MEMBER: A multi-task learning model with hybrid deep features for network intrusion detection

J Lan, X Liu, B Li, J Sun, B Li, J Zhao - Computers & Security, 2022 - Elsevier
With the continuous occurrence of cybersecurity incidents, network intrusion detection has
become one of the most critical issues in cyber ecosystems. Although previous machine …

Applications of sketches in network traffic measurement: A survey

H Han, Z Yan, X Jing, W Pedrycz - Information Fusion, 2022 - Elsevier
Accurate and timely network traffic measurement is essential for network status monitoring,
network fault analysis, network intrusion detection, and network security management. With …

ExtendedSketch: Fusing network traffic for super host identification with a memory efficient sketch

X Jing, Z Yan, H Han, W Pedrycz - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Super host refers to the host that has a high cardinality or exhibits a big change in a network.
Facing big-volume network traffic, sketches have been widely applied to identify super hosts …

SuperSketch: A multi-dimensional reversible data structure for super host identification

X Jing, H Han, Z Yan, W Pedrycz - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Facing big network traffic data, effective data compression becomes crucially important and
urgently needed for estimating host cardinalities and identifying super hosts. However, the …

ExtendedSketch+: Super host identification and network host trust evaluation with memory efficiency and high accuracy

H Han, X Jing, Z Yan, W Pedrycz - Information Fusion, 2023 - Elsevier
Host cardinality estimation is one crucial task in network traffic measurement. Super host is
the host that exhibits anomalies in host cardinality and it is usually related to network …

Stochastic Stabilization of Dual-Layer Rumor Propagation Model with Multiple Channels and Rumor-Detection Mechanism

X Zhong, C Luo, X Dong, D Bai, G Liu, Y Xie, Y Peng - Entropy, 2023 - mdpi.com
With the development of information technology, individuals are able to receive rumor
information through various channels and subsequently act based on their own perceptions …

Benchmarking Unsupervised Online IDS for Masquerade Attacks in CAN

P Moriano, SC Hespeler, M Li, RA Bridges - arXiv preprint arXiv …, 2024 - arxiv.org
Vehicular controller area networks (CANs) are susceptible to masquerade attacks by
malicious adversaries. In masquerade attacks, adversaries silence a targeted ID and then …

[PDF][PDF] A comprehensive security operation center based on big data analytics and threat intelligence [C]

J Wang, T Yan, D An, Z Liang, C Guo, H Hu… - … Symposium on Grids & …, 2021 - pos.sissa.it
Organizations suffer frequent attacks by adversaries with different agendas, and these
attacks, if successful, result in severe consequences to the organizations, their clients, and …

Towards Accurate and Efficient Super Spreader Detection with Sketching

S Song, P Wang, Y Li, N Wang… - 2023 8th International …, 2023 - ieeexplore.ieee.org
Super spreaders are the flow that have a large number of distinct connections (also called
spread), which related with many threats to networks. Estimating flow spread is the crucial …

Low-rate attack detection with intelligent fine-grained network analysis

B Pratomo - 2020 - orca.cardiff.ac.uk
Low-rate attacks are a type of attacks that silently infiltrate the victim network, control
computers, and steal sensitive data. As the effect of this attack type is devastating, it is …