Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (20)
  • Open Access

    ARTICLE

    Detection of Real-Time Distributed Denial-of-Service (DDoS) Attacks on Internet of Things (IoT) Networks Using Machine Learning Algorithms

    Zaed Mahdi1,*, Nada Abdalhussien2, Naba Mahmood1, Rana Zaki3,*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2139-2159, 2024, DOI:10.32604/cmc.2024.053542 - 15 August 2024

    Abstract The primary concern of modern technology is cyber attacks targeting the Internet of Things. As it is one of the most widely used networks today and vulnerable to attacks. Real-time threats pose with modern cyber attacks that pose a great danger to the Internet of Things (IoT) networks, as devices can be monitored or service isolated from them and affect users in one way or another. Securing Internet of Things networks is an important matter, as it requires the use of modern technologies and methods, and real and up-to-date data to design and train systems… More >

  • Open Access

    ARTICLE

    Adaptive Cloud Intrusion Detection System Based on Pruned Exact Linear Time Technique

    Widad Elbakri1, Maheyzah Md. Siraj1,*, Bander Ali Saleh Al-rimy1, Sultan Noman Qasem2, Tawfik Al-Hadhrami3

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3725-3756, 2024, DOI:10.32604/cmc.2024.048105 - 20 June 2024

    Abstract Cloud computing environments, characterized by dynamic scaling, distributed architectures, and complex workloads, are increasingly targeted by malicious actors. These threats encompass unauthorized access, data breaches, denial-of-service attacks, and evolving malware variants. Traditional security solutions often struggle with the dynamic nature of cloud environments, highlighting the need for robust Adaptive Cloud Intrusion Detection Systems (CIDS). Existing adaptive CIDS solutions, while offering improved detection capabilities, often face limitations such as reliance on approximations for change point detection, hindering their precision in identifying anomalies. This can lead to missed attacks or an abundance of false alarms, impacting overall… More >

  • Open Access

    ARTICLE

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

    Laila M. Halman, Mohammed J. F. Alenazi*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1469-1483, 2024, DOI:10.32604/cmes.2023.028077 - 17 November 2023

    Abstract The healthcare sector holds valuable and sensitive data. The amount of this data and the need to handle, exchange, and protect it, has been increasing at a fast pace. Due to their nature, software-defined networks (SDNs) are widely used in healthcare systems, as they ensure effective resource utilization, safety, great network management, and monitoring. In this sector, due to the value of the data, SDNs face a major challenge posed by a wide range of attacks, such as distributed denial of service (DDoS) and probe attacks. These attacks reduce network performance, causing the degradation of… More > Graphic Abstract

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

  • Open Access

    ARTICLE

    Detecting and Mitigating DDOS Attacks in SDNs Using Deep Neural Network

    Gul Nawaz1, Muhammad Junaid1, Adnan Akhunzada2, Abdullah Gani2,*, Shamyla Nawazish3, Asim Yaqub3, Adeel Ahmed1, Huma Ajab4

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2157-2178, 2023, DOI:10.32604/cmc.2023.026952 - 29 November 2023

    Abstract Distributed denial of service (DDoS) attack is the most common attack that obstructs a network and makes it unavailable for a legitimate user. We proposed a deep neural network (DNN) model for the detection of DDoS attacks in the Software-Defined Networking (SDN) paradigm. SDN centralizes the control plane and separates it from the data plane. It simplifies a network and eliminates vendor specification of a device. Because of this open nature and centralized control, SDN can easily become a victim of DDoS attacks. We proposed a supervised Developed Deep Neural Network (DDNN) model that can… More >

  • Open Access

    ARTICLE

    Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks

    Shadi Al-Sarawi1, Mohammed Anbar1,*, Basim Ahmad Alabsi2, Mohammad Adnan Aladaileh3, Shaza Dawood Ahmed Rihan2

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 491-515, 2023, DOI:10.32604/cmc.2023.041108 - 31 October 2023

    Abstract The Internet of Things (IoT) consists of interconnected smart devices communicating and collecting data. The Routing Protocol for Low-Power and Lossy Networks (RPL) is the standard protocol for Internet Protocol Version 6 (IPv6) in the IoT. However, RPL is vulnerable to various attacks, including the sinkhole attack, which disrupts the network by manipulating routing information. This paper proposes the Unweighted Voting Method (UVM) for sinkhole node identification, utilizing three key behavioral indicators: DODAG Information Object (DIO) Transaction Frequency, Rank Harmony, and Power Consumption. These indicators have been carefully selected based on their contribution to sinkhole… More >

  • Open Access

    ARTICLE

    A Machine Learning-Based Distributed Denial of Service Detection Approach for Early Warning in Internet Exchange Points

    Salem Alhayani*, Diane R. Murphy

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2235-2259, 2023, DOI:10.32604/cmc.2023.038003 - 30 August 2023

    Abstract The Internet service provider (ISP) is the heart of any country’s Internet infrastructure and plays an important role in connecting to the World Wide Web. Internet exchange point (IXP) allows the interconnection of two or more separate network infrastructures. All Internet traffic entering a country should pass through its IXP. Thus, it is an ideal location for performing malicious traffic analysis. Distributed denial of service (DDoS) attacks are becoming a more serious daily threat. Malicious actors in DDoS attacks control numerous infected machines known as botnets. Botnets are used to send numerous fake requests to… More >

  • Open Access

    ARTICLE

    Toward Secure Software-Defined Networks Using Machine Learning: A Review, Research Challenges, and Future Directions

    Muhammad Waqas Nadeem1,*, Hock Guan Goh1, Yichiet Aun1, Vasaki Ponnusamy2

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2201-2217, 2023, DOI:10.32604/csse.2023.039893 - 28 July 2023

    Abstract Over the past few years, rapid advancements in the internet and communication technologies have led to increasingly intricate and diverse networking systems. As a result, greater intelligence is necessary to effectively manage, optimize, and maintain these systems. Due to their distributed nature, machine learning models are challenging to deploy in traditional networks. However, Software-Defined Networking (SDN) presents an opportunity to integrate intelligence into networks by offering a programmable architecture that separates data and control planes. SDN provides a centralized network view and allows for dynamic updates of flow rules and software-based traffic analysis. While the… More >

  • Open Access

    ARTICLE

    Adaptive Butterfly Optimization Algorithm (ABOA) Based Feature Selection and Deep Neural Network (DNN) for Detection of Distributed Denial-of-Service (DDoS) Attacks in Cloud

    S. Sureshkumar1,*, G .K. D. Prasanna Venkatesan2, R. Santhosh3

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1109-1123, 2023, DOI:10.32604/csse.2023.036267 - 26 May 2023

    Abstract Cloud computing technology provides flexible, on-demand, and completely controlled computing resources and services are highly desirable. Despite this, with its distributed and dynamic nature and shortcomings in virtualization deployment, the cloud environment is exposed to a wide variety of cyber-attacks and security difficulties. The Intrusion Detection System (IDS) is a specialized security tool that network professionals use for the safety and security of the networks against attacks launched from various sources. DDoS attacks are becoming more frequent and powerful, and their attack pathways are continually changing, which requiring the development of new detection methods. Here… More >

  • Open Access

    ARTICLE

    DDoS Attack Detection in Cloud Computing Based on Ensemble Feature Selection and Deep Learning

    Yousef Sanjalawe1,2,*, Turke Althobaiti3,4

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3571-3588, 2023, DOI:10.32604/cmc.2023.037386 - 31 March 2023

    Abstract Intrusion Detection System (IDS) in the cloud Computing (CC) environment has received paramount interest over the last few years. Among the latest approaches, Deep Learning (DL)-based IDS methods allow the discovery of attacks with the highest performance. In the CC environment, Distributed Denial of Service (DDoS) attacks are widespread. The cloud services will be rendered unavailable to legitimate end-users as a consequence of the overwhelming network traffic, resulting in financial losses. Although various researchers have proposed many detection techniques, there are possible obstacles in terms of detection performance due to the use of insignificant traffic… More >

  • Open Access

    ARTICLE

    A Novel Framework for DDoS Attacks Detection Using Hybrid LSTM Techniques

    Anitha Thangasamy*, Bose Sundan, Logeswari Govindaraj

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2553-2567, 2023, DOI:10.32604/csse.2023.032078 - 21 December 2022

    Abstract The recent development of cloud computing offers various services on demand for organization and individual users, such as storage, shared computing space, networking, etc. Although Cloud Computing provides various advantages for users, it remains vulnerable to many types of attacks that attract cyber criminals. Distributed Denial of Service (DDoS) is the most common type of attack on cloud computing. Consequently, Cloud computing professionals and security experts have focused on the growth of preventive processes towards DDoS attacks. Since DDoS attacks have become increasingly widespread, it becomes difficult for some DDoS attack methods based on individual… More >

Displaying 1-10 on page 1 of 20. Per Page