Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (183)
  • Open Access

    ARTICLE

    Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network

    Abdallah Elhigazi Abdallah1, Mosab Hamdan2, Shukor Abd Razak3, Fuad A. Ghalib3, Muzaffar Hamzah2,*, Suleman Khan4, Siddiq Ahmed Babikir Ali5, Mutaz H. H. Khairi1, Sayeed Salih6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5607-5623, 2023, DOI:10.32604/cmc.2023.031047 - 28 December 2022

    Abstract IEEE 802.11 Wi-Fi networks are prone to many denial of service (DoS) attacks due to vulnerabilities at the media access control (MAC) layer of the 802.11 protocol. Due to the data transmission nature of the wireless local area network (WLAN) through radio waves, its communication is exposed to the possibility of being attacked by illegitimate users. Moreover, the security design of the wireless structure is vulnerable to versatile attacks. For example, the attacker can imitate genuine features, rendering classification-based methods inaccurate in differentiating between real and false messages. Although many security standards have been proposed… More >

  • Open Access

    ARTICLE

    A Novel Framework for DDoS Attacks Detection Using Hybrid LSTM Techniques

    Anitha Thangasamy*, Bose Sundan, Logeswari Govindaraj

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2553-2567, 2023, DOI:10.32604/csse.2023.032078 - 21 December 2022

    Abstract The recent development of cloud computing offers various services on demand for organization and individual users, such as storage, shared computing space, networking, etc. Although Cloud Computing provides various advantages for users, it remains vulnerable to many types of attacks that attract cyber criminals. Distributed Denial of Service (DDoS) is the most common type of attack on cloud computing. Consequently, Cloud computing professionals and security experts have focused on the growth of preventive processes towards DDoS attacks. Since DDoS attacks have become increasingly widespread, it becomes difficult for some DDoS attack methods based on individual… More >

  • Open Access

    ARTICLE

    RMCARTAM For DDoS Attack Mitigation in SDN Using Machine Learning

    M. Revathi, V. V. Ramalingam*, B. Amutha

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3023-3036, 2023, DOI:10.32604/csse.2023.033600 - 21 December 2022

    Abstract The impact of a Distributed Denial of Service (DDoS) attack on Software Defined Networks (SDN) is briefly analyzed. Many approaches to detecting DDoS attacks exist, varying on the feature being considered and the method used. Still, the methods have a deficiency in the performance of detecting DDoS attacks and mitigating them. To improve the performance of SDN, an efficient Real-time Multi-Constrained Adaptive Replication and Traffic Approximation Model (RMCARTAM) is sketched in this article. The RMCARTAM considers different parameters or constraints in running different controllers responsible for handling incoming packets. The model is designed with multiple… More >

  • Open Access

    ARTICLE

    DoS Attack Detection Based on Deep Factorization Machine in SDN

    Jing Wang1, Xiangyu Lei1, Qisheng Jiang1, Osama Alfarraj2, Amr Tolba2, Gwang-jun Kim3,*

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1727-1742, 2023, DOI:10.32604/csse.2023.030183 - 03 November 2022

    Abstract Software-Defined Network (SDN) decouples the control plane of network devices from the data plane. While alleviating the problems presented in traditional network architectures, it also brings potential security risks, particularly network Denial-of-Service (DoS) attacks. While many research efforts have been devoted to identifying new features for DoS attack detection, detection methods are less accurate in detecting DoS attacks against client hosts due to the high stealth of such attacks. To solve this problem, a new method of DoS attack detection based on Deep Factorization Machine (DeepFM) is proposed in SDN. Firstly, we select the Growth… More >

  • Open Access

    ARTICLE

    Optimization of the Plugging Agent Dosage for High Temperature Salt Profile Control in Heavy Oil Reservoirs

    Jiayu Ruan1, Mingjing Lu2,3, Wei Zhang4, Yuxi Zhang1, Yuhui Zhou1,*, Jie Gong1, Fan Wang1, Yuanxiao Guan1

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.2, pp. 421-436, 2023, DOI:10.32604/fdmp.2022.020665 - 29 August 2022

    Abstract After steam discharge in heavy oil reservoirs, the distribution of temperature, pressure, and permeability in different wells becomes irregular. Flow channels can easily be produced, which affect the sweep efficiency of the oil displacement. Previous studies have shown that the salting-out plugging method can effectively block these channels in high-temperature reservoirs, improve the suction profile, and increase oil production. In the present study, the optimal dosage of the plugging agent is determined taking into account connection transmissibility and inter-well volumes. Together with the connectivity model, a water flooding simulation model is introduced. Moreover, a non-gradient More >

  • Open Access

    ARTICLE

    A Quasi-Newton Neural Network Based Efficient Intrusion Detection System for Wireless Sensor Network

    A. Gautami1,*, J. Shanthini2, S. Karthik3

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 427-443, 2023, DOI:10.32604/csse.2023.026688 - 16 August 2022

    Abstract In Wireless Sensor Networks (WSN), attacks mostly aim in limiting or eliminating the capability of the network to do its normal function. Detecting this misbehaviour is a demanding issue. And so far the prevailing research methods show poor performance. AQN3 centred efficient Intrusion Detection Systems (IDS) is proposed in WSN to ameliorate the performance. The proposed system encompasses Data Gathering (DG) in WSN as well as Intrusion Detection (ID) phases. In DG, the Sensor Nodes (SN) is formed as clusters in the WSN and the Distance-based Fruit Fly Fuzzy c-means (DFFF) algorithm chooses the Cluster… More >

  • Open Access

    ARTICLE

    Progressive Transfer Learning-based Deep Q Network for DDOS Defence in WSN

    S. Rameshkumar1,*, R. Ganesan2, A. Merline1

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2379-2394, 2023, DOI:10.32604/csse.2023.027910 - 01 August 2022

    Abstract In The Wireless Multimedia Sensor Network (WNSMs) have achieved popularity among diverse communities as a result of technological breakthroughs in sensor and current gadgets. By utilising portable technologies, it achieves solid and significant results in wireless communication, media transfer, and digital transmission. Sensor nodes have been used in agriculture and industry to detect characteristics such as temperature, moisture content, and other environmental conditions in recent decades. WNSMs have also made apps easier to use by giving devices self-governing access to send and process data connected with appropriate audio and video information. Many video sensor network… More >

  • Open Access

    ARTICLE

    Iterative Dichotomiser Posteriori Method Based Service Attack Detection in Cloud Computing

    B. Dhiyanesh1,*, K. Karthick2, R. Radha3, Anita Venaik4

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1099-1107, 2023, DOI:10.32604/csse.2023.024691 - 15 June 2022

    Abstract Cloud computing (CC) is an advanced technology that provides access to predictive resources and data sharing. The cloud environment represents the right type regarding cloud usage model ownership, size, and rights to access. It introduces the scope and nature of cloud computing. In recent times, all processes are fed into the system for which consumer data and cache size are required. One of the most security issues in the cloud environment is Distributed Denial of Service (DDoS) attacks, responsible for cloud server overloading. This proposed system ID3 (Iterative Dichotomiser 3) Maximum Multifactor Dimensionality Posteriori Method… More >

  • Open Access

    ARTICLE

    Detecting and Preventing of Attacks in Cloud Computing Using Hybrid Algorithm

    R. S. Aashmi1, T. Jaya2,*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 79-95, 2023, DOI:10.32604/iasc.2023.024291 - 06 June 2022

    Abstract

    Cloud computing is the technology that is currently used to provide users with infrastructure, platform, and software services effectively. Under this system, Platform as a Service (PaaS) offers a medium headed for a web development platform that uniformly distributes the requests and resources. Hackers using Denial of service (DoS) and Distributed Denial of Service (DDoS) attacks abruptly interrupt these requests. Even though several existing methods like signature-based, statistical anomaly-based, and stateful protocol analysis are available, they are not sufficient enough to get rid of Denial of service (DoS) and Distributed Denial of Service (DDoS) attacks

    More >

  • Open Access

    ARTICLE

    Evidence-Based Federated Learning for Set-Valued Classification of Industrial IoT DDos Attack Traffic

    Jiale Cheng1, Zilong Jin1,2,*

    Journal on Internet of Things, Vol.4, No.3, pp. 183-195, 2022, DOI:10.32604/jiot.2022.042054 - 12 June 2023

    Abstract A novel Federated learning classifier is proposed using the Dempster-Shafer (DS) theory for the set-valued classification of industrial IoT Distributed Denial of Service (DDoS) attack traffic. The proposed classifier, referred to as the evidence-based federated learning classifier, employs convolution and pooling layers to extract high-dimensional features of Distributed Denial of Service (DDoS) traffic from the local data of private industrial clients. The characteristics obtained from the various participants are transformed into mass functions and amalgamated utilizing Dempster’s rule within the DS layer, situated on the federated server. Lastly, the set value classification task of attack More >

Displaying 71-80 on page 8 of 183. Per Page