Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
Network Intrusion Response using Deep Reinforcement Learning in an Aircraft IT-OT Scenario
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 51, Pages 1–7https://doi.org/10.1145/3664476.3670917This paper presents an intrusion response system created using deep reinforcement learning, trained within an emulation environment. The emulation environment aims to represent a networked IT-OT system found within an aircraft. The goal of this paper’s ...
- research-articleJuly 2024
VAIDANSHH: Adaptive DDoS detection for heterogeneous hosts in vehicular environments
AbstractVehicular networks are vulnerable to Distributed Denial of Service (DDoS), an extension of a Denial of Service (DoS) attack. The existing solutions for DDoS detection in vehicular networks use various Machine Learning (ML) algorithms. However, ...
- research-articleJune 2024
Study for Integrating IoT-IDS Datasets: Machine and Deep Learning for Secure IoT Network System
EASE '24: Proceedings of the 28th International Conference on Evaluation and Assessment in Software EngineeringPages 686–691https://doi.org/10.1145/3661167.3661286The rapid expansion of Internet of Things (IoT) devices has introduced a new phase of inter connectivity and convenience, while also presenting notable security obstacles. This research paper investigates novel methodologies for enhancing the security ...
- research-articleJanuary 2024
DeepLG SecNet: utilizing deep LSTM and GRU with secure network for enhanced intrusion detection in IoT environments
Cluster Computing (KLU-CLUS), Volume 27, Issue 4Pages 5459–5471https://doi.org/10.1007/s10586-023-04223-3AbstractThe rapid proliferation of the Internet of Things (IoT) has led to a significant surge in interconnected devices across diverse domains, ranging from smart homes and healthcare systems to industrial automation and smart cities. However, this ...
- research-articleMay 2024
Transfer Learning Method for Handling The Intrusion Detection System with Zero Attacks Using Machine Learning and Deep Learning
ICIMMI '23: Proceedings of the 5th International Conference on Information Management & Machine IntelligenceArticle No.: 48, Pages 1–11https://doi.org/10.1145/3647444.3647874Due to the fast advancement of technology, cybercrime is also increasing in frequency and complexity. Since a variety of attacks evolves regularly with complex patterns and varied signatures the task of securing cyberspace becomes more and more difficult ...
-
- research-articleOctober 2023
Network intrusion detection and mitigation in SDN using deep learning models
International Journal of Information Security (IJOIS), Volume 23, Issue 2Pages 849–862https://doi.org/10.1007/s10207-023-00771-2AbstractSoftware-Defined Networking (SDN) is a contemporary network strategy utilized instead of a traditional network structure. It provides significantly more administrative efficiency and ease than traditional networks. However, the centralized control ...
- research-articleOctober 2023
Optimizing intrusion detection in industrial cyber-physical systems through transfer learning approaches
- Amro A. Nour,
- Abolfazl Mehbodniya,
- Julian L. Webber,
- Ali Bostani,
- Bhoomi Shah,
- Beknazarov Zafarjon Ergashevich,
- Sathishkumar K
Computers and Electrical Engineering (CENG), Volume 111, Issue PAhttps://doi.org/10.1016/j.compeleceng.2023.108929Highlights- The general operation of the physical process can nevertheless be affected, and system failure is caused by specific traditional measures designed to anticipate CPS cyber-attacks.
- Also, as the system appears to be extremely complicated ...
Applications of Cyber-Physical Systems (CPSs) greatly influenceseveral industrial sectors. Treating security-related concerns with utmost seriousness is necessary for the CPS to work correctly. Although CPS supervises the manufacturing process, ...
Graphical abstractDisplay Omitted
- research-articleSeptember 2023
PIGNUS: A Deep Learning model for IDS in industrial internet-of-things
Highlights- Optimal features: PIGNUS is the first hybrid model to use Auto Encoder (AE) for the intrusion detection. AE is an unsupervised data compression technique that provides the encoded format of data for further processing. The method generates ...
The heterogeneous nature of the Industrial Internet of Thing (IIoT) has a considerable impact on the development of an effective Intrusion Detection System (IDS). The proliferation of linked devices results in multiple inputs from industrial ...
Graphical abstract
Display Omitted
- research-articleJuly 2023
Intrusion Detection System with SVM and Ensemble Learning Algorithms
AbstractOne of the most effective methods of training a model for intrusion detection requires a very good selection of features from the data and efficient and robust training algorithms to facilitate a better prediction model. Choosing features scoring ...
- review-articleMay 2023
Negative selection in anomaly detection—A survey
AbstractThe remarkable ability to separate and identify self and non-self in a given problem space, makes negative selection a fascinating concept of artificial immune system. Therefore, negative selection has attracted research interest and is studied ...
Highlights- Covers and discuss different negative selection taxonomies, representations and matching techniques.
- Makes an effort to survey the major works in NSA based anomaly detection with extensive comparisons.
- Mentions NSA impacts in ...
- research-articleNovember 2022
An efficient optimal security system for intrusion detection in cloud computing environment using hybrid deep learning technique
Advances in Engineering Software (ADES), Volume 173, Issue Chttps://doi.org/10.1016/j.advengsoft.2022.103236Highlights- Improved heap optimization (IHO) removed unwanted data for data quality.
- Intrusion detection systems (IDS) for cloud computing environments detected known abnormalities with minimal false alarms.
- A chaotic red deer optimization (...
Users have been urged to embrace a cloud-based environment by recent technologies and advancements. Because of the dispersed nature of cloud solutions, security is a major problem. Because it is highly exposed to intruders for any kind of assault,...
- ArticleJuly 2022
Intrusion-Based Attack Detection Using Machine Learning Techniques for Connected Autonomous Vehicle
Advances and Trends in Artificial Intelligence. Theory and Practices in Artificial IntelligencePages 505–515https://doi.org/10.1007/978-3-031-08530-7_43AbstractWith advancements in technology, an important issue is ensuring the security of self-driving cars. Unfortunately, hackers have been developing increasingly complex and harmful cyberattacks, making them difficult to detect. Furthermore, due to the ...
- research-articleJuly 2022
Home Security System Using Wireless Sensors Network
Wireless Personal Communications: An International Journal (WPCO), Volume 125, Issue 2Pages 1185–1201https://doi.org/10.1007/s11277-022-09596-zAbstractIn this paper, we propose a smart and robust home security system. This is for intrusion detection along with a proprietary Android application. Intruder-Spi makes use of relatively low cost but effective wireless sensors network that makes it an ...
- research-articleMay 2022
A Model-Free Approach to Intrusion Response Systems
Journal of Information Security and Applications (JISA), Volume 66, Issue Chttps://doi.org/10.1016/j.jisa.2022.103150AbstractWith the rising number of data breaches, denial of service attacks and general malicious activity facing modern computer networks, there is an increasing need to quickly and effectively respond to attacks. Intrusion Detection Systems ...
- articleApril 2022
Intrusion Detection System Using Deep Learning Asymmetric Autoencoder (DLAA)
International Journal of Fuzzy System Applications (IJFSA-IGI), Volume 11, Issue 2Pages 1–17https://doi.org/10.4018/IJFSA.296590To protect a network security, a good network IDS is essential. With the advancement of science and technology, present intrusion detection technology is unable to manage today's complex and volatile network abnormal traffic without taking into ...
- research-articleMarch 2022
A hybrid machine learning model for intrusion detection in VANET
AbstractWhile Vehicular Ad-hoc Network (VANET) is developed to enable effective vehicle communication and traffic information exchange, VANET is also vulnerable to different security attacks, such as DOS attacks. The usage of an intrusion detection system ...
- research-articleFebruary 2022
An intrusion detection approach using ensemble Support Vector Machine based Chaos Game Optimization algorithm in big data platform
AbstractThe mainstream computing technology is not efficient in managing massive data and detecting network traffic intrusions, often including big data. The intrusions present in sustained network traffic and the massive host log event data ...
Graphical abstractDisplay Omitted
Highlights- The feature selection is carried out by performing the proposed ensemble Support Vector Machine (ESVM) algorithm.
- review-articleSeptember 2021
Secure Opportunistic Watchdog Production in Wireless Sensor Networks: A Review
Wireless Personal Communications: An International Journal (WPCO), Volume 120, Issue 2Pages 1895–1919https://doi.org/10.1007/s11277-021-08542-9AbstractFinding the security vulnerabilities and solving the issues in Wireless Sensor Networks (WSN) are mandatory tasks for providing secure data transmission. Attackers or intruders are rising with various types of network harming activities. Due to ...
- research-articleMay 2021
Soft computing for anomaly detection and prediction to mitigate IoT-based real-time abuse
Personal and Ubiquitous Computing (PUC), Volume 28, Issue 1Pages 123–133https://doi.org/10.1007/s00779-021-01567-8AbstractCyber-surveillance and connected devices can be misused to monitor, harass, isolate, and otherwise, harm individuals. In particular, these devices gather high volumes of personal data such as account details with shared passwords, person’s ...
- research-articleAugust 2020
DIADL: An Energy Efficient Framework for Detecting Intrusion Attack Using Deep LearnIing
ICCMS '20: Proceedings of the 12th International Conference on Computer Modeling and SimulationPages 138–142https://doi.org/10.1145/3408066.3408107In today's era, the Internet's complexity, accessi- bility, and openness has greatly enhanced the security risk of information systems. The Internet's popularity entails many threats of network attacks. Detection of intrusion is one of the major ...