Skip to main content

Showing 1–4 of 4 results for author: Farrukh, Y A

.
  1. arXiv:2310.09298  [pdf, other

    cs.CR cs.AI cs.LG

    ByteStack-ID: Integrated Stacked Model Leveraging Payload Byte Frequency for Grayscale Image-based Network Intrusion Detection

    Authors: Irfan Khan, Yasir Ali Farrukh, Syed Wali

    Abstract: In the ever-evolving realm of network security, the swift and accurate identification of diverse attack classes within network traffic is of paramount importance. This paper introduces "ByteStack-ID," a pioneering approach tailored for packet-level intrusion detection. At its core, ByteStack-ID leverages grayscale images generated from the frequency distributions of payload data, a groundbreaking… ▽ More

    Submitted 14 February, 2024; v1 submitted 6 October, 2023; originally announced October 2023.

    Comments: 6 pages, 6 figures

  2. arXiv:2309.07461  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection

    Authors: Yasir Ali Farrukh, Syed Wali, Irfan Khan, Nathaniel D. Bastian

    Abstract: The widespread integration of Internet of Things (IoT) devices across all facets of life has ushered in an era of interconnectedness, creating new avenues for cybersecurity challenges and underscoring the need for robust intrusion detection systems. However, traditional security systems are designed with a closed-world perspective and often face challenges in dealing with the ever-evolving threat… ▽ More

    Submitted 28 September, 2023; v1 submitted 14 September, 2023; originally announced September 2023.

    Comments: 6 Pages, 5 figures

  3. arXiv:2112.11219  [pdf

    cs.CR eess.SP

    An Autonomous Self-Incremental Learning Approach for Detection of Cyber Attacks on Unmanned Aerial Vehicles (UAVs)

    Authors: Yasir Ali Farrukh, Irfan Khan

    Abstract: As the technological advancement and capabilities of automated systems have increased drastically, the usage of unmanned aerial vehicles for performing human-dependent tasks without human indulgence has also spiked. Since unmanned aerial vehicles are heavily dependent on Information and Communication Technology, they are highly prone to cyber-attacks. With time more advanced and new attacks are be… ▽ More

    Submitted 18 December, 2021; originally announced December 2021.

    Comments: 10 pages, 4 figures

  4. arXiv:2108.00476  [pdf

    cs.CR eess.SY

    A Sequential Supervised Machine Learning Approach for Cyber Attack Detection in a Smart Grid System

    Authors: Yasir Ali Farrukh, Irfan Khan, Zeeshan Ahmad, Rajvikram Madurai Elavarasan

    Abstract: Modern smart grid systems are heavily dependent on Information and Communication Technology, and this dependency makes them prone to cyberattacks. The occurrence of a cyberattack has increased in recent years resulting in substantial damage to power systems. For a reliable and stable operation, cyber protection, control, and detection techniques are becoming essential. Automated detection of cyber… ▽ More

    Submitted 1 August, 2021; originally announced August 2021.

    Comments: 6 pages, 7 figures, to be published in North Americal Power Systems (NAPS 2021) Conference