Machine learning-powered encrypted network traffic analysis: A comprehensive survey

M Shen, K Ye, X Liu, L Zhu, J Kang… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …

Edge computing security: State of the art and challenges

Y Xiao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

Deep learning for anomaly detection: A survey

R Chalapathy, S Chawla - arXiv preprint arXiv:1901.03407, 2019 - arxiv.org
Anomaly detection is an important problem that has been well-studied within diverse
research areas and application domains. The aim of this survey is two-fold, firstly we present …

A survey of deep learning: Platforms, applications and emerging research trends

WG Hatcher, W Yu - IEEE access, 2018 - ieeexplore.ieee.org
Deep learning has exploded in the public consciousness, primarily as predictive and
analytical products suffuse our world, in the form of numerous human-centered smart-world …

Cyber security meets artificial intelligence: a survey

J Li - Frontiers of Information Technology & Electronic …, 2018 - Springer
There is a wide range of interdisciplinary intersections between cyber security and artificial
intelligence (AI). On one hand, AI technologies, such as deep learning, can be introduced …

A review on the effectiveness of machine learning and deep learning algorithms for cyber security

R Geetha, T Thilagam - Archives of Computational Methods in …, 2021 - Springer
In recent years there exists a wide variety of cyber attacks with the drastic development of
the internet technology. Detection of these attacks is of more significant in today's cyber …

Review of recent detection methods for HTTP DDoS attack

GA Jaafar, SM Abdullah, S Ismail - Journal of Computer …, 2019 - Wiley Online Library
With increment in dependency on web technology, a commensurate increase has been
noted in destructive attempts to disrupt the essential web technologies, hence leading to …

[HTML][HTML] HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm

I Sreeram, VPK Vuppala - Applied computing and informatics, 2019 - Elsevier
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack,
which is one that intentionally occupies the computing resources and bandwidth in order to …

Deep learning method for denial of service attack detection based on restricted boltzmann machine

Y Imamverdiyev, F Abdullayeva - Big data, 2018 - liebertpub.com
In this article, the application of the deep learning method based on Gaussian–Bernoulli
type restricted Boltzmann machine (RBM) to the detection of denial of service (DoS) attacks …

Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and …

AM Aleesa, BB Zaidan, AA Zaidan… - Neural Computing and …, 2020 - Springer
This study reviews and analyses the research landscape for intrusion detection systems
(IDSs) based on deep learning (DL) techniques into a coherent taxonomy and identifies the …