A systematic review on intrusion detection based on the Hidden Markov Model

A Ahmadian Ramaki, A Rasoolzadegan… - … Analysis and Data …, 2018 - Wiley Online Library
Apart from using traditional security solutions in software systems such as firewalls and
access control mechanisms, utilizing intrusion detection systems are also necessary …

LSTM-based system-call language modeling and robust ensemble method for designing host-based intrusion detection systems

G Kim, H Yi, J Lee, Y Paek, S Yoon - arXiv preprint arXiv:1611.01726, 2016 - arxiv.org
In computer security, designing a robust intrusion detection system is one of the most
fundamental and important problems. In this paper, we propose a system-call language …

A three-way decision making approach to malware analysis using probabilistic rough sets

M Nauman, N Azam, JT Yao - Information Sciences, 2016 - Elsevier
Malware analysis aims to identify malware by examining applications behaviour on the host
operating system. A common issue in malware analysis is how to mitigate and handle the …

Cdl: Classified distributed learning for detecting security attacks in containerized applications

Y Lin, O Tunde-Onadele, X Gu - … of the 36th Annual Computer Security …, 2020 - dl.acm.org
Containers have been widely adopted in production computing environments for its
efficiency and low overhead of isolation. However, recent studies have shown that …

Combining heterogeneous anomaly detectors for improved software security

W Khreich, SS Murtaza, A Hamou-Lhadj… - Journal of Systems and …, 2018 - Elsevier
Abstract Host-based Anomaly Detection Systems (ADSs) monitor for significant deviations
from normal software behavior. Several techniques have been investigated for detecting …

Intrusion detection system for detecting wireless attacks in IEEE 802.11 networks

SC Sethuraman, S Dhamodaran, V Vijayakumar - IET networks, 2019 - Wiley Online Library
Sophisticated wireless attacks such as Wifiphishing, Evil twin and so on are a serious threat
to Wi‐Fi networks. These attacks are tricky enough to spoof users by launching a fake …

The effect on network flows-based features and training set size on malware detection

JMH Jiménez… - 2018 IEEE 17th …, 2018 - ieeexplore.ieee.org
Although network flows have been used in areas such as network traffic analysis and botnet
detection, not many works have used network flows-based features for malware detection …

Enhanced security for an IoT devices in cyber-physical system against cyber attacks

V Bharathi, CNSV Kumar - 2022 International Conference for …, 2022 - ieeexplore.ieee.org
Cyber physical systems (CPS) integrate the physical and numerical worlds. Number of
computing system connected with wireless networks and also transmits sensitive data in …

Mimicry resilient program behavior modeling with LSTM based branch models

H Yi, G Kim, J Lee, S Ahn, Y Lee, S Yoon… - arXiv preprint arXiv …, 2018 - arxiv.org
In the software design, protecting a computer system from a plethora of software attacks or
malware in the wild has been increasingly important. One branch of research to detect the …

An anomaly detection system based on ensemble of detectors with effective pruning techniques

A Soudi, W Khreich… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Anomaly detection systems rely on machine learning techniques to model the normal
behavior of the system. This model is used during operation to detect anomalies due to …