The role of machine learning in network anomaly detection for cybersecurity

A Yaseen - Sage Science Review of Applied Machine …, 2023 - journals.sagescience.org
This research introduces a theoretical framework for network anomaly detection in
cybersecurity, emphasizing the integration of adaptive machine learning models, ensemble …

[HTML][HTML] Black-box attacks against log anomaly detection with adversarial examples

S Lu, M Wang, D Wang, X Wei, S Xiao, Z Wang… - Information …, 2023 - Elsevier
Deep neural networks (DNNs) have been widely employed to solve log anomaly detection
and outperform a range of conventional methods. They have attained such striking success …

Regularizing autoencoders with wavelet transform for sequence anomaly detection

Y Yao, J Ma, Y Ye - Pattern Recognition, 2023 - Elsevier
Nowadays, systems or entities are usually monitored by devices, generating large amounts
of time series. Detecting anomalies in them help prevent potential losses, thus arousing …

The proposition and evaluation of the RoEduNet-SIMARGL2021 network intrusion detection dataset

ME Mihailescu, D Mihai, M Carabas, M Komisarek… - Sensors, 2021 - mdpi.com
Cybersecurity is an arms race, with both the security and the adversaries attempting to
outsmart one another, coming up with new attacks, new ways to defend against those …

How to effectively collect and process network data for intrusion detection?

M Komisarek, M Pawlicki, R Kozik, W Hołubowicz… - Entropy, 2021 - mdpi.com
The number of security breaches in the cyberspace is on the rise. This threat is met with
intensive work in the intrusion detection research community. To keep the defensive …

Modern netflow network dataset with labeled attacks and detection methods

M Komisarek, M Pawlicki, T Simic, D Kavcnik… - Proceedings of the 18th …, 2023 - dl.acm.org
Network Intrusion Detection Systems are an important part of cyber-defensive inventory.
Currently, Machine-Learning-Based Network Intrusion Detection Systems are being …

CAN Signal Extinction‐based DoS Attack on In‐Vehicle Network

Y Lee, S Woo - Security and Communication Networks, 2022 - Wiley Online Library
As automobiles become more electrified, more and more Electronic Control Units (ECU) are
installed in vehicles. ECUs communicate with each other through dedicated protocols such …

Explainability versus Security: The Unintended Consequences of xAI in Cybersecurity

M Pawlicki, A Pawlicka, R Kozik, M Choraś - Proceedings of the 2nd …, 2024 - dl.acm.org
The rapid advancement of Artificial Intelligence in the field of cybersecurity brings about both
opportunity and vulnerability, like a dual-edged sword. The research community expressed …

Machine learning based signaling ddos detection system for 5g stand alone core network

S Park, B Cho, D Kim, I You - Applied Sciences, 2022 - mdpi.com
Research to deal with distributed denial of service (DDoS) attacks was kicked off from long
ago and has seen technological advancement along with an extensive 5G footprint. Prior …

Counterfeited product identification in a supply chain using blockchain technology

S Singh, G Choudhary, SK Shandilya, V Sihag… - Research Briefs on …, 2021 - orbit.dtu.dk
Since the invention of the Blockchain technology in 2008, it has been used in many domains
to ensure high security and reliability of data, like from the use of Bitcoin to BaaS (Blockchain …