Network attacks detection methods based on deep learning techniques: a survey

Y Wu, D Wei, J Feng - Security and Communication Networks, 2020 - Wiley Online Library
With the development of the fifth‐generation networks and artificial intelligence
technologies, new threats and challenges have emerged to wireless communication system …

A review of artificial intelligence to enhance the security of big data systems: state-of-art, methodologies, applications, and challenges

D Dai, S Boroomand - Archives of Computational Methods in Engineering, 2022 - Springer
Technological advancements modernize the way we live with the changes made both
globally and nationwide. These technological improvements also cause adverse effects in …

Detection of malware by deep learning as CNN-LSTM machine learning techniques in real time

MS Akhtar, T Feng - Symmetry, 2022 - mdpi.com
Cyber-attacks on the numerous parts of today's fast developing IoT are only going to
increase in frequency and severity. A reliable method for detecting malicious attacks such as …

ML‐DDoSnet: IoT intrusion detection based on denial‐of‐service attacks using machine learning methods and NSL‐KDD

M Esmaeili, SH Goki, BHK Masjidi… - Wireless …, 2022 - Wiley Online Library
The Internet of Things (IoT) is a complicated security feature in which datagrams are
protected by integrity, confidentiality, and authentication services. The network is protected …

Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions

R Uddin, SAP Kumar, V Chamola - Ad Hoc Networks, 2024 - Elsevier
Edge computing has emerged as the dominant communication technology connecting IoT
and cloud, offering reduced latency and harnessing the potential of edge devices. However …

Performance and features: Mitigating the low-rate TCP-targeted DoS attack via SDN

D Tang, Y Yan, S Zhang, J Chen… - IEEE Journal on Selected …, 2021 - ieeexplore.ieee.org
Software-Defined Networking (SDN) is an emerging network architecture. The decoupled
data and control plane provides programmability for efficient network management …

Real-time detection and mitigation of LDoS attacks in the SDN using the HGB-FP algorithm

D Tang, S Zhang, Y Yan, J Chen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The software-defined network (SDN) has created the conditions for the optimization and
development of network structures. However, its architecture is still not sufficient to resist or …

The detection of low-rate DoS attacks using the SADBSCAN algorithm

D Tang, S Zhang, J Chen, X Wang - Information Sciences, 2021 - Elsevier
Low-rate denial-of-service (DoS) attacks, which can exploit vulnerabilities in Internet
protocols to deteriorate the quality of service, are variants of DoS attacks. It is challenging to …

WEDMS: An advanced mean shift clustering algorithm for LDoS attacks detection

D Tang, J Man, L Tang, Y Feng, Q Yang - Ad Hoc Networks, 2020 - Elsevier
Network and communication security are the focus of attention. Low-rate denial of service
(LDoS) attacks exploit deficiencies of TCP protocol to restrain TCP throughput and network …

Recurrent and deep learning neural network models for DDoS attack detection

S Sumathi, R Rajesh, S Lim - Journal of Sensors, 2022 - Wiley Online Library
Distributed denial of service (DDoS) attack is a subclass of denial of service attack that
performs severe attack in a cloud computing environment. It makes a malicious attempt to …