Identification of malicious activities in industrial internet of things based on deep learning models

ALH Muna, N Moustafa, E Sitnikova - Journal of information security and …, 2018 - Elsevier
Abstract Internet Industrial Control Systems (IICSs) that connect technological appliances
and services with physical systems have become a new direction of research as they face …

A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection

V Hajisalem, S Babaie - Computer Networks, 2018 - Elsevier
Due to the widespread use of the internet, computer systems are prone to information theft
that has led to the emergence of Intrusion Detection Systems (IDSs). Various approaches …

A new threat intelligence scheme for safeguarding industry 4.0 systems

N Moustafa, E Adi, B Turnbull, J Hu - IEEE Access, 2018 - ieeexplore.ieee.org
Industry 4.0 represents the fourth phase of industry and manufacturing revolution, unique in
that it provides Internet-connected smart systems, including automated factories …

Towards developing network forensic mechanism for botnet activities in the IoT based on machine learning techniques

N Koroniotis, N Moustafa, E Sitnikova, J Slay - Mobile Networks and …, 2018 - Springer
The IoT is a network of interconnected everyday objects called “things” that have been
augmented with a small measure of computing capabilities. Lately, the IoT has been affected …

An effective deep learning based scheme for network intrusion detection

H Zhang, CQ Wu, S Gao, Z Wang… - 2018 24th International …, 2018 - ieeexplore.ieee.org
Intrusion detection systems (IDS) play an important role in the protection of network
operations and services. In this paper, we propose an effective network intrusion detection …

Generalized outlier gaussian mixture technique based on automated association features for simulating and detecting web application attacks

N Moustafa, G Misra, J Slay - IEEE Transactions on Sustainable …, 2018 - ieeexplore.ieee.org
Web application attacks constitute considerable security threats to computer networks and
end users. Existing threat detection methods are mostly designed on signature-based …

Распределенная система обнаружения вторжений с защитой от внутреннего нарушителя

СИ Штеренберг, МА Полтавцева - Проблемы информационной …, 2018 - elibrary.ru
Защита современных распределенных информационных сетей от внешних и
внутренних нарушителей продолжает оставаться актуальной в связи с развитием …

A distributed intrusion detection system with protection from an internal intruder

SI Shterenberg, MA Poltavtseva - Automatic Control and Computer …, 2018 - Springer
The protection of modern distributed information networks from external and internal
intruders continues to be of great importance due to the development of data transmission …

Probability risk identification based intrusion detection system for SCADA systems

T Marsden, N Moustafa, E Sitnikova… - Mobile Networks and …, 2018 - Springer
Abstract As Supervisory Control and Data Acquisition (SCADA) systems control several
critical infrastructures, they have connected to the internet. Consequently, SCADA systems …

Risk identification-based association rule mining for supply chain big data

A Salamai, M Saberi, O Hussain, E Chang - Security, Privacy, and …, 2018 - Springer
Since most supply chain processes include operational risks, the effectiveness of a
corporation's success depends mainly on identifying, analyzing and managing them …