Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (35)
  • Open Access

    ARTICLE

    Unknown DDoS Attack Detection with Fuzzy C-Means Clustering and Spatial Location Constraint Prototype Loss

    Thanh-Lam Nguyen1, Hao Kao1, Thanh-Tuan Nguyen2, Mong-Fong Horng1,*, Chin-Shiuh Shieh1,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2181-2205, 2024, DOI:10.32604/cmc.2024.047387

    Abstract Since its inception, the Internet has been rapidly evolving. With the advancement of science and technology and the explosive growth of the population, the demand for the Internet has been on the rise. Many applications in education, healthcare, entertainment, science, and more are being increasingly deployed based on the internet. Concurrently, malicious threats on the internet are on the rise as well. Distributed Denial of Service (DDoS) attacks are among the most common and dangerous threats on the internet today. The scale and complexity of DDoS attacks are constantly growing. Intrusion Detection Systems (IDS) have been deployed and have demonstrated… More >

  • Open Access

    ARTICLE

    Cybernet Model: A New Deep Learning Model for Cyber DDoS Attacks Detection and Recognition

    Azar Abid Salih1,*, Maiwan Bahjat Abdulrazaq2

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1275-1295, 2024, DOI:10.32604/cmc.2023.046101

    Abstract Cyberspace is extremely dynamic, with new attacks arising daily. Protecting cybersecurity controls is vital for network security. Deep Learning (DL) models find widespread use across various fields, with cybersecurity being one of the most crucial due to their rapid cyberattack detection capabilities on networks and hosts. The capabilities of DL in feature learning and analyzing extensive data volumes lead to the recognition of network traffic patterns. This study presents novel lightweight DL models, known as Cybernet models, for the detection and recognition of various cyber Distributed Denial of Service (DDoS) attacks. These models were constructed to have a reasonable number… More >

  • Open Access

    ARTICLE

    Detecting and Mitigating DDOS Attacks in SDNs Using Deep Neural Network

    Gul Nawaz1, Muhammad Junaid1, Adnan Akhunzada2, Abdullah Gani2,*, Shamyla Nawazish3, Asim Yaqub3, Adeel Ahmed1, Huma Ajab4

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2157-2178, 2023, DOI:10.32604/cmc.2023.026952

    Abstract Distributed denial of service (DDoS) attack is the most common attack that obstructs a network and makes it unavailable for a legitimate user. We proposed a deep neural network (DNN) model for the detection of DDoS attacks in the Software-Defined Networking (SDN) paradigm. SDN centralizes the control plane and separates it from the data plane. It simplifies a network and eliminates vendor specification of a device. Because of this open nature and centralized control, SDN can easily become a victim of DDoS attacks. We proposed a supervised Developed Deep Neural Network (DDNN) model that can classify the DDoS attack traffic… More >

  • Open Access

    ARTICLE

    GMLP-IDS: A Novel Deep Learning-Based Intrusion Detection System for Smart Agriculture

    Abdelwahed Berguiga1,2,*, Ahlem Harchay1,2, Ayman Massaoudi1,2, Mossaad Ben Ayed3, Hafedh Belmabrouk4

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 379-402, 2023, DOI:10.32604/cmc.2023.041667

    Abstract Smart Agriculture, also known as Agricultural 5.0, is expected to be an integral part of our human lives to reduce the cost of agricultural inputs, increasing productivity and improving the quality of the final product. Indeed, the safety and ongoing maintenance of Smart Agriculture from cyber-attacks are vitally important. To provide more comprehensive protection against potential cyber-attacks, this paper proposes a new deep learning-based intrusion detection system for securing Smart Agriculture. The proposed Intrusion Detection System IDS, namely GMLP-IDS, combines the feedforward neural network Multilayer Perceptron (MLP) and the Gaussian Mixture Model (GMM) that can better protect the Smart Agriculture… More >

  • Open Access

    ARTICLE

    Honeypot Game Theory against DoS Attack in UAV Cyber

    Shangting Miao1, Yang Li2,*, Quan Pan2

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2745-2762, 2023, DOI:10.32604/cmc.2023.037257

    Abstract A space called Unmanned Aerial Vehicle (UAV) cyber is a new environment where UAV, Ground Control Station (GCS) and business processes are integrated. Denial of service (DoS) attack is a standard network attack method, especially suitable for attacking the UAV cyber. It is a robust security risk for UAV cyber and has recently become an active research area. Game theory is typically used to simulate the existing offensive and defensive mechanisms for DoS attacks in a traditional network. In addition, the honeypot, an effective security vulnerability defense mechanism, has not been widely adopted or modeled for defense against DoS attack… More >

  • Open Access

    ARTICLE

    Multi-Domain Malicious Behavior Knowledge Base Framework for Multi-Type DDoS Behavior Detection

    Ouyang Liu, Kun Li*, Ziwei Yin, Deyun Gao, Huachun Zhou

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2955-2977, 2023, DOI:10.32604/iasc.2023.039995

    Abstract Due to the many types of distributed denial-of-service attacks (DDoS) attacks and the large amount of data generated, it becomes a challenge to manage and apply the malicious behavior knowledge generated by DDoS attacks. We propose a malicious behavior knowledge base framework for DDoS attacks, which completes the construction and application of a multi-domain malicious behavior knowledge base. First, we collected malicious behavior traffic generated by five mainstream DDoS attacks. At the same time, we completed the knowledge collection mechanism through data pre-processing and dataset design. Then, we designed a malicious behavior category graph and malicious behavior structure graph for… More >

  • Open Access

    ARTICLE

    Evidence-Based Federated Learning for Set-Valued Classification of Industrial IoT DDos Attack Traffic

    Jiale Cheng1, Zilong Jin1,2,*

    Journal on Internet of Things, Vol.4, No.3, pp. 183-195, 2022, DOI:10.32604/jiot.2022.042054

    Abstract A novel Federated learning classifier is proposed using the Dempster-Shafer (DS) theory for the set-valued classification of industrial IoT Distributed Denial of Service (DDoS) attack traffic. The proposed classifier, referred to as the evidence-based federated learning classifier, employs convolution and pooling layers to extract high-dimensional features of Distributed Denial of Service (DDoS) traffic from the local data of private industrial clients. The characteristics obtained from the various participants are transformed into mass functions and amalgamated utilizing Dempster’s rule within the DS layer, situated on the federated server. Lastly, the set value classification task of attack mode is executed in the… More >

  • Open Access

    ARTICLE

    A Modified PointNet-Based DDoS Attack Classification and Segmentation in Blockchain

    Jieren Cheng1,3, Xiulai Li1,2,3,4,*, Xinbing Xu2,3, Xiangyan Tang1,3, Victor S. Sheng5

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 975-992, 2023, DOI:10.32604/csse.2023.039280

    Abstract With the rapid development of blockchain technology, the number of distributed applications continues to increase, so ensuring the security of the network has become particularly important. However, due to its decentralized, decentralized nature, blockchain networks are vulnerable to distributed denial-of-service (DDoS) attacks, which can lead to service stops, causing serious economic losses and social impacts. The research questions in this paper mainly include two aspects: first, the classification of DDoS, which refers to detecting whether blockchain nodes are suffering DDoS attacks, that is, detecting the data of nodes in parallel; The second is the problem of DDoS segmentation, that is,… More >

  • Open Access

    ARTICLE

    Feature Selection for Detecting ICMPv6-Based DDoS Attacks Using Binary Flower Pollination Algorithm

    Adnan Hasan Bdair Aighuraibawi1,2, Selvakumar Manickam1,*, Rosni Abdullah3, Zaid Abdi Alkareem Alyasseri4,5, Ayman Khallel6, Dilovan Asaad Zebari9, Hussam Mohammed Jasim7, Mazin Mohammed Abed8, Zainb Hussein Arif7

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 553-574, 2023, DOI:10.32604/csse.2023.037948

    Abstract Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4 × 1038 unique IP addresses of devices in the network. IPv6 has introduced new features like Neighbour Discovery Protocol (NDP) and Address Auto-configuration Scheme. IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial of Service (DoS) and Distributed Denial of Service (DDoS) which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, an Intrusion Detection System (IDS) is a monitoring system… More >

  • Open Access

    ARTICLE

    DDoS Attack Detection in Cloud Computing Based on Ensemble Feature Selection and Deep Learning

    Yousef Sanjalawe1,2,*, Turke Althobaiti3,4

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3571-3588, 2023, DOI:10.32604/cmc.2023.037386

    Abstract Intrusion Detection System (IDS) in the cloud Computing (CC) environment has received paramount interest over the last few years. Among the latest approaches, Deep Learning (DL)-based IDS methods allow the discovery of attacks with the highest performance. In the CC environment, Distributed Denial of Service (DDoS) attacks are widespread. The cloud services will be rendered unavailable to legitimate end-users as a consequence of the overwhelming network traffic, resulting in financial losses. Although various researchers have proposed many detection techniques, there are possible obstacles in terms of detection performance due to the use of insignificant traffic features. Therefore, in this paper,… More >

Displaying 1-10 on page 1 of 35. Per Page