A survey of stealth malware attacks, mitigation measures, and steps toward autonomous open world solutions

EM Rudd, A Rozsa, M Günther… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As our professional, social, and financial existences become increasingly digitized and as
our government, healthcare, and military infrastructures rely more on computer technologies …

Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization

C Fachkha, M Debbabi - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …

In-vehicle network intrusion detection using deep convolutional neural network

HM Song, J Woo, HK Kim - Vehicular Communications, 2020 - Elsevier
The implementation of electronics in modern vehicles has resulted in an increase in attacks
targeting in-vehicle networks; thus, attack detection models have caught the attention of the …

CNN-based network intrusion detection against denial-of-service attacks

J Kim, J Kim, H Kim, M Shim, E Choi - Electronics, 2020 - mdpi.com
As cyberattacks become more intelligent, it is challenging to detect advanced attacks in a
variety of fields including industry, national defense, and healthcare. Traditional intrusion …

A stacking ensemble for network intrusion detection using heterogeneous datasets

S Rajagopal, PP Kundapur… - Security and …, 2020 - Wiley Online Library
The problem of network intrusion detection poses innumerable challenges to the research
community, industry, and commercial sectors. Moreover, the persistent attacks occurring on …

A deep learning ensemble for network anomaly and cyber-attack detection

V Dutta, M Choraś, M Pawlicki, R Kozik - Sensors, 2020 - mdpi.com
Currently, expert systems and applied machine learning algorithms are widely used to
automate network intrusion detection. In critical infrastructure applications of communication …

Network intrusion detection system using J48 Decision Tree

S Sahu, BM Mehtre - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
As the number of cyber attacks have increased, detecting the intrusion in networks become
a very tough job. For network intrusion detection system (NIDS), many data mining and …

Applications in security and evasions in machine learning: a survey

R Sagar, R Jhaveri, C Borrego - Electronics, 2020 - mdpi.com
In recent years, machine learning (ML) has become an important part to yield security and
privacy in various applications. ML is used to address serious issues such as real-time …

[PDF][PDF] Intrusion detection system using data mining technique: Support vector machine

YB Bhavsar, KC Waghmare - International Journal of Emerging …, 2013 - academia.edu
Security and privacy of a system is compromised, when an intrusion happens. Intrusion
Detection System (IDS) plays vital role in network security as it detects various types of …

Support vector machine meets software defined networking in ids domain

L Boero, M Marchese… - 2017 29th International …, 2017 - ieeexplore.ieee.org
Intrusion Detection Systems (IDS) are aimed at analyzing and detecting security problems.
IDS based on anomaly detection and, in particular, on statistical analysis, inspect each traffic …