no code implementations • 3 Mar 2024 • Alessandro Tavazzi, Dimitri Percia David, Julian Jang-Jaccard, Alain Mermoud
Identifying technological convergence among emerging technologies in cybersecurity is crucial for advancing science and fostering innovation.
no code implementations • 27 Jun 2023 • Yuanyuan Wei, Julian Jang-Jaccard, Amardeep Singh, Fariza Sabrina, Seyit Camtepe
In this context, we proposed a framework that can not only classify legitimate traffic and malicious traffic of DDoS attacks but also use SHAP to explain the decision-making of the classifier model.
no code implementations • 21 Apr 2023 • Yuanyuan Wei, Julian Jang-Jaccard, Fariza Sabrina, Wen Xu, Seyit Camtepe, Aeryn Dunmore
In this research, we trained and evaluated our proposed LSTM-AE model on reflection-based DDoS attacks (DNS, LDAP, and SNMP).
no code implementations • 16 Feb 2023 • Aeryn Dunmore, Julian Jang-Jaccard, Fariza Sabrina, Jin Kwak
This paper surveys the current research and literature for the use of Generative Adversarial Networks in the malware problem space.
no code implementations • 20 Aug 2022 • Yuhua Yin, Julian Jang-Jaccard, Fariza Sabrina, Jin Kwak
In this study, we proposed a two-stage model that combines the Birch clustering algorithm and MLP classifier to improve the performance of network anomaly multi-classification.
1 code implementation • 14 Apr 2022 • Yuanyuan Wei, Julian Jang-Jaccard, Wen Xu, Fariza Sabrina, Seyit Camtepe, Mikael Boulic
Anomaly detection for indoor air quality (IAQ) data has become an important area of research as the quality of air is closely related to human health and well-being.
no code implementations • 30 Mar 2022 • Yuhua Yin, Julian Jang-Jaccard, Wen Xu, Amardeep Singh, Jinting Zhu, Fariza Sabrina, Jin Kwak
Then, we apply recursive feature elimination(RFE) as a wrapper feature selection method to further eliminate redundant features recursively on the reduced feature subsets.
no code implementations • 2 Feb 2022 • Wen Xu, Julian Jang-Jaccard, Tong Liu, Fariza Sabrina
The network intrusion detection task is challenging because of the imbalanced and unlabeled nature of the dataset it operates on.
no code implementations • 4 Dec 2021 • Hooman Alavizadeh, Julian Jang-Jaccard, Tansu Alpcan, Seyit A. Camtepe
The new generation of botnets leverages Artificial Intelligent (AI) techniques to conceal the identity of botmasters and the attack intention to avoid detection.
no code implementations • 27 Nov 2021 • Hooman Alavizadeh, Julian Jang-Jaccard, Hootan Alavizadeh
In this paper, we introduce a new generation of network intrusion detection methods that combines a Q-learning-based reinforcement learning with a deep-feed forward neural network method for network intrusion detection.
no code implementations • 31 Oct 2021 • Amardeep Singh, Julian Jang-Jaccard
To address this, we propose a new novel feature extraction method based on covariance matrices that extract spatial-temporal characteristics of network traffic data for detecting malicious network traffic behavior.
no code implementations • 26 Oct 2021 • Jinting Zhu, Julian Jang-Jaccard, Amardeep Singh, Paul A. Watters, Seyit Camtepe
Existing Siamese neural network (SNN)-based malware detection methods fail to correctly classify different malware families when such obfuscated malware samples are present in the training dataset, resulting in high false-positive rates.
no code implementations • 15 Oct 2019 • Yuanyuan Wei, Julian Jang-Jaccard, Fariza Sabrina, Timothy McIntosh
Outlier detection is a technique in data mining that aims to detect unusual or unexpected records in the dataset.