Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (100)
  • Open Access

    ARTICLE

    Lightweight Intrusion Detection Using Reservoir Computing

    Jiarui Deng1,2, Wuqiang Shen1,3, Yihua Feng4, Guosheng Lu5, Guiquan Shen1,3, Lei Cui1,3, Shanxiang Lyu1,2,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1345-1361, 2024, DOI:10.32604/cmc.2023.047079

    Abstract The blockchain-empowered Internet of Vehicles (IoV) enables various services and achieves data security and privacy, significantly advancing modern vehicle systems. However, the increased frequency of data transmission and complex network connections among nodes also make them more susceptible to adversarial attacks. As a result, an efficient intrusion detection system (IDS) becomes crucial for securing the IoV environment. Existing IDSs based on convolutional neural networks (CNN) often suffer from high training time and storage requirements. In this paper, we propose a lightweight IDS solution to protect IoV against both intra-vehicle and external threats. Our approach achieves superior performance, as demonstrated by… More >

  • Open Access

    ARTICLE

    Developing Transparent IDS for VANETs Using LIME and SHAP: An Empirical Study

    Fayaz Hassan1,*, Jianguo Yu1, Zafi Sherhan Syed2, Arif Hussain Magsi3, Nadeem Ahmed4

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3185-3208, 2023, DOI:10.32604/cmc.2023.044650

    Abstract Vehicular Ad-hoc Networks (VANETs) are mobile ad-hoc networks that use vehicles as nodes to create a wireless network. Whereas VANETs offer many advantages over traditional transportation networks, ensuring security in VANETs remains a significant challenge due to the potential for malicious attacks. This study addresses the critical issue of security in VANETs by introducing an intelligent Intrusion Detection System (IDS) that merges Machine Learning (ML)–based attack detection with Explainable AI (XAI) explanations. This study ML pipeline involves utilizing correlation-based feature selection followed by a Random Forest (RF) classifier that achieves a classification accuracy of 100% for the binary classification task… More >

  • Open Access

    ARTICLE

    Intrusion Detection System with Customized Machine Learning Techniques for NSL-KDD Dataset

    Mohammed Zakariah1, Salman A. AlQahtani2,*, Abdulaziz M. Alawwad1, Abdullilah A. Alotaibi3

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 4025-4054, 2023, DOI:10.32604/cmc.2023.043752

    Abstract Modern networks are at risk from a variety of threats as a result of the enormous growth in internet-based traffic. By consuming time and resources, intrusive traffic hampers the efficient operation of network infrastructure. An effective strategy for preventing, detecting, and mitigating intrusion incidents will increase productivity. A crucial element of secure network traffic is Intrusion Detection System (IDS). An IDS system may be host-based or network-based to monitor intrusive network activity. Finding unusual internet traffic has become a severe security risk for intelligent devices. These systems are negatively impacted by several attacks, which are slowing computation. In addition, networked… More >

  • Open Access

    ARTICLE

    Utilizing Machine Learning with Unique Pentaplet Data Structure to Enhance Data Integrity

    Abdulwahab Alazeb*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2995-3014, 2023, DOI:10.32604/cmc.2023.043173

    Abstract Data protection in databases is critical for any organization, as unauthorized access or manipulation can have severe negative consequences. Intrusion detection systems are essential for keeping databases secure. Advancements in technology will lead to significant changes in the medical field, improving healthcare services through real-time information sharing. However, reliability and consistency still need to be solved. Safeguards against cyber-attacks are necessary due to the risk of unauthorized access to sensitive information and potential data corruption. Disruptions to data items can propagate throughout the database, making it crucial to reverse fraudulent transactions without delay, especially in the healthcare industry, where real-time… More >

  • Open Access

    ARTICLE

    GMLP-IDS: A Novel Deep Learning-Based Intrusion Detection System for Smart Agriculture

    Abdelwahed Berguiga1,2,*, Ahlem Harchay1,2, Ayman Massaoudi1,2, Mossaad Ben Ayed3, Hafedh Belmabrouk4

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 379-402, 2023, DOI:10.32604/cmc.2023.041667

    Abstract Smart Agriculture, also known as Agricultural 5.0, is expected to be an integral part of our human lives to reduce the cost of agricultural inputs, increasing productivity and improving the quality of the final product. Indeed, the safety and ongoing maintenance of Smart Agriculture from cyber-attacks are vitally important. To provide more comprehensive protection against potential cyber-attacks, this paper proposes a new deep learning-based intrusion detection system for securing Smart Agriculture. The proposed Intrusion Detection System IDS, namely GMLP-IDS, combines the feedforward neural network Multilayer Perceptron (MLP) and the Gaussian Mixture Model (GMM) that can better protect the Smart Agriculture… More >

  • Open Access

    ARTICLE

    A Comprehensive Analysis of Datasets for Automotive Intrusion Detection Systems

    Seyoung Lee1, Wonsuk Choi1, Insup Kim2, Ganggyu Lee2, Dong Hoon Lee1,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3413-3442, 2023, DOI:10.32604/cmc.2023.039583

    Abstract Recently, automotive intrusion detection systems (IDSs) have emerged as promising defense approaches to counter attacks on in-vehicle networks (IVNs). However, the effectiveness of IDSs relies heavily on the quality of the datasets used for training and evaluation. Despite the availability of several datasets for automotive IDSs, there has been a lack of comprehensive analysis focusing on assessing these datasets. This paper aims to address the need for dataset assessment in the context of automotive IDSs. It proposes qualitative and quantitative metrics that are independent of specific automotive IDSs, to evaluate the quality of datasets. These metrics take into consideration various… More >

  • Open Access

    ARTICLE

    FIDS: Filtering-Based Intrusion Detection System for In-Vehicle CAN

    Seungmin Lee, Hyunghoon Kim, Haehyun Cho, Hyo Jin Jo*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2941-2954, 2023, DOI:10.32604/iasc.2023.039992

    Abstract Modern vehicles are equipped with multiple Electronic Control Units (ECUs) that support various convenient driving functions, such as the Advanced Driver Assistance System (ADAS). To enable communication between these ECUs, the Controller Area Network (CAN) protocol is widely used. However, since CAN lacks any security technologies, it is vulnerable to cyber attacks. To address this, researchers have conducted studies on machine learning-based intrusion detection systems (IDSs) for CAN. However, most existing IDSs still have non-negligible detection errors. In this paper, we propose a new filtering-based intrusion detection system (FIDS) to minimize the detection errors of machine learning-based IDSs. FIDS uses… More >

  • Open Access

    ARTICLE

    Fusion of Feature Ranking Methods for an Effective Intrusion Detection System

    Seshu Bhavani Mallampati1, Seetha Hari2,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1721-1744, 2023, DOI:10.32604/cmc.2023.040567

    Abstract Expanding internet-connected services has increased cyberattacks, many of which have grave and disastrous repercussions. An Intrusion Detection System (IDS) plays an essential role in network security since it helps to protect the network from vulnerabilities and attacks. Although extensive research was reported in IDS, detecting novel intrusions with optimal features and reducing false alarm rates are still challenging. Therefore, we developed a novel fusion-based feature importance method to reduce the high dimensional feature space, which helps to identify attacks accurately with less false alarm rate. Initially, to improve training data quality, various preprocessing techniques are utilized. The Adaptive Synthetic oversampling… More >

  • Open Access

    ARTICLE

    AID4I: An Intrusion Detection Framework for Industrial Internet of Things Using Automated Machine Learning

    Anıl Sezgin1,2,*, Aytuğ Boyacı3

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2121-2143, 2023, DOI:10.32604/cmc.2023.040287

    Abstract By identifying and responding to any malicious behavior that could endanger the system, the Intrusion Detection System (IDS) is crucial for preserving the security of the Industrial Internet of Things (IIoT) network. The benefit of anomaly-based IDS is that they are able to recognize zero-day attacks due to the fact that they do not rely on a signature database to identify abnormal activity. In order to improve control over datasets and the process, this study proposes using an automated machine learning (AutoML) technique to automate the machine learning processes for IDS. Our ground-breaking architecture, known as AID4I, makes use of… More >

  • Open Access

    ARTICLE

    An Efficient Cyber Security and Intrusion Detection System Using CRSR with PXORP-ECC and LTH-CNN

    Nouf Saeed Alotaibi*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2061-2078, 2023, DOI:10.32604/cmc.2023.039446

    Abstract Intrusion Detection System (IDS) is a network security mechanism that analyses all users’ and applications’ traffic and detects malicious activities in real-time. The existing IDS methods suffer from lower accuracy and lack the required level of security to prevent sophisticated attacks. This problem can result in the system being vulnerable to attacks, which can lead to the loss of sensitive data and potential system failure. Therefore, this paper proposes an Intrusion Detection System using Logistic Tanh-based Convolutional Neural Network Classification (LTH-CNN). Here, the Correlation Coefficient based Mayfly Optimization (CC-MA) algorithm is used to extract the input characteristics for the IDS… More >

Displaying 1-10 on page 1 of 100. Per Page