AI/ML for network security: The emperor has no clothes

AS Jacobs, R Beltiukov, W Willinger… - Proceedings of the …, 2022 - dl.acm.org
Several recent research efforts have proposed Machine Learning (ML)-based solutions that
can detect complex patterns in network traffic for a wide range of network security problems …

MidSiot: A multistage intrusion detection system for internet of things

N Dat-Thinh, H Xuan-Ninh… - … and Mobile Computing, 2022 - Wiley Online Library
Internet of Things (IoT) has been thriving in recent years, playing an important role in a
multitude of various domains, including industry 4.0, smart transportation, home automation …

CyberTEA: a technical and economic approach for cybersecurity planning and investment

MF Franco, LZ Granville, B Stiller - NOMS 2023-2023 IEEE/IFIP …, 2023 - ieeexplore.ieee.org
It is essential to look at cybersecurity not only as a technical problem but also from
economic, societal, and legal perspectives. Companies need to pay more attention to …

Real-time detection of stealthy IoT-based cyber-attacks on power distribution systems: A novel anomaly prediction approach

A Sawas, HEZ Farag - Electric Power Systems Research, 2023 - Elsevier
IoT-enabled appliances are essential components in the development of modern smart
homes and cities as they offer energy-efficient solutions that bring comfort to customers …

SecGrid: a visual system for the analysis and ML-based classification of cyberattack traffic

M Franco, J Von der Assen, L Boillat… - 2021 IEEE 46th …, 2021 - ieeexplore.ieee.org
Due to the increasing number of cyberattacks and respective predictions for the upcoming
years with even larger numbers of occurrences, companies are becoming aware not only …

A threat modeling framework for IoT-Based botnet attacks

H Jin, GH Jeon, HWA Choi, S Jeon, JT Seo - Heliyon, 2024 - cell.com
Abstract Internet of Things (IoT) devices are much closer to users than personal computers
used in traditional computing environments. Due to prevalence of IoT devices, even if they …

A methodology for selecting hardware performance counters for supporting non-intrusive diagnostic of flood DDoS attacks on web servers

PP do Nascimento, P Pereira, JM Mialaret, I Ferreira… - Computers & …, 2021 - Elsevier
Web server outages caused by a Distributed Denial of Service (DDoS) attacks have
increased considerably over the years. Intrusion Detection Systems (IDS) are not sufficient to …

Security threats in IoT

OG Dorobantu, S Halunga - 2020 International Symposium on …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a massive group of devices connected over wired or wireless
networks. IoT aims to provide advanced and intelligent services but at the same time to …

A Survey on Securing IoT Ecosystems and Adaptive Network Vision

T Goli, Y Kim - International Journal of Networked and Distributed …, 2021 - Springer
The rapid growth of Internet-of-Things (IoT) devices and the large network of interconnected
devices pose new security challenges and privacy threats that would put those devices at …

Serving while attacked: DDoS attack effect minimization using page separation and container allocation strategy

A Patidar, G Somani - Journal of Information Security and Applications, 2021 - Elsevier
Distributed denial of service attacks are prominent cyber attacks for the last many years.
Cloud computing environments are emerging as a common service deployment alternative …