Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (378)
  • Open Access

    ARTICLE

    Unknown DDoS Attack Detection with Sliced Iterative Normalizing Flows Technique

    Chin-Shiuh Shieh1, Thanh-Lam Nguyen1, Thanh-Tuan Nguyen2,*, Mong-Fong Horng1,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4881-4912, 2025, DOI:10.32604/cmc.2025.061001 - 06 March 2025

    Abstract DDoS attacks represent one of the most pervasive and evolving threats in cybersecurity, capable of crippling critical infrastructures and disrupting services globally. As networks continue to expand and threats become more sophisticated, there is an urgent need for Intrusion Detection Systems (IDS) capable of handling these challenges effectively. Traditional IDS models frequently have difficulties in detecting new or changing attack patterns since they heavily depend on existing characteristics. This paper presents a novel approach for detecting unknown Distributed Denial of Service (DDoS) attacks by integrating Sliced Iterative Normalizing Flows (SINF) into IDS. SINF utilizes the… More >

  • Open Access

    ARTICLE

    An Intrusion Detection System Based on HiTar-2024 Dataset Generation from LOG Files for Smart Industrial Internet-of-Things Environment

    Tarak Dhaouadi1, Hichem Mrabet1,2,*, Adeeb Alhomoud3, Abderrazak Jemai1,4

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4535-4554, 2025, DOI:10.32604/cmc.2025.060935 - 06 March 2025

    Abstract The increasing adoption of Industrial Internet of Things (IIoT) systems in smart manufacturing is leading to raise cyberattack numbers and pressing the requirement for intrusion detection systems (IDS) to be effective. However, existing datasets for IDS training often lack relevance to modern IIoT environments, limiting their applicability for research and development. To address the latter gap, this paper introduces the HiTar-2024 dataset specifically designed for IIoT systems. As a consequence, that can be used by an IDS to detect imminent threats. Likewise, HiTar-2024 was generated using the AREZZO simulator, which replicates realistic smart manufacturing scenarios.… More >

  • Open Access

    ARTICLE

    Practical Adversarial Attacks Imperceptible to Humans in Visual Recognition

    Donghyeok Park1, Sumin Yeon2, Hyeon Seo2, Seok-Jun Buu2, Suwon Lee2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 2725-2737, 2025, DOI:10.32604/cmes.2025.061732 - 03 March 2025

    Abstract Recent research on adversarial attacks has primarily focused on white-box attack techniques, with limited exploration of black-box attack methods. Furthermore, in many black-box research scenarios, it is assumed that the output label and probability distribution can be observed without imposing any constraints on the number of attack attempts. Unfortunately, this disregard for the real-world practicality of attacks, particularly their potential for human detectability, has left a gap in the research landscape. Considering these limitations, our study focuses on using a similar color attack method, assuming access only to the output label, limiting the number of More >

  • Open Access

    ARTICLE

    Prioritizing Network-On-Chip Routers for Countermeasure Techniques against Flooding Denial-of-Service Attacks: A Fuzzy Multi-Criteria Decision-Making Approach

    Ahmed Abbas Jasim Al-Hchaimi1, Yousif Raad Muhsen2,3,*, Wisam Hazim Gwad4, Entisar Soliman Alkayal5, Riyadh Rahef Nuiaa Al Ogaili6, Zaid Abdi Alkareem Alyasseri7,8, Alhamzah Alnoor9

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 2661-2689, 2025, DOI:10.32604/cmes.2025.061318 - 03 March 2025

    Abstract The implementation of Countermeasure Techniques (CTs) in the context of Network-On-Chip (NoC) based Multiprocessor System-On-Chip (MPSoC) routers against the Flooding Denial-of-Service Attack (F-DoSA) falls under Multi-Criteria Decision-Making (MCDM) due to the three main concerns, called: traffic variations, multiple evaluation criteria-based traffic features, and prioritization NoC routers as an alternative. In this study, we propose a comprehensive evaluation of various NoC traffic features to identify the most efficient routers under the F-DoSA scenarios. Consequently, an MCDM approach is essential to address these emerging challenges. While the recent MCDM approach has some issues, such as uncertainty, this… More >

  • Open Access

    REVIEW

    Quick Response Code Security Attacks and Countermeasures: A Systematic Literature Review

    David Njuguna*, John Ndia

    Journal of Cyber Security, Vol.7, pp. 1-20, 2025, DOI:10.32604/jcs.2025.059398 - 18 February 2025

    Abstract A quick response code is a barcode that allows users to instantly access information via a digital device. Quick response codes store data as pixels in a square-shaped grid. QR codes are prone to cyber-attacks. This assault exploits human vulnerabilities, as users can scarcely discern what is concealed in the quick response code prior to usage. The aim of the study was to investigate Quick Response code attack types and the detection techniques. To achieve the objective, 50 relevant studies published between the year 2010 and 2024 were identified. The articles were obtained from the… More >

  • Open Access

    ARTICLE

    Machine Learning-Based Detection and Selective Mitigation of Denial-of-Service Attacks in Wireless Sensor Networks

    Soyoung Joo#, So-Hyun Park#, Hye-Yeon Shim, Ye-Sol Oh, Il-Gu Lee*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2475-2494, 2025, DOI:10.32604/cmc.2025.058963 - 17 February 2025

    Abstract As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. There exists a gap in research on the detection and response to attacks on Medium Access Control (MAC) mechanisms themselves, which would lead to service outages between nodes. Classifying exploitation and deceptive jamming attacks on control mechanisms is particularly challengingdue to their resemblance to normal heavy communication patterns. Accordingly, this paper proposes a machine learning-based selective attack mitigation model that detects DoS attacks on wireless networks by More >

  • Open Access

    ARTICLE

    APWF: A Parallel Website Fingerprinting Attack with Attention Mechanism

    Dawei Xu1,2,3, Min Wang1, Yue Lv1, Moxuan Fu2, Yi Wu4,5,*, Jian Zhao1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2027-2041, 2025, DOI:10.32604/cmc.2024.058178 - 17 February 2025

    Abstract Website fingerprinting (WF) attacks can reveal information about the websites users browse by de-anonymizing encrypted traffic. Traditional website fingerprinting attack models, focusing solely on a single spatial feature, are inefficient regarding training time. When confronted with the concept drift problem, they suffer from a sharp drop in attack accuracy within a short period due to their reliance on extensive, outdated training data. To address the above problems, this paper proposes a parallel website fingerprinting attack (APWF) that incorporates an attention mechanism, which consists of an attack model and a fine-tuning method. Among them, the APWF… More >

  • Open Access

    ARTICLE

    PIAFGNN: Property Inference Attacks against Federated Graph Neural Networks

    Jiewen Liu1, Bing Chen1,2,*, Baolu Xue1, Mengya Guo1, Yuntao Xu1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 1857-1877, 2025, DOI:10.32604/cmc.2024.057814 - 17 February 2025

    Abstract Federated Graph Neural Networks (FedGNNs) have achieved significant success in representation learning for graph data, enabling collaborative training among multiple parties without sharing their raw graph data and solving the data isolation problem faced by centralized GNNs in data-sensitive scenarios. Despite the plethora of prior work on inference attacks against centralized GNNs, the vulnerability of FedGNNs to inference attacks has not yet been widely explored. It is still unclear whether the privacy leakage risks of centralized GNNs will also be introduced in FedGNNs. To bridge this gap, we present PIAFGNN, the first property inference attack… More >

  • Open Access

    ARTICLE

    Towards Net Zero Resilience: A Futuristic Architectural Strategy for Cyber-Attack Defence in Industrial Control Systems (ICS) and Operational Technology (OT)

    Hariharan Ramachandran1,*, Richard Smith2, Kenny Awuson David1,*, Tawfik Al-Hadhrami3, Parag Acharya1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3619-3641, 2025, DOI:10.32604/cmc.2024.054802 - 17 February 2025

    Abstract This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA framework integrates security by design principles, micro-segmentation, and Island Mode Operation (IMO) to enhance cyber resilience and ensure continuous, secure operations. The methodology deploys a Forward-Thinking Architecture Strategy (FTAS) algorithm, which utilises an industrial Intrusion Detection System (IDS) implemented with Python’s Network Intrusion Detection System (NIDS) library. The FTAS algorithm successfully identified and responded to cyber-attacks, ensuring minimal system disruption. ISERA has been validated through comprehensive testing scenarios… More >

  • Open Access

    ARTICLE

    Oversampling-Enhanced Feature Fusion-Based Hybrid ViT-1DCNN Model for Ransomware Cyber Attack Detection

    Muhammad Armghan Latif1, Zohaib Mushtaq2,*, Saifur Rahman3, Saad Arif4, Salim Nasar Faraj Mursal3, Muhammad Irfan3, Haris Aziz5

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.2, pp. 1667-1695, 2025, DOI:10.32604/cmes.2024.056850 - 27 January 2025

    Abstract Ransomware attacks pose a significant threat to critical infrastructures, demanding robust detection mechanisms. This study introduces a hybrid model that combines vision transformer (ViT) and one-dimensional convolutional neural network (1DCNN) architectures to enhance ransomware detection capabilities. Addressing common challenges in ransomware detection, particularly dataset class imbalance, the synthetic minority oversampling technique (SMOTE) is employed to generate synthetic samples for minority class, thereby improving detection accuracy. The integration of ViT and 1DCNN through feature fusion enables the model to capture both global contextual and local sequential features, resulting in comprehensive ransomware classification. Tested on the UNSW-NB15 More >

Displaying 1-10 on page 1 of 378. Per Page