4.6 Article

Deep Generative Learning Models for Cloud Intrusion Detection Systems

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

A deep learning based HTTP slow DoS classification approach using flow data

N. Muraleedharan et al.

Summary: A deep classification model using flow data is proposed to detect slow DoS attack on HTTP in this paper. The classifier is evaluated using CICIDS2017 dataset, and the results show that it can achieve 99.61% accuracy.

ICT EXPRESS (2021)

Article Computer Science, Information Systems

Toward a Distributed Approach for Detection and Mitigation of Denial-of-Service Attacks Within Industrial Internet of Things

Vladimir Borgiani et al.

Summary: Wireless sensor networks are commonly used in the Industrial Internet-of-Things, but vulnerable to security attacks. A distributed congestion control method has been proposed to mitigate DoS attacks, showing potential application in a sensor network scenario with 500 nodes.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Toward Effective Intrusion Detection Using Log-Cosh Conditional Variational Autoencoder

Xing Xu et al.

Summary: Intrusion detection is important for network security, but traditional machine learning-based methods face challenges with unknown attacks. This article introduces a novel deep learning method LCVAE for intrusion detection, which effectively handles imbalanced intrusion data. Experimental results demonstrate the superior performance of LCVAE in detecting intrusions and its potential for generating diverse new intrusion data.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Automation & Control Systems

Multiple Attacks Detection in Cyber-Physical Systems Using Random Finite Set Theory

Chaoqun Yang et al.

IEEE TRANSACTIONS ON CYBERNETICS (2020)

Proceedings Paper Engineering, Electrical & Electronic

Intrusion Detection for Smart Home Security Based on Data Augmentation with Edge Computing

Danni Yuan et al.

ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) (2020)

Article Computer Science, Information Systems

Anomaly-Based Intrusion Detection From Network Flow Features Using Variational Autoencoder

Sultan Zavrak et al.

IEEE ACCESS (2020)

Article Acoustics

Audio-Visual Speech Enhancement Using Conditional Variational Auto-Encoders

Mostafa Sadeghi et al.

IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING (2020)

Article Automation & Control Systems

Learning Neural Representations for Network Anomaly Detection

Van Loi Cao et al.

IEEE TRANSACTIONS ON CYBERNETICS (2019)

Article Computer Science, Information Systems

DDoS Attacks at the Application Layer: Challenges and Research Perspectives for Safeguarding Web Applications

Amit Praseed et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Artificial Intelligence

A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks

Saurabh Dey et al.

INFORMATION FUSION (2019)

Article Computer Science, Artificial Intelligence

Denoising Adversarial Autoencoders

Antonia Creswell et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2019)

Article Acoustics

ACVAE-VC: Non-Parallel Voice Conversion With Auxiliary Classifier Variational Autoencoder

Hirokazu Katneoka et al.

IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING (2019)

Article Computer Science, Information Systems

Deep Learning Approach for Intelligent Intrusion Detection System

R. Vinayakumar et al.

IEEE ACCESS (2019)

Article Computer Science, Artificial Intelligence

Cost-Sensitive Learning of Deep Feature Representations From Imbalanced Data

Salman H. Khan et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2018)

Article Computer Science, Artificial Intelligence

An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities

Amin Karami

EXPERT SYSTEMS WITH APPLICATIONS (2018)

Proceedings Paper Computer Science, Hardware & Architecture

Cyberattack Detection in Mobile Cloud Computing: A Deep Learning Approach

Khoi Khac Nguyen et al.

2018 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC) (2018)

Review Computer Science, Hardware & Architecture

Intrusion detection techniques in cloud environment: A survey

Preeti Mishra et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Artificial Intelligence

PSO-based method for SVM classification on skewed data sets

Jair Cervantes et al.

NEUROCOMPUTING (2017)

Article Computer Science, Hardware & Architecture

Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN

N. Pandeeswari et al.

MOBILE NETWORKS & APPLICATIONS (2016)

Proceedings Paper Computer Science, Information Systems

Detecting Denial of Service Attacks in the Cloud

Raneel Kumar et al.

2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC (2016)

Article Computer Science, Hardware & Architecture

Security and Privacy-Enhancing Multicloud Architectures

Jens-Matthias Bohli et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2013)

Article Automation & Control Systems

Exploratory Undersampling for Class-Imbalance Learning

Xu-Ying Liu et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS (2009)