Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (196)
  • Open Access

    ARTICLE

    Development of PCCNN-Based Network Intrusion Detection System for EDGE Computing

    Mohd Anul Haq, Mohd Abdul Rahim Khan*, Talal AL-Harbi

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1769-1788, 2022, DOI:10.32604/cmc.2022.018708

    Abstract Intrusion Detection System (IDS) plays a crucial role in detecting and identifying the DoS and DDoS type of attacks on IoT devices. However, anomaly-based techniques do not provide acceptable accuracy for efficacious intrusion detection. Also, we found many difficulty levels when applying IDS to IoT devices for identifying attempted attacks. Given this background, we designed a solution to detect intrusions using the Convolutional Neural Network (CNN) for Enhanced Data rates for GSM Evolution (EDGE) Computing. We created two separate categories to handle the attack and non-attack events in the system. The findings of this study indicate that this approach was… More >

  • Open Access

    ARTICLE

    Intrusion Detection System for Energy Efficient Cluster Based Vehicular Adhoc Networks

    R. Lavanya1,*, S. Kannan2

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 323-337, 2022, DOI:10.32604/iasc.2022.021467

    Abstract A vehicular ad hoc network (VANET), a subfield of mobile adhoc network (MANET) is defined by its high mobility by demonstrating the dissimilar mobility patterns. So, VANET clustering techniques are needed with the consideration of the mobility parameters amongst the nearby nodes for constructing the stable clustering techniques. At the same time, security is also a major design issue in VANET, this can be resolved by the intrusion detection systems (IDS). In contrast to the conventional IDS, VANET based IDS are required to be designed in such a way that the functioning of the system does not affect the real-time… More >

  • Open Access

    ARTICLE

    Improved Dragonfly Optimizer for Intrusion Detection Using Deep Clustering CNN-PSO Classifier

    K. S. Bhuvaneshwari1, K. Venkatachalam2, S. Hubálovský3,*, P. Trojovský4, P. Prabu5

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5949-5965, 2022, DOI:10.32604/cmc.2022.020769

    Abstract With the rapid growth of internet based services and the data generated on these services are attracted by the attackers to intrude the networking services and information. Based on the characteristics of these intruders, many researchers attempted to aim to detect the intrusion with the help of automating process. Since, the large volume of data is generated and transferred through network, the security and performance are remained an issue. IDS (Intrusion Detection System) was developed to detect and prevent the intruders and secure the network systems. The performance and loss are still an issue because of the features space grows… More >

  • Open Access

    ARTICLE

    Machine Learning Approaches to Detect DoS and Their Effect on WSNs Lifetime

    Raniyah Wazirali1, Rami Ahmad2,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4922-4946, 2022, DOI:10.32604/cmc.2022.020044

    Abstract Energy and security remain the main two challenges in Wireless Sensor Networks (WSNs). Therefore, protecting these WSN networks from Denial of Service (DoS) and Distributed DoS (DDoS) is one of the WSN networks security tasks. Traditional packet deep scan systems that rely on open field inspection in transport layer security packets and the open field encryption trend are making machine learning-based systems the only viable choice for these types of attacks. This paper contributes to the evaluation of the use machine learning algorithms in WSN nodes traffic and their effect on WSN network life time. We examined the performance metrics… More >

  • Open Access

    ARTICLE

    Fuzzy Based Latent Dirichlet Allocation for Intrusion Detection in Cloud Using ML

    S. Ranjithkumar1,*, S. Chenthur Pandian2

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4261-4277, 2022, DOI:10.32604/cmc.2022.019031

    Abstract The growth of cloud in modern technology is drastic by provisioning services to various industries where data security is considered to be common issue that influences the intrusion detection system (IDS). IDS are considered as an essential factor to fulfill security requirements. Recently, there are diverse Machine Learning (ML) approaches that are used for modeling effectual IDS. Most IDS are based on ML techniques and categorized as supervised and unsupervised. However, IDS with supervised learning is based on labeled data. This is considered as a common drawback and it fails to identify the attack patterns. Similarly, unsupervised learning fails to… More >

  • Open Access

    ARTICLE

    Industrial Datasets with ICS Testbed and Attack Detection Using Machine Learning Techniques

    Sinil Mubarak1, Mohamed Hadi Habaebi1,*, Md Rafiqul Islam1, Asaad Balla1, Mohammad Tahir2, Elfatih A. A. Elsheikh3, F. M. Suliman3

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1345-1360, 2022, DOI:10.32604/iasc.2022.020801

    Abstract Industrial control systems (ICS) are the backbone for the implementation of cybersecurity solutions. They are susceptible to various attacks, due to openness in connectivity, unauthorized attempts, malicious attacks, use of more commercial off the shelf (COTS) software and hardware, and implementation of Internet protocols (IP) that exposes them to the outside world. Cybersecurity solutions for Information technology (IT) secured with firewalls, intrusion detection/protection systems do nothing much for Operational technology (OT) ICS. An innovative concept of using real operational technology network traffic-based testbed, for cyber-physical system simulation and analysis, is presented. The testbed is equipped with real-time attacks using in-house… More >

  • Open Access

    ARTICLE

    Data Fusion-Based Machine Learning Architecture for Intrusion Detection

    Muhammad Adnan Khan, Taher M. Ghazal2,3, Sang-Woong Lee1,*, Abdur Rehman4

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3399-3413, 2022, DOI:10.32604/cmc.2022.020173

    Abstract In recent years, the infrastructure of Wireless Internet of Sensor Networks (WIoSNs) has been more complicated owing to developments in the internet and devices’ connectivity. To effectively prepare, control, hold and optimize wireless sensor networks, a better assessment needs to be conducted. The field of artificial intelligence has made a great deal of progress with deep learning systems and these techniques have been used for data analysis. This study investigates the methodology of Real Time Sequential Deep Extreme Learning Machine (RTS-DELM) implemented to wireless Internet of Things (IoT) enabled sensor networks for the detection of any intrusion activity. Data fusion… More >

  • Open Access

    ARTICLE

    Optimal Deep Reinforcement Learning for Intrusion Detection in UAVs

    V. Praveena1, A. Vijayaraj2, P. Chinnasamy3, Ihsan Ali4,*, Roobaea Alroobaea5, Saleh Yahya Alyahyan6, Muhammad Ahsan Raza7

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2639-2653, 2022, DOI:10.32604/cmc.2022.020066

    Abstract In recent years, progressive developments have been observed in recent technologies and the production cost has been continuously decreasing. In such scenario, Internet of Things (IoT) network which is comprised of a set of Unmanned Aerial Vehicles (UAV), has received more attention from civilian to military applications. But network security poses a serious challenge to UAV networks whereas the intrusion detection system (IDS) is found to be an effective process to secure the UAV networks. Classical IDSs are not adequate to handle the latest computer networks that possess maximum bandwidth and data traffic. In order to improve the detection performance… More >

  • Open Access

    ARTICLE

    Blockchain-Based SQKD and IDS in Edge Enabled Smart Grid Network

    Abdullah Musaed Alkhiari1, Shailendra Mishra2,*, Mohammed AlShehri1

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2149-2169, 2022, DOI:10.32604/cmc.2022.019562

    Abstract Smart Grid is a power grid that improves flexibility, reliability, and efficiency through smart meters. Due to extensive data exchange over the Internet, the smart grid faces many security challenges that have led to data loss, data compromise, and high power consumption. Moreover, the lack of hardware protection and physical attacks reduce the overall performance of the smart grid network. We proposed the BLIDSE model (Blockchain-based secure quantum key distribution and Intrusion Detection System in Edge Enables Smart Grid Network) to address these issues. The proposed model includes five phases: The first phase is blockchain-based secure user authentication, where all… More >

  • Open Access

    ARTICLE

    Cross-Layer Hidden Markov Analysis for Intrusion Detection

    K. Venkatachalam1, P. Prabu2, B. Saravana Balaji3, Byeong-Gwon Kang4, Yunyoung Nam4,*, Mohamed Abouhawwash5,6

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3685-3700, 2022, DOI:10.32604/cmc.2022.019502

    Abstract Ad hoc mobile cloud computing networks are affected by various issues, like delay, energy consumption, flexibility, infrastructure, network lifetime, security, stability, data transition, and link accomplishment. Given the issues above, route failure is prevalent in ad hoc mobile cloud computing networks, which increases energy consumption and delay and reduces stability. These issues may affect several interconnected nodes in an ad hoc mobile cloud computing network. To address these weaknesses, which raise many concerns about privacy and security, this study formulated clustering-based storage and search optimization approaches using cross-layer analysis. The proposed approaches were formed by cross-layer analysis based on intrusion… More >

Displaying 141-150 on page 15 of 196. Per Page