IH Sarker - Security and Privacy, 2023 - Wiley Online Library
Due to the rising dependency on digital technology, cybersecurity has emerged as a more prominent field of research and application that typically focuses on securing devices …
In recent years, organizations and enterprises put huge attention on their network security. The attackers were able to influence vulnerabilities for the configuration of the network …
Many intrusion detection and prevention systems (IDPS) have been introduced to identify suspicious activities. However, since attackers are exploiting new vulnerabilities in systems …
Recently, network intrusion attacks, particularly new unknown attacks referred to as zero-day attacks, have become a global phenomenon. Zero-day network intrusion attacks constitute a …
V Kumar, D Sinha - Complex & Intelligent Systems, 2021 - Springer
With the introduction of the Internet to the mainstream like e-commerce, online banking, health system and other day-to-day essentials, risk of being exposed to various are …
W Lim, KYS Chek, LB Theng, CTC Lin - Computers & Security, 2024 - Elsevier
Anomaly detection is crucial in various applications, particularly cybersecurity and network intrusion. However, a common challenge across anomaly detection techniques is the …
Large-scale Internet scans are a common method to identify victims of a specific attack. Stateless scanning like in ZMap has been established as an efficient approach to probing at …
Over the last years, several works have proposed highly accurate machine learning (ML) techniques for network-based intrusion detection systems (NIDS), that are hardly used in …
S Lei, C Xia, Z Li, X Li, T Wang - IEEE Transactions on Network …, 2021 - ieeexplore.ieee.org
Network intrusion poses a severe threat to the Internet. Intrusion detection methods based on deep learning are very effective to process and analyze intrusion data. On the one hand …