Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (196)
  • Open Access

    ARTICLE

    Archimedes Optimization with Deep Learning Based Aerial Image Classification for Cybersecurity Enabled UAV Networks

    Faris Kateb, Mahmoud Ragab*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2171-2185, 2023, DOI:10.32604/csse.2023.039931

    Abstract The recent adoption of satellite technologies, unmanned aerial vehicles (UAVs) and 5G has encouraged telecom networking to evolve into more stable service to remote areas and render higher quality. But, security concerns with drones were increasing as drone nodes have been striking targets for cyberattacks because of immensely weak inbuilt and growing poor security volumes. This study presents an Archimedes Optimization with Deep Learning based Aerial Image Classification and Intrusion Detection (AODL-AICID) technique in secure UAV networks. The presented AODL-AICID technique concentrates on two major processes: image classification and intrusion detection. For aerial image classification, the AODL-AICID technique encompasses MobileNetv2… More >

  • Open Access

    ARTICLE

    Real-Time Multi Fractal Trust Evaluation Model for Efficient Intrusion Detection in Cloud

    S. Priya1, R. S. Ponmagal2,*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1895-1907, 2023, DOI:10.32604/iasc.2023.039814

    Abstract Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks. To address such threats towards cloud services, numerous techniques exist that mitigate the service threats according to different metrics. The rule-based approaches are unsuitable for new threats, whereas trust-based systems estimate trust value based on behavior, flow, and other features. However, the methods suffer from mitigating intrusion attacks at a higher rate. This article presents a novel Multi Fractal Trust Evaluation Model (MFTEM) to overcome these deficiencies. The method involves analyzing service growth,… More >

  • Open Access

    ARTICLE

    Ensemble-Based Approach for Efficient Intrusion Detection in Network Traffic

    Ammar Almomani1,2,*, Iman Akour3, Ahmed M. Manasrah4,5, Omar Almomani6, Mohammad Alauthman7, Esra’a Abdullah1, Amaal Al Shwait1, Razan Al Sharaa1

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2499-2517, 2023, DOI:10.32604/iasc.2023.039687

    Abstract The exponential growth of Internet and network usage has necessitated heightened security measures to protect against data and network breaches. Intrusions, executed through network packets, pose a significant challenge for firewalls to detect and prevent due to the similarity between legitimate and intrusion traffic. The vast network traffic volume also complicates most network monitoring systems and algorithms. Several intrusion detection methods have been proposed, with machine learning techniques regarded as promising for dealing with these incidents. This study presents an Intrusion Detection System Based on Stacking Ensemble Learning base (Random Forest, Decision Tree, and k-Nearest-Neighbors). The proposed system employs pre-processing… More >

  • Open Access

    ARTICLE

    A Novel Ensemble Learning System for Cyberattack Classification

    Óscar Mogollón-Gutiérrez*, José Carlos Sancho Núñez, Mar Ávila Vegas, Andrés Caro Lindo

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1691-1709, 2023, DOI:10.32604/iasc.2023.039255

    Abstract Nowadays, IT systems rely mainly on artificial intelligence (AI) algorithms to process data. AI is generally used to extract knowledge from stored information and, depending on the nature of data, it may be necessary to apply different AI algorithms. In this article, a novel perspective on the use of AI to ensure the cybersecurity through the study of network traffic is presented. This is done through the construction of a two-stage cyberattack classification ensemble model addressing class imbalance following a one-vs-rest (OvR) approach. With the growing trend of cyberattacks, it is essential to implement techniques that ensure legitimate access to… More >

  • Open Access

    ARTICLE

    Intrusion Detection in the Internet of Things Using Fusion of GRU-LSTM Deep Learning Model

    Mohammad S. Al-kahtani1, Zahid Mehmood2,3,*, Tariq Sadad4, Islam Zada5, Gauhar Ali6, Mohammed ElAffendi6

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2279-2290, 2023, DOI:10.32604/iasc.2023.037673

    Abstract Cybersecurity threats are increasing rapidly as hackers use advanced techniques. As a result, cybersecurity has now a significant factor in protecting organizational limits. Intrusion detection systems (IDSs) are used in networks to flag serious issues during network management, including identifying malicious traffic, which is a challenge. It remains an open contest over how to learn features in IDS since current approaches use deep learning methods. Hybrid learning, which combines swarm intelligence and evolution, is gaining attention for further improvement against cyber threats. In this study, we employed a PSO-GA (fusion of particle swarm optimization (PSO) and genetic algorithm (GA)) for… More >

  • Open Access

    ARTICLE

    Signature-Based Intrusion Detection System in Wireless 6G IoT Networks

    Mansoor Farooq1,*, Mubashir Hassan Khan2

    Journal on Internet of Things, Vol.4, No.3, pp. 155-168, 2022, DOI:10.32604/jiot.2022.039271

    Abstract An “Intrusion Detection System” (IDS) is a security measure designed to perceive and be aware of unauthorized access or malicious activity on a computer system or network. Signature-based IDSs employ an attack signature database to identify intrusions. This indicates that the system can only identify known attacks and cannot identify brand-new or unidentified assaults. In Wireless 6G IoT networks, signature-based IDSs can be useful to detect a wide range of known attacks such as viruses, worms, and Trojans. However, these networks have specific requirements and constraints, such as the need for real-time detection and low-power operation. To meet these requirements,… More >

  • Open Access

    ARTICLE

    An Intrusion Detection Scheme Based on Federated Learning and Self-Attention Fusion Convolutional Neural Network for IoT

    Jie Deng1, Ran Guo2, Zilong Jin1,3,*

    Journal on Internet of Things, Vol.4, No.3, pp. 141-153, 2022, DOI:10.32604/jiot.2022.038914

    Abstract Traditional based deep learning intrusion detection methods face problems such as insufficient cloud storage, data privacy leaks, high communication costs, unsatisfactory detection rates, and false positive rate. To address existing issues in intrusion detection, this paper presents a novel approach called CS-FL, which combines Federated Learning and a Self-Attention Fusion Convolutional Neural Network. Federated Learning is a new distributed computing model that enables individual training of client data without uploading local data to a central server. at the same time, local training results are uploaded and integrated across all participating clients to produce a global model. The sharing model reduces… More >

  • Open Access

    ARTICLE

    MEM-TET: Improved Triplet Network for Intrusion Detection System

    Weifei Wang1, Jinguo Li1,*, Na Zhao2, Min Liu1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 471-487, 2023, DOI:10.32604/cmc.2023.039733

    Abstract With the advancement of network communication technology, network traffic shows explosive growth. Consequently, network attacks occur frequently. Network intrusion detection systems are still the primary means of detecting attacks. However, two challenges continue to stymie the development of a viable network intrusion detection system: imbalanced training data and new undiscovered attacks. Therefore, this study proposes a unique deep learning-based intrusion detection method. We use two independent in-memory autoencoders trained on regular network traffic and attacks to capture the dynamic relationship between traffic features in the presence of unbalanced training data. Then the original data is fed into the triplet network… More >

  • Open Access

    ARTICLE

    XA-GANomaly: An Explainable Adaptive Semi-Supervised Learning Method for Intrusion Detection Using GANomaly

    Yuna Han1, Hangbae Chang2,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 221-237, 2023, DOI:10.32604/cmc.2023.039463

    Abstract Intrusion detection involves identifying unauthorized network activity and recognizing whether the data constitute an abnormal network transmission. Recent research has focused on using semi-supervised learning mechanisms to identify abnormal network traffic to deal with labeled and unlabeled data in the industry. However, real-time training and classifying network traffic pose challenges, as they can lead to the degradation of the overall dataset and difficulties preventing attacks. Additionally, existing semi-supervised learning research might need to analyze the experimental results comprehensively. This paper proposes XA-GANomaly, a novel technique for explainable adaptive semi-supervised learning using GANomaly, an image anomalous detection model that dynamically trains… More >

  • Open Access

    ARTICLE

    Securing Cloud Computing from Flash Crowd Attack Using Ensemble Intrusion Detection System

    Turke Althobaiti1,2, Yousef Sanjalawe3,*, Naeem Ramzan4

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 453-469, 2023, DOI:10.32604/csse.2023.039207

    Abstract Flash Crowd attacks are a form of Distributed Denial of Service (DDoS) attack that is becoming increasingly difficult to detect due to its ability to imitate normal user behavior in Cloud Computing (CC). Botnets are often used by attackers to perform a wide range of DDoS attacks. With advancements in technology, bots are now able to simulate DDoS attacks as flash crowd events, making them difficult to detect. When it comes to application layer DDoS attacks, the Flash Crowd attack that occurs during a Flash Event is viewed as the most intricate issue. This is mainly because it can imitate… More >

Displaying 31-40 on page 4 of 196. Per Page