To anticipate and counter cyber-attacks that may threaten the stability of the economy, society, and governments around the world, significant efforts have made particularly towards the detection of cyber-attacks, while fewer studies have focused on their forecasting. This paper proposes a framework that provides forecasts of upcoming (within the next minute) cyber-attacks, as well as their type, to a specific destination port. To this end, several machine learning-based methods are applied on measurements (observations) obtained from the network traffic flow. The proposed method is supported by two major pillars: first, the selection of appropriate features generated by the network traffic and, second, in addition to the selected features,...
Due to the invincibility nature of cyber attacks on the cyber supply chain (CSC), and the cascading ...
Current intrusion detection solutions are based on signature or rule-based detection. The large numb...
12 pagesInternational audienceThis paper proposes new cognitive algorithms and mechanisms for detect...
Abstract Having the ability to forecast cyberattacks before they happen will unquestionably change t...
Network attacks can be very costly to victims and due to the complexities in they disparate types of...
This paper provides a survey of prediction, and forecasting methods used in cyber security. Four mai...
To keep up with the increasing prevalence of cybersecurity attacks, improvements in the current prev...
Protection of networked computing infrastructures (such as Internet of Things, Industrial Control Sy...
Over the last two years, machine learning has become rapidly utilized in cybersecurity, rising from ...
Abstract Computer networks target several kinds of attacks every hour and day; they evolved to make ...
Computer networks are constantly being targeted by different at-tacks. Since not all attacks are cre...
In this research we compare different methods to examine network packets using supervised learning t...
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and...
Abstract Billions of gadgets are already online, making the IoT an essential aspect of daily life. H...
In recent years, large scale network attacks have been orchestrated using widespread malware such as...
Due to the invincibility nature of cyber attacks on the cyber supply chain (CSC), and the cascading ...
Current intrusion detection solutions are based on signature or rule-based detection. The large numb...
12 pagesInternational audienceThis paper proposes new cognitive algorithms and mechanisms for detect...
Abstract Having the ability to forecast cyberattacks before they happen will unquestionably change t...
Network attacks can be very costly to victims and due to the complexities in they disparate types of...
This paper provides a survey of prediction, and forecasting methods used in cyber security. Four mai...
To keep up with the increasing prevalence of cybersecurity attacks, improvements in the current prev...
Protection of networked computing infrastructures (such as Internet of Things, Industrial Control Sy...
Over the last two years, machine learning has become rapidly utilized in cybersecurity, rising from ...
Abstract Computer networks target several kinds of attacks every hour and day; they evolved to make ...
Computer networks are constantly being targeted by different at-tacks. Since not all attacks are cre...
In this research we compare different methods to examine network packets using supervised learning t...
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and...
Abstract Billions of gadgets are already online, making the IoT an essential aspect of daily life. H...
In recent years, large scale network attacks have been orchestrated using widespread malware such as...
Due to the invincibility nature of cyber attacks on the cyber supply chain (CSC), and the cascading ...
Current intrusion detection solutions are based on signature or rule-based detection. The large numb...
12 pagesInternational audienceThis paper proposes new cognitive algorithms and mechanisms for detect...