Machine learning and deep learning techniques for cybersecurity: a review

SA Salloum, M Alshurideh, A Elnagar… - … Conference on Artificial …, 2020 - Springer
In this review, significant literature surveys on machine learning (ML) and deep learning
(DL) techniques for network analysis of intrusion detection are explained. In addition, it …

A review on cyber security datasets for machine learning algorithms

O Yavanoglu, M Aydos - … conference on big data (big data), 2017 - ieeexplore.ieee.org
It is an undeniable fact that currently information is a pretty significant presence for all
companies or organizations. Therefore protecting its security is crucial and the security …

Detection of zero-day attacks: An unsupervised port-based approach

A Blaise, M Bouet, V Conan, S Secci - Computer Networks, 2020 - Elsevier
Last years have witnessed more and more DDoS attacks towards high-profile websites, as
the Mirai botnet attack on September 2016, or more recently the memcached attack on …

A survey on botnets: Incentives, evolution, detection and current trends

SN Thanh Vu, M Stege, PI El-Habr, J Bang, N Dragoni - Future Internet, 2021 - mdpi.com
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained
prominence in an era of pervasive computing and the Internet of Things. Botnets have …

A survey on representation learning efforts in cybersecurity domain

M Usman, MA Jan, X He, J Chen - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
In this technology-based era, network-based systems are facing new cyber-attacks on daily
bases. Traditional cybersecurity approaches are based on old threat-knowledge databases …

Use of Machine Learning algorithms for designing efficient cyber security solutions

S Soni, B Bhushan - 2019 2nd international conference on …, 2019 - ieeexplore.ieee.org
With rapidly increment of internet traffic, the importance of cyber security also increases
significantly. Several areas like IP traffic classifications, detection of-intrusion, spam and …

A frontier: Dependable, reliable and secure machine learning for network/system management

DC Le, N Zincir-Heywood - Journal of Network and Systems Management, 2020 - Springer
Modern networks and systems pose many challenges to traditional management
approaches. Not only the number of devices and the volume of network traffic are increasing …

A survey on Botnet: Classification, detection and defense

P Amini, MA Araghizadeh… - 2015 International …, 2015 - ieeexplore.ieee.org
In recent years, Botnets have become an important security problem on the Internet. Botnets
have been used for many attacks, such as banking information theft, spam, distributed denial …

Peerhunter: Detecting peer-to-peer botnets through community behavior analysis

D Zhuang, JM Chang - 2017 IEEE Conference on Dependable …, 2017 - ieeexplore.ieee.org
Peer-to-peer (P2P) botnets have become one of the major threats in network security for
serving as the infrastructure that responsible for various of cyber-crimes. Though a few …

Malware detection using power consumption and network traffic data

JH Jimenez… - 2019 2nd International …, 2019 - ieeexplore.ieee.org
Even though malware detection is an active area of research, not many works have used
features extracted from physical properties, such as power consumption. This paper is …