2 năm trước
Recently, the development in both quantity and complication of malware has raised a need of powerful malware detection solution. The outstanding characteristics of machine learning (ML) and deep learning (DL) techniques has been leveraged in the fight against malware. However, they are proved to be vulnerable against adversarial attacks, where…
Đọc tiếp >>>2 năm trước
Nowadays, the amount of data generated from Internet of Things (IoT) devices is increasing, paving the way for the development of artificial intelligence (AI) applications. However, with the traditional AI approach, users sharing their raw data causes many concerns in terms of privacy leakage. There have been reports that there…
Đọc tiếp >>>2 năm trước
Phishing is a major cybersecurity threat that is increasingly dangerous and complicated, especially during a global pandemic when there is a great need for remote work and communication between Internet users. Moreover, the challenge is even greater when the crime of using high technology increase with the speed of development…
Đọc tiếp >>>2 năm trước
As one of the defensive solutions against cyberattacks, Intrusion Detection System (IDS) plays an important role in observing the network state, alerting suspicious actions that can break down the system. There are many attempts of adopting Machine Learning (ML) in IDS to achieve the high performance in intrusion detection. However,…
Đọc tiếp >>>2 năm trước
Cloud infrastructure enables individuals, organizations, and enterprises to offer scalable and elastic resources to support business operations remotely. The demand for digital transformation encourages communities and technical professionals to adopt cloud computing and automation platforms for facilitating their resource capacity, including operating systems, networks, and applications. Of cloud-based applications for…
Đọc tiếp >>>2 năm trước
Emerging with outstanding features in network management, Software Defined Networking (SDN) is considered as a flexible and efficient paradigm in the context of smart city including a massive number of heterogeneous devices. In the vision of Metaverse towards, SDN plays important roles for network orchestration to support interactive experience through…
Đọc tiếp >>>2 năm trước
The adoption of deception technology constructed to throw off stealthy attackers from real assets and gather intelligence about how they operate is gaining ground in the network system. Also, some static honeypots are deployed in the network system to attract adversaries for avoiding them accessing the real targets. This leads…
Đọc tiếp >>>2 năm trước
Threat hunting is the action of seeking harmful actors lurking in the network or the system in the early stage with the assumption of attackers already broke the cy-ber defense solution. This defense solution requires collecting more knowledge inside and outside to search potential threats in each organization. To leverage…
Đọc tiếp >>>2 năm trước
Federated learning has become the promising approach for building collaborative intrusion detection systems (IDS) as providing privacy guaranteeing among data holders. Nevertheless, the non-independent and identically distributed (Non-IID) data in real-world scenarios negatively impacts the performance of aggregated models from training client updates. To this end, in this paper, we…
Đọc tiếp >>>2 năm trước
Virtual cybersecurity training platforms play an important role in developing the knowledge and practice skills for students in educational institution and universities. It helps learners can access to virtual laboratory through web-interface without any geolocation restriction, especially in the Covid-19 pandemic. Furthermore, instructors can monitor and understand learners’ behaviors in…
Đọc tiếp >>>