Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (51)
  • Open Access

    ARTICLE

    CNN Channel Attention Intrusion Detection System Using NSL-KDD Dataset

    Fatma S. Alrayes1, Mohammed Zakariah2, Syed Umar Amin3,*, Zafar Iqbal Khan3, Jehad Saad Alqurni4

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4319-4347, 2024, DOI:10.32604/cmc.2024.050586

    Abstract Intrusion detection systems (IDS) are essential in the field of cybersecurity because they protect networks from a wide range of online threats. The goal of this research is to meet the urgent need for small-footprint, highly-adaptable Network Intrusion Detection Systems (NIDS) that can identify anomalies. The NSL-KDD dataset is used in the study; it is a sizable collection comprising 43 variables with the label’s “attack” and “level.” It proposes a novel approach to intrusion detection based on the combination of channel attention and convolutional neural networks (CNN). Furthermore, this dataset makes it easier to conduct… More >

  • Open Access

    ARTICLE

    Scientific Elegance in NIDS: Unveiling Cardinality Reduction, Box-Cox Transformation, and ADASYN for Enhanced Intrusion Detection

    Amerah Alabrah*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3897-3912, 2024, DOI:10.32604/cmc.2024.048528

    Abstract The emergence of digital networks and the wide adoption of information on internet platforms have given rise to threats against users’ private information. Many intruders actively seek such private data either for sale or other inappropriate purposes. Similarly, national and international organizations have country-level and company-level private information that could be accessed by different network attacks. Therefore, the need for a Network Intruder Detection System (NIDS) becomes essential for protecting these networks and organizations. In the evolution of NIDS, Artificial Intelligence (AI) assisted tools and methods have been widely adopted to provide effective solutions. However,… More >

  • Open Access

    ARTICLE

    Correlation Composition Awareness Model with Pair Collaborative Localization for IoT Authentication and Localization

    Kranthi Alluri, S. Gopikrishnan*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 943-961, 2024, DOI:10.32604/cmc.2024.048621

    Abstract Secure authentication and accurate localization among Internet of Things (IoT) sensors are pivotal for the functionality and integrity of IoT networks. IoT authentication and localization are intricate and symbiotic, impacting both the security and operational functionality of IoT systems. Hence, accurate localization and lightweight authentication on resource-constrained IoT devices pose several challenges. To overcome these challenges, recent approaches have used encryption techniques with well-known key infrastructures. However, these methods are inefficient due to the increasing number of data breaches in their localization approaches. This proposed research efficiently integrates authentication and localization processes in such a… More >

  • Open Access

    ARTICLE

    A Web Application Fingerprint Recognition Method Based on Machine Learning

    Yanmei Shi1, Wei Yu2,*, Yanxia Zhao3,*, Yungang Jia4

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 887-906, 2024, DOI:10.32604/cmes.2024.046140

    Abstract Web application fingerprint recognition is an effective security technology designed to identify and classify web applications, thereby enhancing the detection of potential threats and attacks. Traditional fingerprint recognition methods, which rely on preannotated feature matching, face inherent limitations due to the ever-evolving nature and diverse landscape of web applications. In response to these challenges, this work proposes an innovative web application fingerprint recognition method founded on clustering techniques. The method involves extensive data collection from the Tranco List, employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction. The core… More >

  • Open Access

    ARTICLE

    Applying an Improved Dung Beetle Optimizer Algorithm to Network Traffic Identification

    Qinyue Wu, Hui Xu*, Mengran Liu

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4091-4107, 2024, DOI:10.32604/cmc.2024.048461

    Abstract Network traffic identification is critical for maintaining network security and further meeting various demands of network applications. However, network traffic data typically possesses high dimensionality and complexity, leading to practical problems in traffic identification data analytics. Since the original Dung Beetle Optimizer (DBO) algorithm, Grey Wolf Optimization (GWO) algorithm, Whale Optimization Algorithm (WOA), and Particle Swarm Optimization (PSO) algorithm have the shortcomings of slow convergence and easily fall into the local optimal solution, an Improved Dung Beetle Optimizer (IDBO) algorithm is proposed for network traffic identification. Firstly, the Sobol sequence is utilized to initialize the… More >

  • Open Access

    ARTICLE

    A Security Trade-Off Scheme of Anomaly Detection System in IoT to Defend against Data-Tampering Attacks

    Bing Liu1, Zhe Zhang1, Shengrong Hu2, Song Sun3,*, Dapeng Liu4, Zhenyu Qiu5

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4049-4069, 2024, DOI:10.32604/cmc.2024.048099

    Abstract Internet of Things (IoT) is vulnerable to data-tampering (DT) attacks. Due to resource limitations, many anomaly detection systems (ADSs) for IoT have high false positive rates when detecting DT attacks. This leads to the misreporting of normal data, which will impact the normal operation of IoT. To mitigate the impact caused by the high false positive rate of ADS, this paper proposes an ADS management scheme for clustered IoT. First, we model the data transmission and anomaly detection in clustered IoT. Then, the operation strategy of the clustered IoT is formulated as the running probabilities… More >

  • Open Access

    ARTICLE

    Strengthening Network Security: Deep Learning Models for Intrusion Detection with Optimized Feature Subset and Effective Imbalance Handling

    Bayi Xu1, Lei Sun2,*, Xiuqing Mao2, Chengwei Liu3, Zhiyi Ding2

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1995-2022, 2024, DOI:10.32604/cmc.2023.046478

    Abstract In recent years, frequent network attacks have highlighted the importance of efficient detection methods for ensuring cyberspace security. This paper presents a novel intrusion detection system consisting of a data preprocessing stage and a deep learning model for accurately identifying network attacks. We have proposed four deep neural network models, which are constructed using architectures such as Convolutional Neural Networks (CNN), Bi-directional Long Short-Term Memory (BiLSTM), Bidirectional Gate Recurrent Unit (BiGRU), and Attention mechanism. These models have been evaluated for their detection performance on the NSL-KDD dataset.To enhance the compatibility between the data and the More >

  • Open Access

    ARTICLE

    Application Research on Two-Layer Threat Prediction Model Based on Event Graph

    Shuqin Zhang, Xinyu Su*, Yunfei Han, Tianhui Du, Peiyu Shi

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3993-4023, 2023, DOI:10.32604/cmc.2023.044526

    Abstract Advanced Persistent Threat (APT) is now the most common network assault. However, the existing threat analysis models cannot simultaneously predict the macro-development trend and micro-propagation path of APT attacks. They cannot provide rapid and accurate early warning and decision responses to the present system state because they are inadequate at deducing the risk evolution rules of network threats. To address the above problems, firstly, this paper constructs the multi-source threat element analysis ontology (MTEAO) by integrating multi-source network security knowledge bases. Subsequently, based on MTEAO, we propose a two-layer threat prediction model (TL-TPM) that combines… More >

  • Open Access

    ARTICLE

    Empirical Analysis of Neural Networks-Based Models for Phishing Website Classification Using Diverse Datasets

    Shoaib Khan, Bilal Khan, Saifullah Jan*, Subhan Ullah, Aiman

    Journal of Cyber Security, Vol.5, pp. 47-66, 2023, DOI:10.32604/jcs.2023.045579

    Abstract Phishing attacks pose a significant security threat by masquerading as trustworthy entities to steal sensitive information, a problem that persists despite user awareness. This study addresses the pressing issue of phishing attacks on websites and assesses the performance of three prominent Machine Learning (ML) models—Artificial Neural Networks (ANN), Convolutional Neural Networks (CNN), and Long Short-Term Memory (LSTM)—utilizing authentic datasets sourced from Kaggle and Mendeley repositories. Extensive experimentation and analysis reveal that the CNN model achieves a better accuracy of 98%. On the other hand, LSTM shows the lowest accuracy of 96%. These findings underscore the More >

  • Open Access

    ARTICLE

    Enhancement of UAV Data Security and Privacy via Ethereum Blockchain Technology

    Sur Singh Rawat1,*, Youseef Alotaibi2, Nitima Malsa1, Vimal Gupta1

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1797-1815, 2023, DOI:10.32604/cmc.2023.039381

    Abstract Unmanned aerial vehicles (UAVs), or drones, have revolutionized a wide range of industries, including monitoring, agriculture, surveillance, and supply chain. However, their widespread use also poses significant challenges, such as public safety, privacy, and cybersecurity. Cyberattacks, targeting UAVs have become more frequent, which highlights the need for robust security solutions. Blockchain technology, the foundation of cryptocurrencies has the potential to address these challenges. This study suggests a platform that utilizes blockchain technology to manage drone operations securely and confidentially. By incorporating blockchain technology, the proposed method aims to increase the security and privacy of drone… More >

Displaying 1-10 on page 1 of 51. Per Page