A survey and taxonomy of the fuzzy signature-based intrusion detection systems

M Masdari, H Khezri - Applied Soft Computing, 2020 - Elsevier
Organizations that benefit from information technologies are vulnerable to various attacks
and malicious behaviors. Intrusion Detection Systems (IDS) are one of the main lines of …

Botnet in DDoS attacks: trends and challenges

N Hoque, DK Bhattacharyya… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due
to rapid development of computer networks and associated infrastructure, and millions of …

A survey on attack detection, estimation and control of industrial cyber–physical systems

D Zhang, QG Wang, G Feng, Y Shi, AV Vasilakos - ISA transactions, 2021 - Elsevier
Cyber–physical systems (CPSs) are complex systems that involve technologies such as
control, communication, and computing. Nowadays, CPSs have a wide range of applications …

Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods

BA Khalaf, SA Mostafa, A Mustapha… - IEEE …, 2019 - ieeexplore.ieee.org
Until now, an effective defense method against Distributed Denial of Service (DDoS) attacks
is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks …

Detecting distributed denial of service attacks: methods, tools and future directions

MH Bhuyan, HJ Kashyap… - The Computer …, 2014 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attack is a coordinated attack, generally performed on a
massive scale on the availability of services of a target system or network resources. Owing …

Methods and systems for malware detection

MV Raugas, RA Borbely, MW West, JL Ulrich - US Patent 9,288,220, 2016 - Google Patents
Methods, system, and media for detecting malware are disclosed. A network may be
monitored to collect samples of the network traffic. Feature vectors may be extracted from the …

[图书][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

Public cloud networks oriented deep neural networks for effective intrusion detection in online music education

J Zhang, JD Peter, A Shankar, W Viriyasitavat - Computers and Electrical …, 2024 - Elsevier
The rapid growth of online music education has led to increased security risks from cyber
intrusions. This paper proposes public cloud networks oriented deep neural networks for …

A review of detection approaches for distributed denial of service attacks

P Kaur, M Kumar, A Bhandari - Systems Science & Control …, 2017 - Taylor & Francis
ABSTRACT Distributed Denial of Service (DDoS) attacks are the intimidation trials on the
Internet that depletes the network bandwidth or exhausts the victim's resources …

An adaptive protection of flooding attacks model for complex network environments

BA Khalaf, SA Mostafa, A Mustapha… - Security and …, 2021 - Wiley Online Library
Currently, online organizational resources and assets are potential targets of several types
of attack, the most common being flooding attacks. We consider the Distributed Denial of …