An intelligent agent-based detection system for DDoS attacks using automatic feature extraction and selection

R Abu Bakar, X Huang, MS Javed, S Hussain… - Sensors, 2023 - mdpi.com
Distributed Denial of Service (DDoS) attacks, advanced persistent threats, and malware
actively compromise the availability and security of Internet services. Thus, this paper …

A deep learning ensemble with data resampling for credit card fraud detection

ID Mienye, Y Sun - IEEE Access, 2023 - ieeexplore.ieee.org
Credit cards play an essential role in today's digital economy, and their usage has recently
grown tremendously, accompanied by a corresponding increase in credit card fraud …

Untargeted white-box adversarial attack with heuristic defence methods in real-time deep learning based network intrusion detection system

K Roshan, A Zafar, SBU Haque - Computer Communications, 2024 - Elsevier
Abstract Network Intrusion Detection System (NIDS) is a key component in securing the
computer network from various cyber security threats and network attacks. However …

[HTML][HTML] Enhancing IoT network security through deep learning-powered Intrusion Detection System

SA Bakhsh, MA Khan, F Ahmed, MS Alshehri, H Ali… - Internet of Things, 2023 - Elsevier
The rapid growth of the Internet of Things (IoT) has brought about a global concern for the
security of interconnected devices and networks. This necessitates the use of efficient …

An intrusion detection system based on stacked ensemble learning for IoT network

Y Cao, Z Wang, H Ding, J Zhang, B Li - Computers and Electrical …, 2023 - Elsevier
Abstract As Internet of Things (IoT) technology advances rapidly, the need for security
measures in this domain intensifies, mainly due to the inherent computational resource …

On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from sysmon logs

C Smiliotopoulos, G Kambourakis… - International Journal of …, 2023 - Springer
Lateral movement (LM) is a principal, increasingly common, tactic in the arsenal of
advanced persistent threat (APT) groups and other less or more powerful threat actors. It …

Hybrid VGG19 and 2D-CNN for intrusion detection in the FOG-cloud environment

A Binbusayyis - Expert Systems with Applications, 2024 - Elsevier
Fog computing (FC) extends cloud technology by providing services, storage, and network
interaction between data centers and end devices. By putting storage and processing closer …

Research trends in deep learning and machine learning for cloud computing security

YI Alzoubi, A Mishra, AE Topcu - Artificial Intelligence Review, 2024 - Springer
Deep learning and machine learning show effectiveness in identifying and addressing cloud
security threats. Despite the large number of articles published in this field, there remains a …

HC-DTTSVM: a network intrusion detection method based on decision tree twin support vector machine and hierarchical clustering

L Zou, X Luo, Y Zhang, X Yang, X Wang - IEEE Access, 2023 - ieeexplore.ieee.org
Network intrusion detection is an important technology in national cyberspace security
strategy and has become a research hotspot in various cyberspace security issues in recent …

[PDF][PDF] A hybrid deep learning-based intrusion detection system for IoT networks

NW Khan, MS Alshehri, MA Khan, S Almakdi… - Math. Biosci …, 2023 - aimspress.com
The Internet of Things (IoT) is a rapidly evolving technology with a wide range of potential
applications, but the security of IoT networks remains a major concern. The existing system …