4.6 Article

Detection of Unknown DDoS Attacks with Deep Learning and Gaussian Mixture Model

Related references

Note: Only part of the references are listed.
Article Telecommunications

Ensemble machine learning approaches for webshell detection in Internet of things environments

Binbin Yong et al.

Summary: The Internet of things (IoT) is a system made up of a large number of interconnected sensor devices that can be used for data exchange, intelligent identification, and management, playing a crucial role in improving living quality and standards. However, IoT is vulnerable to cyberattacks from the Internet, making network security essential. This article utilizes machine learning models to detect webshell and discusses detection methods in different IoT environments for building secure solutions. Extensive experiments verify the effectiveness of webshell intrusion detection, with simulation results showing the suitability of certain methods for lightweight and heavyweight IoT scenarios.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2022)

Article Computer Science, Artificial Intelligence

Recent Advances in Open Set Recognition: A Survey

Chuanxing Geng et al.

Summary: This paper provides a comprehensive survey of existing open set recognition techniques, covering various aspects such as related definitions, models representations, datasets, evaluation criteria, and algorithm comparisons. It also briefly analyzes the relationships between OSR and its related tasks, highlights the limitations of existing approaches, and points out some promising subsequent research directions in this field.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2021)

Article Physics, Multidisciplinary

An Efficient DenseNet-Based Deep Learning Model for Malware Detection

Jeyaprakash Hemalatha et al.

Summary: This study presents an efficient malware detection system based on deep learning, which improves classification performance by visualizing malware as images and addresses the challenges of traditional methods in identifying new malware and handling class imbalance. Experimental results demonstrate that the system can efficiently detect new samples with lower false-positive rates and computational time.

ENTROPY (2021)

Article Computer Science, Information Systems

Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection

R. Doriguzzi-Corin et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2020)

Article Computer Science, Theory & Methods

Multimedia Big Data Analytics: A Survey

Samira Pouyanfar et al.

ACM COMPUTING SURVEYS (2018)

Article Computer Science, Artificial Intelligence

The Extreme Value Machine

Ethan M. Rudd et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2018)

Review Computer Science, Information Systems

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

Tasnuva Mahjabin et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Bi-directional Long Short-Term Memory using Quantized data of Deep Belief Networks for Sleep Stage Classification

Intan Nurma Yulita et al.

DISCOVERY AND INNOVATION OF COMPUTER SCIENCE TECHNOLOGY IN ARTIFICIAL INTELLIGENCE ERA (2017)