Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (100)
  • Open Access

    ARTICLE

    Anomaly Detection for Internet of Things Cyberattacks

    Manal Alanazi*, Ahamed Aljuhani

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 261-279, 2022, DOI:10.32604/cmc.2022.024496

    Abstract The Internet of Things (IoT) has been deployed in diverse critical sectors with the aim of improving quality of service and facilitating human lives. The IoT revolution has redefined digital services in different domains by improving efficiency, productivity, and cost-effectiveness. Many service providers have adapted IoT systems or plan to integrate them as integral parts of their systems’ operation; however, IoT security issues remain a significant challenge. To minimize the risk of cyberattacks on IoT networks, anomaly detection based on machine learning can be an effective security solution to overcome a wide range of IoT cyberattacks. Although various detection techniques… More >

  • Open Access

    ARTICLE

    An Adaptive Classifier Based Approach for Crowd Anomaly Detection

    Sofia Nishath, P. S. Nithya Darisini*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 349-364, 2022, DOI:10.32604/cmc.2022.023935

    Abstract Crowd Anomaly Detection has become a challenge in intelligent video surveillance system and security. Intelligent video surveillance systems make extensive use of data mining, machine learning and deep learning methods. In this paper a novel approach is proposed to identify abnormal occurrences in crowded situations using deep learning. In this approach, Adaptive GoogleNet Neural Network Classifier with Multi-Objective Whale Optimization Algorithm are applied to predict the abnormal video frames in the crowded scenes. We use multiple instance learning (MIL) to dynamically develop a deep anomalous ranking framework. This technique predicts higher anomalous values for abnormal video frames by treating regular… More >

  • Open Access

    ARTICLE

    Ensemble Deep Learning Models for Mitigating DDoS Attack in Software-Defined Network

    Fatmah Alanazi*, Kamal Jambi, Fathy Eassa, Maher Khemakhem, Abdullah Basuhail, Khalid Alsubhi

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 923-938, 2022, DOI:10.32604/iasc.2022.024668

    Abstract Software-defined network (SDN) is an enabling technology that meets the demand of dynamic, adaptable, and manageable networking architecture for the future. In contrast to the traditional networks that are based on a distributed control plane, the control plane of SDN is based on a centralized architecture. As a result, SDNs are susceptible to critical cyber attacks that exploit the single point of failure. A distributed denial of service (DDoS) attack is one of the most crucial and risky attacks, targeting the SDN controller and disrupting its services. Several researchers have proposed signature-based DDoS mitigation and detection techniques that rely on… More >

  • Open Access

    ARTICLE

    Research on Power Consumption Anomaly Detection Based on Fuzzy Clustering and Trend Judgment

    Wei Xiong1,2, Xianshan Li1,2,*, Yu Zou3, Shiwei Su1,2, Li Zhi1,2

    Energy Engineering, Vol.119, No.2, pp. 755-765, 2022, DOI:10.32604/ee.2022.018009

    Abstract Among the end-users of the power grid, especially in the rural power grid, there are a large number of users and the situation is complex. In this complex situation, there are more leakage caused by insulation damage and a small number of users stealing electricity. Maintenance staff will take a long time to determine the location of the abnormal user meter box. In view of this situation, the method of subjective fuzzy clustering and quartile difference is adopted to determine the partition threshold. The power consumption data of end-users are divided into three regions: high, normal and low, which can… More >

  • Open Access

    ARTICLE

    Deep Learning Based Intrusion Detection in Cloud Services for Resilience Management

    S. Sreenivasa Chakravarthi1,*, R. Jagadeesh Kannan2, V. Anantha Natarajan3, Xiao-Zhi Gao4

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5117-5133, 2022, DOI:10.32604/cmc.2022.022351

    Abstract In the global scenario one of the important goals for sustainable development in industrial field is innovate new technology, and invest in building infrastructure. All the developed and developing countries focus on building resilient infrastructure and promote sustainable developments by fostering innovation. At this juncture the cloud computing has become an important information and communication technologies model influencing sustainable development of the industries in the developing countries. As part of the innovations happening in the industrial sector, a new concept termed as ‘smart manufacturing’ has emerged, which employs the benefits of emerging technologies like internet of things and cloud computing.… More >

  • Open Access

    ARTICLE

    Abnormality Identification in Video Surveillance System using DCT

    A. Balasundaram1,*, Golda Dilip2, M. Manickam3, Arun Kumar Sivaraman4, K. Gurunathan5, R. Dhanalakshmi6, S. Ashokkumar7

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 693-704, 2022, DOI:10.32604/iasc.2022.022241

    Abstract In the present world, video surveillance methods play a vital role in observing the activities that take place across secured and unsecured environment. The main aim with which a surveillance system is deployed is to spot abnormalities in specific areas like airport, military, forests and other remote areas, etc. A new block-based strategy is represented in this paper. This strategy is used to identify unusual circumstances by examining the pixel-wise frame movement instead of the standard object-based approaches. The density and also the speed of the movement is extorted by utilizing optical flow. The proposed strategy recognizes the unusual movement… More >

  • Open Access

    ARTICLE

    Sensor Data Based Anomaly Detection in Autonomous Vehicles using Modified Convolutional Neural Network

    Sivaramakrishnan Rajendar, Vishnu Kumar Kaliappan*

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 859-875, 2022, DOI:10.32604/iasc.2022.020936

    Abstract Automated Vehicles (AVs) reform the automotive industry by enabling real-time and efficient data exchange between the vehicles. While connectivity and automation of the vehicles deliver a slew of benefits, they may also introduce new safety, security, and privacy risks. Further, AVs rely entirely on the sensor data and the data from other vehicles too. On the other hand, the sensor data is susceptible to anomalies caused by cyber-attacks, errors, and faults, resulting in accidents and fatalities. Hence, it is essential to create techniques for detecting anomalies and identifying their sources before the wide adoption of AVs. This paper proposes an… More >

  • Open Access

    ARTICLE

    LogUAD: Log Unsupervised Anomaly Detection Based on Word2Vec

    Jin Wang1, Changqing Zhao1, Shiming He1,*, Yu Gu2, Osama Alfarraj3, Ahed Abugabah4

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1207-1222, 2022, DOI:10.32604/csse.2022.022365

    Abstract System logs record detailed information about system operation and are important for analyzing the system's operational status and performance. Rapid and accurate detection of system anomalies is of great significance to ensure system stability. However, large-scale distributed systems are becoming more and more complex, and the number of system logs gradually increases, which brings challenges to analyze system logs. Some recent studies show that logs can be unstable due to the evolution of log statements and noise introduced by log collection and parsing. Moreover, deep learning-based detection methods take a long time to train models. Therefore, to reduce the computational… More >

  • Open Access

    ARTICLE

    A Hybrid Deep Learning-Based Unsupervised Anomaly Detection in High Dimensional Data

    Amgad Muneer1,2,*, Shakirah Mohd Taib1,2, Suliman Mohamed Fati3, Abdullateef O. Balogun1, Izzatdin Abdul Aziz1,2

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5363-5381, 2022, DOI:10.32604/cmc.2022.021113

    Abstract Anomaly detection in high dimensional data is a critical research issue with serious implication in the real-world problems. Many issues in this field still unsolved, so several modern anomaly detection methods struggle to maintain adequate accuracy due to the highly descriptive nature of big data. Such a phenomenon is referred to as the “curse of dimensionality” that affects traditional techniques in terms of both accuracy and performance. Thus, this research proposed a hybrid model based on Deep Autoencoder Neural Network (DANN) with five layers to reduce the difference between the input and output. The proposed model was applied to a… More >

  • Open Access

    ARTICLE

    Industrial Datasets with ICS Testbed and Attack Detection Using Machine Learning Techniques

    Sinil Mubarak1, Mohamed Hadi Habaebi1,*, Md Rafiqul Islam1, Asaad Balla1, Mohammad Tahir2, Elfatih A. A. Elsheikh3, F. M. Suliman3

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1345-1360, 2022, DOI:10.32604/iasc.2022.020801

    Abstract Industrial control systems (ICS) are the backbone for the implementation of cybersecurity solutions. They are susceptible to various attacks, due to openness in connectivity, unauthorized attempts, malicious attacks, use of more commercial off the shelf (COTS) software and hardware, and implementation of Internet protocols (IP) that exposes them to the outside world. Cybersecurity solutions for Information technology (IT) secured with firewalls, intrusion detection/protection systems do nothing much for Operational technology (OT) ICS. An innovative concept of using real operational technology network traffic-based testbed, for cyber-physical system simulation and analysis, is presented. The testbed is equipped with real-time attacks using in-house… More >

Displaying 61-70 on page 7 of 100. Per Page