[HTML][HTML] Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions toward automation, intelligence and transparent cybersecurity modeling for critical …

IH Sarker, H Janicke, MA Ferrag, A Abuadbba - Internet of Things, 2024 - Elsevier
Critical infrastructure (CI) typically refers to the essential physical and virtual systems, assets,
and services that are vital for the functioning and well-being of a society, economy, or nation …

Generating realistic cyber data for training and evaluating machine learning classifiers for network intrusion detection systems

M Chalé, ND Bastian - Expert Systems with Applications, 2022 - Elsevier
Cyberspace operations, in conjunction with artificial intelligence and machine learning
enhanced cyberspace infrastructure, make it possible to connect sensors directly to shooters …

Payload-byte: A tool for extracting and labeling packet capture files of modern network intrusion detection datasets

YA Farrukh, I Khan, S Wali, D Bierbrauer… - 2022 IEEE/ACM …, 2022 - ieeexplore.ieee.org
Adapting modern approaches for network intrusion detection is becoming critical, given the
rapid technological advancement and adversarial attack rates. Therefore, packet-based …

Transfer learning for raw network traffic detection

DA Bierbrauer, MJ De Lucia, K Reddy… - Expert Systems with …, 2023 - Elsevier
Traditional machine learning models used for network intrusion detection systems rely on
vast amounts of network traffic data with expertly engineered features. The abundance of …

Machine learning raw network traffic detection

MJ De Lucia, PE Maxwell, ND Bastian… - … Learning for Multi …, 2021 - spiedigitallibrary.org
Increasingly cyber-attacks are sophisticated and occur rapidly, necessitating the use of
machine learning techniques for detection at machine speed. However, the use of machine …

Challenges and opportunities for generative methods in the cyber domain

M Chalé, ND Bastian - 2021 Winter Simulation Conference …, 2021 - ieeexplore.ieee.org
Large, high quality data sets are essential for training machine learning models to perform
their tasks accurately. The lack of such training data has constrained machine learning …

Constrained optimization based adversarial example generation for transfer attacks in network intrusion detection systems

M Chale, B Cox, J Weir, ND Bastian - Optimization Letters, 2023 - Springer
Deep learning has enabled network intrusion detection rates as high as 99.9% for malicious
network packets without requiring feature engineering. Adversarial machine learning …

Novelty detection in network traffic: Using survival analysis for feature identification

T Bradley, E Alhajjar, ND Bastian - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Network Intrusion Detection Systems (NIDS) are an important component of many
organizations' cyber defense, resiliency and assurance strategies. However, one downside …

Algorithm selection framework for cyber attack detection

M Chalé, ND Bastian, J Weir - Proceedings of the 2nd ACM Workshop …, 2020 - dl.acm.org
The number of cyber threats against both wired and wireless computer systems and other
components of the Internet of Things continues to increase annually. In this work, an …

Utilizing Deep Learning Techniques to Detect Zero Day Exploits in Network Traffic Flows

B Drozdenko, M Powell - 2022 IEEE 13th Annual Ubiquitous …, 2022 - ieeexplore.ieee.org
In recent times, the cybersecurity of naval systems has become a major concern; in
particular, there is an increased need for network traffic analysis and detecting the presence …