Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (244)
  • Open Access

    ARTICLE

    A New Cybersecurity Approach Enhanced by xAI-Derived Rules to Improve Network Intrusion Detection and SIEM

    Federica Uccello1,2, Marek Pawlicki3,4, Salvatore D'Antonio1, Rafał Kozik3,4, Michał Choraś3,4,*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1607-1621, 2025, DOI:10.32604/cmc.2025.062801 - 16 April 2025

    Abstract The growing sophistication of cyberthreats, among others the Distributed Denial of Service attacks, has exposed limitations in traditional rule-based Security Information and Event Management systems. While machine learning–based intrusion detection systems can capture complex network behaviours, their “black-box” nature often limits trust and actionable insight for security operators. This study introduces a novel approach that integrates Explainable Artificial Intelligence—xAI—with the Random Forest classifier to derive human-interpretable rules, thereby enhancing the detection of Distributed Denial of Service (DDoS) attacks. The proposed framework combines traditional static rule formulation with advanced xAI techniques—SHapley Additive exPlanations and Scoped Rules More >

  • Open Access

    ARTICLE

    DMF: A Deep Multimodal Fusion-Based Network Traffic Classification Model

    Xiangbin Wang1, Qingjun Yuan1,*, Weina Niu2, Qianwei Meng1, Yongjuan Wang1, Chunxiang Gu1

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2267-2285, 2025, DOI:10.32604/cmc.2025.061767 - 16 April 2025

    Abstract With the rise of encrypted traffic, traditional network analysis methods have become less effective, leading to a shift towards deep learning-based approaches. Among these, multimodal learning-based classification methods have gained attention due to their ability to leverage diverse feature sets from encrypted traffic, improving classification accuracy. However, existing research predominantly relies on late fusion techniques, which hinder the full utilization of deep features within the data. To address this limitation, we propose a novel multimodal encrypted traffic classification model that synchronizes modality fusion with multiscale feature extraction. Specifically, our approach performs real-time fusion of modalities More >

  • Open Access

    ARTICLE

    SA-ResNet: An Intrusion Detection Method Based on Spatial Attention Mechanism and Residual Neural Network Fusion

    Zengyu Cai1,*, Yuming Dai1, Jianwei Zhang2,3,*, Yuan Feng4

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3335-3350, 2025, DOI:10.32604/cmc.2025.061206 - 16 April 2025

    Abstract The rapid development and widespread adoption of Internet technology have significantly increased Internet traffic, highlighting the growing importance of network security. Intrusion Detection Systems (IDS) are essential for safeguarding network integrity. To address the low accuracy of existing intrusion detection models in identifying network attacks, this paper proposes an intrusion detection method based on the fusion of Spatial Attention mechanism and Residual Neural Network (SA-ResNet). Utilizing residual connections can effectively capture local features in the data; by introducing a spatial attention mechanism, the global dependency relationships of intrusion features can be extracted, enhancing the intrusion More >

  • Open Access

    ARTICLE

    SNN-IoMT: A Novel AI-Driven Model for Intrusion Detection in Internet of Medical Things

    Mourad Benmalek1,*,#,*, Abdessamed Seddiki2,#, Kamel-Dine Haouam1

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.1, pp. 1157-1184, 2025, DOI:10.32604/cmes.2025.062841 - 11 April 2025

    Abstract The Internet of Medical Things (IoMT) connects healthcare devices and sensors to the Internet, driving transformative advancements in healthcare delivery. However, expanding IoMT infrastructures face growing security threats, necessitating robust Intrusion Detection Systems (IDS). Maintaining the confidentiality of patient data is critical in AI-driven healthcare systems, especially when securing interconnected medical devices. This paper introduces SNN-IoMT (Stacked Neural Network Ensemble for IoMT Security), an AI-driven IDS framework designed to secure dynamic IoMT environments. Leveraging a stacked deep learning architecture combining Multi-Layer Perceptron (MLP), Convolutional Neural Networks (CNN), and Long Short-Term Memory (LSTM), the model optimizes data management More >

  • Open Access

    ARTICLE

    Intrusion Detection in NSL-KDD Dataset Using Hybrid Self-Organizing Map Model

    Noveela Iftikhar1, Mujeeb Ur Rehman1, Mumtaz Ali Shah2, Mohammed J. F. Alenazi3, Jehad Ali4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.1, pp. 639-671, 2025, DOI:10.32604/cmes.2025.062788 - 11 April 2025

    Abstract Intrusion attempts against Internet of Things (IoT) devices have significantly increased in the last few years. These devices are now easy targets for hackers because of their built-in security flaws. Combining a Self-Organizing Map (SOM) hybrid anomaly detection system for dimensionality reduction with the inherited nature of clustering and Extreme Gradient Boosting (XGBoost) for multi-class classification can improve network traffic intrusion detection. The proposed model is evaluated on the NSL-KDD dataset. The hybrid approach outperforms the baseline line models, Multilayer perceptron model, and SOM-KNN (k-nearest neighbors) model in precision, recall, and F1-score, highlighting the proposed More >

  • Open Access

    ARTICLE

    Privacy-Aware Federated Learning Framework for IoT Security Using Chameleon Swarm Optimization and Self-Attentive Variational Autoencoder

    Saad Alahmari1,*, Abdulwhab Alkharashi2

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.1, pp. 849-873, 2025, DOI:10.32604/cmes.2025.062549 - 11 April 2025

    Abstract The Internet of Things (IoT) is emerging as an innovative phenomenon concerned with the development of numerous vital applications. With the development of IoT devices, huge amounts of information, including users’ private data, are generated. IoT systems face major security and data privacy challenges owing to their integral features such as scalability, resource constraints, and heterogeneity. These challenges are intensified by the fact that IoT technology frequently gathers and conveys complex data, creating an attractive opportunity for cyberattacks. To address these challenges, artificial intelligence (AI) techniques, such as machine learning (ML) and deep learning (DL),… More >

  • Open Access

    ARTICLE

    Enhanced Triple Layered Approach for Mitigating Security Risks in Cloud

    Tajinder Kumar1, Purushottam Sharma2,*, Xiaochun Cheng3,*, Sachin Lalar4, Shubham Kumar5, Sandhya Bansal6

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 719-738, 2025, DOI:10.32604/cmc.2025.060836 - 26 March 2025

    Abstract With cloud computing, large chunks of data can be handled at a small cost. However, there are some reservations regarding the security and privacy of cloud data stored. For solving these issues and enhancing cloud computing security, this research provides a Three-Layered Security Access model (TLSA) aligned to an intrusion detection mechanism, access control mechanism, and data encryption system. The TLSA underlines the need for the protection of sensitive data. This proposed approach starts with Layer 1 data encryption using the Advanced Encryption Standard (AES). For data transfer and storage, this encryption guarantees the data’s… More >

  • Open Access

    ARTICLE

    Enhanced Detection of APT Vector Lateral Movement in Organizational Networks Using Lightweight Machine Learning

    Mathew Nicho1,2,*, Oluwasegun Adelaiye3, Christopher D. McDermott4, Shini Girija5

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 281-308, 2025, DOI:10.32604/cmc.2025.059597 - 26 March 2025

    Abstract The successful penetration of government, corporate, and organizational IT systems by state and non-state actors deploying APT vectors continues at an alarming pace. Advanced Persistent Threat (APT) attacks continue to pose significant challenges for organizations despite technological advancements in artificial intelligence (AI)-based defense mechanisms. While AI has enhanced organizational capabilities for deterrence, detection, and mitigation of APTs, the global escalation in reported incidents, particularly those successfully penetrating critical government infrastructure has heightened concerns among information technology (IT) security administrators and decision-makers. Literature review has identified the stealthy lateral movement (LM) of malware within the initially… More >

  • Open Access

    ARTICLE

    An Intrusion Detection System Based on HiTar-2024 Dataset Generation from LOG Files for Smart Industrial Internet-of-Things Environment

    Tarak Dhaouadi1, Hichem Mrabet1,2,*, Adeeb Alhomoud3, Abderrazak Jemai1,4

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4535-4554, 2025, DOI:10.32604/cmc.2025.060935 - 06 March 2025

    Abstract The increasing adoption of Industrial Internet of Things (IIoT) systems in smart manufacturing is leading to raise cyberattack numbers and pressing the requirement for intrusion detection systems (IDS) to be effective. However, existing datasets for IDS training often lack relevance to modern IIoT environments, limiting their applicability for research and development. To address the latter gap, this paper introduces the HiTar-2024 dataset specifically designed for IIoT systems. As a consequence, that can be used by an IDS to detect imminent threats. Likewise, HiTar-2024 was generated using the AREZZO simulator, which replicates realistic smart manufacturing scenarios.… More >

  • Open Access

    ARTICLE

    Diff-IDS: A Network Intrusion Detection Model Based on Diffusion Model for Imbalanced Data Samples

    Yue Yang1,2, Xiangyan Tang2,3,*, Zhaowu Liu2,3,*, Jieren Cheng2,3, Haozhe Fang3, Cunyi Zhang3

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4389-4408, 2025, DOI:10.32604/cmc.2025.060357 - 06 March 2025

    Abstract With the rapid development of Internet of Things technology, the sharp increase in network devices and their inherent security vulnerabilities present a stark contrast, bringing unprecedented challenges to the field of network security, especially in identifying malicious attacks. However, due to the uneven distribution of network traffic data, particularly the imbalance between attack traffic and normal traffic, as well as the imbalance between minority class attacks and majority class attacks, traditional machine learning detection algorithms have significant limitations when dealing with sparse network traffic data. To effectively tackle this challenge, we have designed a lightweight… More >

Displaying 1-10 on page 1 of 244. Per Page