In-vehicle network intrusion detection using deep convolutional neural network

HM Song, J Woo, HK Kim - Vehicular Communications, 2020 - Elsevier
The implementation of electronics in modern vehicles has resulted in an increase in attacks
targeting in-vehicle networks; thus, attack detection models have caught the attention of the …

Application of machine learning to accidents detection at directional drilling

E Gurina, N Klyuchnikov, A Zaytsev… - Journal of Petroleum …, 2020 - Elsevier
We present a data-driven algorithm and mathematical model for anomaly alarming at
directional drilling. The algorithm is based on machine learning. It compares the real-time …

Lightweight collaborative anomaly detection for the IoT using blockchain

Y Mirsky, T Golomb, Y Elovici - Journal of Parallel and Distributed …, 2020 - Elsevier
Due to their rapid growth and deployment, the Internet of things (IoT) have become a central
aspect of our daily lives. Unfortunately, IoT devices tend to have many vulnerabilities which …

FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems

W Haider, N Moustafa, M Keshk, A Fernandez… - Computers & …, 2020 - Elsevier
As existing system calls-based Host Anomaly Detection Systems (HADSs) exclude hidden
patterns that can reside in the elapsed times of system calls with respect to the lifecycle of a …

[HTML][HTML] Feature extraction based on word embedding models for intrusion detection in network traffic

R Corizzo, E Zdravevski, M Russell… - … , Security and Safety, 2020 - oaepublish.com
Aim: The analysis of network traffic plays a crucial role in modern organizations since it can
provide defense mechanisms against cyberattacks. In this context, machine learning …

Using attack injection to evaluate intrusion detection effectiveness in container-based systems

J Flora, P Gonçalves, N Antunes - 2020 IEEE 25th Pacific Rim …, 2020 - ieeexplore.ieee.org
Containers revolutionized cloud applications, as they are lightweight, highly portable and
ideal for microservices. Although they are being adopted in business-critical scenarios, they …

Asymmetrical challenges for web security

MR Hansen - US Patent 10,567,419, 2020 - Google Patents
This document describes, among other things, a computerimplemented method for
improving the security of one or more computing systems. The method can include …

A survey of intrusion detection system

P Wanda, HJ Jie - International Journal of Informatics and …, 2020 - ijicom.respati.ac.id
Nowadays, the evolution of the internet and the use of computer systems has resulted in the
huge electronic transformation of data that experienced multiple problems such as security …

Investigation of dual-flow deep learning models LSTM-FCN and GRU-FCN efficiency against single-flow CNN models for the host-based intrusion and malware …

D Čeponis, N Goranin - Applied Sciences, 2020 - mdpi.com
Intrusion and malware detection tasks on a host level are a critical part of the overall
information security infrastructure of a modern enterprise. While classical host-based …

Detecting malicious logins as graph anomalies

BA Powell - Journal of information security and applications, 2020 - Elsevier
Authenticated lateral movement via compromised accounts is a common adversarial
maneuver that is challenging to discover with signature-or rules-based intrusion detection …