[HTML][HTML] A systematic review of defensive and offensive cybersecurity with machine learning

ID Aiyanyo, H Samuel, H Lim - Applied Sciences, 2020 - mdpi.com
This is a systematic review of over one hundred research papers about machine learning
methods applied to defensive and offensive cybersecurity. In contrast to previous reviews …

A survey of link flooding attacks in software defined network ecosystems

R ur Rasool, H Wang, U Ashraf, K Ahmed… - Journal of Network and …, 2020 - Elsevier
Abstract Link Flooding Attacks (LFA) are a devastating type of stealthy denial of service
attack that congests critical network links and can completely isolate the victim's network. In …

A taxonomy of network threats and the effect of current datasets on intrusion detection systems

H Hindy, D Brosset, E Bayne, AK Seeam… - IEEE …, 2020 - ieeexplore.ieee.org
As the world moves towards being increasingly dependent on computers and automation,
building secure applications, systems and networks are some of the main challenges faced …

Voting extreme learning machine based distributed denial of service attack detection in cloud computing

GS Kushwah, V Ranga - Journal of Information Security and Applications, 2020 - Elsevier
Distributed denial of service attack is one of the most dangerous attacks in cloud computing.
This attack makes the cloud services inaccessible to the end-users by exhausting resources …

[HTML][HTML] Benchmark-based reference model for evaluating botnet detection tools driven by traffic-flow analytics

KS Huancayo Ramos, MA Sotelo Monge… - Sensors, 2020 - mdpi.com
Botnets are some of the most recurrent cyber-threats, which take advantage of the wide
heterogeneity of endpoint devices at the Edge of the emerging communication environments …

Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection

S Dwivedi, M Vardhan, S Tripathi, AK Shukla - Evolutionary intelligence, 2020 - Springer
Intrusion detection has become important to network security because of the increasing
connectivity between computers and internet. Various Intrusion Detection Systems have …

An effect of chaos grasshopper optimization algorithm for protection of network infrastructure

S Dwivedi, M Vardhan, S Tripathi - Computer Networks, 2020 - Elsevier
Due to the proliferation of sophisticated cyber extortion with exponentially critical effects,
intrusion detection system is being evolved systematically their revealing, understanding …

Artificial immune systems and fuzzy logic to detect flooding attacks in software-defined networks

GF Scaranti, LF Carvalho, S Barbon… - IEEE Access, 2020 - ieeexplore.ieee.org
Software-defined Networking (SDN) has been discovered as an architecture that uses
applications to make networks flexible and centrally controlled. Although SDN provides …

Incorporating evolutionary computation for securing wireless network against cyberthreats

S Dwivedi, M Vardhan, S Tripathi - The Journal of Supercomputing, 2020 - Springer
Due to the rapid growth of internet services, the demand for protection and security of the
network against sophisticated attacks is continuously increasing. Nowadays, in network …

Sok: A taxonomy for anomaly detection in wireless sensor networks focused on node-level techniques

D Widhalm, KM Goeschka, W Kastner - Proceedings of the 15th …, 2020 - dl.acm.org
Wireless sensor networks play an important role in today's world: When measuring physical
conditions, the quality of the sensor readings ultimately impacts the quality of various data …