相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article
Computer Science, Information Systems
Muna Al-Hawawreh et al.
Summary: The Industrial Internet of Things (IIoT) is a high-value target for cyber attacks, and developing security solutions that fit its requirements is challenging due to the lack of accurate data. To address this, we propose X-IIoTID, an intrusion data set for IIoT that includes multi-view features of connectivity protocols, device activities, attack types, and protocols.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Engineering, Electrical & Electronic
Muna Al-Hawawreh et al.
Summary: The Internet of Things (IoT) is facing challenges related to data redundancy and energy consumption. To address this, we propose an AI-powered solution that utilizes autocorrelation and deep reinforcement learning to make smart decisions about transmitting data, thereby reducing data redundancy and minimizing sensor power consumption.
IEEE SENSORS JOURNAL
(2022)
Article
Computer Science, Information Systems
Hatma Suryotrisongko et al.
Summary: In this study, the researchers investigated 12 years of DNS query logs from their campus network and discovered the presence of malicious botnet domain generation algorithm (DGA) traffic. They found that DGA-based botnets are difficult to detect using traditional cyber threat intelligence systems and proposed the use of AI/machine learning-based systems for improved detection. The researchers developed a model to detect DGA-based traffic using statistical features and discussed the expansion of CTI using computable CTI paradigm. They also explored methods to improve the explainability of the model outputs using explainable AI (XAI) and open-source intelligence (OSINT). Experimental results showed the effectiveness of their models and the superiority of their random forest model against adversarial attacks compared to other deep learning models. The researchers demonstrated the potential of XAI-OSINT blending in improving trust for CTI sharing and validating computable CTI paradigm.
Article
Computer Science, Information Systems
Muna Al-Hawawreh et al.
Summary: This paper introduces a targeted ransomware detection model tailored for IIoT systems, utilizing Asynchronous Peer-to-Peer Federated Learning and Deep Learning techniques to effectively detect known and unknown attacks in these systems with their heterogeneous and distributed nature.
Article
Computer Science, Artificial Intelligence
Alejandro Barredo Arrieta et al.
INFORMATION FUSION
(2020)
Article
Computer Science, Hardware & Architecture
Jean-Paul A. Yaacoub et al.
MICROPROCESSORS AND MICROSYSTEMS
(2020)
Article
Computer Science, Information Systems
Yun Zhou et al.
COMPUTERS & SECURITY
(2019)
Article
Computer Science, Information Systems
Wiem Tounsi et al.
COMPUTERS & SECURITY
(2018)
Article
Computer Science, Artificial Intelligence
Gregoire Montavon et al.
PATTERN RECOGNITION
(2017)