Intrusion detection systems: A state-of-the-art taxonomy and survey

M Alkasassbeh, S Al-Haj Baddar - Arabian Journal for Science and …, 2023 - Springer
Abstract Intrusion Detection Systems (IDSs) have become essential to the sound operations
of networks. These systems have the potential to identify and report deviations from normal …

APT beaconing detection: A systematic review

MA Talib, Q Nasir, AB Nassif, T Mokhamed… - Computers & …, 2022 - Elsevier
Abstract Advanced Persistent Threat (APT) is a type of threat that has grabbed the attention
of researchers, particularly in the industrial security field. APTs are cyber intrusions carried …

GRU-based deep learning approach for network intrusion alert prediction

MS Ansari, V Bartoš, B Lee - Future Generation Computer Systems, 2022 - Elsevier
The exponential growth in the number of cyber attacks in the recent past has necessitated
active research on network intrusion detection, prediction and mitigation systems. While …

A dynamic games approach to proactive defense strategies against advanced persistent threats in cyber-physical systems

L Huang, Q Zhu - Computers & Security, 2020 - Elsevier
Abstract Advanced Persistent Threats (APTs) have recently emerged as a significant security
challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature …

Early detection of the advanced persistent threat attack using performance analysis of deep learning

JH Joloudari, M Haderbadi, A Mashmool… - IEEE …, 2020 - ieeexplore.ieee.org
One of the most common and critical destructive attacks on the victim system is the
advanced persistent threat (APT)-attack. An APT attacker can achieve its hostile goal …

Machine learning for botnet detection: An optimized feature selection approach

M Lefoane, I Ghafir, S Kabir, IU Awan - Proceedings of the 5th …, 2021 - dl.acm.org
Technological advancements have been evolving for so long, particularly Internet of Things
(IoT) technology that has seen an increase in the number of connected devices surpass non …

Analysis of hidden Markov model learning algorithms for the detection and prediction of multi-stage network attacks

T Chadza, KG Kyriakopoulos, S Lambotharan - Future generation …, 2020 - Elsevier
Abstract Hidden Markov Models have been extensively used for determining computer
systems under a Multi-Stage Network Attack (MSA), however, acquisition of optimal model …

Explainable intelligence-driven defense mechanism against advanced persistent threats: A joint edge game and AI approach

H Li, J Wu, H Xu, G Li, M Guizani - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Advanced persistent threats (APT) have novel features such as long-term latency, precision
strikes and uncertain strategies. APT poses severe threats to the resource-limited edge …

E2E-VSDL: End-to-end video surveillance-based deep learning model to detect and prevent criminal activities

MQ Gandapur - Image and Vision Computing, 2022 - Elsevier
Crime detection and their prediction is a fundamental process to reduce criminal activities
before they actually happen. Moreover, the detection method is vital since can it potentially …

APT adversarial defence mechanism for industrial IoT enabled cyber-physical system

SH Javed, MB Ahmad, M Asif, W Akram… - IEEE …, 2023 - ieeexplore.ieee.org
The objective of Advanced Persistent Threat (APT) attacks is to exploit Cyber-Physical
Systems (CPSs) in combination with the Industrial Internet of Things (I-IoT) by using fast …