Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (20)
  • Open Access

    ARTICLE

    Applying an Improved Dung Beetle Optimizer Algorithm to Network Traffic Identification

    Qinyue Wu, Hui Xu*, Mengran Liu

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4091-4107, 2024, DOI:10.32604/cmc.2024.048461

    Abstract Network traffic identification is critical for maintaining network security and further meeting various demands of network applications. However, network traffic data typically possesses high dimensionality and complexity, leading to practical problems in traffic identification data analytics. Since the original Dung Beetle Optimizer (DBO) algorithm, Grey Wolf Optimization (GWO) algorithm, Whale Optimization Algorithm (WOA), and Particle Swarm Optimization (PSO) algorithm have the shortcomings of slow convergence and easily fall into the local optimal solution, an Improved Dung Beetle Optimizer (IDBO) algorithm is proposed for network traffic identification. Firstly, the Sobol sequence is utilized to initialize the dung beetle population, laying the… More >

  • Open Access

    ARTICLE

    An Improved Jump Spider Optimization for Network Traffic Identification Feature Selection

    Hui Xu, Yalin Hu*, Weidong Cao, Longjie Han

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3239-3255, 2023, DOI:10.32604/cmc.2023.039227

    Abstract The massive influx of traffic on the Internet has made the composition of web traffic increasingly complex. Traditional port-based or protocol-based network traffic identification methods are no longer suitable for today’s complex and changing networks. Recently, machine learning has been widely applied to network traffic recognition. Still, high-dimensional features and redundant data in network traffic can lead to slow convergence problems and low identification accuracy of network traffic recognition algorithms. Taking advantage of the faster optimization-seeking capability of the jumping spider optimization algorithm (JSOA), this paper proposes a jumping spider optimization algorithm that incorporates the harris hawk optimization (HHO) and… More >

  • Open Access

    ARTICLE

    Ensemble-Based Approach for Efficient Intrusion Detection in Network Traffic

    Ammar Almomani1,2,*, Iman Akour3, Ahmed M. Manasrah4,5, Omar Almomani6, Mohammad Alauthman7, Esra’a Abdullah1, Amaal Al Shwait1, Razan Al Sharaa1

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2499-2517, 2023, DOI:10.32604/iasc.2023.039687

    Abstract The exponential growth of Internet and network usage has necessitated heightened security measures to protect against data and network breaches. Intrusions, executed through network packets, pose a significant challenge for firewalls to detect and prevent due to the similarity between legitimate and intrusion traffic. The vast network traffic volume also complicates most network monitoring systems and algorithms. Several intrusion detection methods have been proposed, with machine learning techniques regarded as promising for dealing with these incidents. This study presents an Intrusion Detection System Based on Stacking Ensemble Learning base (Random Forest, Decision Tree, and k-Nearest-Neighbors). The proposed system employs pre-processing… More >

  • Open Access

    ARTICLE

    Mirai Botnet Attack Detection in Low-Scale Network Traffic

    Ebu Yusuf GÜVEN, Zeynep GÜRKAŞ-AYDIN*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 419-437, 2023, DOI:10.32604/iasc.2023.038043

    Abstract The Internet of Things (IoT) has aided in the development of new products and services. Due to the heterogeneity of IoT items and networks, traditional techniques cannot identify network risks. Rule-based solutions make it challenging to secure and manage IoT devices and services due to their diversity. While the use of artificial intelligence eliminates the need to define rules, the training and retraining processes require additional processing power. This study proposes a methodology for analyzing constrained devices in IoT environments. We examined the relationship between different sized samples from the Kitsune dataset to simulate the Mirai attack on IoT devices.… More >

  • Open Access

    ARTICLE

    MTC: A Multi-Task Model for Encrypted Network Traffic Classification Based on Transformer and 1D-CNN

    Kaiyue Wang1, Jian Gao1,2,*, Xinyan Lei1

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 619-638, 2023, DOI:10.32604/iasc.2023.036701

    Abstract Traffic characterization (e.g., chat, video) and application identification (e.g., FTP, Facebook) are two of the more crucial jobs in encrypted network traffic classification. These two activities are typically carried out separately by existing systems using separate models, significantly adding to the difficulty of network administration. Convolutional Neural Network (CNN) and Transformer are deep learning-based approaches for network traffic classification. CNN is good at extracting local features while ignoring long-distance information from the network traffic sequence, and Transformer can capture long-distance feature dependencies while ignoring local details. Based on these characteristics, a multi-task learning model that combines Transformer and 1D-CNN for… More >

  • Open Access

    ARTICLE

    RRCNN: Request Response-Based Convolutional Neural Network for ICS Network Traffic Anomaly Detection

    Yan Du1,2, Shibin Zhang1,2,*, Guogen Wan1,2, Daohua Zhou3, Jiazhong Lu1,2, Yuanyuan Huang1,2, Xiaoman Cheng4, Yi Zhang4, Peilin He5

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5743-5759, 2023, DOI:10.32604/cmc.2023.035919

    Abstract Nowadays, industrial control system (ICS) has begun to integrate with the Internet. While the Internet has brought convenience to ICS, it has also brought severe security concerns. Traditional ICS network traffic anomaly detection methods rely on statistical features manually extracted using the experience of network security experts. They are not aimed at the original network data, nor can they capture the potential characteristics of network packets. Therefore, the following improvements were made in this study: (1) A dataset that can be used to evaluate anomaly detection algorithms is produced, which provides raw network data. (2) A request response-based convolutional neural… More >

  • Open Access

    ARTICLE

    A Network Traffic Prediction Algorithm Based on Prophet-EALSTM-GPR

    Guoqing Xu1, Changsen Xia1, Jun Qian1, Guo Ran3, Zilong Jin1,2,*

    Journal on Internet of Things, Vol.4, No.2, pp. 113-125, 2022, DOI:10.32604/jiot.2022.036066

    Abstract Huge networks and increasing network traffic will consume more and more resources. It is critical to predict network traffic accurately and timely for network planning, and resource allocation, etc. In this paper, a combined network traffic prediction model is proposed, which is based on Prophet, evolutionary attention-based LSTM (EALSTM) network, and Gaussian process regression (GPR). According to the non-smooth, sudden, periodic, and long correlation characteristics of network traffic, the prediction procedure is divided into three steps to predict network traffic accurately. In the first step, the Prophet model decomposes network traffic data into periodic and non-periodic parts. The periodic term… More >

  • Open Access

    ARTICLE

    Metaheuristic Optimization of Time Series Models for Predicting Networks Traffic

    Reem Alkanhel1, El-Sayed M. El-kenawy2,3, D. L. Elsheweikh4, Abdelaziz A. Abdelhamid5,6, Abdelhameed Ibrahim7, Doaa Sami Khafaga8,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 427-442, 2023, DOI:10.32604/cmc.2023.032885

    Abstract Traffic prediction of wireless networks attracted many researchers and practitioners during the past decades. However, wireless traffic frequently exhibits strong nonlinearities and complicated patterns, which makes it challenging to be predicted accurately. Many of the existing approaches for predicting wireless network traffic are unable to produce accurate predictions because they lack the ability to describe the dynamic spatial-temporal correlations of wireless network traffic data. In this paper, we proposed a novel meta-heuristic optimization approach based on fitness grey wolf and dipper throated optimization algorithms for boosting the prediction accuracy of traffic volume. The proposed algorithm is employed to optimize the… More >

  • Open Access

    ARTICLE

    Detection of Abnormal Network Traffic Using Bidirectional Long Short-Term Memory

    Nga Nguyen Thi Thanh, Quang H. Nguyen*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 491-504, 2023, DOI:10.32604/csse.2023.032107

    Abstract Nowadays, web systems and servers are constantly at great risk from cyberattacks. This paper proposes a novel approach to detecting abnormal network traffic using a bidirectional long short-term memory (LSTM) network in combination with the ensemble learning technique. First, the binary classification module was used to detect the current abnormal flow. Then, the abnormal flows were fed into the multilayer classification module to identify the specific type of flow. In this research, a deep learning bidirectional LSTM model, in combination with the convolutional neural network and attention technique, was deployed to identify a specific attack. To solve the real-time intrusion-detecting… More >

  • Open Access

    ARTICLE

    Design of Fuzzy Logic Control Framework for QoS Routing in MANET

    M. Vargheese1,*, S. Vanithamani2, D. Stalin David3, Ganga Rama Koteswara Rao4

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3479-3499, 2023, DOI:10.32604/iasc.2023.030948

    Abstract Wireless networks with no infrastructure arise as a result of multiple wireless devices working together. The Mobile Ad hoc Network (MANET) is a system for connecting independently located Mobile Nodes (MNs) via wireless links. A MANET is self-configuring in telecommunications, while MN produces non-infrastructure networks that are entirely decentralized. Both the MAC and routing layers of MANETs take into account issues related to Quality of Service (QoS). When culling a line of optical discernment communication, MANET can be an effective and cost-saving route cull option. To maintain QoS, however, more or fewer challenges must be overcome. This paper proposes a… More >

Displaying 1-10 on page 1 of 20. Per Page