Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (24)
  • Open Access

    ARTICLE

    Network Traffic Synthesis and Simulation Framework for Cybersecurity Exercise Systems

    Dong-Wook Kim1, Gun-Yoon Sin2, Kwangsoo Kim3, Jaesik Kang3, Sun-Young Im3, Myung-Mook Han1,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3637-3653, 2024, DOI:10.32604/cmc.2024.054108

    Abstract In the rapidly evolving field of cybersecurity, the challenge of providing realistic exercise scenarios that accurately mimic real-world threats has become increasingly critical. Traditional methods often fall short in capturing the dynamic and complex nature of modern cyber threats. To address this gap, we propose a comprehensive framework designed to create authentic network environments tailored for cybersecurity exercise systems. Our framework leverages advanced simulation techniques to generate scenarios that mirror actual network conditions faced by professionals in the field. The cornerstone of our approach is the use of a conditional tabular generative adversarial network (CTGAN),… More >

  • Open Access

    ARTICLE

    Fortifying Smart Grids: A Holistic Assessment Strategy against Cyber Attacks and Physical Threats for Intelligent Electronic Devices

    Yangrong Chen1,2, June Li3,*, Yu Xia3, Ruiwen Zhang3, Lingling Li1,2, Xiaoyu Li1,2, Lin Ge1,2

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2579-2609, 2024, DOI:10.32604/cmc.2024.053230

    Abstract Intelligent electronic devices (IEDs) are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control instructions. In the context of the heightened security challenges within smart grids, IEDs pose significant risks due to inherent hardware and software vulnerabilities, as well as the openness and vulnerability of communication protocols. Smart grid security, distinct from traditional internet security, mainly relies on monitoring network security events at the platform layer, lacking an effective assessment mechanism for IEDs. Hence, we incorporate considerations for both cyber-attacks and physical faults, presenting security assessment indicators and… More > Graphic Abstract

    Fortifying Smart Grids: A Holistic Assessment Strategy against Cyber Attacks and Physical Threats for Intelligent Electronic Devices

  • Open Access

    ARTICLE

    Classified VPN Network Traffic Flow Using Time Related to Artificial Neural Network

    Saad Abdalla Agaili Mohamed*, Sefer Kurnaz

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 819-841, 2024, DOI:10.32604/cmc.2024.050474

    Abstract VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world. However, increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorize VPN network data. We present a novel VPN network traffic flow classification method utilizing Artificial Neural Networks (ANN). This paper aims to provide a reliable system that can identify a virtual private network (VPN) traffic from intrusion attempts, data exfiltration, and denial-of-service assaults. We compile a broad dataset of labeled VPN traffic flows from various apps and usage patterns. Next, we create an ANN architecture that can… More >

  • Open Access

    ARTICLE

    Abnormal Traffic Detection for Internet of Things Based on an Improved Residual Network

    Tingting Su1, Jia Wang1,*, Wei Hu2,*, Gaoqiang Dong1, Jeon Gwanggil3

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4433-4448, 2024, DOI:10.32604/cmc.2024.051535

    Abstract Along with the progression of Internet of Things (IoT) technology, network terminals are becoming continuously more intelligent. IoT has been widely applied in various scenarios, including urban infrastructure, transportation, industry, personal life, and other socio-economic fields. The introduction of deep learning has brought new security challenges, like an increment in abnormal traffic, which threatens network security. Insufficient feature extraction leads to less accurate classification results. In abnormal traffic detection, the data of network traffic is high-dimensional and complex. This data not only increases the computational burden of model training but also makes information extraction more… More >

  • Open Access

    ARTICLE

    Applying an Improved Dung Beetle Optimizer Algorithm to Network Traffic Identification

    Qinyue Wu, Hui Xu*, Mengran Liu

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4091-4107, 2024, DOI:10.32604/cmc.2024.048461

    Abstract Network traffic identification is critical for maintaining network security and further meeting various demands of network applications. However, network traffic data typically possesses high dimensionality and complexity, leading to practical problems in traffic identification data analytics. Since the original Dung Beetle Optimizer (DBO) algorithm, Grey Wolf Optimization (GWO) algorithm, Whale Optimization Algorithm (WOA), and Particle Swarm Optimization (PSO) algorithm have the shortcomings of slow convergence and easily fall into the local optimal solution, an Improved Dung Beetle Optimizer (IDBO) algorithm is proposed for network traffic identification. Firstly, the Sobol sequence is utilized to initialize the… More >

  • Open Access

    ARTICLE

    An Improved Jump Spider Optimization for Network Traffic Identification Feature Selection

    Hui Xu, Yalin Hu*, Weidong Cao, Longjie Han

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3239-3255, 2023, DOI:10.32604/cmc.2023.039227

    Abstract The massive influx of traffic on the Internet has made the composition of web traffic increasingly complex. Traditional port-based or protocol-based network traffic identification methods are no longer suitable for today’s complex and changing networks. Recently, machine learning has been widely applied to network traffic recognition. Still, high-dimensional features and redundant data in network traffic can lead to slow convergence problems and low identification accuracy of network traffic recognition algorithms. Taking advantage of the faster optimization-seeking capability of the jumping spider optimization algorithm (JSOA), this paper proposes a jumping spider optimization algorithm that incorporates the… More >

  • Open Access

    ARTICLE

    Ensemble-Based Approach for Efficient Intrusion Detection in Network Traffic

    Ammar Almomani1,2,*, Iman Akour3, Ahmed M. Manasrah4,5, Omar Almomani6, Mohammad Alauthman7, Esra’a Abdullah1, Amaal Al Shwait1, Razan Al Sharaa1

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2499-2517, 2023, DOI:10.32604/iasc.2023.039687

    Abstract The exponential growth of Internet and network usage has necessitated heightened security measures to protect against data and network breaches. Intrusions, executed through network packets, pose a significant challenge for firewalls to detect and prevent due to the similarity between legitimate and intrusion traffic. The vast network traffic volume also complicates most network monitoring systems and algorithms. Several intrusion detection methods have been proposed, with machine learning techniques regarded as promising for dealing with these incidents. This study presents an Intrusion Detection System Based on Stacking Ensemble Learning base (Random Forest, Decision Tree, and k-Nearest-Neighbors). More >

  • Open Access

    ARTICLE

    Mirai Botnet Attack Detection in Low-Scale Network Traffic

    Ebu Yusuf GÜVEN, Zeynep GÜRKAŞ-AYDIN*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 419-437, 2023, DOI:10.32604/iasc.2023.038043

    Abstract The Internet of Things (IoT) has aided in the development of new products and services. Due to the heterogeneity of IoT items and networks, traditional techniques cannot identify network risks. Rule-based solutions make it challenging to secure and manage IoT devices and services due to their diversity. While the use of artificial intelligence eliminates the need to define rules, the training and retraining processes require additional processing power. This study proposes a methodology for analyzing constrained devices in IoT environments. We examined the relationship between different sized samples from the Kitsune dataset to simulate the… More >

  • Open Access

    ARTICLE

    MTC: A Multi-Task Model for Encrypted Network Traffic Classification Based on Transformer and 1D-CNN

    Kaiyue Wang1, Jian Gao1,2,*, Xinyan Lei1

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 619-638, 2023, DOI:10.32604/iasc.2023.036701

    Abstract Traffic characterization (e.g., chat, video) and application identification (e.g., FTP, Facebook) are two of the more crucial jobs in encrypted network traffic classification. These two activities are typically carried out separately by existing systems using separate models, significantly adding to the difficulty of network administration. Convolutional Neural Network (CNN) and Transformer are deep learning-based approaches for network traffic classification. CNN is good at extracting local features while ignoring long-distance information from the network traffic sequence, and Transformer can capture long-distance feature dependencies while ignoring local details. Based on these characteristics, a multi-task learning model that… More >

  • Open Access

    ARTICLE

    RRCNN: Request Response-Based Convolutional Neural Network for ICS Network Traffic Anomaly Detection

    Yan Du1,2, Shibin Zhang1,2,*, Guogen Wan1,2, Daohua Zhou3, Jiazhong Lu1,2, Yuanyuan Huang1,2, Xiaoman Cheng4, Yi Zhang4, Peilin He5

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5743-5759, 2023, DOI:10.32604/cmc.2023.035919

    Abstract Nowadays, industrial control system (ICS) has begun to integrate with the Internet. While the Internet has brought convenience to ICS, it has also brought severe security concerns. Traditional ICS network traffic anomaly detection methods rely on statistical features manually extracted using the experience of network security experts. They are not aimed at the original network data, nor can they capture the potential characteristics of network packets. Therefore, the following improvements were made in this study: (1) A dataset that can be used to evaluate anomaly detection algorithms is produced, which provides raw network data. (2)… More >

Displaying 1-10 on page 1 of 24. Per Page