A two-level hybrid model for anomalous activity detection in IoT networks

I Ullah, QH Mahmoud - 2019 16th IEEE Annual Consumer …, 2019 - ieeexplore.ieee.org
In this paper we propose a two-level hybrid anomalous activity detection model for intrusion
detection in IoT networks. The level-1 model uses flow-based anomaly detection, which is …

Distributed traffic synthesis and classification in edge networks: A federated self-supervised learning approach

Y Xiao, R Xia, Y Li, G Shi, DN Nguyen… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
With the rising demand for wireless services and increased awareness of the need for data
protection, existing network traffic analysis and management architectures are facing …

Review of detection DDOS attack detection using naive bayes classifier for network forensics

A Fadlil, I Riadi, S Aji - Bulletin of Electrical Engineering and Informatics, 2017 - beei.org
Abstract Distributed Denial of Service (DDoS) is a type of attack using the volume, intensity,
and more costs mitigation to increase in this era. Attackers used many zombie computers to …

Deep IP flow inspection to detect beyond network anomalies

AA Amaral, L de Souza Mendes, BB Zarpelão… - Computer …, 2017 - Elsevier
Taking into account the accelerated rate of network growth, the occurrence of anomalies
becomes inevitable. A single anomaly can affect the network performance so it is crucial to …

[PDF][PDF] A novel ddos attack detection based on gaussian naive bayes

A Fadil, I Riadi, S Aji - Bulletin of Electrical Engineering and …, 2017 - researchgate.net
Abstract Distributed Denial of Service (DDoS) is a type of attack using the volume, intensity,
and more costs mitigation to increase in this era. Attackers used many zombie computers to …

An extensive research on cyber threats using learning algorithm

C Aravindan, T Frederick, V Hemamalini… - … on Emerging Trends …, 2020 - ieeexplore.ieee.org
Quotidian, the perspective of cyber attacks. New malware divergent are provoked almost
daily, the number of attacks is up by 56%. Many see cyber-security alliterative in the form of …

[PDF][PDF] Intrusion detection network attacks based on whale optimization algorithm

SA Mohamed, OI Alsaif, IA Saleh - Ingénierie des Systèmes d' …, 2022 - researchgate.net
Accepted: 7 June 2022 Network intrusion detection is a significant issue faced by the
Information technology industry. Hacker's attacks set of techniques cause confusion network …

Detection of distributed cyber attacks based on weighted ensembles of classifiers and big data processing architecture

I Kotenko, I Saenko, A Branitskiy - IEEE INFOCOM 2019-IEEE …, 2019 - ieeexplore.ieee.org
Distributed cyber attacks represent a special class of attacks on computer networks and
systems which is rather difficult to detect. In many respects it is explained by the complexity …

Securing industrial control systems from false data injection attacks with convolutional neural networks

S Potluri, S Ahmed, C Diedrich - Development and analysis of deep …, 2020 - Springer
Due to trends in modern infrastructure development and usage, the attacks on Industrial
Control Systems (ICS) are inevitable. New threats and other forms of attacks are constantly …

Denial of Service (DoS) attack identification and analyse using sniffing technique in the network environment

KA Fidele, WA Syafei - E3S Web of Conferences, 2020 - e3s-conferences.org
Network-based intruders such as (DoS) attacks have become one of the most significant
internet interruptions. Some operations that rely on the internet, such as banking …