Results 241 to 250 of about 62,210 (284)
Some of the next articles are maybe not open access.

IoT Cyber-Attack Detection: A Comparative Analysis

International Conference on Data Science, E-learning and Information Systems 2021, 2021
A cyber-attack is precautious manipulation of computer systems and networks using malware to conciliate data or restrict processes or operations. These types of attacks are vastly growing over the years. This increase in structure and complexity calls for advanced innovation in defensive strategies and detection.
Abdul Hanan K. Mohammed   +3 more
openaire   +1 more source

Detection of collaborative misbehaviour in distributed cyber-attacks

Computer Communications, 2021
Abstract In this article, we consider the detection of suspiciously high correlation between malicious Internet users that are collaborating in order to cause a Distributed Denial of Service (DDoS) attack. The main goal is to obtain a method for judging correlated misbehaviour among the requests that are issued by different users, aiming to recognize
Marios Thoma   +1 more
openaire   +1 more source

Context and semantics for detection of cyber attacks

International Journal of Information and Computer Security, 2014
This paper presents a novel layered cyber-attack detection approach utilising: 1 semantic relationships between attacks to infer possible related suspicious network activities from connections between hosts; 2 contextual information expressed as attack context profiles on top of semantic relationships.
Ahmed Aleroud   +3 more
openaire   +1 more source

Detecting Cyber-Attacks

New Electronics, 2020
ULTRASOC AND AGILE ANALOG WORK TO DETECT PHYSICAL CYBER-ATTACKS.
openaire   +1 more source

Scalable Detection of Cyber Attacks

2011
Attackers can exploit vulnerabilities to incrementally penetrate a network and compromise critical systems. The enormous amount of raw security data available to analysts and the complex interdependencies among vulnerabilities make manual analysis extremely labor-intensive and error-prone. To address this important problem, we build on previous work on
Massimiliano Albanese   +3 more
openaire   +2 more sources

Detection of complex cyber attacks

SPIE Proceedings, 2006
One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed.
Ian Gregorio- de Souza   +6 more
openaire   +1 more source

Faults and Cyber Attacks Detection in Critical Infrastructures

2016
In this paper we study the case of Critical Infrastructures (CIs), and especially power grid systems, which nowadays rely on computers and the Internet for their operation. We propose a combinatorial method for automatic detection and classification of faults and cyber-attacks, when there is limited data from the power grid nodes due to cyber ...
Soupionis, Yannis   +2 more
openaire   +2 more sources

Cyber Attack Detection Framework for Cloud Computing

2020
To prevent cyber-attacks, cloud-based systems mainly depend upon different types of intrusion detection systems (IDS). Most of the approaches have high detection rate for known attacks. But in case of unknown attacks or new attacks, these intrusion detection system increases false alarm rate.
Suryakant Badde   +3 more
openaire   +1 more source

Intrusion Detection Techniques for Detection of Cyber Attacks

2021
Intrusion detection system (IDS) is a software-related application where we can detect the system or network activities and notice if any suspicious task happens. Excellent broadening and the use of the Internet lift examine the communication and save the digital information securely. Nowadays, attackers use variety of attacks for fetching private data.
Shaikh Sahil Ahmed   +2 more
openaire   +1 more source

Finding Patterns of Cyber-Attacks and Creating A Detection Model to Detect Cyber-Attacks Using Machine Learning

Journal of Artificial Intelligence, Machine Learning and Neural Network, 2023
This research is a finding and detection type of research. That paper focuses on exploratory data analysis and YOLOv3, you only look once at version three, a real-time recognizing model. The hypothesis of this research are, a cyber-attack gives the same pattern in all the different, different IP addresses, and the research model, the YOLOv3 model can ...
openaire   +1 more source

Home - About - Disclaimer - Privacy