A machine learning security framework for iot systems

M Bagaa, T Taleb, JB Bernabe, A Skarmeta - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things security is attracting a growing attention from both academic and industry
communities. Indeed, IoT devices are prone to various security attacks varying from Denial …

Network intrusion detection based on supervised adversarial variational auto-encoder with regularization

Y Yang, K Zheng, B Wu, Y Yang, X Wang - IEEE access, 2020 - ieeexplore.ieee.org
To explore the advantages of adversarial learning and deep learning, we propose a novel
network intrusion detection model called SAVAER-DNN, which can not only detect known …

BigTrustScheduling: Trust-aware big data task scheduling approach in cloud computing environments

G Rjoub, J Bentahar, OA Wahab - Future Generation Computer Systems, 2020 - Elsevier
Big data task scheduling in cloud computing environments has gained considerable
attention in the past few years, due to the exponential growth in the number of businesses …

Federated TON_IoT Windows datasets for evaluating AI-based security applications

N Moustafa, M Keshky, E Debiez… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
Existing cyber security solutions have been basically developed using knowledge-based
models that often cannot trigger new cyber-attack families. With the boom of Artificial …

Data analytics-enabled intrusion detection: Evaluations of ToN_IoT linux datasets

N Moustafa, M Ahmed, S Ahmed - 2020 IEEE 19th International …, 2020 - ieeexplore.ieee.org
With the widespread of Artificial Intelligence (AI)-enabled security applications, there is a
need for collecting heterogeneous and scalable data sources for effectively evaluating the …

[PDF][PDF] Designing an effective network forensic framework for the investigation of botnets in the Internet of Things

N Koroniotis - 2020 - unsworks.unsw.edu.au
In recent times, the world has come to rely greatly on the Internet and the services that it
provides. As such, it should come as no surprise that innovations that harness the …

Incorporating evolutionary computation for securing wireless network against cyberthreats

S Dwivedi, M Vardhan, S Tripathi - The Journal of Supercomputing, 2020 - Springer
Due to the rapid growth of internet services, the demand for protection and security of the
network against sophisticated attacks is continuously increasing. Nowadays, in network …

Feature reduction and classifications techniques for intrusion detection system

G Sah, S Banerjee - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
Today, an intelligent intrusion detection system is very important to enable high-level
security in Networks to protect private and highly sensitive information. Nowadays, an …

A comparative evaluation of unsupervised deep architectures for intrusion detection in sequential data streams

D Sovilj, P Budnarain, S Sanner, G Salmon… - Expert Systems with …, 2020 - Elsevier
Cybersecurity data remains a challenge for the machine learning community as the high
volume of traffic makes it difficult to properly disambiguate anomalous from normal …

NADS-RA: network anomaly detection scheme based on feature representation and data augmentation

X Liu, X Di, Q Ding, W Liu, H Qi, J Li, H Yang - IEEE Access, 2020 - ieeexplore.ieee.org
Network anomaly detection aims to identify network anomalies, and it has obtained many
achievements using the supervised classification technique. Since the supervised classifier …