Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (74)
  • Open Access

    ARTICLE

    Enhanced DDoS Detection Using Advanced Machine Learning and Ensemble Techniques in Software Defined Networking

    Hira Akhtar Butt1, Khoula Said Al Harthy2, Mumtaz Ali Shah3, Mudassar Hussain2,*, Rashid Amin4,*, Mujeeb Ur Rehman1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3003-3031, 2024, DOI:10.32604/cmc.2024.057185 - 18 November 2024

    Abstract Detecting sophisticated cyberattacks, mainly Distributed Denial of Service (DDoS) attacks, with unexpected patterns remains challenging in modern networks. Traditional detection systems often struggle to mitigate such attacks in conventional and software-defined networking (SDN) environments. While Machine Learning (ML) models can distinguish between benign and malicious traffic, their limited feature scope hinders the detection of new zero-day or low-rate DDoS attacks requiring frequent retraining. In this paper, we propose a novel DDoS detection framework that combines Machine Learning (ML) and Ensemble Learning (EL) techniques to improve DDoS attack detection and mitigation in SDN environments. Our model… More >

  • Open Access

    ARTICLE

    Dynamic Networking Method of Vehicles in VANET

    Qingkun Chen, Qinmu Wu*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1301-1318, 2024, DOI:10.32604/cmc.2024.054799 - 15 October 2024

    Abstract Vehicular Ad-hoc Networks (VANETs) make it easy to transfer information between vehicles, and this feature is utilized to enable collaborative decision-making between vehicles to enhance the safety, economy, and entertainment of vehicle operation. The high mobility of vehicles leads to a time-varying topology between vehicles, which makes inter-vehicle information transfer challenging in terms of delay control and ensuring the stability of collaborative decision-making among vehicles. The clustering algorithm is a method aimed at improving the efficiency of VANET communication. Currently, most of the research based on this method focuses on maintaining the stability of vehicle… More >

  • Open Access

    ARTICLE

    Examining the Quality Metrics of a Communication Network with Distributed Software-Defined Networking Architecture

    Khawaja Tahir Mehmood1,2,*, Shahid Atiq1, Intisar Ali Sajjad3, Muhammad Majid Hussain4, Malik M. Abdul Basit2

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1673-1708, 2024, DOI:10.32604/cmes.2024.053903 - 27 September 2024

    Abstract Software-Defined Networking (SDN), with segregated data and control planes, provides faster data routing, stability, and enhanced quality metrics, such as throughput (Th), maximum available bandwidth (Bd(max)), data transfer (DTransfer), and reduction in end-to-end delay (D(E-E)). This paper explores the critical work of deploying SDN in large­scale Data Center Networks (DCNs) to enhance its Quality of Service (QoS) parameters, using logically distributed control configurations. There is a noticeable increase in Delay(E-E) when adopting SDN with a unified (single) control structure in big DCNs to handle Hypertext Transfer Protocol (HTTP) requests causing a reduction in network quality parameters (Bd(max), Th, DTransfer, D(E-E),… More > Graphic Abstract

    Examining the Quality Metrics of a Communication Network with Distributed Software-Defined Networking Architecture

  • Open Access

    ARTICLE

    Network Traffic Synthesis and Simulation Framework for Cybersecurity Exercise Systems

    Dong-Wook Kim1, Gun-Yoon Sin2, Kwangsoo Kim3, Jaesik Kang3, Sun-Young Im3, Myung-Mook Han1,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3637-3653, 2024, DOI:10.32604/cmc.2024.054108 - 12 September 2024

    Abstract In the rapidly evolving field of cybersecurity, the challenge of providing realistic exercise scenarios that accurately mimic real-world threats has become increasingly critical. Traditional methods often fall short in capturing the dynamic and complex nature of modern cyber threats. To address this gap, we propose a comprehensive framework designed to create authentic network environments tailored for cybersecurity exercise systems. Our framework leverages advanced simulation techniques to generate scenarios that mirror actual network conditions faced by professionals in the field. The cornerstone of our approach is the use of a conditional tabular generative adversarial network (CTGAN),… More >

  • Open Access

    ARTICLE

    Information Centric Networking Based Cooperative Caching Framework for 5G Communication Systems

    R. Mahaveerakannan1, Thanarajan Tamilvizhi2,*, Sonia Jenifer Rayen3, Osamah Ibrahim Khalaf4, Habib Hamam5,6,7,8

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3945-3966, 2024, DOI:10.32604/cmc.2024.051611 - 12 September 2024

    Abstract The demands on conventional communication networks are increasing rapidly because of the exponential expansion of connected multimedia content. In light of the data-centric aspect of contemporary communication, the information-centric network (ICN) paradigm offers hope for a solution by emphasizing content retrieval by name instead of location. If 5G networks are to meet the expected data demand surge from expanded connectivity and Internet of Things (IoT) devices, then effective caching solutions will be required to maximize network throughput and minimize the use of resources. Hence, an ICN-based Cooperative Caching (ICN-CoC) technique has been used to select… More >

  • Open Access

    REVIEW

    Open-Source Software Defined Networking Controllers: State-of-the-Art, Challenges and Solutions for Future Network Providers

    Johari Abdul Rahim1, Rosdiadee Nordin2,*, Oluwatosin Ahmed Amodu3,4

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 747-800, 2024, DOI:10.32604/cmc.2024.047009 - 18 July 2024

    Abstract Software Defined Networking (SDN) is programmable by separation of forwarding control through the centralization of the controller. The controller plays the role of the ‘brain’ that dictates the intelligent part of SDN technology. Various versions of SDN controllers exist as a response to the diverse demands and functions expected of them. There are several SDN controllers available in the open market besides a large number of commercial controllers; some are developed to meet carrier-grade service levels and one of the recent trends in open-source SDN controllers is the Open Network Operating System (ONOS). This paper… More >

  • Open Access

    ARTICLE

    Exploring the Reasons for Selfie-Taking and Selfie-Posting on Social Media with Its Effect on Psychological and Social Lives: A Study among Indian Youths

    Divya P. Vijayan1, Tokani Ghuhato1, Eslavath Rajkumar2,*, Allen Joshua George3, Romate John1, John Abraham4

    International Journal of Mental Health Promotion, Vol.26, No.5, pp. 389-398, 2024, DOI:10.32604/ijmhp.2024.023032 - 30 May 2024

    Abstract ‘Selfie’ taking was introduced to the common people by smartphones and has become a common practice across the globe in no time. With technological advancement and the popularity of smartphones, selfie-taking has grown rapidly within a short time. In light of the new trend set by the generation, this study aimed to explore reasons for selfie-taking and selfie-posting on social media and their effects on the social and psychological lives of young adults. A purposive sampling method was adopted to select 20 Indian citizens, between 18 and 24 years. The data were collected through semi-structured More >

  • Open Access

    ARTICLE

    The Social Networking Addiction Scale: Translation and Validation Study among Chinese College Students

    Siyuan Bi1, Junfeng Yuan1,2, Lin Luo1,2,3,*

    International Journal of Mental Health Promotion, Vol.26, No.1, pp. 51-60, 2024, DOI:10.32604/ijmhp.2023.041614 - 05 February 2024

    Abstract Purpose: The core component theory of addiction behavior provides a multidimensional theoretical model for measuring social networking addiction. Based on this theoretical model, the Social Networking Addiction Scale (SNAS) was developed. The aim of this study was to test the psychometric properties of the Chinese version of the SNAS (SNAS-C). Methods: This study used a sample of 3383 Chinese university students to conduct confirmatory factor analysis (CFA) to explore the structural validity of the SNAS-C. This study examined the Pearson correlations between the six subscales of the SNAS-C (i.e., salience, mood modification, tolerance, withdrawal symptoms,… More >

  • Open Access

    ARTICLE

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

    Laila M. Halman, Mohammed J. F. Alenazi*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1469-1483, 2024, DOI:10.32604/cmes.2023.028077 - 17 November 2023

    Abstract The healthcare sector holds valuable and sensitive data. The amount of this data and the need to handle, exchange, and protect it, has been increasing at a fast pace. Due to their nature, software-defined networks (SDNs) are widely used in healthcare systems, as they ensure effective resource utilization, safety, great network management, and monitoring. In this sector, due to the value of the data, SDNs face a major challenge posed by a wide range of attacks, such as distributed denial of service (DDoS) and probe attacks. These attacks reduce network performance, causing the degradation of… More > Graphic Abstract

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

  • Open Access

    ARTICLE

    Detecting and Mitigating DDOS Attacks in SDNs Using Deep Neural Network

    Gul Nawaz1, Muhammad Junaid1, Adnan Akhunzada2, Abdullah Gani2,*, Shamyla Nawazish3, Asim Yaqub3, Adeel Ahmed1, Huma Ajab4

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2157-2178, 2023, DOI:10.32604/cmc.2023.026952 - 29 November 2023

    Abstract Distributed denial of service (DDoS) attack is the most common attack that obstructs a network and makes it unavailable for a legitimate user. We proposed a deep neural network (DNN) model for the detection of DDoS attacks in the Software-Defined Networking (SDN) paradigm. SDN centralizes the control plane and separates it from the data plane. It simplifies a network and eliminates vendor specification of a device. Because of this open nature and centralized control, SDN can easily become a victim of DDoS attacks. We proposed a supervised Developed Deep Neural Network (DDNN) model that can… More >

Displaying 1-10 on page 1 of 74. Per Page