Experimental review of neural-based approaches for network intrusion management

M Di Mauro, G Galatro, A Liotta - IEEE Transactions on Network …, 2020 - ieeexplore.ieee.org
The use of Machine Learning (ML) techniques in Intrusion Detection Systems (IDS) has
taken a prominent role in the network security management field, due to the substantial …

Intrusion detection systems: A state-of-the-art taxonomy and survey

M Alkasassbeh, S Al-Haj Baddar - Arabian Journal for Science and …, 2023 - Springer
Abstract Intrusion Detection Systems (IDSs) have become essential to the sound operations
of networks. These systems have the potential to identify and report deviations from normal …

LUCID: A practical, lightweight deep learning solution for DDoS attack detection

R Doriguzzi-Corin, S Millar… - … on Network and …, 2020 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks are one of the most harmful threats in today's
Internet, disrupting the availability of essential services. The challenge of DDoS detection is …

[HTML][HTML] Network traffic classification for data fusion: A survey

J Zhao, X Jing, Z Yan, W Pedrycz - Information Fusion, 2021 - Elsevier
Traffic classification groups similar or related traffic data, which is one main stream
technique of data fusion in the field of network management and security. With the rapid …

Software-defined DDoS detection with information entropy analysis and optimized deep learning

Y Liu, T Zhi, M Shen, L Wang, Y Li, M Wan - Future Generation Computer …, 2022 - Elsevier
Abstract Software Defined Networking (SDN) decouples the control plane and the data
plane and solves the difficulty of new services deployment. However, the threat of a single …

A generalized machine learning model for DDoS attacks detection using hybrid feature selection and hyperparameter tuning

RK Batchu, H Seetha - Computer Networks, 2021 - Elsevier
In the digital era, the usage of network-connected devices is rapidly growing which leads to
an increase in cyberattacks. Among them, Distributed Denial of Service (DDoS) attacks are …

A comprehensive survey on DDoS defense systems: New trends and challenges

Q Li, H Huang, R Li, J Lv, Z Yuan, L Ma, Y Han… - Computer Networks, 2023 - Elsevier
In the past ten years, the source of DDoS has migrated to botnets composed of IoT devices.
The scale of DDoS attacks increases dramatically with the number of IoT devices. New …

A transfer double deep Q network based DDoS detection method for internet of vehicles

Z Li, Y Kong, C Jiang - IEEE Transactions on Vehicular …, 2023 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attacks have become one of the main factors restricting
the development of internet of vehicles (IoV). Although some intelligent reinforcement …

Conditional variational auto-encoder and extreme value theory aided two-stage learning approach for intelligent fine-grained known/unknown intrusion detection

J Yang, X Chen, S Chen, X Jiang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Promptly discovering unknown network attacks is critical for reducing the risk of major loss
imposed on organizations and information infrastructure. This paper aims at developing an …

Explainable AI-based DDOS attack identification method for IoT networks

CS Kalutharage, X Liu, C Chrysoulas, N Pitropakis… - Computers, 2023 - mdpi.com
The modern digitized world is mainly dependent on online services. The availability of
online systems continues to be seriously challenged by distributed denial of service (DDoS) …