|
1
|
Improving the efficacy of network security based on dimensionality reduction techniquesThis paper focuses on proposing a network intrusion detection model applying fundamental machine learning techniques to enhance early detection of network intrusions (rapid detection of attack... Author: Phuong Hoang Thi Keyword: Network attack DDoS machine learning deep learning dimensionality reduction
|
|
2
|
A study proposing improvements to overlay network architecture to mitigate the impact of distributed denial-of-service attacks on website systemsDenial-of-service (DoS) attacks on website systems have become increasingly sophisticated. These attacks are evolving at a pace and complexity that outstrips the capabilities of current defensive... Author: Vu Phuong Thi Keyword: Cyber attacks denial of service attacks distributed denial of service attacks website overlay network
|
|
3
|
Research on techniques to en-hance DDoS attack prevention using cumulative Sum and back-propagation algorithmsThis paper focuses on enhancing DDoS attack prevention ca-pabilities through the combination of the Cumulative Sum (CUSUM) algorithm and the Backpropagation method, aiming to detect attack indicators... Author: Phuong Hoang Thi Keyword: Network attack CUSUM algorithm Backpropagation algo-rithm Anti-spoofing DDoS attack
|
|
4
|
Applying transformer architecture to enhance attack detection performance in intrusion detection systemsIntrusion Detection Systems (IDS) are crucial in safeguarding network security against increasingly sophisticated threats. In this study, we propose a Transformer-based intrusion detection model to... Author: Vu Phuong Thi, Ha Hoang Thi Hong, Truong Dinh Gia, Yen Tran Thi Keyword: Intrusion Detection Transformer UNSW-NB15 Cybersecurity Self-attention
|
|
5
|
Intrusion detection in network systems using transformer based approachThe growing complexity of modern network infrastructures, driven by cloud computing, IoT, and 5G, poses significant challenges for traditional Intrusion Detection Systems (IDS), which often fail to... Author: Ngo Hoa Thi Keyword: Transformer Intrusion Detection Cybersecurity Network Traffic Deep Learning Anomaly Detection
|