|
|
|
Jadil Alsamiri and Khalid Alsubhi
In recent years, the Internet of Vehicles (IoV) has garnered significant attention from researchers and automotive industry professionals due to its expanding range of applications and services aimed at enhancing road safety and driver/passenger comfort....
ver más
|
|
|
|
|
|
|
Faeiz Alserhani and Alaa Aljared
With the increased sophistication of cyber-attacks, there is a greater demand for effective network intrusion detection systems (NIDS) to protect against various threats. Traditional NIDS are incapable of detecting modern and sophisticated attacks due to...
ver más
|
|
|
|
|
|
|
Surasit Songma, Theera Sathuphan and Thanakorn Pamutha
This article examines intrusion detection systems in depth using the CSE-CIC-IDS-2018 dataset. The investigation is divided into three stages: to begin, data cleaning, exploratory data analysis, and data normalization procedures (min-max and Z-score) are...
ver más
|
|
|
|
|
|
|
Dustin M. Mink, Jeffrey McDonald, Sikha Bagui, William B. Glisson, Jordan Shropshire, Ryan Benton and Samuel Russ
Modern-day aircraft are flying computer networks, vulnerable to ground station flooding, ghost aircraft injection or flooding, aircraft disappearance, virtual trajectory modifications or false alarm attacks, and aircraft spoofing. This work lays out a da...
ver más
|
|
|
|
|
|
|
Waqas Haider, Gideon Creech, Yi Xie and Jiankun Hu
|
|
|
|
|
|
|
Waqas Haider, Gideon Creech, Yi Xie and Jiankun Hu
The Windows Operating System (OS) is the most popular desktop OS in the world, as it has the majority market share of both servers and personal computing necessities. However, as its default signature-based security measures are ineffectual for detecting...
ver más
|
|
|
|
|
|
|
Konstantinos Psychogyios, Andreas Papadakis, Stavroula Bourou, Nikolaos Nikolaou, Apostolos Maniatis and Theodore Zahariadis
The advent of computer networks and the internet has drastically altered the means by which we share information and interact with each other. However, this technological advancement has also created opportunities for malevolent behavior, with individual...
ver más
|
|
|
|
|
|
|
Helmut Neuschmied, Martin Winter, Branka Stojanovic, Katharina Hofer-Schmitz, Josip Bo?ic and Ulrike Kleb
In the face of emerging technological achievements, cyber security remains a significant issue. Despite the new possibilities that arise with such development, these do not come without a drawback. Attackers make use of the new possibilities to take adva...
ver más
|
|
|
|
|
|
|
Mário Antunes, Luís Oliveira, Afonso Seguro, João Veríssimo, Ruben Salgado and Tiago Murteira
Network security encloses a wide set of technologies dealing with intrusions detection. Despite the massive adoption of signature-based network intrusion detection systems (IDSs), they fail in detecting zero-day attacks and previously unseen vulnerabilit...
ver más
|
|
|
|
|
|
|
Ruohao Zhang, Jean-Philippe Condomines and Emmanuel Lochin
The rapid development of Internet of Things (IoT) technology, together with mobile network technology, has created a never-before-seen world of interconnection, evoking research on how to make it vaster, faster, and safer. To support the ongoing fight ag...
ver más
|
|
|
|
|
|
|
Niraj Thapa, Zhipeng Liu, Dukka B. KC, Balakrishna Gokaraju and Kaushik Roy
The development of robust anomaly-based network detection systems, which are preferred over static signal-based network intrusion, is vital for cybersecurity. The development of a flexible and dynamic security system is required to tackle the new attacks...
ver más
|
|
|
|
|
|
|
Thi-Thu-Huong Le, Yongsu Kim and Howon Kim
The recent increase in hacks and computer network attacks around the world has intensified the need to develop better intrusion detection and prevention systems. The intrusion detection system (IDS) plays a vital role in detecting anomalies and attacks o...
ver más
|
|
|
|
|
|
|
Pawel Dymora and Miroslaw Mazurek
Fractal and multifractal analysis can help to discover the structure of the communication system, and in particular the pattern and characteristics of traffic, in order to understand the threats better and detect anomalies in network operation. The massi...
ver más
|
|
|
|
|
|
|
Afnan Alotaibi and Murad A. Rassam
Concerns about cybersecurity and attack methods have risen in the information age. Many techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs), that help achieve security goals, such as detecting malicious attacks befo...
ver más
|
|
|
|
|
|
|
Rubayyi Alghamdi and Martine Bellaiche
Using the Internet of Things (IoT) for various applications, such as home and wearables devices, network applications, and even self-driven vehicles, detecting abnormal traffic is one of the problematic areas for researchers to protect network infrastruc...
ver más
|
|
|
|
|
|
|
Shweta More, Moad Idrissi, Haitham Mahmoud and A. Taufiq Asyhari
The rapid proliferation of new technologies such as Internet of Things (IoT), cloud computing, virtualization, and smart devices has led to a massive annual production of over 400 zettabytes of network traffic data. As a result, it is crucial for compani...
ver más
|
|
|
|
|
|
|
Duc-Minh Ngo, Dominic Lightbody, Andriy Temko, Cuong Pham-Quoc, Ngoc-Thinh Tran, Colin C. Murphy and Emanuel Popovici
This study proposes a heterogeneous hardware-based framework for network intrusion detection using lightweight artificial neural network models. With the increase in the volume of exchanged data, IoT networks? security has become a crucial issue. Anomaly...
ver más
|
|
|
|
|
|
|
Ammar Alazab, Ansam Khraisat, Moutaz Alazab and Sarabjot Singh
Websites on the Internet are becoming increasingly vulnerable to malicious JavaScript code because of its strong impact and dramatic effect. Numerous recent cyberattacks use JavaScript vulnerabilities, and in some cases employ obfuscation to conceal thei...
ver más
|
|
|
|
|
|
|
Haruna Umar Adoga and Dimitrios P. Pezaros
Network slicing has become a fundamental property for next-generation networks, especially because an inherent part of 5G standardisation is the ability for service providers to migrate some or all of their network services to a virtual network infrastru...
ver más
|
|
|
|
|
|
|
Leyi Shi, Yang Li and Haijie Feng
As one of the active defense technologies, the honeypot deceives the latent intruders to interact with the imitated systems or networks deployed with security mechanisms. Its modeling and performance analysis have not been well studied. In this paper, we...
ver más
|
|
|
|