APAD: Autoencoder-based payload anomaly detection for industrial IoE

SJ Kim, WY Jo, T Shon - Applied Soft Computing, 2020 - Elsevier
Abstract The Internet of Things era is being replaced by the Internet of Everything (IoE) era,
where everything can communicate with everything else. With the advent of the fourth …

Payload-byte: A tool for extracting and labeling packet capture files of modern network intrusion detection datasets

YA Farrukh, I Khan, S Wali, D Bierbrauer… - 2022 IEEE/ACM …, 2022 - ieeexplore.ieee.org
Adapting modern approaches for network intrusion detection is becoming critical, given the
rapid technological advancement and adversarial attack rates. Therefore, packet-based …

Network malware classification comparison using DPI and flow packet headers

A Boukhtouta, SA Mokhov, NE Lakhdari… - Journal of Computer …, 2016 - Springer
In order to counter cyber-attacks and digital threats, security experts must generate, share,
and exploit cyber-threat intelligence generated from malware. In this research, we address …

Intrusion detection using payload embeddings

M Hassan, ME Haque, ME Tozal, V Raghavan… - IEEE …, 2021 - ieeexplore.ieee.org
Attacks launched over the Internet often degrade or disrupt the quality of online services.
Various Intrusion Detection Systems (IDSs), with or without prevention capabilities, have …

An investigation to detect banking malware network communication traffic using machine learning techniques

MA Kazi, S Woodhead, D Gan - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
Banking malware are malicious programs that attempt to steal confidential information, such
as banking authentication credentials, from users. Zeus is one of the most widespread …

[PDF][PDF] Types and Methods of Detecting the Penetration of MaliciousCargoes

HMJ Alfouadi, NMN Saeea, NAF Neamah - Wasit Journal of Computer and …, 2023 - iasj.net
Intrusion detection systems are management programs that detect possible attacks on
networks and computers, and usually do so by identifying information in the header of …

A meta-classification model for optimized zbot malware prediction using learning algorithms

S Jagan, A Ashish, M Mahdal, KR Isabels, J Dhanke… - Mathematics, 2023 - mdpi.com
Botnets pose a real threat to cybersecurity by facilitating criminal activities like malware
distribution, attacks involving distributed denial of service, fraud, click fraud, phishing, and …

Virtualizing and sharing reconfigurable resources in high-performance reconfigurable computing systems

E El-Araby, I Gonzalez… - 2008 Second International …, 2008 - ieeexplore.ieee.org
High-performance reconfigurable computers (HPRCs) are parallel computers but with
added FPGA chips. Examples of such systems are the Cray XT5 h and Cray XD1, the SRC-7 …

Traffic classification and verification using unsupervised learning of Gaussian Mixture Models

H Alizadeh, A Khoshrou… - 2015 IEEE international …, 2015 - ieeexplore.ieee.org
This paper presents the use of unsupervised Gaussian Mixture Models (GMMs) for the
production of per-application models using their flows' statistics in order to be exploited in …

Survey on botnet detection techniques

R Mishra, SK Jha - Internet of Things and Its Applications: Select …, 2022 - Springer
Due to unpleasant market competition, IT companies are releasing the software or
applications without much considering the unintended security breaches presented inside it …