[HTML][HTML] Quantum-empowered federated learning and 6G wireless networks for IoT security: Concept, challenges and future directions

D Javeed, MS Saeed, I Ahmad, M Adil, P Kumar… - Future Generation …, 2024 - Elsevier
Abstract The Internet of Things (IoT) has revolutionized various sectors by enabling
seamless device interaction. However, the proliferation of IoT devices has also raised …

Artificial intelligence-based anomaly detection technology over encrypted traffic: a systematic literature review

IH Ji, JH Lee, MJ Kang, WJ Park, SH Jeon, JT Seo - Sensors, 2024 - mdpi.com
As cyber-attacks increase in unencrypted communication environments such as the
traditional Internet, protected communication channels based on cryptographic protocols …

Deep-efficient-guard: securing wireless ad hoc networks via graph neural network

S Masood, A Zafar - International Journal of Information Technology, 2024 - Springer
This study presents a new intrusion detection system (IDS) for Wireless Ad hoc Networks,
leveraging graph neural networks (GNN). Overcoming the challenges faced by traditional …

A review on graph-based approaches for network security monitoring and botnet detection

S Lagraa, M Husák, H Seba, S Vuppala, R State… - International Journal of …, 2024 - Springer
This survey paper provides a comprehensive overview of recent research and development
in network security that uses graphs and graph-based data representation and analytics …

Unveiling encrypted traffic types through hierarchical network characteristics

Y Chen, J Yang, S Cui, C Dong, B Jiang, Y Liu… - Computers & Security, 2024 - Elsevier
The wide adoption of encrypted traffic brings challenges to network management. Previous
studies propose different approaches to tackle this problem. However, most of them still …

[HTML][HTML] Bot-DM: A dual-modal botnet detection method based on the combination of implicit semantic expression and graphical expression

G Wu, X Wang, Q Lu, H Zhang - Expert Systems with Applications, 2024 - Elsevier
A botnet is a group of hijacked devices that conduct various cyberattacks, which is one of the
most dangerous threats on the internet. Individuals or organizations can effectively detect …

DDoS attacks & defense mechanisms in SDN-enabled cloud: Taxonomy, review and research challenges

JK Chahal, A Bhandari, S Behal - Computer Science Review, 2024 - Elsevier
Software-defined Networking (SDN) is a transformative approach for addressing the
limitations of legacy networks due to decoupling of control planes from data planes. It offers …

Augmented Memory Replay-based Continual Learning Approaches for Network Intrusion Detection

S Channappayya, BR Tamma - Advances in Neural …, 2024 - proceedings.neurips.cc
Intrusion detection is a form of anomalous activity detection in communication network traffic.
Continual learning (CL) approaches to the intrusion detection task accumulate old …

B-CAT: a model for detecting botnet attacks using deep attack behavior analysis on network traffic flows

MAR Putra, T Ahmad, DP Hostiadi - Journal of Big Data, 2024 - Springer
Threats on computer networks have been increasing rapidly, and irresponsible parties are
always trying to exploit vulnerabilities in the network to do various dangerous things. One …

Toward generating a new cloud-based Distributed Denial of Service (DDoS) dataset and cloud intrusion traffic characterization

MM Shafi, AH Lashkari, V Rodriguez, R Nevo - Information, 2024 - mdpi.com
The distributed denial of service attack poses a significant threat to network security. Despite
the availability of various methods for detecting DDoS attacks, the challenge remains in …