A survey of data mining and machine learning methods for cyber security intrusion detection

AL Buczak, E Guven - IEEE Communications surveys & tutorials, 2015 - ieeexplore.ieee.org
This survey paper describes a focused literature survey of machine learning (ML) and data
mining (DM) methods for cyber analytics in support of intrusion detection. Short tutorial …

Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities

S Zhang, D Zhu - Computer Networks, 2020 - Elsevier
Abstract 6G is expected to support the unprecedented Internet of everything scenarios with
extremely diverse and challenging requirements. To fulfill such diverse requirements …

[图书][B] Machine learning and security: Protecting systems with data and algorithms

C Chio, D Freeman - 2018 - books.google.com
Can machine learning techniques solve our computer security problems and finally put an
end to the cat-and-mouse game between attackers and defenders? Or is this hope merely …

A comprehensive measurement study of domain generating malware

D Plohmann, K Yakdan, M Klatt, J Bader… - 25th USENIX Security …, 2016 - usenix.org
Recent years have seen extensive adoption of domain generation algorithms (DGA) by
modern botnets. The main goal is to generate a large number of domain names and then …

Predicting domain generation algorithms with long short-term memory networks

J Woodbridge, HS Anderson, A Ahuja… - arXiv preprint arXiv …, 2016 - arxiv.org
Various families of malware use domain generation algorithms (DGAs) to generate a large
number of pseudo-random domain names to connect to a command and control (C&C) …

Botnet attack detection in Internet of Things devices over cloud environment via machine learning

M Waqas, K Kumar, AA Laghari… - Concurrency and …, 2022 - Wiley Online Library
With the arrival of the Internet of Things (IoT) many devices such as sensors, nowadays can
communicate with each other and share data easily. However, the IoT paradigm is prone to …

A survey on malicious domains detection through DNS data analysis

Y Zhauniarovich, I Khalil, T Yu, M Dacier - ACM Computing Surveys …, 2018 - dl.acm.org
Malicious domains are one of the major resources required for adversaries to run attacks
over the Internet. Due to the important role of the Domain Name System (DNS), extensive …

Distributed privacy-preserving collaborative intrusion detection systems for VANETs

T Zhang, Q Zhu - IEEE Transactions on Signal and Information …, 2018 - ieeexplore.ieee.org
Vehicular ad hoc network (VANET) is an enabling technology in modern transportation
systems for providing safety and valuable information, and yet vulnerable to a number of …

DNS rule-based schema to botnet detection

K Alieyan, A Almomani, M Anbar… - Enterprise Information …, 2021 - Taylor & Francis
Botnets are considered a serious issue today. They have several negative economic
impacts as well. Such impacts are affecting organizations and individuals. Recent botnets …

{FANCI}: Feature-based automated {NXDomain} classification and intelligence

S Schüppen, D Teubert, P Herrmann… - 27th USENIX Security …, 2018 - usenix.org
FANCI is a novel system for detecting infections with domain generation algorithm (DGA)
based malware by monitoring non-existent domain (NXD) responses in DNS traffic. It relies …