intrusion detection

F Li, H Shen, J Mai, T Wang, Y Dai, X Miao - Peer-to-Peer Networking and …, 2024 - Springer
As cyber threats continue to evolve, ensuring network security has become increasingly
critical. Deep learning-based intrusion detection systems (IDS) are crucial for addressing …

TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks

L Wang, X Ma, N Li, Q Lv, Y Wang, W Huang… - Computers & Security, 2023 - Elsevier
Nowadays, most network traffic is encrypted, which protects user privacy but hides attack
traces, further hindering identifying attacks to inspect traffic packages. Machine Learning …

Self-Discriminative Modeling for Anomalous Graph Detection

J Cai, Y Zhang, J Fan - arXiv preprint arXiv:2310.06261, 2023 - arxiv.org
This paper studies the problem of detecting anomalous graphs using a machine learning
model trained on only normal graphs, which has many applications in molecule, biology …

LGBM: An Intrusion Detection Scheme for Resource‐Constrained End Devices in Internet of Things

YQ Cong, T Guan, JF Cui… - Security and …, 2022 - Wiley Online Library
The intrusion detection schemes (IDSs) based on the Gradient Boosting Decision Tree
(GBDT) face three problems: unbalanced training data distribution, large dimensionality of …

Meta-Analysis and Systematic Review for Anomaly Network Intrusion Detection Systems: Detection Methods, Dataset, Validation Methodology, and Challenges

ZK Maseer, R Yusof, B Al-Bander, A Saif… - arXiv preprint arXiv …, 2023 - arxiv.org
Intrusion detection systems (IDSs) built on artificial intelligence (AI) are presented as latent
mechanisms for actively detecting fresh attacks over a complex network. Although review …

Anomaly Detectors for Self-Aware Edge and IoT Devices

T Zoppi, G Merlino, A Ceccarelli… - 2023 IEEE 23rd …, 2023 - ieeexplore.ieee.org
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …

A review of advancements and applications of pre-trained language models in cybersecurity

Z Liu - 2024 12th International Symposium on Digital …, 2024 - ieeexplore.ieee.org
In this paper, we delve into the transformative role of pre-trained language models (PLMs) in
cybersecurity, offering a comprehensive examination of their deployment across a wide …

[HTML][HTML] Experimental evaluation of malware family classification methods from sequential information of tls-encrypted traffic

J Ha, H Roh - Electronics, 2021 - mdpi.com
In parallel with the rapid adoption of transport layer security (TLS), malware has utilized the
encrypted communication channel provided by TLS to hinder detection from network traffic …

Swarm-intelligence for the modern ICT ecosystems

G Hatzivasilis, E Lakka, M Athanatos… - International Journal of …, 2024 - Springer
Digitalization is continuing facilitating our daily lives. The world is interconnected as never
before, bringing close people, businesses, or other organizations. However, hackers are …

Network Intrusion Detection and Dynamic Defense Method Based on Unsupervised Machine Learning

Q Wang, M Xie, Z Wu, D Yang - 2023 International Conference …, 2023 - ieeexplore.ieee.org
With the rapid development of the Internet, network security issues have become
increasingly prominent, and the traditional rule-based and signature-based intrusion …