Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (197)
  • Open Access

    ARTICLE

    Intrusion Detection Based on Bidirectional Long Short-Term Memory with Attention Mechanism

    Yongjie Yang1, Shanshan Tu1, Raja Hashim Ali2, Hisham Alasmary3,4, Muhammad Waqas5,6,*, Muhammad Nouman Amjad7

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 801-815, 2023, DOI:10.32604/cmc.2023.031907

    Abstract With the recent developments in the Internet of Things (IoT), the amount of data collected has expanded tremendously, resulting in a higher demand for data storage, computational capacity, and real-time processing capabilities. Cloud computing has traditionally played an important role in establishing IoT. However, fog computing has recently emerged as a new field complementing cloud computing due to its enhanced mobility, location awareness, heterogeneity, scalability, low latency, and geographic distribution. However, IoT networks are vulnerable to unwanted assaults because of their open and shared nature. As a result, various fog computing-based security models that protect IoT networks have been developed.… More >

  • Open Access

    ARTICLE

    Augmenting IoT Intrusion Detection System Performance Using Deep Neural Network

    Nasir Sayed1, Muhammad Shoaib2,*, Waqas Ahmed3, Sultan Noman Qasem4, Abdullah M. Albarrak4, Faisal Saeed5

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1351-1374, 2023, DOI:10.32604/cmc.2023.030831

    Abstract Due to their low power consumption and limited computing power, Internet of Things (IoT) devices are difficult to secure. Moreover, the rapid growth of IoT devices in homes increases the risk of cyber-attacks. Intrusion detection systems (IDS) are commonly employed to prevent cyberattacks. These systems detect incoming attacks and instantly notify users to allow for the implementation of appropriate countermeasures. Attempts have been made in the past to detect new attacks using machine learning and deep learning techniques, however, these efforts have been unsuccessful. In this paper, we propose two deep learning models to automatically detect various types of intrusion… More >

  • Open Access

    REVIEW

    Machine Learning Techniques for Intrusion Detection Systems in SDN-Recent Advances, Challenges and Future Directions

    Gulshan Kumar1,*, Hamed Alqahtani2

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 89-119, 2023, DOI:10.32604/cmes.2022.020724

    Abstract Software-Defined Networking (SDN) enables flexibility in developing security tools that can effectively and efficiently analyze and detect malicious network traffic for detecting intrusions. Recently Machine Learning (ML) techniques have attracted lots of attention from researchers and industry for developing intrusion detection systems (IDSs) considering logically centralized control and global view of the network provided by SDN. Many IDSs have developed using advances in machine learning and deep learning. This study presents a comprehensive review of recent work of ML-based IDS in context to SDN. It presents a comprehensive study of the existing review papers in the field. It is followed… More >

  • Open Access

    ARTICLE

    An Intelligent Intrusion Detection System in Smart Grid Using PRNN Classifier

    P. Ganesan1,*, S. Arockia Edwin Xavier2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2979-2996, 2023, DOI:10.32604/iasc.2023.029264

    Abstract Typically, smart grid systems enhance the ability of conventional power system networks as it is vulnerable to several kinds of attacks. These vulnerabilities might cause the attackers or intruders to collapse the entire network system thus breaching the confidentiality and integrity of smart grid systems. Thus, for this purpose, Intrusion detection system (IDS) plays a pivotal part in offering a reliable and secured range of services in the smart grid framework. Several existing approaches are there to detect the intrusions in smart grid framework, however they are utilizing an old dataset to detect anomaly thus resulting in reduced rate of… More >

  • Open Access

    ARTICLE

    Classification Model for IDS Using Auto Cryptographic Denoising Technique

    N. Karthikeyan2, P. Sivaprakash1,*, S. Karthik2

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 671-685, 2023, DOI:10.32604/csse.2023.029984

    Abstract Intrusion detection systems (IDS) are one of the most promising ways for securing data and networks; In recent decades, IDS has used a variety of categorization algorithms. These classifiers, on the other hand, do not work effectively unless they are combined with additional algorithms that can alter the classifier’s parameters or select the optimal sub-set of features for the problem. Optimizers are used in tandem with classifiers to increase the stability and with efficiency of the classifiers in detecting invasion. These algorithms, on the other hand, have a number of limitations, particularly when used to detect new types of threats.… More >

  • Open Access

    ARTICLE

    A Quasi-Newton Neural Network Based Efficient Intrusion Detection System for Wireless Sensor Network

    A. Gautami1,*, J. Shanthini2, S. Karthik3

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 427-443, 2023, DOI:10.32604/csse.2023.026688

    Abstract In Wireless Sensor Networks (WSN), attacks mostly aim in limiting or eliminating the capability of the network to do its normal function. Detecting this misbehaviour is a demanding issue. And so far the prevailing research methods show poor performance. AQN3 centred efficient Intrusion Detection Systems (IDS) is proposed in WSN to ameliorate the performance. The proposed system encompasses Data Gathering (DG) in WSN as well as Intrusion Detection (ID) phases. In DG, the Sensor Nodes (SN) is formed as clusters in the WSN and the Distance-based Fruit Fly Fuzzy c-means (DFFF) algorithm chooses the Cluster Head (CH). Then, the data… More >

  • Open Access

    ARTICLE

    An Efficient Unsupervised Learning Approach for Detecting Anomaly in Cloud

    P. Sherubha1,*, S. P. Sasirekha2, A. Dinesh Kumar Anguraj3, J. Vakula Rani4, Raju Anitha3, S. Phani Praveen5,6, R. Hariharan Krishnan5,6

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 149-166, 2023, DOI:10.32604/csse.2023.024424

    Abstract The Cloud system shows its growing functionalities in various industrial applications. The safety towards data transfer seems to be a threat where Network Intrusion Detection System (NIDS) is measured as an essential element to fulfill security. Recently, Machine Learning (ML) approaches have been used for the construction of intellectual IDS. Most IDS are based on ML techniques either as unsupervised or supervised. In supervised learning, NIDS is based on labeled data where it reduces the efficiency of the reduced model to identify attack patterns. Similarly, the unsupervised model fails to provide a satisfactory outcome. Hence, to boost the functionality of… More >

  • Open Access

    ARTICLE

    Blockchain Driven Metaheuristic Route Planning in Secure Vehicular Adhoc Networks

    Siwar Ben Haj Hassine1, Saud S. Alotaibi2, Hadeel Alsolai3, Reem Alshahrani4, Lilia Kechiche5, Mrim M. Alnfiai6, Amira Sayed A. Aziz7, Manar Ahmed Hamza8,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6461-6477, 2022, DOI:10.32604/cmc.2022.032353

    Abstract Nowadays, vehicular ad hoc networks (VANET) turn out to be a core portion of intelligent transportation systems (ITSs), that mainly focus on achieving continual Internet connectivity amongst vehicles on the road. The VANET was utilized to enhance driving safety and build an ITS in modern cities. Driving safety is a main portion of VANET, the privacy and security of these messages should be protected. In this aspect, this article presents a blockchain with sunflower optimization enabled route planning scheme (BCSFO-RPS) for secure VANET. The presented BCSFO-RPS model focuses on the identification of routes in such a way that vehicular communication… More >

  • Open Access

    ARTICLE

    Blockchain Assisted Intrusion Detection System Using Differential Flower Pollination Model

    Mohammed Altaf Ahmed1, Sara A Althubiti2, Dronamraju Nageswara Rao3, E. Laxmi Lydia4, Woong Cho5, Gyanendra Prasad Joshi6, Sung Won Kim7,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4695-4711, 2022, DOI:10.32604/cmc.2022.032083

    Abstract Cyberattacks are developing gradually sophisticated, requiring effective intrusion detection systems (IDSs) for monitoring computer resources and creating reports on anomalous or suspicious actions. With the popularity of Internet of Things (IoT) technology, the security of IoT networks is developing a vital problem. Because of the huge number and varied kinds of IoT devices, it can be challenging task for protecting the IoT framework utilizing a typical IDS. The typical IDSs have their restrictions once executed to IoT networks because of resource constraints and complexity. Therefore, this paper presents a new Blockchain Assisted Intrusion Detection System using Differential Flower Pollination with… More >

  • Open Access

    ARTICLE

    Feature Selection with Stacked Autoencoder Based Intrusion Detection in Drones Environment

    Heba G. Mohamed1, Saud S. Alotaibi2, Majdy M. Eltahir3, Heba Mohsen4, Manar Ahmed Hamza5,*, Abu Sarwar Zamani5, Ishfaq Yaseen5, Abdelwahed Motwakel5

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5441-5458, 2022, DOI:10.32604/cmc.2022.031887

    Abstract The Internet of Drones (IoD) offers synchronized access to organized airspace for Unmanned Aerial Vehicles (known as drones). The availability of inexpensive sensors, processors, and wireless communication makes it possible in real time applications. As several applications comprise IoD in real time environment, significant interest has been received by research communications. Since IoD operates in wireless environment, it is needed to design effective intrusion detection system (IDS) to resolve security issues in the IoD environment. This article introduces a metaheuristics feature selection with optimal stacked autoencoder based intrusion detection (MFSOSAE-ID) in the IoD environment. The major intention of the MFSOSAE-ID… More >

Displaying 91-100 on page 10 of 197. Per Page