Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (194)
  • Open Access

    ARTICLE

    AID4I: An Intrusion Detection Framework for Industrial Internet of Things Using Automated Machine Learning

    Anıl Sezgin1,2,*, Aytuğ Boyacı3

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2121-2143, 2023, DOI:10.32604/cmc.2023.040287

    Abstract By identifying and responding to any malicious behavior that could endanger the system, the Intrusion Detection System (IDS) is crucial for preserving the security of the Industrial Internet of Things (IIoT) network. The benefit of anomaly-based IDS is that they are able to recognize zero-day attacks due to the fact that they do not rely on a signature database to identify abnormal activity. In order to improve control over datasets and the process, this study proposes using an automated machine learning (AutoML) technique to automate the machine learning processes for IDS. Our ground-breaking architecture, known as AID4I, makes use of… More >

  • Open Access

    ARTICLE

    MBB-IoT: Construction and Evaluation of IoT DDoS Traffic Dataset from a New Perspective

    Yi Qing1, Xiangyu Liu2, Yanhui Du2,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2095-2119, 2023, DOI:10.32604/cmc.2023.039980

    Abstract Distributed Denial of Service (DDoS) attacks have always been a major concern in the security field. With the release of malware source codes such as BASHLITE and Mirai, Internet of Things (IoT) devices have become the new source of DDoS attacks against many Internet applications. Although there are many datasets in the field of IoT intrusion detection, such as Bot-IoT, Constrained Application Protocol–Denial of Service (CoAP-DoS), and LATAM-DDoS-IoT (some of the names of DDoS datasets), which mainly focus on DDoS attacks, the datasets describing new IoT DDoS attack scenarios are extremely rare, and only N-BaIoT and IoT-23 datasets used IoT… More >

  • Open Access

    ARTICLE

    An Efficient Cyber Security and Intrusion Detection System Using CRSR with PXORP-ECC and LTH-CNN

    Nouf Saeed Alotaibi*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2061-2078, 2023, DOI:10.32604/cmc.2023.039446

    Abstract Intrusion Detection System (IDS) is a network security mechanism that analyses all users’ and applications’ traffic and detects malicious activities in real-time. The existing IDS methods suffer from lower accuracy and lack the required level of security to prevent sophisticated attacks. This problem can result in the system being vulnerable to attacks, which can lead to the loss of sensitive data and potential system failure. Therefore, this paper proposes an Intrusion Detection System using Logistic Tanh-based Convolutional Neural Network Classification (LTH-CNN). Here, the Correlation Coefficient based Mayfly Optimization (CC-MA) algorithm is used to extract the input characteristics for the IDS… More >

  • Open Access

    ARTICLE

    Improving Intrusion Detection in UAV Communication Using an LSTM-SMOTE Classification Method

    Abdulrahman M. Abdulghani, Mokhles M. Abdulghani, Wilbur L. Walters, Khalid H. Abed*

    Journal of Cyber Security, Vol.4, No.4, pp. 287-298, 2022, DOI:10.32604/jcs.2023.042486

    Abstract Unmanned Aerial Vehicles (UAVs) proliferate quickly and play a significant part in crucial tasks, so it is important to protect the security and integrity of UAV communication channels. Intrusion Detection Systems (IDSs) are required to protect the UAV communication infrastructure from unauthorized access and harmful actions. In this paper, we examine a new approach for enhancing intrusion detection in UAV communication channels by utilizing the Long Short-Term Memory network (LSTM) combined with the Synthetic Minority Oversampling Technique (SMOTE) algorithm, and this integration is the binary classification method (LSTM-SMOTE). We successfully achieved 99.83% detection accuracy by using the proposed approach and… More >

  • Open Access

    ARTICLE

    Intrusion Detection in 5G Cellular Network Using Machine Learning

    Ishtiaque Mahmood1, Tahir Alyas2, Sagheer Abbas3, Tariq Shahzad4, Qaiser Abbas5,6, Khmaies Ouahada7,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2439-2453, 2023, DOI:10.32604/csse.2023.033842

    Abstract Attacks on fully integrated servers, apps, and communication networks via the Internet of Things (IoT) are growing exponentially. Sensitive devices’ effectiveness harms end users, increases cyber threats and identity theft, raises costs, and negatively impacts income as problems brought on by the Internet of Things network go unnoticed for extended periods. Attacks on Internet of Things interfaces must be closely monitored in real time for effective safety and security. Following the 1, 2, 3, and 4G cellular networks, the 5th generation wireless 5G network is indeed the great invasion of mankind and is known as the global advancement of cellular… More >

  • Open Access

    ARTICLE

    Intelligent Intrusion Detection System for the Internet of Medical Things Based on Data-Driven Techniques

    Okba Taouali1,*, Sawcen Bacha2, Khaoula Ben Abdellafou1, Ahamed Aljuhani1, Kamel Zidi3, Rehab Alanazi1, Mohamed Faouzi Harkat4

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1593-1609, 2023, DOI:10.32604/csse.2023.039984

    Abstract Introducing IoT devices to healthcare fields has made it possible to remotely monitor patients’ information and provide a proper diagnosis as needed, resulting in the Internet of Medical Things (IoMT). However, obtaining good security features that ensure the integrity and confidentiality of patient’s information is a significant challenge. However, due to the computational resources being limited, an edge device may struggle to handle heavy detection tasks such as complex machine learning algorithms. Therefore, designing and developing a lightweight detection mechanism is crucial. To address the aforementioned challenges, a new lightweight IDS approach is developed to effectively combat a diverse range… More >

  • Open Access

    ARTICLE

    Modified Metaheuristics with Weighted Majority Voting Ensemble Deep Learning Model for Intrusion Detection System

    Mahmoud Ragab1,2,*, Sultanah M. Alshammari2,3, Abdullah S. Al-Malaise Al-Ghamdi2,4

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2497-2512, 2023, DOI:10.32604/csse.2023.041446

    Abstract The Internet of Things (IoT) system has confronted dramatic growth in high dimensionality and data traffic. The system named intrusion detection systems (IDS) is broadly utilized for the enhancement of security posture in an IT infrastructure. An IDS is a practical and suitable method for assuring network security and identifying attacks by protecting it from intrusive hackers. Nowadays, machine learning (ML)-related techniques were used for detecting intrusion in IoTs IDSs. But, the IoT IDS mechanism faces significant challenges because of physical and functional diversity. Such IoT features use every attribute and feature for IDS self-protection unrealistic and difficult. This study… More >

  • Open Access

    ARTICLE

    An Enhanced Intelligent Intrusion Detection System to Secure E-Commerce Communication Systems

    Adil Hussain1, Kashif Naseer Qureshi2,*, Khalid Javeed3, Musaed Alhussein4

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2513-2528, 2023, DOI:10.32604/csse.2023.040305

    Abstract Information and communication technologies are spreading rapidly due to their fast proliferation in many fields. The number of Internet users has led to a spike in cyber-attack incidents. E-commerce applications, such as online banking, marketing, trading, and other online businesses, play an integral role in our lives. Network Intrusion Detection System (NIDS) is essential to protect the network from unauthorized access and against other cyber-attacks. The existing NIDS systems are based on the Backward Oracle Matching (BOM) algorithm, which minimizes the false alarm rate and causes of high packet drop ratio. This paper discussed the existing NIDS systems and different… More >

  • Open Access

    ARTICLE

    Archimedes Optimization with Deep Learning Based Aerial Image Classification for Cybersecurity Enabled UAV Networks

    Faris Kateb, Mahmoud Ragab*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2171-2185, 2023, DOI:10.32604/csse.2023.039931

    Abstract The recent adoption of satellite technologies, unmanned aerial vehicles (UAVs) and 5G has encouraged telecom networking to evolve into more stable service to remote areas and render higher quality. But, security concerns with drones were increasing as drone nodes have been striking targets for cyberattacks because of immensely weak inbuilt and growing poor security volumes. This study presents an Archimedes Optimization with Deep Learning based Aerial Image Classification and Intrusion Detection (AODL-AICID) technique in secure UAV networks. The presented AODL-AICID technique concentrates on two major processes: image classification and intrusion detection. For aerial image classification, the AODL-AICID technique encompasses MobileNetv2… More >

  • Open Access

    ARTICLE

    Real-Time Multi Fractal Trust Evaluation Model for Efficient Intrusion Detection in Cloud

    S. Priya1, R. S. Ponmagal2,*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1895-1907, 2023, DOI:10.32604/iasc.2023.039814

    Abstract Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks. To address such threats towards cloud services, numerous techniques exist that mitigate the service threats according to different metrics. The rule-based approaches are unsuitable for new threats, whereas trust-based systems estimate trust value based on behavior, flow, and other features. However, the methods suffer from mitigating intrusion attacks at a higher rate. This article presents a novel Multi Fractal Trust Evaluation Model (MFTEM) to overcome these deficiencies. The method involves analyzing service growth,… More >

Displaying 21-30 on page 3 of 194. Per Page