Search Results for author: Nour Moustafa

Found 10 papers, 0 papers with code

A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection

no code implementations4 Nov 2021 Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marius Portmann

The framework has been designed and evaluated in this paper by using two key datasets in a NetFlow format known as NF-UNSW-NB15-v2 and NF-BoT-IoT-v2.

Federated Learning Network Intrusion Detection

Feature Extraction for Machine Learning-based Intrusion Detection in IoT Networks

no code implementations28 Aug 2021 Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marcus Gallagher, Marius Portmann

In an analysis of related works, it was observed that most researchers aim to obtain better classification results by using a set of untried combinations of Feature Reduction (FR) and Machine Learning (ML) techniques on NIDS datasets.

BIG-bench Machine Learning Network Intrusion Detection

Security and Privacy for Artificial Intelligence: Opportunities and Challenges

no code implementations9 Feb 2021 Ayodeji Oseni, Nour Moustafa, Helge Janicke, Peng Liu, Zahir Tari, Athanasios Vasilakos

The increased adoption of Artificial Intelligence (AI) presents an opportunity to solve many socio-economic and environmental challenges; however, this cannot happen without securing AI-enabled technologies.

Federated Learning

Mitigating the Impact of Adversarial Attacks in Very Deep Networks

no code implementations8 Dec 2020 Mohammed Hassanin, Ibrahim Radwan, Nour Moustafa, Murat Tahtali, Neeraj Kumar

In it, a Defensive Feature Layer (DFL) is integrated with a well-known DNN architecture which assists in neutralizing the effects of illegitimate perturbation samples in the feature space.

Data Poisoning

A Deep Marginal-Contrastive Defense against Adversarial Attacks on 1D Models

no code implementations8 Dec 2020 Mohammed Hassanin, Nour Moustafa, Murat Tahtali

Several research studies have been conducted to address this issue and build more robust deep learning models.

Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications

no code implementations4 Oct 2020 Nour Moustafa, Marwa Keshk, Essam Debie, Helge Janicke

This paper presents the description of new datasets, the so-called ToN_IoT, which involve federated data sources collected from telemetry datasets of IoT services, operating system datasets of Windows and Linux, and datasets of network traffic.

Cryptography and Security

Densely Connected Residual Network for Attack Recognition

no code implementations5 Aug 2020 Peilun Wu, Nour Moustafa, Shiyi Yang, Hui Guo

High false alarm rate and low detection rate are the major sticking points for unknown threat perception.

Enhancing network forensics with particle swarm and deep learning: The particle deep framework

no code implementations2 May 2020 Nickolaos Koroniotis, Nour Moustafa

The popularity of IoT smart things is rising, due to the automation they provide and its effects on productivity.

Cannot find the paper you are looking for? You can Submit a new open access paper.