Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (209)
  • Open Access

    ARTICLE

    A Real-Time Sequential Deep Extreme Learning Machine Cybersecurity Intrusion Detection System

    Amir Haider1, Muhammad Adnan Khan2, Abdur Rehman3, Muhib Ur Rahman4, Hyung Seok Kim1,*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1785-1798, 2021, DOI:10.32604/cmc.2020.013910

    Abstract In recent years, cybersecurity has attracted significant interest due to the rapid growth of the Internet of Things (IoT) and the widespread development of computer infrastructure and systems. It is thus becoming particularly necessary to identify cyber-attacks or irregularities in the system and develop an efficient intrusion detection framework that is integral to security. Researchers have worked on developing intrusion detection models that depend on machine learning (ML) methods to address these security problems. An intelligent intrusion detection device powered by data can exploit artificial intelligence (AI), and especially ML, techniques. Accordingly, we propose in More >

  • Open Access

    ARTICLE

    A New Database Intrusion Detection Approach Based on Hybrid Meta-Heuristics

    Youseef Alotaibi*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1879-1895, 2021, DOI:10.32604/cmc.2020.013739

    Abstract A new secured database management system architecture using intrusion detection systems (IDS) is proposed in this paper for organizations with no previous role mapping for users. A simple representation of Structured Query Language queries is proposed to easily permit the use of the worked clustering algorithm. A new clustering algorithm that uses a tube search with adaptive memory is applied to database log files to create users’ profiles. Then, queries issued for each user are checked against the related user profile using a classifier to determine whether or not each query is malicious. The IDS… More >

  • Open Access

    ARTICLE

    Improving the Detection Rate of Rarely Appearing Intrusions in Network-Based Intrusion Detection Systems

    Eunmok Yang1, Gyanendra Prasad Joshi2, Changho Seo3,*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1647-1663, 2021, DOI:10.32604/cmc.2020.013210

    Abstract In network-based intrusion detection practices, there are more regular instances than intrusion instances. Because there is always a statistical imbalance in the instances, it is difficult to train the intrusion detection system effectively. In this work, we compare intrusion detection performance by increasing the rarely appearing instances rather than by eliminating the frequently appearing duplicate instances. Our technique mitigates the statistical imbalance in these instances. We also carried out an experiment on the training model by increasing the instances, thereby increasing the attack instances step by step up to 13 levels. The experiments included not… More >

  • Open Access

    ARTICLE

    A Stacking-Based Deep Neural Network Approach for Effective Network Anomaly Detection

    Lewis Nkenyereye1, Bayu Adhi Tama2, Sunghoon Lim3,*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 2217-2227, 2021, DOI:10.32604/cmc.2020.012432

    Abstract An anomaly-based intrusion detection system (A-IDS) provides a critical aspect in a modern computing infrastructure since new types of attacks can be discovered. It prevalently utilizes several machine learning algorithms (ML) for detecting and classifying network traffic. To date, lots of algorithms have been proposed to improve the detection performance of A-IDS, either using individual or ensemble learners. In particular, ensemble learners have shown remarkable performance over individual learners in many applications, including in cybersecurity domain. However, most existing works still suffer from unsatisfactory results due to improper ensemble design. The aim of this study More >

  • Open Access

    ARTICLE

    Anomaly Classification Using Genetic Algorithm-Based Random Forest Model for Network Attack Detection

    Adel Assiri*

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 767-778, 2021, DOI:10.32604/cmc.2020.013813

    Abstract Anomaly classification based on network traffic features is an important task to monitor and detect network intrusion attacks. Network-based intrusion detection systems (NIDSs) using machine learning (ML) methods are effective tools for protecting network infrastructures and services from unpredictable and unseen attacks. Among several ML methods, random forest (RF) is a robust method that can be used in ML-based network intrusion detection solutions. However, the minimum number of instances for each split and the number of trees in the forest are two key parameters of RF that can affect classification accuracy. Therefore, optimal parameter selection… More >

  • Open Access

    ARTICLE

    Enhance Intrusion Detection in Computer Networks Based on Deep Extreme Learning Machine

    Muhammad Adnan Khan1,*, Abdur Rehman2, Khalid Masood Khan1, Mohammed A. Al Ghamdi3, Sultan H. Almotiri3

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 467-480, 2021, DOI:10.32604/cmc.2020.013121

    Abstract Networks provide a significant function in everyday life, and cybersecurity therefore developed a critical field of study. The Intrusion detection system (IDS) becoming an essential information protection strategy that tracks the situation of the software and hardware operating on the network. Notwithstanding advancements of growth, current intrusion detection systems also experience dif- ficulties in enhancing detection precision, growing false alarm levels and identifying suspicious activities. In order to address above mentioned issues, several researchers concentrated on designing intrusion detection systems that rely on machine learning approaches. Machine learning models will accurately identify the underlying variations… More >

  • Open Access

    ARTICLE

    A Novel Intrusion Detection Algorithm Based on Long Short Term Memory Network

    Xinda Hao1, Jianmin Zhou2,*, Xueqi Shen1, Yu Yang1

    Journal of Quantum Computing, Vol.2, No.2, pp. 97-104, 2020, DOI:10.32604/jqc.2020.010819

    Abstract In recent years, machine learning technology has been widely used for timely network attack detection and classification. However, due to the large number of network traffic and the complex and variable nature of malicious attacks, many challenges have arisen in the field of network intrusion detection. Aiming at the problem that massive and high-dimensional data in cloud computing networks will have a negative impact on anomaly detection, this paper proposes a Bi-LSTM method based on attention mechanism, which learns by transmitting IDS data to multiple hidden layers. Abstract information and high-dimensional feature representation in network More >

  • Open Access

    ARTICLE

    Towards Improving the Intrusion Detection through ELM (Extreme Learning Machine)

    Iftikhar Ahmad1, *, Rayan Atteah Alsemmeari1

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1097-1111, 2020, DOI:10.32604/cmc.2020.011732

    Abstract An IDS (intrusion detection system) provides a foremost front line mechanism to guard networks, systems, data, and information. That’s why intrusion detection has grown as an active study area and provides significant contribution to cyber-security techniques. Multiple techniques have been in use but major concern in their implementation is variation in their detection performance. The performance of IDS lies in the accurate detection of attacks, and this accuracy can be raised by improving the recognition rate and significant reduction in the false alarms rate. To overcome this problem many researchers have used different machine learning… More >

  • Open Access

    ARTICLE

    Intrusion Detection and Anticipation System (IDAS) for IEEE 802.15.4 Devices

    Usman Tariq

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 231-242, 2019, DOI:10.31209/2018.100000040

    Abstract Wireless Sensor Networks (WSNs) empower the reflection of the environment with an extraordinary resolve. These systems are combination of several minuscule squat-cost, and stumpy-power on-chip transceiver sensing motes. Characteristically, a sensing device comprises of four key gears: an identifying element for data attainment, a microcontroller for native data dispensation, a message component to permit the broadcast/response of data to/from additional associated hardware, and lastly, a trivial energy source. Near field frequency series and inadequate bandwidth of transceiver device drags to multi-stage data transactions at minimum achievable requirements. State of art, and prevailing operating systems, such… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks

    Fei Li1, *, Jiayan Zhang1, Edward Szczerbicki2, Jiaqi Song1, Ruxiang Li 1, Renhong Diao1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 653-681, 2020, DOI:10.32604/cmc.2020.011264

    Abstract The increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated the intrusion detection system based on the in-vehicle system. We combined two algorithms to realize the efficient learning of the vehicle’s boundary behavior and the detection of intrusive behavior. In order to More >

Displaying 191-200 on page 20 of 209. Per Page