AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis

SK Shandilya, S Upadhyay, A Kumar… - Future Generation …, 2022 - Elsevier
In the current ever-changing cybersecurity scenario, active cyber defense strategies are
imperative. In this work, we present a standard testbed to measure the efficacy and efficiency …

Adaptive artificial bee colony algorithm for nature-inspired cyber defense

C Ganguli, SK Shandilya, M Nehrey, M Havryliuk - Systems, 2023 - mdpi.com
With the significant growth of the cyber environment over recent years, defensive
mechanisms against adversaries have become an important step in maintaining online …

Modified Firefly Optimization Algorithm-Based IDS for Nature-Inspired Cybersecurity

SK Shandilya, BJ Choi, A Kumar, S Upadhyay - Processes, 2023 - mdpi.com
The new paradigm of nature-inspired cybersecurity can establish a robust defense by
utilizing well-established nature-inspired computing algorithms to analyze networks and act …

Differential game approach for attack-defense strategy analysis in Internet of Things networks

H Wu, Q Gao, X Tao, N Zhang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is vulnerable to various cyber attacks due to the massive deployment
of IoT devices and the openness of wireless environments. In this article, taking IoT devices …

Data-driven network layer security detection model and simulation for the Internet of Things based on an artificial immune system

B Yang, M Yang - Neural Computing and Applications, 2021 - Springer
Traditional network security detection models are trained offline using attack samples of
known types. Although such models have high detection rates for known attack types, they …

AI and Big Data: Synergizing to Create Robust Cybersecurity Ecosystems for Future Networks

BR Maddireddy, BR Maddireddy - International Journal of Advanced …, 2020 - ijaeti.com
In the rapidly evolving landscape of cybersecurity, the dynamic nature of threats
necessitates equally adaptive defense mechanisms. Traditional static security measures are …

A highly interactive honeypot-based approach to network threat management

X Yang, J Yuan, H Yang, Y Kong, H Zhang, J Zhao - Future Internet, 2023 - mdpi.com
In this paper, considering the problem that the common defensive means in the current
cyber confrontation often fall into disadvantage, honeypot technology is adopted to turn …

Effective defense strategies in network security using improved double dueling deep Q-network

Z Zhu, M Chen, C Zhu, Y Zhu - Computers & Security, 2024 - Elsevier
Network security is a critical discipline in the contemporary digital world, encompassing
diverse technologies and strategies aimed at safeguarding computer systems, networks …

Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios

M Ficco, F Palmieri - Journal of Systems Architecture, 2019 - Elsevier
The complexity of current cyber infrastructures requires specialized security-oriented skills to
be acquired by a variety of different actors, in order to defend critical systems and sensitive …

Network security evaluation and optimal active defense based on attack and defense game model

F Li - … Conference on Distributed Computing and Electrical …, 2023 - ieeexplore.ieee.org
With the rapid development of network technology, information spreads rapidly through the
network. High-speed wide area network and broadband metropolitan area network have …