An intelligent intrusion detection system for internet of things attack detection and identification using machine learning

TS Othman, SM Abdullah - aro-the scientific journal of …, 2023 - eprints.koyauniversity.org
The usability and scalability of Internet of things (IoT) technology are expanding in such a
way that they facilitate human living standards. However, they increase the vulnerabilities …

Deep echo state networks for detecting internet worm and ransomware attacks

T Sharma, K Patni, Z Li… - 2023 IEEE international …, 2023 - ieeexplore.ieee.org
With the advancement of technology over the last decade, there has been a rapid increase
in the number and types of malware attacks such as worms whose primary function is to self …

Multidimensional Scaling Orienting Discriminative Co-Representation Learning

Z Qin, Y Zhang, H Wang, Z Luo, C Li… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Co-representation, which co-represents samples and features, has been widely used in
various machine learning tasks, such as document clustering, gene expression analysis …

[PDF][PDF] Intrusion Detection Systems for IoT Attack Detection and Identification Using Intelligent Techniques

TS Othman, KR KOY45, SM Abdullah - networks, 2023 - ijcna.org
The Internet of Things (IoT) and its connected objects have resource limitations, which lead
to weak security concerns over the IoT infrastructures. Therefore, the IoT networks should …

Optimal detection of border gateway protocol anomalies with extensive feature set

M Sunita, SV Mallapur - Multimedia Tools and Applications, 2024 - Springer
For effective and secure access of Internet, the Border Gateway Protocol (BGP) has to be
capable to identify and stop odd concurrences in realistic time. Despite the fact that more …

Case Study: Understanding Internet Anomalies

HK Takhar, LF Oliveira… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Machine learning algorithms have been applied to address a variety of engineering and
scientific problems. The Internet has historically been prone to failures and attacks that …

Enhancing Cybersecurity Through Fast Machine Learning Algorithms

Z Li, W Han, Y Shao, T Makanju - 2024 IEEE Canadian …, 2024 - ieeexplore.ieee.org
As cyber attacks grow in complexity, their detection becomes increasingly challenging,
underscoring the critical role of advanced machine learning methods in cybersecurity. These …

Enhancing Cyber Defense: Using Machine Learning Algorithms for Detection of Network Anomalies

Z Li, L Trajković - … on Systems, Man, and Cybernetics (SMC), 2023 - ieeexplore.ieee.org
Developing advanced cyber defense techniques is essential for effectively detecting network
anomalies that are becoming more challenging to identify. In this paper, we generate …