Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (18)
  • Open Access

    ARTICLE

    Adversarial Training Against Adversarial Attacks for Machine Learning-Based Intrusion Detection Systems

    Muhammad Shahzad Haroon*, Husnain Mansoor Ali

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3513-3527, 2022, DOI:10.32604/cmc.2022.029858 - 16 June 2022

    Abstract Intrusion detection system plays an important role in defending networks from security breaches. End-to-end machine learning-based intrusion detection systems are being used to achieve high detection accuracy. However, in case of adversarial attacks, that cause misclassification by introducing imperceptible perturbation on input samples, performance of machine learning-based intrusion detection systems is greatly affected. Though such problems have widely been discussed in image processing domain, very few studies have investigated network intrusion detection systems and proposed corresponding defence. In this paper, we attempt to fill this gap by using adversarial attacks on standard intrusion detection datasets… More >

  • Open Access

    ARTICLE

    Cyber Security Analysis and Evaluation for Intrusion Detection Systems

    Yoosef B. Abushark1, Asif Irshad Khan1,*, Fawaz Alsolami1, Abdulmohsen Almalawi1, Md Mottahir Alam2, Alka Agrawal3, Rajeev Kumar4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1765-1783, 2022, DOI:10.32604/cmc.2022.025604 - 24 February 2022

    Abstract Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the world. Machine learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and security issues. It is crucial in offering a proactive security system in the field of cybersecurity. In real time, cybersecurity protects information, information systems, and networks from intruders. In the recent decade, several assessments on security and privacy estimates have noted a rapid growth in both the incidence and quantity of cybersecurity breaches. At an increasing rate, intruders are breaching… More >

  • Open Access

    ARTICLE

    A Novel Hybrid Deep Learning Framework for Intrusion Detection Systems in WSN-IoT Networks

    M. Maheswari1,2,*, R. A. Karthika1

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 365-382, 2022, DOI:10.32604/iasc.2022.022259 - 05 January 2022

    Abstract With the advent of wireless communication and digital technology, low power, Internet-enabled, and reconfigurable wireless devices have been developed, which revolutionized day-to-day human life and the economy across the globe. These devices are realized by leveraging the features of sensing, processing the data and nodes communications. The scale of Internet-enabled wireless devices has increased daily, and these devices are exposed to various cyber-attacks. Since the complexity and dynamics of the attacks on the devices are computationally high, intelligent, scalable and high-speed intrusion detection systems (IDS) are required. Moreover, the wireless devices are battery-driven; implementing them… More >

  • Open Access

    ARTICLE

    Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks

    Vasaki Ponnusamy1,*, Mamoona Humayun2, N. Z. Jhanjhi3, Aun Yichiet1, Maram Fahhad Almufareh2

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1199-1215, 2022, DOI:10.32604/csse.2022.018518 - 24 September 2021

    Abstract Internet of Things (IoT) devices work mainly in wireless mediums; requiring different Intrusion Detection System (IDS) kind of solutions to leverage 802.11 header information for intrusion detection. Wireless-specific traffic features with high information gain are primarily found in data link layers rather than application layers in wired networks. This survey investigates some of the complexities and challenges in deploying wireless IDS in terms of data collection methods, IDS techniques, IDS placement strategies, and traffic data analysis techniques. This paper’s main finding highlights the lack of available network traces for training modern machine-learning models against IoT… More >

  • Open Access

    REVIEW

    Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges

    Salam Al-E’mari1, Mohammed Anbar1,*, Yousef Sanjalawe1,2, Selvakumar Manickam1, Iznan Hasbullah1

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 87-112, 2022, DOI:10.32604/csse.2022.017941 - 26 August 2021

    Abstract Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches. However, the current approaches have challenges in detecting intrusions, which may affect the performance of the overall detection system as well as network performance. For the time being, one of the most important creative technological advancements that plays a significant role in the professional world today is blockchain technology. Blockchain technology moves in the direction of persistent revolution and change. It is a chain of blocks that covers information and maintains… More >

  • Open Access

    ARTICLE

    Deep Learning Based Optimal Multimodal Fusion Framework for Intrusion Detection Systems for Healthcare Data

    Phong Thanh Nguyen1, Vy Dang Bich Huynh2, Khoa Dang Vo1, Phuong Thanh Phan1, Mohamed Elhoseny3, Dac-Nhuong Le4,5,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2555-2571, 2021, DOI:10.32604/cmc.2021.012941 - 28 December 2020

    Abstract Data fusion is a multidisciplinary research area that involves different domains. It is used to attain minimum detection error probability and maximum reliability with the help of data retrieved from multiple healthcare sources. The generation of huge quantity of data from medical devices resulted in the formation of big data during which data fusion techniques become essential. Securing medical data is a crucial issue of exponentially-pacing computing world and can be achieved by Intrusion Detection Systems (IDS). In this regard, since singular-modality is not adequate to attain high detection rate, there is a need exists… More >

  • Open Access

    ARTICLE

    Improving the Detection Rate of Rarely Appearing Intrusions in Network-Based Intrusion Detection Systems

    Eunmok Yang1, Gyanendra Prasad Joshi2, Changho Seo3,*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1647-1663, 2021, DOI:10.32604/cmc.2020.013210 - 26 November 2020

    Abstract In network-based intrusion detection practices, there are more regular instances than intrusion instances. Because there is always a statistical imbalance in the instances, it is difficult to train the intrusion detection system effectively. In this work, we compare intrusion detection performance by increasing the rarely appearing instances rather than by eliminating the frequently appearing duplicate instances. Our technique mitigates the statistical imbalance in these instances. We also carried out an experiment on the training model by increasing the instances, thereby increasing the attack instances step by step up to 13 levels. The experiments included not… More >

  • Open Access

    ARTICLE

    Applying Stack Bidirectional LSTM Model to Intrusion Detection

    Ziyong Ran1, Desheng Zheng1, *, Yanling Lai1, Lulu Tian2

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 309-320, 2020, DOI:10.32604/cmc.2020.010102 - 23 July 2020

    Abstract Nowadays, Internet has become an indispensable part of daily life and is used in many fields. Due to the large amount of Internet traffic, computers are subject to various security threats, which may cause serious economic losses and even endanger national security. It is hoped that an effective security method can systematically classify intrusion data in order to avoid leakage of important data or misuse of data. As machine learning technology matures, deep learning is widely used in various industries. Combining deep learning with network security and intrusion detection is the current trend. In this… More >

Displaying 11-20 on page 2 of 18. Per Page