A holistic review of network anomaly detection systems: A comprehensive survey

N Moustafa, J Hu, J Slay - Journal of Network and Computer Applications, 2019 - Elsevier
Abstract Network Anomaly Detection Systems (NADSs) are gaining a more important role in
most network defense systems for detecting and preventing potential threats. The paper …

An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems

M Keshk, E Sitnikova, N Moustafa… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Protecting Cyber-physical Systems (CPSs) is highly important for preserving sensitive
information and detecting cyber threats. Developing a robust privacy-preserving anomaly …

Identifying and benchmarking key features for cyber intrusion detection: An ensemble approach

A Binbusayyis, T Vaiyapuri - IEEE Access, 2019 - ieeexplore.ieee.org
In today's interconnected era, intrusion detection system (IDS) has the potential to be the
frontier of defense against cyberattacks and plays an essential role in achieving security of …

Outlier dirichlet mixture mechanism: Adversarial statistical learning for anomaly detection in the fog

N Moustafa, KKR Choo, I Radwan… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Current anomaly detection systems (ADSs) apply statistical and machine learning
algorithms to discover zero-day attacks, but such algorithms are vulnerable to advanced …

CorrCorr: A feature selection method for multivariate correlation network anomaly detection techniques

F Gottwalt, E Chang, T Dillon - Computers & Security, 2019 - Elsevier
Recent research on network intrusion detection has focused on correlation-based
techniques, which allow one to adapt to continuously changing environments such as the …

Framework for detection of malicious activities in IoT networks using keras deep learning library

A Nagisetty, GP Gupta - 2019 3rd international conference on …, 2019 - ieeexplore.ieee.org
Secure and reliable services of the smart cities are generally depend on the reliable
services provided by different devices of the Internet of Things ecosystem and Internet of …

A heuristic intrusion detection system for Internet-of-Things (IoT)

AH Qureshi, H Larijani, J Ahmad, N Mtetwa - … Computing: Proceedings of …, 2019 - Springer
Today, digitally connected devices are involved in every aspect of life due to the
advancements in Internet-of-Things (IoT) paradigm. Recently, it has been a driving force for …

Autonomic intrusion detection and response using big data

K Vieira, FL Koch, JBM Sobral… - IEEE Systems …, 2019 - ieeexplore.ieee.org
We present a method for autonomic intrusion detection and response to optimize processes
of cybersecurity in large distributed systems. These environments are characterized by …

Review on insider threat detection techniques

TO Oladimeji, CK Ayo… - Journal of Physics …, 2019 - iopscience.iop.org
An insider, also regarded as an employee of a company, becomes a threat when the
intention or action can affect the company negatively. Insider threat has been an eminent …

Cross-site scripting (XSS) detection integrating evidences in multiple stages

J Zhang, YT Jou, X Li - 2019 - scholarspace.manoa.hawaii.edu
Abstract As Cross-Site Scripting (XSS) remains one of the top web security risks, people
keep exploring ways to detect such attacks efficiently. So far, existing solutions only focus on …