Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (79)
  • Open Access

    ARTICLE

    A Model Training Method for DDoS Detection Using CTGAN under 5GC Traffic

    Yea-Sul Kim1, Ye-Eun Kim1, Hwankuk Kim2,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1125-1147, 2023, DOI:10.32604/csse.2023.039550

    Abstract With the commercialization of 5th-generation mobile communications (5G) networks, a large-scale internet of things (IoT) environment is being built. Security is becoming increasingly crucial in 5G network environments due to the growing risk of various distributed denial of service (DDoS) attacks across vast IoT devices. Recently, research on automated intrusion detection using machine learning (ML) for 5G environments has been actively conducted. However, 5G traffic has insufficient data due to privacy protection problems and imbalance problems with significantly fewer attack data. If this data is used to train an ML model, it will likely suffer from generalization errors due to… More >

  • Open Access

    ARTICLE

    A Modified PointNet-Based DDoS Attack Classification and Segmentation in Blockchain

    Jieren Cheng1,3, Xiulai Li1,2,3,4,*, Xinbing Xu2,3, Xiangyan Tang1,3, Victor S. Sheng5

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 975-992, 2023, DOI:10.32604/csse.2023.039280

    Abstract With the rapid development of blockchain technology, the number of distributed applications continues to increase, so ensuring the security of the network has become particularly important. However, due to its decentralized, decentralized nature, blockchain networks are vulnerable to distributed denial-of-service (DDoS) attacks, which can lead to service stops, causing serious economic losses and social impacts. The research questions in this paper mainly include two aspects: first, the classification of DDoS, which refers to detecting whether blockchain nodes are suffering DDoS attacks, that is, detecting the data of nodes in parallel; The second is the problem of DDoS segmentation, that is,… More >

  • Open Access

    ARTICLE

    New Denial of Service Attacks Detection Approach Using Hybridized Deep Neural Networks and Balanced Datasets

    Ouail Mjahed1,*, Salah El Hadaj1, El Mahdi El Guarmah1,2, Soukaina Mjahed1

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 757-775, 2023, DOI:10.32604/csse.2023.039111

    Abstract Denial of Service (DoS/DDoS) intrusions are damaging cyber-attacks, and their identification is of great interest to the Intrusion Detection System (IDS). Existing IDS are mainly based on Machine Learning (ML) methods including Deep Neural Networks (DNN), but which are rarely hybridized with other techniques. The intrusion data used are generally imbalanced and contain multiple features. Thus, the proposed approach aims to use a DNN-based method to detect DoS/DDoS attacks using CICIDS2017, CSE-CICIDS2018 and CICDDoS 2019 datasets, according to the following key points. a) Three imbalanced CICIDS2017-2018-2019 datasets, including Benign and DoS/DDoS attack classes, are used. b) A new technique based… More >

  • Open Access

    ARTICLE

    Feature Selection for Detecting ICMPv6-Based DDoS Attacks Using Binary Flower Pollination Algorithm

    Adnan Hasan Bdair Aighuraibawi1,2, Selvakumar Manickam1,*, Rosni Abdullah3, Zaid Abdi Alkareem Alyasseri4,5, Ayman Khallel6, Dilovan Asaad Zebari9, Hussam Mohammed Jasim7, Mazin Mohammed Abed8, Zainb Hussein Arif7

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 553-574, 2023, DOI:10.32604/csse.2023.037948

    Abstract Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4 × 1038 unique IP addresses of devices in the network. IPv6 has introduced new features like Neighbour Discovery Protocol (NDP) and Address Auto-configuration Scheme. IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial of Service (DoS) and Distributed Denial of Service (DDoS) which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, an Intrusion Detection System (IDS) is a monitoring system… More >

  • Open Access

    ARTICLE

    Adaptive Butterfly Optimization Algorithm (ABOA) Based Feature Selection and Deep Neural Network (DNN) for Detection of Distributed Denial-of-Service (DDoS) Attacks in Cloud

    S. Sureshkumar1,*, G .K. D. Prasanna Venkatesan2, R. Santhosh3

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1109-1123, 2023, DOI:10.32604/csse.2023.036267

    Abstract Cloud computing technology provides flexible, on-demand, and completely controlled computing resources and services are highly desirable. Despite this, with its distributed and dynamic nature and shortcomings in virtualization deployment, the cloud environment is exposed to a wide variety of cyber-attacks and security difficulties. The Intrusion Detection System (IDS) is a specialized security tool that network professionals use for the safety and security of the networks against attacks launched from various sources. DDoS attacks are becoming more frequent and powerful, and their attack pathways are continually changing, which requiring the development of new detection methods. Here the purpose of the study… More >

  • Open Access

    ARTICLE

    Weak Expansive Soil Physical Properties Modification by Means of a Cement-Jute Fiber

    Zisheng Yang1, Wendong Li1, Xuelei Cheng1,2,*, Ran Hai1, Shunqun Li3

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.8, pp. 2119-2130, 2023, DOI:10.32604/fdmp.2023.025444

    Abstract Sixteen groups of comprehensive tests have been conducted to investigate the modifications in the physical properties of a weak expansive soil due to the addition of a cement jute fiber. The tests have been conducted to analyze the liquid plastic limit, the particle distribution and the free expansion rate. The results show that: (1) With an increase in the cement-jute fiber content, the free expansion rate of the modified expansive soil gradually decreases, however, such a rate rebounds when the fiber content exceeds 0.5% and the cement content exceeds 6%. (2) With an increase in the cement percentage, the particle… More >

  • Open Access

    ARTICLE

    DDoS Attack Detection in Cloud Computing Based on Ensemble Feature Selection and Deep Learning

    Yousef Sanjalawe1,2,*, Turke Althobaiti3,4

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3571-3588, 2023, DOI:10.32604/cmc.2023.037386

    Abstract Intrusion Detection System (IDS) in the cloud Computing (CC) environment has received paramount interest over the last few years. Among the latest approaches, Deep Learning (DL)-based IDS methods allow the discovery of attacks with the highest performance. In the CC environment, Distributed Denial of Service (DDoS) attacks are widespread. The cloud services will be rendered unavailable to legitimate end-users as a consequence of the overwhelming network traffic, resulting in financial losses. Although various researchers have proposed many detection techniques, there are possible obstacles in terms of detection performance due to the use of insignificant traffic features. Therefore, in this paper,… More >

  • Open Access

    ARTICLE

    Variant Wasserstein Generative Adversarial Network Applied on Low Dose CT Image Denoising

    Anoud A. Mahmoud1,*, Hanaa A. Sayed2,3, Sara S. Mohamed1

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4535-4552, 2023, DOI:10.32604/cmc.2023.037087

    Abstract Computed Tomography (CT) images have been extensively employed in disease diagnosis and treatment, causing a huge concern over the dose of radiation to which patients are exposed. Increasing the radiation dose to get a better image may lead to the development of genetic disorders and cancer in the patients; on the other hand, decreasing it by using a Low-Dose CT (LDCT) image may cause more noise and increased artifacts, which can compromise the diagnosis. So, image reconstruction from LDCT image data is necessary to improve radiologists’ judgment and confidence. This study proposed three novel models for denoising LDCT images based… More >

  • Open Access

    ARTICLE

    Concept Drift Analysis and Malware Attack Detection System Using Secure Adaptive Windowing

    Emad Alsuwat1,*, Suhare Solaiman1, Hatim Alsuwat2

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3743-3759, 2023, DOI:10.32604/cmc.2023.035126

    Abstract Concept drift is a main security issue that has to be resolved since it presents a significant barrier to the deployment of machine learning (ML) models. Due to attackers’ (and/or benign equivalents’) dynamic behavior changes, testing data distribution frequently diverges from original training data over time, resulting in substantial model failures. Due to their dispersed and dynamic nature, distributed denial-of-service attacks pose a danger to cybersecurity, resulting in attacks with serious consequences for users and businesses. This paper proposes a novel design for concept drift analysis and detection of malware attacks like Distributed Denial of Service (DDOS) in the network.… More >

  • Open Access

    ARTICLE

    The effect of natural products combination on MCF-7 cells exceeds tamoxifen therapeutic dose effects in vitro

    ZEINAB KLAAB1, AZIZA HASSAN2, JAWAHER ALBAQAMI1, FAIZAH A. ALMALKI1,*

    BIOCELL, Vol.47, No.4, pp. 891-904, 2023, DOI:10.32604/biocell.2023.026556

    Abstract Cancer remains to be one of the most severe sicknesses globally. Cases have kept rising over the years. Breast cancer (BC), which is among the leading types of cancers and predominantly affects women, is the second leading cause of cancer mortality. Researchers have developed interventions over the years; however, the BC survival rate has not improved since the 1980s. This has created the need for novel drug interventions that would manage and treat BC more effectively. This study focused on using a combination of natural product extracts such as phytoestrogen (Ziziphus jujube) and Tannin nanoparticles (NP99) together, which we have… More >

Displaying 1-10 on page 1 of 79. Per Page  

Share Link