Deep cybersecurity: a comprehensive overview from neural network and deep learning perspective

IH Sarker - SN Computer Science, 2021 - Springer
Deep learning, which is originated from an artificial neural network (ANN), is one of the
major technologies of today's smart cybersecurity systems or policies to function in an …

A survey on data-driven network intrusion detection

D Chou, M Jiang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Data-driven network intrusion detection (NID) has a tendency towards minority attack
classes compared to normal traffic. Many datasets are collected in simulated environments …

Deep Q-learning based reinforcement learning approach for network intrusion detection

H Alavizadeh, H Alavizadeh, J Jang-Jaccard - Computers, 2022 - mdpi.com
The rise of the new generation of cyber threats demands more sophisticated and intelligent
cyber defense solutions equipped with autonomous agents capable of learning to make …

Security threats, defense mechanisms, challenges, and future directions in cloud computing

S El Kafhali, I El Mir, M Hanini - Archives of Computational Methods in …, 2022 - Springer
Several new technologies such as the smart cities, the Internet of Things (IoT), and 5G
Internet need services offered by cloud computing for processing and storing more …

DMAIDPS: A distributed multi-agent intrusion detection and prevention system for cloud IoT environments

A Javadpour, P Pinto, F Ja'fari, W Zhang - Cluster Computing, 2023 - Springer
Abstract Cloud Internet of Things (CIoT) environments, as the essential basis for computing
services, have been subject to abuses and cyber threats. The adversaries constantly search …

Cyber-security and reinforcement learning—a brief survey

AMK Adawadkar, N Kulkarni - Engineering Applications of Artificial …, 2022 - Elsevier
This paper presents a comprehensive literature review on Reinforcement Learning (RL)
techniques used in Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) …

[HTML][HTML] Deep neural networks in the cloud: Review, applications, challenges and research directions

KY Chan, B Abu-Salih, R Qaddoura, AZ Ala'M… - Neurocomputing, 2023 - Elsevier
Deep neural networks (DNNs) are currently being deployed as machine learning technology
in a wide range of important real-world applications. DNNs consist of a huge number of …

Deep reinforcement learning for anomaly detection: A systematic review

K Arshad, RF Ali, A Muneer, IA Aziz, S Naseer… - IEEE …, 2022 - ieeexplore.ieee.org
Anomaly detection has been used to detect and analyze anomalous elements from data for
years. Various techniques have been developed to detect anomalies. However, the most …

[HTML][HTML] Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents

L Erdődi, ÅÅ Sommervoll, FM Zennaro - Journal of Information Security and …, 2021 - Elsevier
In this paper, we propose a formalization of the process of exploitation of SQL injection
vulnerabilities. We consider a simplification of the dynamics of SQL injection attacks by …

Effective network intrusion detection by addressing class imbalance with deep neural networks multimedia tools and applications

M Rani, Gagandeep - Multimedia Tools and Applications, 2022 - Springer
Abstract The Intrusion Detection System plays a significant role in discovering malicious
activities and provides better network security solutions than other conventional defense …