This thesis presents a novel approach to provide adaptive mechanisms to detect and categorise Flooding-Base DoS (FBDoS) and Flooding-Base DDoS (FBDDoS) attacks. These attacks are generally based on a flood of packets with the intention of overfilling key resources of the target, and today the attacks have the capability to disrupt networks of almost any size. To address this problem we propose a Multi-Agent Reinforcement Learning (MARL) approach. In Reinforcement Learning (RL) agents learn to act optimally via observations and feedback from the environment in the form of positive or negative rewards. The thesis also investigates new methods of how to overcome some of the problems that Multi-Agent RL (MARL) faces. The proposed approach u...
In this paper, a new reinforcement learning intrusion detection system is developed for IoT networks...
Abstract. Distributed denial of service attacks constitute a rapidly evolving threat in the current ...
Abstract — Firewall is employed for defense however they are doing not offer full protection. This e...
This thesis presents a novel approach to provide adaptive mechanisms to detect and categorise Floodi...
The increasing adoption of technologies and the exponential growth of networks has made the area of ...
DDoS attacks plague the availability of online services today, yet like many cybersecurity problems ...
Owing to the distributed nature of modern attacks (e.g. denial-of-service), it is extremely challeng...
Early threat detection is an increasing part of the cybersecurity landscape, given the growing scale...
Producción CientíficaIntrusion detection is a crucial service in today’s data networks, and the sear...
Abstract Large unbalanced datasets pose challenges for machine learning models, as redundant and irr...
Producción CientíficaThe application of new techniques to increase the performance of intrusion dete...
Purpose – In this research, the authors demonstrate the advantage of reinforcement learning (RL) bas...
The detection and elimination of threats to cyber security is essential for system functionality, pr...
Future Internet involves several emerging technologies such as 5G and beyond 5G networks, vehicular ...
The impact of computer networks on modern society cannot be estimated. Arguably, computer networks a...
In this paper, a new reinforcement learning intrusion detection system is developed for IoT networks...
Abstract. Distributed denial of service attacks constitute a rapidly evolving threat in the current ...
Abstract — Firewall is employed for defense however they are doing not offer full protection. This e...
This thesis presents a novel approach to provide adaptive mechanisms to detect and categorise Floodi...
The increasing adoption of technologies and the exponential growth of networks has made the area of ...
DDoS attacks plague the availability of online services today, yet like many cybersecurity problems ...
Owing to the distributed nature of modern attacks (e.g. denial-of-service), it is extremely challeng...
Early threat detection is an increasing part of the cybersecurity landscape, given the growing scale...
Producción CientíficaIntrusion detection is a crucial service in today’s data networks, and the sear...
Abstract Large unbalanced datasets pose challenges for machine learning models, as redundant and irr...
Producción CientíficaThe application of new techniques to increase the performance of intrusion dete...
Purpose – In this research, the authors demonstrate the advantage of reinforcement learning (RL) bas...
The detection and elimination of threats to cyber security is essential for system functionality, pr...
Future Internet involves several emerging technologies such as 5G and beyond 5G networks, vehicular ...
The impact of computer networks on modern society cannot be estimated. Arguably, computer networks a...
In this paper, a new reinforcement learning intrusion detection system is developed for IoT networks...
Abstract. Distributed denial of service attacks constitute a rapidly evolving threat in the current ...
Abstract — Firewall is employed for defense however they are doing not offer full protection. This e...