Skip to main content

Showing 1–3 of 3 results for author: Essex, A

.
  1. arXiv:2008.02327  [pdf, other

    cs.LG cs.NI stat.ML

    Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection

    Authors: MohammadNoor Injadat, Fadi Salo, Ali Bou Nassif, Aleksander Essex, Abdallah Shami

    Abstract: Network attacks have been very prevalent as their rate is growing tremendously. Both organization and individuals are now concerned about their confidentiality, integrity and availability of their critical information which are often impacted by network attacks. To that end, several previous machine learning-based intrusion detection methods have been developed to secure network infrastructure fro… ▽ More

    Submitted 5 August, 2020; originally announced August 2020.

    Comments: 6 pages, 7 Figures, 2 tables, Published in 2018 IEEE Global Communications Conference (GLOBECOM)

  2. arXiv:2005.12267  [pdf, other

    cs.CR cs.AI cs.LG

    Data Mining with Big Data in Intrusion Detection Systems: A Systematic Literature Review

    Authors: Fadi Salo, MohammadNoor Injadat, Ali Bou Nassif, Aleksander Essex

    Abstract: Cloud computing has become a powerful and indispensable technology for complex, high performance and scalable computation. The exponential expansion in the deployment of cloud technology has produced a massive amount of data from a variety of applications, resources and platforms. In turn, the rapid rate and volume of data creation has begun to pose significant challenges for data management and s… ▽ More

    Submitted 23 May, 2020; originally announced May 2020.

    Comments: 8 Pages, 5 Figures, to be appeared in the proceedings of the International Symposium on Big Data Management and Analytics. April 25-26, 2019, Calgary, Canada

  3. arXiv:1708.00991  [pdf, ps, other

    cs.CR

    Trust Implications of DDoS Protection in Online Elections

    Authors: Chris Culnane, Mark Eldridge, Aleksander Essex, Vanessa Teague

    Abstract: Online elections make a natural target for distributed denial of service attacks. Election agencies wary of disruptions to voting may procure DDoS protection services from a cloud provider. However, current DDoS detection and mitigation methods come at the cost of significantly increased trust in the cloud provider. In this paper we examine the security implications of denial-of-service prevention… ▽ More

    Submitted 3 August, 2017; originally announced August 2017.

    Comments: Published in E-Vote-ID 2017