Investigating on the Robustness of Flow-based Intrusion Detection System against Adversarial Samples using Generative Adversarial Networks  

RESEARCH CREW
16:31 07/03/2023
TIN LIÊN QUAN
The increasing proliferation of phishing and scamming websites has become a significant threat to the safety and security of internet users. Accurately detecting such websites is crucial in mitigating their negative impact. While various techniques for detecting phishing and scamming websites exist, machine learning-based approaches have gained significant attention in...
Penetration testing is one of the most common methods for assessing the security of a system, application, or network. Although there are different support tools with great efficiency in this field, penetration testing is done mostly manually and relies heavily on the experience of the ethical hackers who are doing...
Software-defined networking (SDN) is a potential approach for modern network architecture, which has received great attention recently. SDN-based networks also face security issues, and they can become targets of cyberattacks. Cyber threat hunting is one of the security solutions proposed for early attack detection in SDN. Developing machine learning-based IDS...