Skip to main content

Showing 1–7 of 7 results for author: Al-Hawawreh, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.13013  [pdf, other

    cs.CR cs.LG

    Hierarchical Classification for Intrusion Detection System: Effective Design and Empirical Analysis

    Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder

    Abstract: With the increased use of network technologies like Internet of Things (IoT) in many real-world applications, new types of cyberattacks have been emerging. To safeguard critical infrastructures from these emerging threats, it is crucial to deploy an Intrusion Detection System (IDS) that can detect different types of attacks accurately while minimizing false alarms. Machine learning approaches have… ▽ More

    Submitted 17 March, 2024; originally announced March 2024.

    Comments: Deakin University, Australia | This material is based upon work supported by the Air Force Office of Scientific Research under award number FA2386-23-1-4003

  2. arXiv:2403.13010  [pdf, other

    cs.CR cs.LG

    A Dual-Tier Adaptive One-Class Classification IDS for Emerging Cyberthreats

    Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder

    Abstract: In today's digital age, our dependence on IoT (Internet of Things) and IIoT (Industrial IoT) systems has grown immensely, which facilitates sensitive activities such as banking transactions and personal, enterprise data, and legal document exchanges. Cyberattackers consistently exploit weak security measures and tools. The Network Intrusion Detection System (IDS) acts as a primary tool against suc… ▽ More

    Submitted 17 March, 2024; originally announced March 2024.

    Comments: Deakin University, Australia | This material is based upon work supported by the Air Force Office of Scientific Research under award number FA2386-23-1-4003

  3. arXiv:2403.11180  [pdf, other

    cs.CR cs.LG

    usfAD Based Effective Unknown Attack Detection Focused IDS Framework

    Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder

    Abstract: The rapid expansion of varied network systems, including the Internet of Things (IoT) and Industrial Internet of Things (IIoT), has led to an increasing range of cyber threats. Ensuring robust protection against these threats necessitates the implementation of an effective Intrusion Detection System (IDS). For more than a decade, researchers have delved into supervised machine learning techniques… ▽ More

    Submitted 17 March, 2024; originally announced March 2024.

    Comments: Deakin University, Australia | This material is based upon work supported by the Air Force Office of Scientific Research under award number FA2386-23-1-4003

  4. arXiv:2306.10309  [pdf, other

    cs.CR

    Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses

    Authors: Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas Cordeiro, Merouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo

    Abstract: The ongoing deployment of the fifth generation (5G) wireless networks constantly reveals limitations concerning its original concept as a key driver of Internet of Everything (IoE) applications. These 5G challenges are behind worldwide efforts to enable future networks, such as sixth generation (6G) networks, to efficiently support sophisticated applications ranging from autonomous driving capabil… ▽ More

    Submitted 8 February, 2024; v1 submitted 17 June, 2023; originally announced June 2023.

    Comments: This paper has been accepted for publication in IEEE Communications Surveys \& Tutorials

  5. arXiv:2303.11751  [pdf, other

    cs.CR

    Generative AI for Cyber Threat-Hunting in 6G-enabled IoT Networks

    Authors: Mohamed Amine Ferrag, Merouane Debbah, Muna Al-Hawawreh

    Abstract: The next generation of cellular technology, 6G, is being developed to enable a wide range of new applications and services for the Internet of Things (IoT). One of 6G's main advantages for IoT applications is its ability to support much higher data rates and bandwidth as well as to support ultra-low latency. However, with this increased connectivity will come to an increased risk of cyber threats,… ▽ More

    Submitted 21 March, 2023; originally announced March 2023.

    Comments: The paper is accepted and will be published in the IEEE/ACM CCGrid 2023 Conference Proceedings

  6. Fake or Genuine? Contextualised Text Representation for Fake Review Detection

    Authors: Rami Mohawesh, Shuxiang Xu, Matthew Springer, Muna Al-Hawawreh, Sumbal Maqsood

    Abstract: Online reviews have a significant influence on customers' purchasing decisions for any products or services. However, fake reviews can mislead both consumers and companies. Several models have been developed to detect fake reviews using machine learning approaches. Many of these models have some limitations resulting in low accuracy in distinguishing between fake and genuine reviews. These models… ▽ More

    Submitted 28 December, 2021; originally announced December 2021.

    Journal ref: 10th International Conference on Natural Language Processing (NLP 2021)

  7. Develo** a Security Testbed for Industrial Internet of Things

    Authors: Muna Al-Hawawreh, Elena Sitnikovas

    Abstract: While achieving security for Industrial Internet of Things (IIoT) is a critical and non-trivial task, more attention is required for brownfield IIoT systems. This is a consequence of long life cycles of their legacy devices which were initially designed without considering security and IoT connectivity, but they are now becoming more connected and integrated with emerging IoT technologies and mess… ▽ More

    Submitted 25 November, 2020; originally announced November 2020.