(Translated by https://www.hiragana.jp/)
Search | arXiv e-print repository
Skip to main content

Showing 1–3 of 3 results for author: Elsayed, M S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2008.05791  [pdf, other

    cs.CR cs.NI

    Detecting Abnormal Traffic in Large-Scale Networks

    Authors: Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut

    Abstract: With the rapid technological advancements, organizations need to rapidly scale up their information technology (IT) infrastructure viz. hardware, software, and services, at a low cost. However, the dynamic growth in the network services and applications creates security vulnerabilities and new risks that can be exploited by various attacks. For example, User to Root (U2R) and Remote to Local (R2L)… ▽ More

    Submitted 13 August, 2020; originally announced August 2020.

    Comments: Published in Proc. IEEE International Symposium on Networks, Computers and Communications (ISNCC)2020

  2. arXiv:2006.13981  [pdf, other

    cs.CR

    DDoSNet: A Deep-Learning Model for Detecting Network Attacks

    Authors: Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut

    Abstract: Software-Defined Networking (SDN) is an emerging paradigm, which evolved in recent years to address the weaknesses in traditional networks. The significant feature of the SDN, which is achieved by disassociating the control plane from the data plane, facilitates network management and allows the network to be efficiently programmable. However, the new architecture can be susceptible to several att… ▽ More

    Submitted 24 June, 2020; originally announced June 2020.

    Comments: Published in Proc. IEEE World of Wireless, Mobile and Multimedia networks (WoWMoM) 2020

  3. arXiv:1910.00817  [pdf, other

    cs.CR

    Machine-Learning Techniques for Detecting Attacks in SDN

    Authors: Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut

    Abstract: With the advent of Software Defined Networks (SDNs), there has been a rapid advancement in the area of cloud computing. It is now scalable, cheaper, and easier to manage. However, SDNs are more prone to security vulnerabilities as compared to legacy systems. Therefore, machine-learning techniques are now deployed in the SDN infrastructure for the detection of malicious traffic. In this paper, we p… ▽ More

    Submitted 2 October, 2019; originally announced October 2019.

    Comments: Published in 2019 IEEE 7th International Conference on Computer Science and Network Technology