Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    A Study on the Inter-Pretability of Network Attack Prediction Models Based on Light Gradient Boosting Machine (LGBM) and SHapley Additive exPlanations (SHAP)

    Shuqin Zhang1, Zihao Wang1,*, Xinyu Su2

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5781-5809, 2025, DOI:10.32604/cmc.2025.062080 - 19 May 2025

    Abstract The methods of network attacks have become increasingly sophisticated, rendering traditional cybersecurity defense mechanisms insufficient to address novel and complex threats effectively. In recent years, artificial intelligence has achieved significant progress in the field of network security. However, many challenges and issues remain, particularly regarding the interpretability of deep learning and ensemble learning algorithms. To address the challenge of enhancing the interpretability of network attack prediction models, this paper proposes a method that combines Light Gradient Boosting Machine (LGBM) and SHapley Additive exPlanations (SHAP). LGBM is employed to model anomalous fluctuations in various network indicators,… More >

  • Open Access

    ARTICLE

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

    Laila M. Halman, Mohammed J. F. Alenazi*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1469-1483, 2024, DOI:10.32604/cmes.2023.028077 - 17 November 2023

    Abstract The healthcare sector holds valuable and sensitive data. The amount of this data and the need to handle, exchange, and protect it, has been increasing at a fast pace. Due to their nature, software-defined networks (SDNs) are widely used in healthcare systems, as they ensure effective resource utilization, safety, great network management, and monitoring. In this sector, due to the value of the data, SDNs face a major challenge posed by a wide range of attacks, such as distributed denial of service (DDoS) and probe attacks. These attacks reduce network performance, causing the degradation of… More > Graphic Abstract

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

  • Open Access

    ARTICLE

    A Rule-Based Approach for Grey Hole Attack Prediction in Wireless Sensor Networks

    C. Gowdham*, S. Nithyanandam

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3815-3827, 2023, DOI:10.32604/iasc.2023.031876 - 17 August 2022

    Abstract The Wireless Sensor Networks (WSN) are vulnerable to assaults due to the fact that the devices connected to them have a reliable connection to the internet. A malicious node acts as the controller and uses a grey hole attack to get the data from all of the other nodes in the network. Additionally, the nodes are discarding and modifying the data packets according to the requirements of the system. The assault modifies the fundamental concept of the WSNs, which is that different devices should communicate with one another. In the proposed system, there is a… More >

  • Open Access

    ARTICLE

    Optimized Fuzzy Enabled Semi-Supervised Intrusion Detection System for Attack Prediction

    Gautham Praveen Ramalingam1, R. Arockia Xavier Annie1, Shobana Gopalakrishnan2,*

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1479-1492, 2022, DOI:10.32604/iasc.2022.022211 - 09 December 2021

    Abstract Detection of intrusion plays an important part in data protection. Intruders will carry out attacks from a compromised user account without being identified. The key technology is the effective detection of sundry threats inside the network. However, process automation is experiencing expanded use of information communication systems, due to high versatility of interoperability and ease off 34 administration. Traditional knowledge technology intrusion detection systems are not completely tailored to process automation. The combined use of fuzziness-based and RNN-IDS is therefore highly suited to high-precision classification, and its efficiency is better compared to that of conventional More >

  • Open Access

    ARTICLE

    A Cyber Kill Chain Approach for Detecting Advanced Persistent Threats

    Yussuf Ahmed1,*, A.Taufiq Asyhari1, Md Arafatur Rahman2

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2497-2513, 2021, DOI:10.32604/cmc.2021.014223 - 05 February 2021

    Abstract The number of cybersecurity incidents is on the rise despite significant investment in security measures. The existing conventional security approaches have demonstrated limited success against some of the more complex cyber-attacks. This is primarily due to the sophistication of the attacks and the availability of powerful tools. Interconnected devices such as the Internet of Things (IoT) are also increasing attack exposures due to the increase in vulnerabilities. Over the last few years, we have seen a trend moving towards embracing edge technologies to harness the power of IoT devices and 5G networks. Edge technology brings… More >

Displaying 1-10 on page 1 of 5. Per Page