This paper presents a new approach to generate datasets for cyber threat research in a multi-node system. For this purpose, the proof-of-concept of such a system is implemented. The system will be used to collect unique datasets with examples of information hiding techniques. These techniques are not present in publicly available cyber threat detection datasets, while the cyber threats that use them represent an emerging cyber defense challenge worldwide. The network data were collected thanks to the development of a dedicated application that automatically generates random network configurations and runs scenarios of information hiding techniques. The generated datasets were used in the data-driven research workflow for cyber threat detect...
Abstract: Social networking is the most common way of communication nowadays. Maintaining the inform...
Machine learning based anomaly detection mechanisms are a promising tool to detect and protect netwo...
With the world moving towards being increasingly dependent on computers and automation, one of the m...
In recent years, there has been an immense research interest in applying Machine Learning for defend...
Almost all the organisations and even individuals rely on complex structures of data networks and n...
Cyberspace operations, in conjunction with artificial intelligence and machine learning enhanced cyb...
Cybersecurity is an arms race, with both the security and the adversaries attempting to outsmart one...
In this technology-based era, network-based systems are facing new cyber-attacks on daily bases. Tra...
All users place a high value on information security. Over the last few decades, cyber security has ...
Abstract: The main objective of this study is not to identify the best machine learning model, but i...
Pervasive growth and usage of the Internet and mobile applications have expanded cyberspace. The cyb...
Over the last two years, machine learning has become rapidly utilized in cybersecurity, rising from ...
Cyberattacks are sets of actions directed against information systems that operate on the network, c...
This research examines the use of machine-learning techniques to identify malicious traffic in an em...
This thesis studies the application of machine learning to the field of Cyber security. Machine lear...
Abstract: Social networking is the most common way of communication nowadays. Maintaining the inform...
Machine learning based anomaly detection mechanisms are a promising tool to detect and protect netwo...
With the world moving towards being increasingly dependent on computers and automation, one of the m...
In recent years, there has been an immense research interest in applying Machine Learning for defend...
Almost all the organisations and even individuals rely on complex structures of data networks and n...
Cyberspace operations, in conjunction with artificial intelligence and machine learning enhanced cyb...
Cybersecurity is an arms race, with both the security and the adversaries attempting to outsmart one...
In this technology-based era, network-based systems are facing new cyber-attacks on daily bases. Tra...
All users place a high value on information security. Over the last few decades, cyber security has ...
Abstract: The main objective of this study is not to identify the best machine learning model, but i...
Pervasive growth and usage of the Internet and mobile applications have expanded cyberspace. The cyb...
Over the last two years, machine learning has become rapidly utilized in cybersecurity, rising from ...
Cyberattacks are sets of actions directed against information systems that operate on the network, c...
This research examines the use of machine-learning techniques to identify malicious traffic in an em...
This thesis studies the application of machine learning to the field of Cyber security. Machine lear...
Abstract: Social networking is the most common way of communication nowadays. Maintaining the inform...
Machine learning based anomaly detection mechanisms are a promising tool to detect and protect netwo...
With the world moving towards being increasingly dependent on computers and automation, one of the m...