[PDF][PDF] The role of intrusion detection/prevention systems in modern computer networks: A review

S Thapa, A Mailewa - Conference: Midwest Instruction and …, 2020 - easychair.org
The emergence of new devices that make use of the Internet as their primary utility has
made network security one of the most important domains in the world today. Intrusions in …

[PDF][PDF] Data integrity attacks in cloud computing: A review of identifying and protecting techniques

DVS Kaja, Y Fatima, AB Mailewa - J. homepage www. ijrpr. com …, 2022 - researchgate.net
Cloud computing is growing tremendously in recent years. Many organizations are switching
their traditional computing model to a cloud based because of its low cost and pay-as-you …

Discover botnets in IoT sensor networks: A lightweight deep learning framework with hybrid self-organizing maps

S Khan, AB Mailewa - Microprocessors and Microsystems, 2023 - Elsevier
In recent years, we have witnessed a massive growth of intrusion attacks targeted at Internet
of things (IoT) devices. Due to inherent security vulnerabilities, it has become an easy target …

CAVP: A context-aware vulnerability prioritization model

B Jung, Y Li, T Bechor - Computers & Security, 2022 - Elsevier
With the growing number of vulnerabilities while attacks are becoming more advanced,
known software security vulnerabilities need to be managed more efficiently with …

Vulnerability exploitation risk assessment based on offensive security approach

SS Yoon, DY Kim, KK Kim, IC Euom - Applied Sciences, 2023 - mdpi.com
Security incidents targeting control systems and the industrial internet of things (IIoT) are on
the rise as attackers gain a better understanding of the nature of these systems and their …

Security assurance of MongoDB in singularity LXCs: an elastic and convenient testbed using Linux containers to explore vulnerabilities

AM Dissanayaka, S Mengel, L Gittner, H Khan - Cluster Computing, 2020 - Springer
It is essential to ensure the data security of data analytical frameworks as any security
vulnerability existing in the system can lead to a data loss or data breach. This vulnerability …

[HTML][HTML] Mechanisms and techniques to enhance the security of big data analytic framework with mongodb and Linux containers

A Mailewa, S Mengel, L Gittner, H Khan - Array, 2022 - Elsevier
The frequency and scale of unauthorized access cases and misuses of data access
privileges are a growing concern of many organizations. The protection of confidential data …

An environment-specific prioritization model for information-security vulnerabilities based on risk factor analysis

J Reyes, W Fuertes, P Arévalo, M Macas - Electronics, 2022 - mdpi.com
Vulnerabilities represent a constant and growing risk for organizations. Their successful
exploitation compromises the integrity and availability of systems. The use of specialized …

Detecting network transmission anomalies using autoencoders-SVM neural network on multi-class NSL-KDD dataset

SS Khan, AB Mailewa - 2023 IEEE 13th Annual computing and …, 2023 - ieeexplore.ieee.org
As modern manufacturing shifts towards industry 4.0, mass adoption of vulnerable Internet-
of-Things (IoT), Operational Technology (OT), and IT-OT convergence have precipitated the …

Network anomaly uncovering on CICIDS-2017 dataset: a supervised artificial intelligence approach

P Jairu, AB Mailewa - 2022 IEEE International Conference on …, 2022 - ieeexplore.ieee.org
In today's world, businesses and services are shifted to a digital transformation. As a result,
network traffic has tremendously increased over the years. With that, network threats and …