Cybersecurity data science: an overview from machine learning perspective

IH Sarker, ASM Kayes, S Badsha, H Alqahtani… - Journal of Big …, 2020 - Springer
In a computing context, cybersecurity is undergoing massive shifts in technology and its
operations in recent days, and data science is driving the change. Extracting security …

A survey of random forest based methods for intrusion detection systems

PAA Resende, AC Drummond - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Over the past decades, researchers have been proposing different Intrusion Detection
approaches to deal with the increasing number and complexity of threats for computer …

Temporal convolutional autoencoder for unsupervised anomaly detection in time series

M Thill, W Konen, H Wang, T Bäck - Applied Soft Computing, 2021 - Elsevier
Learning temporal patterns in time series remains a challenging task up until today.
Particularly for anomaly detection in time series, it is essential to learn the underlying …

A survey of outlier detection in high dimensional data streams

I Souiden, MN Omri, Z Brahmi - Computer Science Review, 2022 - Elsevier
The rapid evolution of technology has led to the generation of high dimensional data
streams in a wide range of fields, such as genomics, signal processing, and finance. The …

A review of threat modelling approaches for APT-style attacks

M Tatam, B Shanmugam, S Azam, K Kannoorpatti - Heliyon, 2021 - cell.com
Threats are potential events, intentional or not, that compromise the confidentiality, integrity,
and/or availability of information systems. Defending against threats and attacks requires …

Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions

W Li, W Meng, LF Kwok - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
Owing to the swift growth in cyber attacks, intrusion detection systems (IDSs) have become a
necessity to help safeguard personal and organizational assets. However, with the …

A systematic review of defensive and offensive cybersecurity with machine learning

ID Aiyanyo, H Samuel, H Lim - Applied Sciences, 2020 - mdpi.com
This is a systematic review of over one hundred research papers about machine learning
methods applied to defensive and offensive cybersecurity. In contrast to previous reviews …

Securing heterogeneous IoT with intelligent DDoS attack behavior learning

NN Dao, TV Phan, U Sa'ad, J Kim… - IEEE Systems …, 2021 - ieeexplore.ieee.org
The rapid increase of diverse Internet of Things (IoT) services and devices has raised
numerous challenges in terms of connectivity, interoperability, and security. The …

[HTML][HTML] NLP methods in host-based intrusion detection Systems: A systematic review and future directions

ZT Sworna, Z Mousavi, MA Babar - Journal of Network and Computer …, 2023 - Elsevier
Abstract Host-based Intrusion Detection System (HIDS) is an effective last line of defense for
defending against cyber security attacks after perimeter defenses (eg, Network-based …

[HTML][HTML] Countermeasures and their taxonomies for risk treatment in cybersecurity: A systematic mapping review

ID Sánchez-García, TSF Gilabert… - Computers & Security, 2023 - Elsevier
Cybersecurity continues to be one of the principal issues in the computing environment.
Organizations and researchers have made various efforts to mitigate the risks of cyberspace …