Skip to main content

Showing 1–4 of 4 results for author: Jahangir, A H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2303.02622  [pdf, other

    cs.CR cs.NI

    A Multi-Agent Adaptive Deep Learning Framework for Online Intrusion Detection

    Authors: Mahdi Soltani, Khashayar Khajavi, Mahdi Jafari Siavoshani, Amir Hossein Jahangir

    Abstract: The network security analyzers use intrusion detection systems (IDSes) to distinguish malicious traffic from benign ones. The deep learning-based IDSes are proposed to auto-extract high-level features and eliminate the time-consuming and costly signature extraction process. However, this new generation of IDSes still suffers from a number of challenges. One of the main issues of an IDS is facing t… ▽ More

    Submitted 5 March, 2023; originally announced March 2023.

  2. arXiv:2108.09199  [pdf, other

    cs.CR cs.LG cs.NI

    An Adaptable Deep Learning-Based Intrusion Detection System to Zero-Day Attacks

    Authors: Mahdi Soltani, Behzad Ousat, Mahdi Jafari Siavoshani, Amir Hossein Jahangir

    Abstract: The intrusion detection system (IDS) is an essential element of security monitoring in computer networks. An IDS distinguishes the malicious traffic from the benign one and determines the attack types targeting the assets of the organization. The main challenge of an IDS is facing new (i.e., zero-day) attacks and separating them from benign traffic and existing types of attacks. Along with the pow… ▽ More

    Submitted 20 August, 2021; originally announced August 2021.

  3. arXiv:2001.05009  [pdf, other

    cs.NI cs.CR cs.LG

    A Content-Based Deep Intrusion Detection System

    Authors: Mahdi Soltani, Mahdi Jafari Siavoshani, Amir Hossein Jahangir

    Abstract: The growing number of Internet users and the prevalence of web applications make it necessary to deal with very complex software and applications in the network. This results in an increasing number of new vulnerabilities in the systems, and leading to an increase in cyber threats and, in particular, zero-day attacks. The cost of generating appropriate signatures for these attacks is a potential m… ▽ More

    Submitted 16 August, 2021; v1 submitted 14 January, 2020; originally announced January 2020.

  4. arXiv:1612.01894  [pdf

    cs.NI

    Analysis and Evaluation of Real-time and Safety Characteristics of IEEE 802.11p protocol in VANET

    Authors: Hossein Ahmadvand, Amir Hossein Jahangir, Ataollah Fatahi Baarzi

    Abstract: The need for safety in transportation systems has increased the popularity and applicability of Vehicular Ad-Hoc Networks (VANETs) in recent years. On-time reception and processing of alarms caused by possible accidents as well as the preventive actions have important roles in reducing human and financial losses in road accidents. In such cases, the performance of safety applications should be eva… ▽ More

    Submitted 6 December, 2016; originally announced December 2016.

    Comments: 21 pages, 10 figures