network security
Exploring the Effect of DNN Depth on Adversarial Attacks in Network Intrusion Detection Systems
ElShehaby, Mohamed, Matrawy, Ashraf
Adversarial attacks pose significant challenges to Machine Learning (ML) systems and especially Deep Neural Networks (DNNs) by subtly manipulating inputs to induce incorrect predictions. This paper investigates whether increasing the layer depth of deep neural networks affects their robustness against adversarial attacks in the Network Intrusion Detection System (NIDS) domain. We compare the adversarial robustness of various deep neural networks across both \ac{NIDS} and computer vision domains (the latter being widely used in adversarial attack experiments). Our experimental results reveal that in the NIDS domain, adding more layers does not necessarily improve their performance, yet it may actually significantly degrade their robustness against adversarial attacks. Conversely, in the computer vision domain, adding more layers exhibits a more modest impact on robustness. These findings can guide the development of robust neural networks for (NIDS) applications and highlight the unique characteristics of network security domains within the (ML) landscape.
LLMs' Suitability for Network Security: A Case Study of STRIDE Threat Modeling
AbdulGhaffar, AbdulAziz, Matrawy, Ashraf
Abstract--Artificial Intelligence (AI) is expected to be an integral part of next-generation AI-native 6G networks. With the prevalence of AI, researchers have identified numerous use cases of AI in network security. However, there are very few studies that analyze the suitability of Large Language Models (LLMs) in network security. T o fill this gap, we examine the suitability of LLMs in network security, particularly with the case study of STRIDE threat modeling. We utilize four prompting techniques with five LLMs to perform STRIDE classification of 5G threats. From our evaluation results, we point out key findings and detailed insights along with the explanation of the possible underlying factors influencing the behavior of LLMs in the modeling of certain threats. The numerical results and the insights support the necessity for adjusting and fine-tuning LLMs for network security use cases. Future networks, such as Sixth Generation (6G) networks, are envisioned to integrate Artificial Intelligence (AI) into their networks to be AI-Native networks [1] to improve performance, efficiency, and scalability [2].
NetMoniAI: An Agentic AI Framework for Network Security & Monitoring
Zambare, Pallavi, Thanikella, Venkata Nikhil, Kottur, Nikhil Padmanabh, Akula, Sree Akhil, Liu, Ying
The system demonstrated scalable, distributed threat detection, dynamic role classification, and responsive semantic analysis. Particularly, it achieved these capabilities without introducing processing bottlenecks or significant latency overhead. C. Conclusion This paper presented NetMoniAI, a hybrid agentic AI framework for real-time, distributed network monitoring and threat detection. By combining decentralized sensing at node level with centralized semantic analysis using GPT -O3, the system detects both localized and coordinated attacks with low latency and high accuracy. Evaluated across a local micro-testbed and NS-3 simulations, NetMoniAI demonstrated timely anomaly detection, accurate DDoS classification, and clear operator feedback through structured reports and an interactive dashboard. Its scalable, asynchronous architecture supports interpretable, layered responses without sacrificing performance. Future work will extend the framework with adaptive mitigation, multi-agent coordination, and SDN-based policy enforcement.
- Asia > Russia (0.14)
- Europe > Ukraine (0.04)
- North America > United States > Texas (0.04)
- Europe > Russia (0.04)
Efficient Telecom Specific LLM: TSLAM-Mini with QLoRA and Digital Twin Data
Ethiraj, Vignesh, Vijay, Divya, Menon, Sidhanth, Berscilla, Heblin
While general-purpose Large Language Models (LLMs) have demonstrated remarkable proficiency across diverse natural language tasks, their inherent lack of domain-specific knowledge often renders them inadequate for specialized telecom applications, such as intricate network optimization, real-time fault diagnosis, and automated configuration management. To bridge this capability gap, we introduce TSLAM-Mini, a meticulously fine-tuned iteration of the Phi-4 Mini Instruct 4B model. TSLAM-Mini is specifically tailored for telecommunications tasks, leveraging a comprehensive dataset of 100,000 samples that span 20 consolidated and critical telecommunications categories. These categories, delineated in Section 3, encompass a wide spectrum from foundational networking principles (e.g., Network Fundamentals, IP Routing, MPLS) to advanced and emerging areas (e.g., Network Security, Automation, OSS/BSS, RAN, Mobile Core, Satellite Communications, and Ethical AI). The foundational dataset was synthesized utilizing Ne-toAI's DigiTwin platform, which facilitates the creation of high-fidelity digital replicas of network devices and environments. This approach allows for the generation of realistic network operation data, further enriched by insights from seasoned Subject Matter Experts (SMEs) and normative information extracted from pertinent Request for Comments (RFCs), ensuring profound domain relevance. The fine-tuning process employs Quantized Low-Rank Adaptation (QLoRA), a Parameter-Efficient Fine-Tuning (PEFT) technique, to optimize training efficiency and computational footprint, thereby enabling deployment on resource-constrained edge devices or embedded systems. This research endeavors to significantly enhance TSLAM-Mini's capacity to deliver precise, context-aware, and actionable responses to complex telecom challenges, thereby contributing to the paradigm of intelligent, resilient, and autonomous network management and advancing the frontier of applied LLMs in the telecommunications sector.
- Research Report (0.40)
- Overview (0.34)
- Information Technology > Networks (0.69)
- Information Technology > Security & Privacy (0.49)
- Telecommunications > Networks (0.48)
- Information Technology > Communications > Networks (1.00)
- Information Technology > Artificial Intelligence > Representation & Reasoning (1.00)
- Information Technology > Artificial Intelligence > Natural Language > Large Language Model (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (0.47)
Enhancing Network Security: A Hybrid Approach for Detection and Mitigation of Distributed Denial-of-Service Attacks Using Machine Learning
Shohan, Nizo Jaman, Tanbhir, Gazi, Elahi, Faria, Ullah, Ahsan, Sakib, Md. Nazmus
The distributed denial-of-service (DDoS) attack stands out as a highly formidable cyber threat, representing an advanced form of the denial-of-service (DoS) attack. A DDoS attack involves multiple computers working together to overwhelm a system, making it unavailable. On the other hand, a DoS attack is a one-on-one attempt to make a system or website inaccessible. Thus, it is crucial to construct an effective model for identifying various DDoS incidents. Although extensive research has focused on binary detection models for DDoS identification, they face challenges to adapt evolving threats, necessitating frequent updates. Whereas multiclass detection models offer a comprehensive defense against diverse DDoS attacks, ensuring adaptability in the ever-changing cyber threat landscape. In this paper, we propose a Hybrid Model to strengthen network security by combining the featureextraction abilities of 1D Convolutional Neural Networks (CNNs) with the classification skills of Random Forest (RF) and Multi-layer Perceptron (MLP) classifiers. Using the CIC-DDoS2019 dataset, we perform multiclass classification of various DDoS attacks and conduct a comparative analysis of evaluation metrics for RF, MLP, and our proposed Hybrid Model. After analyzing the results, we draw meaningful conclusions and confirm the superiority of our Hybrid Model by performing thorough cross-validation. Additionally, we integrate our machine learning model with Snort, which provides a robust and adaptive solution for detecting and mitigating various DDoS attacks.
Block MedCare: Advancing healthcare through blockchain integration with AI and IoT
Simonoski, Oliver, Bogatinoska, Dijana Capeska
This research explores the integration of blockchain technology in healthcare, focusing on enhancing the security and efficiency of Electronic Health Record (EHR) management. We propose a novel Ethereum-based system that empowers patients with secure control over their medical data. Our approach addresses key challenges in healthcare blockchain implementation, including scalability, privacy, and regulatory compliance. The system incorporates digital signatures, Role-Based Access Control, and a multi-layered architecture to ensure secure, controlled access. We developed a decentralized application (dApp) with user-friendly interfaces for patients, doctors, and administrators, demonstrating the practical application of our solution. A survey among healthcare professionals and IT experts revealed strong interest in blockchain adoption, while also highlighting concerns about integration costs. The study explores future enhancements, including integration with IoT devices and AI-driven analytics, contributing to the evolution of secure, efficient, and interoperable healthcare systems that leverage cutting-edge technologies for improved patient care.
- Europe > North Macedonia > Southwestern Statistical Region > Ohrid Municipality > Ohrid (0.05)
- Europe > Switzerland > Basel-City > Basel (0.04)
- Research Report > New Finding (0.46)
- Research Report > Promising Solution (0.46)
- Overview > Innovation (0.34)
- Information Technology > e-Commerce > Financial Technology (1.00)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Data Science (1.00)
- Information Technology > Artificial Intelligence (1.00)
Trustworthy Intrusion Detection: Confidence Estimation Using Latent Space
Pitsiorlas, Ioannis, Arvanitakis, George, Kountouris, Marios
This work introduces a novel method for enhancing confidence in anomaly detection in Intrusion Detection Systems (IDS) through the use of a Variational Autoencoder (VAE) architecture. By developing a confidence metric derived from latent space representations, we aim to improve the reliability of IDS predictions against cyberattacks. Applied to the NSL-KDD dataset, our approach focuses on binary classification tasks to effectively distinguish between normal and malicious network activities. The methodology demonstrates a significant enhancement in anomaly detection, evidenced by a notable correlation of 0.45 between the reconstruction error and the proposed metric. Our findings highlight the potential of employing VAEs for more accurate and trustworthy anomaly detection in network security.
- Asia > Middle East > UAE > Abu Dhabi Emirate > Abu Dhabi (0.14)
- North America > United States > Wisconsin > Dane County > Madison (0.04)
- Europe > Spain > Andalusia > Granada Province > Granada (0.04)
- Europe > France (0.04)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.49)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Data Science > Data Mining > Anomaly Detection (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Performance Analysis > Accuracy (0.96)
A Cutting-Edge Deep Learning Method For Enhancing IoT Security
Ansar, Nadia, Ansari, Mohammad Sadique, Sharique, Mohammad, Khatoon, Aamina, Malik, Md Abdul, Siddiqui, Md Munir
There have been significant issues given the IoT, with heterogeneity of billions of devices and with a large amount of data. This paper proposed an innovative design of the Internet of Things (IoT) Environment Intrusion Detection System (or IDS) using Deep Learning-integrated Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks. Our model, based on the CICIDS2017 dataset, achieved an accuracy of 99.52% in classifying network traffic as either benign or malicious. The real-time processing capability, scalability, and low false alarm rate in our model surpass some traditional IDS approaches and, therefore, prove successful for application in today's IoT networks. The development and the performance of the model, with possible applications that may extend to other related fields of adaptive learning techniques and cross-domain applicability, are discussed. The research involving deep learning for IoT cybersecurity offers a potent solution for significantly improving network security.
- North America > United States > Nevada > Clark County > Las Vegas (0.04)
- Asia > India (0.04)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.34)
Advancements In Crowd-Monitoring System: A Comprehensive Analysis of Systematic Approaches and Automation Algorithms: State-of-The-Art
Ameen, Mohammed, Stone, Richard
Growing apprehensions surrounding public safety have captured the attention of numerous governments and security agencies across the globe. These entities are increasingly acknowledging the imperative need for reliable and secure crowd-monitoring systems to address these concerns. Effectively managing human gatherings necessitates proactive measures to prevent unforeseen events or complications, ensuring a safe and well-coordinated environment. The scarcity of research focusing on crowd monitoring systems and their security implications has given rise to a burgeoning area of investigation, exploring potential approaches to safeguard human congregations effectively. Crowd monitoring systems depend on a bifurcated approach, encompassing vision-based and non-vision-based technologies. An in-depth analysis of these two methodologies will be conducted in this research. The efficacy of these approaches is contingent upon the specific environment and temporal context in which they are deployed, as they each offer distinct advantages. This paper endeavors to present an in-depth analysis of the recent incorporation of artificial intelligence (AI) algorithms and models into automated systems, emphasizing their contemporary applications and effectiveness in various contexts.
- North America > United States > Iowa (0.04)
- North America > United States > New York (0.04)
- North America > United States > Connecticut (0.04)
- (13 more...)
The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey
Ibitoye, Olakunle, Abou-Khamis, Rana, Shehaby, Mohamed el, Matrawy, Ashraf, Shafiq, M. Omair
Machine learning models have made many decision support systems to be faster, more accurate, and more efficient. However, applications of machine learning in network security face a more disproportionate threat of active adversarial attacks compared to other domains. This is because machine learning applications in network security such as malware detection, intrusion detection, and spam filtering are by themselves adversarial in nature. In what could be considered an arm's race between attackers and defenders, adversaries constantly probe machine learning systems with inputs that are explicitly designed to bypass the system and induce a wrong prediction. In this survey, we first provide a taxonomy of machine learning techniques, tasks, and depth. We then introduce a classification of machine learning in network security applications. Next, we examine various adversarial attacks against machine learning in network security and introduce two classification approaches for adversarial attacks in network security. First, we classify adversarial attacks in network security based on a taxonomy of network security applications. Secondly, we categorize adversarial attacks in network security into a problem space vs feature space dimensional classification model. We then analyze the various defenses against adversarial attacks on machine learning-based network security applications. We conclude by introducing an adversarial risk grid map and evaluating several existing adversarial attacks against machine learning in network security using the risk grid map. We also identify where each attack classification resides within the adversarial risk grid map.
- North America > Canada > Ontario > National Capital Region > Ottawa (0.14)
- Europe > Italy > Calabria > Catanzaro Province > Catanzaro (0.04)
- North America > United States > Wisconsin (0.04)
- (2 more...)
- Research Report > New Finding (1.00)
- Overview (1.00)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.46)