Identification of malicious activities in industrial internet of things based on deep learning models

ALH Muna, N Moustafa, E Sitnikova - Journal of information security and …, 2018 - Elsevier
Abstract Internet Industrial Control Systems (IICSs) that connect technological appliances
and services with physical systems have become a new direction of research as they face …

Data fusion for network intrusion detection: a review

G Li, Z Yan, Y Fu, H Chen - Security and Communication …, 2018 - Wiley Online Library
Rapid progress of networking technologies leads to an exponential growth in the number of
unauthorized or malicious network actions. As a component of defense‐in‐depth, Network …

A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection

V Hajisalem, S Babaie - Computer Networks, 2018 - Elsevier
Due to the widespread use of the internet, computer systems are prone to information theft
that has led to the emergence of Intrusion Detection Systems (IDSs). Various approaches …

Benchmarking datasets for anomaly-based network intrusion detection: KDD CUP 99 alternatives

A Divekar, M Parekh, V Savla… - 2018 IEEE 3rd …, 2018 - ieeexplore.ieee.org
Machine Learning has been steadily gaining traction for its use in Anomaly-based Network
Intrusion Detection Systems (A-NIDS). Research into this domain is frequently performed …

Performance evaluation of intrusion detection based on machine learning using Apache Spark

M Belouch, S El Hadaj, M Idhammad - Procedia Computer Science, 2018 - Elsevier
Nowadays, network intrusion is considered as one of the major concerns in network
communications. Thus, the developed network intrusion detection systems aim to identify …

[PDF][PDF] Benchmark Datasets for Network Intrusion Detection: A Review.

Y Hamid, VR Balasaraswathi, L Journaux… - Int. J. Netw …, 2018 - researchgate.net
Abstract Network Intrusion Detection is the process of monitoring the events occurring in a
computer system or the network and analyzing them for the signs of possible intrusions. An …

Evaluating shallow and deep neural networks for network intrusion detection systems in cyber security

RK Vigneswaran, R Vinayakumar… - 2018 9th …, 2018 - ieeexplore.ieee.org
Intrusion detection system (IDS) has become an essential layer in all the latest ICT system
due to an urge towards cyber safety in the day-to-day world. Reasons including uncertainty …

Semi-supervised machine learning approach for DDoS detection

M Idhammad, K Afdel, M Belouch - Applied Intelligence, 2018 - Springer
Abstract Even though advanced Machine Learning (ML) techniques have been adopted for
DDoS detection, the attack remains a major threat of the Internet. Most of the existing ML …

Towards developing network forensic mechanism for botnet activities in the IoT based on machine learning techniques

N Koroniotis, N Moustafa, E Sitnikova, J Slay - Mobile Networks and …, 2018 - Springer
The IoT is a network of interconnected everyday objects called “things” that have been
augmented with a small measure of computing capabilities. Lately, the IoT has been affected …

Ramp loss one-class support vector machine; a robust and effective approach to anomaly detection problems

Y Tian, M Mirzabagheri, SMH Bamakan, H Wang, Q Qu - Neurocomputing, 2018 - Elsevier
Anomaly detection defines as a problem of finding those data samples, which do not follow
the patterns of the majority of data points. Among the variety of methods and algorithms …