The rapid increase in network traffic has recently led to the importance of flow-based intrusion detection systems processing a small amount of traffic data. Furthermore, anomaly-based methods, which can identify unknown attacks are also integrated into these systems. In this study, the focus is concentrated on the detection of anomalous network traffic (or intrusions) from flow-based data using unsupervised deep learning methods with semi-supervised learning approach. More specifically, Autoencoder and Variational Autoencoder methods were employed to identify unknown attacks using flow features. In the experiments carried out, the flow-based features extracted out of network traffic data, including typical and different types of attacks, w...
The intrusion detection system (IDS) is a promising technology for ensuring security against cyber-a...
Botnet network attacks are a growing issue in network security. These types of attacks consist out o...
Abstract. Computer systems and networks suffer due to rapid increase of attacks, and in order to kee...
The rapid growth of the internet, connecting billions of people and businesses, brings with it an in...
DoS and DDoS attacks have been growing in size and number over the last decade and existing solution...
International audienceIn recent years, the integration of connected devices in smart homes has signi...
Nowadays intrusion detection systems are a mandatory weapon in the war against the ever-increasing a...
Today, network security is crucial due to the rapid development of network and internet technologies...
Cybersecurity has become an increasingly important topic in recent years, as concepts such as cloud ...
In recent years, flow-based anomaly detection has been used as a scalable method for high-speed netw...
Intrusion Detection Systems (IDS) provide substantial measures to protect networks assets. IDSs are ...
With the increase of Internet visits and connections, it is becoming essential and arduous to protec...
By performing network traffic analyzing in different datasets, Intrusion Detection Systems (IDS) tha...
Defending key network infrastructure, such as Internet backbone links or the communication channels ...
The rapid growth of the Internet of Things and the proliferation of easily compromisable IoT devices...
The intrusion detection system (IDS) is a promising technology for ensuring security against cyber-a...
Botnet network attacks are a growing issue in network security. These types of attacks consist out o...
Abstract. Computer systems and networks suffer due to rapid increase of attacks, and in order to kee...
The rapid growth of the internet, connecting billions of people and businesses, brings with it an in...
DoS and DDoS attacks have been growing in size and number over the last decade and existing solution...
International audienceIn recent years, the integration of connected devices in smart homes has signi...
Nowadays intrusion detection systems are a mandatory weapon in the war against the ever-increasing a...
Today, network security is crucial due to the rapid development of network and internet technologies...
Cybersecurity has become an increasingly important topic in recent years, as concepts such as cloud ...
In recent years, flow-based anomaly detection has been used as a scalable method for high-speed netw...
Intrusion Detection Systems (IDS) provide substantial measures to protect networks assets. IDSs are ...
With the increase of Internet visits and connections, it is becoming essential and arduous to protec...
By performing network traffic analyzing in different datasets, Intrusion Detection Systems (IDS) tha...
Defending key network infrastructure, such as Internet backbone links or the communication channels ...
The rapid growth of the Internet of Things and the proliferation of easily compromisable IoT devices...
The intrusion detection system (IDS) is a promising technology for ensuring security against cyber-a...
Botnet network attacks are a growing issue in network security. These types of attacks consist out o...
Abstract. Computer systems and networks suffer due to rapid increase of attacks, and in order to kee...