Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review

N Mishra, S Pandya - IEEE Access, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) technology is prospering and entering every part of our lives, be it
education, home, vehicles, or healthcare. With the increase in the number of connected …

Multi‐aspects AI‐based modeling and adversarial learning for cybersecurity intelligence and robustness: A comprehensive overview

IH Sarker - Security and Privacy, 2023 - Wiley Online Library
Due to the rising dependency on digital technology, cybersecurity has emerged as a more
prominent field of research and application that typically focuses on securing devices …

Cloud security based attack detection using transductive learning integrated with Hidden Markov Model

Y Aoudni, C Donald, A Farouk, KB Sahay… - Pattern recognition …, 2022 - Elsevier
In recent years, organizations and enterprises put huge attention on their network security.
The attackers were able to influence vulnerabilities for the configuration of the network …

Comparative evaluation of ai-based techniques for zero-day attacks detection

S Ali, SU Rehman, A Imran, G Adeem, Z Iqbal, KI Kim - Electronics, 2022 - mdpi.com
Many intrusion detection and prevention systems (IDPS) have been introduced to identify
suspicious activities. However, since attackers are exploiting new vulnerabilities in systems …

Detecting zero-day intrusion attacks using semi-supervised machine learning approaches

I Mbona, JHP Eloff - IEEE Access, 2022 - ieeexplore.ieee.org
Recently, network intrusion attacks, particularly new unknown attacks referred to as zero-day
attacks, have become a global phenomenon. Zero-day network intrusion attacks constitute a …

A robust intelligent zero-day cyber-attack detection technique

V Kumar, D Sinha - Complex & Intelligent Systems, 2021 - Springer
With the introduction of the Internet to the mainstream like e-commerce, online banking,
health system and other day-to-day essentials, risk of being exposed to various are …

[HTML][HTML] Future of generative adversarial networks (GAN) for anomaly detection in network security: A review

W Lim, KYS Chek, LB Theng, CTC Lin - Computers & Security, 2024 - Elsevier
Anomaly detection is crucial in various applications, particularly cybersecurity and network
intrusion. However, a common challenge across anomaly detection techniques is the …

Spoki: Unveiling a new wave of scanners through a reactive network telescope

R Hiesgen, M Nawrocki, A King, A Dainotti… - 31st USENIX Security …, 2022 - usenix.org
Large-scale Internet scans are a common method to identify victims of a specific attack.
Stateless scanning like in ZMap has been established as an efficient approach to probing at …

Toward feasible machine learning model updates in network-based intrusion detection

P Horchulhack, EK Viegas, AO Santin - Computer Networks, 2022 - Elsevier
Over the last years, several works have proposed highly accurate machine learning (ML)
techniques for network-based intrusion detection systems (NIDS), that are hardly used in …

HNN: a novel model to study the intrusion detection based on multi-feature correlation and temporal-spatial analysis

S Lei, C Xia, Z Li, X Li, T Wang - IEEE Transactions on Network …, 2021 - ieeexplore.ieee.org
Network intrusion poses a severe threat to the Internet. Intrusion detection methods based
on deep learning are very effective to process and analyze intrusion data. On the one hand …