4.6 Article

5G Aviation Networks Using Novel AI Approach for DDoS Detection

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

A Bayesian Deep Learning Approach With Convolutional Feature Engineering to Discriminate Cyber-Physical Intrusions in Smart Grid Systems

Devinder Kaur et al.

Summary: The emergence of cyber-physical smart grid systems brings bidirectional energy flow, but also poses challenges to the cyber security mechanisms due to increased information exchange between end-users. To address this, we propose a Bayesian approach integrated with deep convolutional neural networks (CNN-Bayesian). The proposed method outperforms existing benchmark classification methods in discriminating intrusions in CPSG systems using evaluation metrics such as accuracy, precision, recall, and F 1-score.

IEEE ACCESS (2023)

Article Computer Science, Information Systems

Image Processing Based Approach for False Data Injection Attacks Detection in Power Systems

Hamed Moayyed et al.

Summary: This research proposes a visualization-based attack detection framework using deep learning techniques for cybersecurity research in power systems. By encoding system state data into colored images and utilizing a deep convolutional neural network for classification, it enables quick capture and understanding of statistical features of network attacks.

IEEE ACCESS (2022)

Proceedings Paper Computer Science, Theory & Methods

A Multi-Classifier for DDoS Attacks Using Stacking Ensemble Deep Neural Network

Moinul Islam Sayed et al.

Summary: DDoS attacks pose a serious threat to the security and integrity of data and information systems, and existing models struggle to accurately identify different types of DDoS attacks. This paper presents a multi-classifier model based on machine learning and deep learning to effectively detect various types of DDoS attacks and achieve high accuracy in experiments.

2022 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC (2022)

Article Computer Science, Information Systems

Anomaly Detection Based on CNN and Regularization Techniques Against Zero-Day Attacks in IoT Networks

Belal Ibrahim Hairab et al.

Summary: This paper discusses the serious risk that botnets pose to the security of IoT systems and proposes the use of a Convolutional Neural Networks (CNN) classifier and different regularization techniques to detect previously unseen malicious attacks. Experimental results show that this approach outperforms the standard CNN model and enhances the capability of intrusion detection systems (IDS) in detecting new intrusion events.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

RTIDS: A Robust Transformer-Based Approach for Intrusion Detection System

Zihan Wu et al.

Summary: This paper proposes a Robust Transformer-based Intrusion Detection System (RTIDS), which reconstructs feature representations to balance dimensionality reduction and feature retention. The method utilizes self-attention mechanism to facilitate network traffic type classifications and has been validated on real traffic intrusion detection datasets.

IEEE ACCESS (2022)

Article Chemistry, Multidisciplinary

Efficient Detection of DDoS Attacks Using a Hybrid Deep Learning Model with Improved Feature Selection

Daniyal Alghazzawi et al.

Summary: DDoS attacks pose a serious risk to computer networks and systems, but using machine learning/deep learning for detection can be helpful. Existing research has utilized ML classifiers and conventional methods to predict DDoS attacks, but accuracy remains a challenge.

APPLIED SCIENCES-BASEL (2021)

Review Chemistry, Analytical

Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications

Nasr Abosata et al.

Summary: The growth of IoT offers numerous opportunities for industrial applications, but also poses security risks. Various techniques are required to prevent hacks and ensure the security level needed. Wider implementation of IIoT may cause greater security risks than benefits.

SENSORS (2021)

Article Multidisciplinary Sciences

Converting tabular data into images for deep learning with convolutional neural networks

Yitan Zhu et al.

Summary: The IGTD algorithm transforms tabular data into images by assigning similar features close to each other in the image through optimized allocation of features to pixel positions. Compared to existing methods, IGTD generates compact image representations with better preservation of feature neighborhood structure.

SCIENTIFIC REPORTS (2021)

Proceedings Paper Engineering, Aerospace

Aircraft to Operations Communication Analysis and Architecture for the Future Aviation Environment

Huw Whitworth et al.

Summary: The proposed 5G system architecture includes network slicing capabilities which allow for partitioning a single network infrastructure into multiple logical networks tailored to specific use cases, providing appropriate isolation and QoS characteristics. Key to this is the slicing of the Radio Access Network (RAN) to ensure appropriate QoS over multiple domains.

2021 IEEE/AIAA 40TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC) (2021)

Proceedings Paper Engineering, Electrical & Electronic

Ensemble Learning Methods for Anomaly Intrusion Detection System in Smart Grid

Tala Talaei Khoei et al.

Summary: This study focuses on the security solution for smart grid networks, using intrusion detection systems and ensemble learning techniques. By comparing the results of different technologies, it is found that stacking-based ensemble learning techniques outperform others in terms of four evaluation metrics.

2021 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT) (2021)

Article Computer Science, Information Systems

A Novel Approach for Detecting Cyberattacks in Embedded Systems Based on Anomalous Patterns of Resource Utilization-Part I

Abdulmohsan Aloseel et al.

Summary: This paper introduces a novel security approach called ARCD for detecting cyberattacks in embedded systems by comparing standard and anomalous resource consumption patterns. Through simulating different types of cyberattacks on a Smart PiCar, the effectiveness and feasibility of the method have been validated, with a septenary tuple model proposed as the core of the detection mechanism.

IEEE ACCESS (2021)

Article Computer Science, Hardware & Architecture

Near real-time security system applied to SDN environments in IoT networks using convolutional neural network

Marcos V. O. de Assis et al.

COMPUTERS & ELECTRICAL ENGINEERING (2020)

Article Telecommunications

Airport Connectivity Optimization for 5G Ultra-Dense Networks

Saba Al-Rubaye et al.

IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING (2020)

Proceedings Paper Computer Science, Interdisciplinary Applications

G-IDS: Generative Adversarial Networks Assisted Intrusion Detection System

Md Hasan Shahriar et al.

2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020) (2020)

Article Computer Science, Information Systems

Human Activity Recognition Based on Gramian Angular Field and Deep Convolutional Neural Network

Hongji Xu et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Rotation Equivariant Convolutional Neural Networks for Hyperspectral Image Classification

Mercedes E. Paoletti et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A New Framework for DDoS Attack Detection and Defense in SDN Environment

Liang Tan et al.

IEEE ACCESS (2020)

Proceedings Paper Engineering, Electrical & Electronic

On Security Threats of Botnets to Cyber Systems

Thomas Lange et al.

2019 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN) (2019)

Article Computer Science, Information Systems

A Survey on Recent Advances in Transport Layer Protocols

Michele Polese et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Artificial Intelligence

Network Anomaly Detection System using Genetic Algorithm and Fuzzy Logic

Anderson Hiroshi Hamamoto et al.

EXPERT SYSTEMS WITH APPLICATIONS (2018)

Proceedings Paper Computer Science, Artificial Intelligence

DeepDefense: Identifying DDoS Attack via Deep Learning

Xiaoyong Yuan et al.

2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP) (2017)

Article Engineering, Electrical & Electronic

Security Implications of Transport Layer Protocols in Power Grid Synchrophasor Data Communication

Yujue Wang et al.

IEEE TRANSACTIONS ON SMART GRID (2016)

Article Computer Science, Interdisciplinary Applications

Deep Convolutional Neural Networks for Computer-Aided Detection: CNN Architectures, Dataset Characteristics and Transfer Learning

Hoo-Chang Shin et al.

IEEE TRANSACTIONS ON MEDICAL IMAGING (2016)

Article Automation & Control Systems

Attack Detection and Identification in Cyber-Physical Systems

Fabio Pasqualetti et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2013)

News Item Computer Science, Hardware & Architecture

A Storm (Worm) is brewing

Brad Smith

COMPUTER (2008)