3 năm trước
The adoption of deception technology constructed to throw off stealthy attackers from real assets and gather intelligence about how they operate is gaining ground in the network system. Also, some static honeypots are deployed in the network system to attract adversaries for avoiding them accessing the real targets. This leads…
Đọc tiếp >>>3 năm trước
Threat hunting is the action of seeking harmful actors lurking in the network or the system in the early stage with the assumption of attackers already broke the cy-ber defense solution. This defense solution requires collecting more knowledge inside and outside to search potential threats in each organization. To leverage…
Đọc tiếp >>>3 năm trước
Federated learning has become the promising approach for building collaborative intrusion detection systems (IDS) as providing privacy guaranteeing among data holders. Nevertheless, the non-independent and identically distributed (Non-IID) data in real-world scenarios negatively impacts the performance of aggregated models from training client updates. To this end, in this paper, we…
Đọc tiếp >>>3 năm trước
Virtual cybersecurity training platforms play an important role in developing the knowledge and practice skills for students in educational institution and universities. It helps learners can access to virtual laboratory through web-interface without any geolocation restriction, especially in the Covid-19 pandemic. Furthermore, instructors can monitor and understand learners’ behaviors in…
Đọc tiếp >>>3 năm trước
Although Software-defined networking (SDN) is a promising architecture that simplifies network management and control, it also faces security problems that may affect the whole network. Hence, protecting strategies, such as intrusion detection and prevention system (IDPS), are in need in the SDN context. The potential of machine learning-based solutions can…
Đọc tiếp >>>