首页 > 最新文献

Transactions on Emerging Telecommunications Technologies最新文献

英文 中文
AI-Enhanced Signal Detection and Channel Estimation for Beyond 5G and 6G Wireless Networks 超5G和6G无线网络的ai增强信号检测和信道估计
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-12-02 DOI: 10.1002/ett.70306
Muhammad Yunis Daha, Bibin Babu, Rizwan Qureshi, Muhammad Usman Hadi

Integrating deep learning (DL) with massive multiple input multiple output (ma-MIMO) technology has provided a framework for designing new communication systems for next-generation technologies such as sixth-generation (6G) networks. However, due to huge transmitting and receiving antenna sizes, channel estimation and signal detection become a very challenging job at the receiver side. To address the channel estimation and signal detection problem in ma-MIMO systems, this paper presents two system frameworks by considering the two scenarios based on channel information at the receiver end. In scenario 1, the Channel matrix is unknown at the base station (BS), and to ensure accurate channel estimation, the pilot symbols are integrated with the transmitted symbol in the ma-MIMO systems. Based on Scenario 1, this paper proposes an optimized pilot-assisted feedforward network for channel estimation called FF-PCNet in the ma-MIMO system. In scenario 2, the channel matrix is fully known at the BS and uses this exact information for signal detection in the ma-MIMO systems. Based on scenario 2, this paper proposes two methods for signal detection in ma-MIMO systems. The proposed method-1 is based on an optimized long short-term memory-based detection network called LSTM-DetNet, and method-2 is based on an optimized and customized feed-forward detection network called FF-DetNet for signal detection in the ma-MIMO systems. Numerical results show that, for channel estimation, the FF-PCNet performs excellently and achieves a 40.2% low average error per symbol compared to the benchmark traditional MIMO estimator known as least squares estimation (LSE). For signal detection, although method 1, known as LSTM-DetNet, achieves better performance than other benchmark MIMO detectors, yet unable to beat the AIDETECT MIMO detector. However, our second proposed method, known as FF-DetNet, not only achieves better SER performance ranging between 73.2% to 99.993% for both MIMO and ma-MIMO systems but has also been able to achieve much lower computational complexity compared to benchmark artificial intelligence (AI)-based MIMO detectors.

将深度学习(DL)与大规模多输入多输出(ma-MIMO)技术相结合,为第六代(6G)网络等下一代技术设计新的通信系统提供了框架。然而,由于发射和接收天线的巨大尺寸,信道估计和信号检测成为接收端非常具有挑战性的工作。为了解决ma-MIMO系统中的信道估计和信号检测问题,本文基于接收端信道信息,考虑了两种场景,提出了两种系统框架。在场景1中,基站(BS)的信道矩阵是未知的,为了保证准确的信道估计,在ma-MIMO系统中将导频符号与发射符号相结合。基于场景1,本文提出了一种优化的导频辅助前馈信道估计网络,称为FF-PCNet。在场景2中,信道矩阵在BS上是完全已知的,并在ma-MIMO系统中使用该精确信息进行信号检测。基于场景2,本文提出了两种多模多输出系统的信号检测方法。提出的方法1基于优化的长短期记忆检测网络LSTM-DetNet,方法2基于优化和定制的前馈检测网络FF-DetNet,用于ma-MIMO系统中的信号检测。数值结果表明,对于信道估计,FF-PCNet表现优异,与传统的MIMO估计器最小二乘估计(LSE)相比,每个符号的平均误差低40.2%。对于信号检测,虽然方法1(称为LSTM-DetNet)的性能优于其他基准MIMO检测器,但无法击败AIDETECT MIMO检测器。然而,我们提出的第二种方法,称为FF-DetNet,不仅在MIMO和ma-MIMO系统中实现了更好的SER性能,范围在73.2%至99.993%之间,而且与基于人工智能(AI)的基准MIMO检测器相比,还能够实现更低的计算复杂度。
{"title":"AI-Enhanced Signal Detection and Channel Estimation for Beyond 5G and 6G Wireless Networks","authors":"Muhammad Yunis Daha,&nbsp;Bibin Babu,&nbsp;Rizwan Qureshi,&nbsp;Muhammad Usman Hadi","doi":"10.1002/ett.70306","DOIUrl":"https://doi.org/10.1002/ett.70306","url":null,"abstract":"<p>Integrating deep learning (DL) with massive multiple input multiple output (ma-MIMO) technology has provided a framework for designing new communication systems for next-generation technologies such as sixth-generation (6G) networks. However, due to huge transmitting and receiving antenna sizes, channel estimation and signal detection become a very challenging job at the receiver side. To address the channel estimation and signal detection problem in ma-MIMO systems, this paper presents two system frameworks by considering the two scenarios based on channel information at the receiver end. In scenario 1, the Channel matrix <span></span><math></math> is unknown at the base station (BS), and to ensure accurate channel estimation, the pilot symbols are integrated with the transmitted symbol in the ma-MIMO systems. Based on Scenario 1, this paper proposes an optimized pilot-assisted feedforward network for channel estimation called FF-PCNet in the ma-MIMO system. In scenario 2, the channel matrix <span></span><math></math> is fully known at the BS and uses this exact information for signal detection in the ma-MIMO systems. Based on scenario 2, this paper proposes two methods for signal detection in ma-MIMO systems. The proposed method-1 is based on an optimized long short-term memory-based detection network called LSTM-DetNet, and method-2 is based on an optimized and customized feed-forward detection network called FF-DetNet for signal detection in the ma-MIMO systems. Numerical results show that, for channel estimation, the FF-PCNet performs excellently and achieves a 40.2% low average error per symbol compared to the benchmark traditional MIMO estimator known as least squares estimation (LSE). For signal detection, although method 1, known as LSTM-DetNet, achieves better performance than other benchmark MIMO detectors, yet unable to beat the AIDETECT MIMO detector. However, our second proposed method, known as FF-DetNet, not only achieves better SER performance ranging between 73.2% to 99.993% for both MIMO and ma-MIMO systems but has also been able to achieve much lower computational complexity compared to benchmark artificial intelligence (AI)-based MIMO detectors.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.70306","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145695119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction to “QDKFFHNet: Quantum Dilated Kronecker Feed Forward Harmonic Net for Intrusion Detection in IoT-Based Smart City Applications” 修正“QDKFFHNet:基于物联网的智慧城市应用中入侵检测的量子扩张Kronecker前馈谐波网”
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-12-01 DOI: 10.1002/ett.70316

S. Ravindran, and V. Sarveshwaran, “QDKFFHNet: Quantum Dilated Kronecker Feed Forward Harmonic Net for Intrusion Detection in IoT-Based Smart City Applications,” Transactions on Emerging Telecommunications Technologies 36 (2025): e70141, https://doi.org/10.1002/ett.70141.

The affiliation for the authors Selvam Ravindran and Velliangiri Sarveshwaran was incomplete. The complete affiliation is provided below

Selvam Ravindran, Velliangiri Sarveshwaran

Department of Computational Intelligence, School of Computing, College of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur Campus, Chengalpattu – 603203, Tamil Nadu, India

We apologize for this error.

S. Ravindran和V. Sarveshwaran,“QDKFFHNet:基于物联网的智慧城市应用中的量子膨胀Kronecker前馈谐波网络”,新兴电信技术学报36 (2025):e70141, https://doi.org/10.1002/ett.70141.The作者的联系不完整。完整的联系如下:selvam Ravindran, Velliangiri sarveshwaran,工程技术学院计算学院计算智能系,SRM科学技术研究所,Kattankulathur校区,Chengalpattu - 603203, Tamil Nadu, india .我们为这个错误道歉。
{"title":"Correction to “QDKFFHNet: Quantum Dilated Kronecker Feed Forward Harmonic Net for Intrusion Detection in IoT-Based Smart City Applications”","authors":"","doi":"10.1002/ett.70316","DOIUrl":"https://doi.org/10.1002/ett.70316","url":null,"abstract":"<p>S. Ravindran, and V. Sarveshwaran, “QDKFFHNet: Quantum Dilated Kronecker Feed Forward Harmonic Net for Intrusion Detection in IoT-Based Smart City Applications,” <i>Transactions on Emerging Telecommunications Technologies</i> 36 (2025): e70141, https://doi.org/10.1002/ett.70141.</p><p>The affiliation for the authors Selvam Ravindran and Velliangiri Sarveshwaran was incomplete. The complete affiliation is provided below</p><p>Selvam Ravindran, Velliangiri Sarveshwaran</p><p>Department of Computational Intelligence, School of Computing, College of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur Campus, Chengalpattu – 603203, Tamil Nadu, India</p><p>We apologize for this error.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.70316","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145695236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correlation Analysis of ADS-B Data Jump and UAV Positioning Error Combined With Data Mining Algorithm 结合数据挖掘算法的ADS-B数据跳变与无人机定位误差相关性分析
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-11-30 DOI: 10.1002/ett.70297
Wei Sun

Aiming at the problem that ADS-B (Automatic Dependent Surveillance Broadcast) data jump characteristics and multi-source heterogeneous errors are difficult to dynamically associate, this paper constructs a data mining framework that combines time series anomaly detection and multi-modal feature fusion. First, this paper performs missing value interpolation, time alignment and standardization preprocessing on the collected ADS-B data, energy status parameters, material environment parameters and flight environment information; secondly, based on the LSTM-AE (Long Short-Term Memory-Autoencoder) model, an unsupervised model for ADS-B data jump detection is constructed, which identifies the jump point by reconstructing the error and extracts jump features with physical significance. Finally, this paper introduces the Transformer architecture, cross-modally fuses the jump features with multi-source heterogeneous parameters, constructs a semantic alignment mechanism, and combines the error evolution modeling strategy to explore the complex influence mechanism of different factors on positioning errors. Experimental results show that the proposed method has better jump recognition accuracy (average 90.7%) and error prediction mean square error (average 5.81) than Isolation Forest and Variational Autoencoder (VAE), providing a new technical path for improving the positioning reliability and safety control of unmanned aerial vehicles (UAVs).

针对ADS-B (Automatic Dependent Surveillance Broadcast)数据跳跃特征与多源异构错误难以动态关联的问题,构建了时间序列异常检测与多模态特征融合相结合的数据挖掘框架。首先,对采集到的ADS-B数据、能量状态参数、材料环境参数和飞行环境信息进行缺失值插值、时间对准和标准化预处理;其次,基于LSTM-AE (Long - short - short记忆- autoencoder)模型,构建ADS-B数据跳变检测的无监督模型,通过重构误差识别跳变点,提取具有物理意义的跳变特征;最后,引入Transformer体系结构,跨模态融合多源异构参数的跳跃特征,构建语义对齐机制,结合误差演化建模策略,探索不同因素对定位误差的复杂影响机制。实验结果表明,该方法比隔离森林和变分自编码器(VAE)具有更好的跳位识别精度(平均90.7%)和误差预测均方误差(平均5.81),为提高无人机的定位可靠性和安全控制提供了新的技术路径。
{"title":"Correlation Analysis of ADS-B Data Jump and UAV Positioning Error Combined With Data Mining Algorithm","authors":"Wei Sun","doi":"10.1002/ett.70297","DOIUrl":"https://doi.org/10.1002/ett.70297","url":null,"abstract":"<div>\u0000 \u0000 <p>Aiming at the problem that ADS-B (Automatic Dependent Surveillance Broadcast) data jump characteristics and multi-source heterogeneous errors are difficult to dynamically associate, this paper constructs a data mining framework that combines time series anomaly detection and multi-modal feature fusion. First, this paper performs missing value interpolation, time alignment and standardization preprocessing on the collected ADS-B data, energy status parameters, material environment parameters and flight environment information; secondly, based on the LSTM-AE (Long Short-Term Memory-Autoencoder) model, an unsupervised model for ADS-B data jump detection is constructed, which identifies the jump point by reconstructing the error and extracts jump features with physical significance. Finally, this paper introduces the Transformer architecture, cross-modally fuses the jump features with multi-source heterogeneous parameters, constructs a semantic alignment mechanism, and combines the error evolution modeling strategy to explore the complex influence mechanism of different factors on positioning errors. Experimental results show that the proposed method has better jump recognition accuracy (average 90.7%) and error prediction mean square error (average 5.81) than Isolation Forest and Variational Autoencoder (VAE), providing a new technical path for improving the positioning reliability and safety control of unmanned aerial vehicles (UAVs).</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145695378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DSecNet: An Enhanced Cyber Security System for Authentication, Intrusion Detection, and Risk Level Prediction in Information Systems Using Weighted RBM Features-Based DeepCapsNet DSecNet:一种基于加权RBM特征的增强信息系统认证、入侵检测和风险等级预测的网络安全系统
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-11-27 DOI: 10.1002/ett.70298
R. Lakshman Naik, Sourabh Jain

The traditional cybersecurity solution cannot offer the necessary protection against all forms of cyberattacks for management systems since cyberattacks are of a scattered nature. Thus, an efficient security method is suggested in this work to prevent data loss from the information system using optimization and deep learning. The major aim of this work is to offer suitable recommendations for developing a cybersecurity decision support model for information systems with risk analysis and cybersecurity models. In the information system, the security threats are eliminated using this model. So, the authentication, prediction of the risk levels, and the mitigation of the security threats are regarded as the major objectives of this research work. From the CICIDS 2017 KNN dataset, UNSW-NB15 dataset, and NSL-KDD dataset, the data is collected. The collected data is given to the executed Deep Security Network (DSecNet). In the DSecNet, the Restricted Boltzmann Machine (RBM) is utilized to retrieve the features and then the extracted features from the RBM are fused with optimized weights, which are selected using the Enhanced Sandpiper Optimization Algorithm (ESOA). The obtained weighted features are further provided to the Deep Capsule Neural Network (DeepCapsNet). The implemented DSecNet is used for verifying the authentication of the user, detecting the intrusion, and determining the associated risk levels caused by the attacks on the information system. Once the threats are detected, the mitigation of the threat based on their risk level is carried out. The effectiveness of the proposed model is proven by the validation process. From the simulation outcomes, the accuracy rate of the developed model is 97.11% in the NSL-KDD dataset and 96.70% in the UNSW-NB15 dataset based on intrusion detection performance. Therefore, the efficacy of the developed security system is higher for the performance of the authentication, intrusion detection, and risk prediction, which elevates the security of the cyber networks.

传统的网络安全解决方案无法为管理系统提供必要的保护,防止各种形式的网络攻击,因为网络攻击具有分散的性质。因此,本文提出了一种利用优化和深度学习来防止信息系统数据丢失的有效安全方法。这项工作的主要目的是为开发具有风险分析和网络安全模型的信息系统的网络安全决策支持模型提供合适的建议。在信息系统中,利用该模型可以消除安全威胁。因此,验证、预测风险等级和缓解安全威胁是本研究的主要目标。从CICIDS 2017 KNN数据集、UNSW-NB15数据集和NSL-KDD数据集中收集数据。收集到的数据被提供给执行的深度安全网络(DSecNet)。在DSecNet中,利用受限玻尔兹曼机(Restricted Boltzmann Machine, RBM)检索特征,然后将提取的特征与优化权值进行融合,利用增强矶鹞优化算法(Enhanced Sandpiper Optimization Algorithm, ESOA)选择优化权值。得到的加权特征进一步提供给深度胶囊神经网络(DeepCapsNet)。实现的DSecNet用于验证用户的身份验证、检测入侵、判断信息系统受到攻击所带来的风险等级。一旦检测到威胁,就会根据威胁的风险级别来减轻威胁。验证过程证明了该模型的有效性。仿真结果表明,基于入侵检测性能,该模型在NSL-KDD数据集上的准确率为97.11%,在UNSW-NB15数据集上的准确率为96.70%。因此,所开发的安全系统在身份验证、入侵检测和风险预测等方面的效能更高,提高了网络的安全性。
{"title":"DSecNet: An Enhanced Cyber Security System for Authentication, Intrusion Detection, and Risk Level Prediction in Information Systems Using Weighted RBM Features-Based DeepCapsNet","authors":"R. Lakshman Naik,&nbsp;Sourabh Jain","doi":"10.1002/ett.70298","DOIUrl":"https://doi.org/10.1002/ett.70298","url":null,"abstract":"<div>\u0000 \u0000 <p>The traditional cybersecurity solution cannot offer the necessary protection against all forms of cyberattacks for management systems since cyberattacks are of a scattered nature. Thus, an efficient security method is suggested in this work to prevent data loss from the information system using optimization and deep learning. The major aim of this work is to offer suitable recommendations for developing a cybersecurity decision support model for information systems with risk analysis and cybersecurity models. In the information system, the security threats are eliminated using this model. So, the authentication, prediction of the risk levels, and the mitigation of the security threats are regarded as the major objectives of this research work. From the CICIDS 2017 KNN dataset, UNSW-NB15 dataset, and NSL-KDD dataset, the data is collected. The collected data is given to the executed Deep Security Network (DSecNet). In the DSecNet, the Restricted Boltzmann Machine (RBM) is utilized to retrieve the features and then the extracted features from the RBM are fused with optimized weights, which are selected using the Enhanced Sandpiper Optimization Algorithm (ESOA). The obtained weighted features are further provided to the Deep Capsule Neural Network (DeepCapsNet). The implemented DSecNet is used for verifying the authentication of the user, detecting the intrusion, and determining the associated risk levels caused by the attacks on the information system. Once the threats are detected, the mitigation of the threat based on their risk level is carried out. The effectiveness of the proposed model is proven by the validation process. From the simulation outcomes, the accuracy rate of the developed model is 97.11% in the NSL-KDD dataset and 96.70% in the UNSW-NB15 dataset based on intrusion detection performance. Therefore, the efficacy of the developed security system is higher for the performance of the authentication, intrusion detection, and risk prediction, which elevates the security of the cyber networks.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145626522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Bio-Inspired Combined Deep Learning Model for DDoS Attack Detection in Cloud: A Big Data Perspective 云中DDoS攻击检测的混合生物启发组合深度学习模型:大数据视角
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-11-25 DOI: 10.1002/ett.70300
Perumal Radhika, Somasundaram Kamalakkannan

One of the most prevalent attacks that cause significant harm and impair cloud performance is Distributed Denial of Service (DDoS). DDoS attacks pose a significant threat to cloud environments, degrading performance and disrupting services. To address this issue, we propose a hybrid bio-inspired deep learning model for DDoS attack detection that leverages big data analytics in the cloud. The proposed model incorporates a MapReduce framework to efficiently process large-scale network traffic data, extracting crucial features such as raw features, packet-based features, improved correlations, and statistical features. These extracted features are further refined using an improved recursive feature elimination (RFE) method, which selects the most relevant attributes for attack detection. The attack detection phase employs a hybrid classifier (HC) that integrates Long Short-Term Memory (LSTM) and Deep MaxOut (DMO) models. To ensure optimal performance, the weights of LSTM and DMO are fine-tuned using the White Shark Updated Remora Optimization (WSU-ROA), enhancing classification accuracy. The proposed HC + WSU-ROA model outperforms other methods, achieving the highest accuracy of 93.98%, compared to the other existing methods, demonstrating its superior effectiveness in DDoS attack detection.

分布式拒绝服务(DDoS)是造成重大伤害和损害云性能的最常见攻击之一。DDoS攻击对云环境造成严重威胁,会导致性能下降和业务中断。为了解决这个问题,我们提出了一种混合生物启发的深度学习模型,用于DDoS攻击检测,利用云中的大数据分析。该模型结合MapReduce框架有效地处理大规模网络流量数据,提取关键特征,如原始特征、基于数据包的特征、改进的相关性和统计特征。这些提取的特征使用改进的递归特征消除(RFE)方法进一步细化,该方法选择最相关的属性进行攻击检测。攻击检测阶段采用混合分类器(HC),该分类器集成了LSTM (Long - Short-Term Memory)和DMO (Deep MaxOut)模型。为了保证最优的性能,LSTM和DMO的权重使用了White Shark Updated Remora Optimization (WSU-ROA)进行微调,提高了分类精度。本文提出的HC + WSU-ROA模型优于其他方法,与其他现有方法相比,准确率最高,达到93.98%,证明了其在DDoS攻击检测中的优越性。
{"title":"Hybrid Bio-Inspired Combined Deep Learning Model for DDoS Attack Detection in Cloud: A Big Data Perspective","authors":"Perumal Radhika,&nbsp;Somasundaram Kamalakkannan","doi":"10.1002/ett.70300","DOIUrl":"https://doi.org/10.1002/ett.70300","url":null,"abstract":"<div>\u0000 \u0000 <p>One of the most prevalent attacks that cause significant harm and impair cloud performance is Distributed Denial of Service (DDoS). DDoS attacks pose a significant threat to cloud environments, degrading performance and disrupting services. To address this issue, we propose a hybrid bio-inspired deep learning model for DDoS attack detection that leverages big data analytics in the cloud. The proposed model incorporates a MapReduce framework to efficiently process large-scale network traffic data, extracting crucial features such as raw features, packet-based features, improved correlations, and statistical features. These extracted features are further refined using an improved recursive feature elimination (RFE) method, which selects the most relevant attributes for attack detection. The attack detection phase employs a hybrid classifier (HC) that integrates Long Short-Term Memory (LSTM) and Deep MaxOut (DMO) models. To ensure optimal performance, the weights of LSTM and DMO are fine-tuned using the White Shark Updated Remora Optimization (WSU-ROA), enhancing classification accuracy. The proposed HC + WSU-ROA model outperforms other methods, achieving the highest accuracy of 93.98%, compared to the other existing methods, demonstrating its superior effectiveness in DDoS attack detection.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145619032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RIS-Aided mmWave MIMO Channel Estimation Using Rotation-Invariant Coordinate Convolutional Neural Network and Compressive Sensing 基于旋转不变坐标卷积神经网络和压缩感知的ris辅助毫米波MIMO信道估计
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-11-23 DOI: 10.1002/ett.70289
Madhu Kumar Vanteru, Martin Margala, Sri Hari Nallamala, Prasun Chakrabarti

Channel State Information (CSI) is necessary for wireless systems supported by reconfigurable intelligent surfaces to regulate wireless channels and increase bandwidth along energy efficiency. In this paper, RIS-Aided mmWave MIMO Channel Estimation with Rotation-Invariant Coordinate Convolutional Neural Network and Compressive Sensing (RIS-MIMO-CE-RICCNN) is proposed. Reconfigurable Intelligent Surface (RIS) is utilized to estimate frequency-flat and frequency-selective cascaded channels with minimal overhead in multi-user millimeter wave big multiple inputs multiple outputs (MIMO) systems. The unique angle cascaded channels visible to different users have totally shared non-zero rows including user-specific column supports; it makes use of both the double-structured sparsity property of angular cascaded channel (ACC) matrices and the common sparsity property among the various subcarriers. Rotation-Invariant Coordinate Convolutional Neural Networks (RICCNN) is used to accurately detect channel supports. Then, channel estimation is done by Harbor Seal Whiskers Optimization Algorithm (HSWOA). The performance metrics like Signal to Noise Ratio (SNR), Normalized mean square error (NMSE), Bit error rate (BER), Peak-signal to noise ratio (PSNR), Computational complexity, Loss function, BER versus SNR and energy consumption are evaluated. The performance of the RIS-MIMO-CE-RICCNN technique is evaluated against existing methods. The RIS-MIMO-CE-RICCNN achieves 16.28%, 30.78% and 25.29% lower SNR, 15.08%, 20.58%, and 15.25% lower NMSE, 28.96%, 30.21%, and 23.89% lower BER, and 26.28%, 31.26%, 19.66% lower PSNR when compared to the existing models: RIS-assisted mmWave MIMO channel estimation utilizing deep learning with compressive sensing (RIS-MIMO-CE-CS), channel estimation for reconfigurable intelligent surface enabled multiple user mmWave MIMO systems (RIS-MIMO-CE-MU), Beam Pattern along Reflection Pattern Design of Channel Estimation in RIS-Assisted mmWave MIMO Schemes (BPRPD-CE-RIS-MIMO)respectively.

信道状态信息(CSI)对于可重构智能表面支持的无线系统来说是必要的,以调节无线信道并增加带宽和能效。提出了基于旋转不变坐标卷积神经网络和压缩感知的ris -MIMO辅助毫米波MIMO信道估计方法(RIS-MIMO-CE-RICCNN)。在多用户毫米波大多输入多输出(MIMO)系统中,利用可重构智能表面(RIS)以最小开销估计频率平坦和频率选择性级联信道。不同用户可见的独特角度级联通道完全共享非零行,包括用户特定的列支持;它既利用了角级联信道(ACC)矩阵的双结构稀疏性,又利用了各子载波之间的共同稀疏性。采用旋转不变坐标卷积神经网络(RICCNN)精确检测通道支撑点。然后,利用斑海豹须优化算法(HSWOA)进行信道估计。对信噪比(SNR)、归一化均方误差(NMSE)、误码率(BER)、峰值信噪比(PSNR)、计算复杂度、损失函数、误码率与信噪比以及能耗等性能指标进行了评估。对比现有方法对RIS-MIMO-CE-RICCNN技术的性能进行了评价。与现有模型相比,RIS-MIMO-CE-RICCNN的信噪比分别降低了16.28%、30.78%和25.29%,NMSE分别降低了15.08%、20.58%和15.25%,BER分别降低了28.96%、30.21%和23.89%,PSNR分别降低了26.28%、31.26%和19.66%。利用压缩感知深度学习的ris辅助毫米波MIMO信道估计(RIS-MIMO-CE-CS),可重构智能表面多用户毫米波MIMO系统的信道估计(RIS-MIMO-CE-MU), ris辅助毫米波MIMO方案中沿反射方向波束方向的信道估计设计(BPRPD-CE-RIS-MIMO)。
{"title":"RIS-Aided mmWave MIMO Channel Estimation Using Rotation-Invariant Coordinate Convolutional Neural Network and Compressive Sensing","authors":"Madhu Kumar Vanteru,&nbsp;Martin Margala,&nbsp;Sri Hari Nallamala,&nbsp;Prasun Chakrabarti","doi":"10.1002/ett.70289","DOIUrl":"https://doi.org/10.1002/ett.70289","url":null,"abstract":"<div>\u0000 \u0000 <p>Channel State Information (CSI) is necessary for wireless systems supported by reconfigurable intelligent surfaces to regulate wireless channels and increase bandwidth along energy efficiency. In this paper, RIS-Aided mmWave MIMO Channel Estimation with Rotation-Invariant Coordinate Convolutional Neural Network and Compressive Sensing (RIS-MIMO-CE-RICCNN) is proposed. Reconfigurable Intelligent Surface (RIS) is utilized to estimate frequency-flat and frequency-selective cascaded channels with minimal overhead in multi-user millimeter wave big multiple inputs multiple outputs (MIMO) systems. The unique angle cascaded channels visible to different users have totally shared non-zero rows including user-specific column supports; it makes use of both the double-structured sparsity property of angular cascaded channel (ACC) matrices and the common sparsity property among the various subcarriers. Rotation-Invariant Coordinate Convolutional Neural Networks (RICCNN) is used to accurately detect channel supports. Then, channel estimation is done by Harbor Seal Whiskers Optimization Algorithm (HSWOA). The performance metrics like Signal to Noise Ratio (SNR), Normalized mean square error (NMSE), Bit error rate (BER), Peak-signal to noise ratio (PSNR), Computational complexity, Loss function, BER versus SNR and energy consumption are evaluated. The performance of the RIS-MIMO-CE-RICCNN technique is evaluated against existing methods. The RIS-MIMO-CE-RICCNN achieves 16.28%, 30.78% and 25.29% lower SNR, 15.08%, 20.58%, and 15.25% lower NMSE, 28.96%, 30.21%, and 23.89% lower BER, and 26.28%, 31.26%, 19.66% lower PSNR when compared to the existing models: RIS-assisted mmWave MIMO channel estimation utilizing deep learning with compressive sensing (RIS-MIMO-CE-CS), channel estimation for reconfigurable intelligent surface enabled multiple user mmWave MIMO systems (RIS-MIMO-CE-MU), Beam Pattern along Reflection Pattern Design of Channel Estimation in RIS-Assisted mmWave MIMO Schemes (BPRPD-CE-RIS-MIMO)respectively.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145619112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-Driven Anomaly Detection and Traffic Management in Software-Defined IoT Networks for Smart Agriculture 智能农业软件定义物联网网络中人工智能驱动的异常检测和流量管理
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-11-23 DOI: 10.1002/ett.70301
Muzammal Majeed, Muhammad Ashfaq, Preeti Rani, Afzaal Hussain, Muhammad Azam Zia

Smart agriculture uses Internet of Things (IoT) and sensors to increase productivity, optimize resource use, and enhance decision-making. However, the large and varied agricultural data sets pose challenges for traffic management and network security. Traditional software-defined networking (SDN) offers centralized, flexible traffic control, but it cannot detect malicious or abnormal activities in real-time. To fill this gap, we introduce an Artificial Intelligence (AI)-based anomaly detection and traffic management framework for SD-IoT networks in smart agriculture. This system combines a machine learning (ML) Intrusion Detection System (IDS) with the SDN controller, enabling real-time identification of abnormal traffic and adaptive prioritization of critical data flows. The IDS detects unusual traffic patterns, while the SDN controller allocates resources and routes flows based on quality of service (QoS) and security needs. Simulations demonstrate that our system achieves high accuracy in anomaly detection, reduces latency for emergency flows, enhances throughput, and reduces packet loss compared to traditional methods. This work highlights the importance of integrating AI-powered IDS with SDN traffic management to enhance security and communication in smart agricultural networks.

智慧农业利用物联网(IoT)和传感器来提高生产力、优化资源利用和加强决策。然而,庞大而多样的农业数据集给交通管理和网络安全带来了挑战。传统的软件定义网络(SDN)提供集中、灵活的流量控制,但无法实时检测恶意或异常活动。为了填补这一空白,我们为智能农业中的SD-IoT网络引入了基于人工智能(AI)的异常检测和流量管理框架。该系统将机器学习(ML)入侵检测系统(IDS)与SDN控制器相结合,能够实时识别异常流量并自适应确定关键数据流的优先级。IDS检测异常流量模式,SDN控制器根据QoS (quality service)和安全需求分配资源和路由流。仿真结果表明,与传统方法相比,该系统在异常检测方面具有较高的准确性,减少了紧急流的延迟,提高了吞吐量,减少了丢包。这项工作强调了将人工智能驱动的IDS与SDN流量管理集成在一起以增强智能农业网络的安全性和通信的重要性。
{"title":"AI-Driven Anomaly Detection and Traffic Management in Software-Defined IoT Networks for Smart Agriculture","authors":"Muzammal Majeed,&nbsp;Muhammad Ashfaq,&nbsp;Preeti Rani,&nbsp;Afzaal Hussain,&nbsp;Muhammad Azam Zia","doi":"10.1002/ett.70301","DOIUrl":"https://doi.org/10.1002/ett.70301","url":null,"abstract":"<div>\u0000 \u0000 <p>Smart agriculture uses Internet of Things (IoT) and sensors to increase productivity, optimize resource use, and enhance decision-making. However, the large and varied agricultural data sets pose challenges for traffic management and network security. Traditional software-defined networking (SDN) offers centralized, flexible traffic control, but it cannot detect malicious or abnormal activities in real-time. To fill this gap, we introduce an Artificial Intelligence (AI)-based anomaly detection and traffic management framework for SD-IoT networks in smart agriculture. This system combines a machine learning (ML) Intrusion Detection System (IDS) with the SDN controller, enabling real-time identification of abnormal traffic and adaptive prioritization of critical data flows. The IDS detects unusual traffic patterns, while the SDN controller allocates resources and routes flows based on quality of service (QoS) and security needs. Simulations demonstrate that our system achieves high accuracy in anomaly detection, reduces latency for emergency flows, enhances throughput, and reduces packet loss compared to traditional methods. This work highlights the importance of integrating AI-powered IDS with SDN traffic management to enhance security and communication in smart agricultural networks.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145619111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Double Deep Reinforcement Learning for Optimization of Underwater Acoustic Sensor Network Energy Consumption and Congestion Control 基于双深度强化学习的水声传感器网络能耗与拥塞控制优化
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-11-21 DOI: 10.1002/ett.70293
Krishnaveni Sannathammegowda, Shwetha M

Underwater Acoustic Sensor Networks (UASNs) are essential for offshore engineering, military surveillance, environmental monitoring, and oceanographic exploration. However, challenges including high latency, congested networks, low bandwidth, and energy limitations make it difficult to communicate effectively in UASNs. In order to tackle these problems, this study suggests a new Energy-Efficient Double-Level Deep Reinforcement Learning with Chaotic Chimp Optimization (E2D2RL-ChCo) model that is intended to improve localization precision, reduce packet loss, and effectively handle network congestion. The proposed E2D2RL-ChCo model uses transformer-based Markov Decision Processes (MDPs) for node localization at the top level and congestion-aware routing at the bottom level to guarantee efficient task scheduling and energy-efficient data transfer. By integrating Chaotic Chimp Optimization (ChCo), learning parameters are adjusted to enhance convergence and solution quality. Simulation results demonstrate up to 33.8% reduction in energy consumption, 61.5% decrease in end-to-end delay, and over 52% improvement in successful packet delivery compared to baseline models. The proposed model also improves localization error to 0.0075, outperforming existing strategies. This work fills gaps in existing literature by integrating deep reinforcement learning and metaheuristics to optimize both localization and congestion in real-time UASN scenarios. This approach enables more sustainable and reliable UASN operations, paving the way for enhanced performance in real-world aquatic environments.

水声传感器网络在海洋工程、军事监视、环境监测和海洋勘探等领域具有重要意义。然而,包括高延迟、拥塞网络、低带宽和能量限制在内的挑战使得在usns中有效通信变得困难。为了解决这些问题,本研究提出了一种新的节能双级深度强化学习混沌黑猩猩优化(E2D2RL-ChCo)模型,旨在提高定位精度,减少丢包,并有效处理网络拥塞。提出的E2D2RL-ChCo模型在顶层使用基于变压器的马尔可夫决策过程(mdp)进行节点定位,在底层使用拥塞感知路由,以保证高效的任务调度和节能的数据传输。通过整合混沌黑猩猩优化算法,调整学习参数以提高收敛性和解的质量。仿真结果表明,与基线模型相比,能耗降低了33.8%,端到端延迟降低了61.5%,成功的数据包传输提高了52%以上。该模型还将定位误差提高到0.0075,优于现有的定位策略。本工作通过集成深度强化学习和元启发式来优化实时usasn场景中的定位和拥塞,填补了现有文献的空白。这种方法可以实现更可持续、更可靠的usasn操作,为在现实水生环境中提高性能铺平了道路。
{"title":"Double Deep Reinforcement Learning for Optimization of Underwater Acoustic Sensor Network Energy Consumption and Congestion Control","authors":"Krishnaveni Sannathammegowda,&nbsp;Shwetha M","doi":"10.1002/ett.70293","DOIUrl":"https://doi.org/10.1002/ett.70293","url":null,"abstract":"<div>\u0000 \u0000 <p>Underwater Acoustic Sensor Networks (UASNs) are essential for offshore engineering, military surveillance, environmental monitoring, and oceanographic exploration. However, challenges including high latency, congested networks, low bandwidth, and energy limitations make it difficult to communicate effectively in UASNs. In order to tackle these problems, this study suggests a new Energy-Efficient Double-Level Deep Reinforcement Learning with Chaotic Chimp Optimization (E2D2RL-ChCo) model that is intended to improve localization precision, reduce packet loss, and effectively handle network congestion. The proposed E2D2RL-ChCo model uses transformer-based Markov Decision Processes (MDPs) for node localization at the top level and congestion-aware routing at the bottom level to guarantee efficient task scheduling and energy-efficient data transfer. By integrating Chaotic Chimp Optimization (ChCo), learning parameters are adjusted to enhance convergence and solution quality. Simulation results demonstrate up to 33.8% reduction in energy consumption, 61.5% decrease in end-to-end delay, and over 52% improvement in successful packet delivery compared to baseline models. The proposed model also improves localization error to 0.0075, outperforming existing strategies. This work fills gaps in existing literature by integrating deep reinforcement learning and metaheuristics to optimize both localization and congestion in real-time UASN scenarios. This approach enables more sustainable and reliable UASN operations, paving the way for enhanced performance in real-world aquatic environments.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145581369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain-Empowered Trust Management System for Collaborative Services in Sustainable Smart Cities 可持续智慧城市协同服务的区块链授权信任管理系统
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-11-21 DOI: 10.1002/ett.70296
Sasikumar Asaithambi, Sunil Prajapat, Mohammed Wasim Bhatt, Syed Rizwan Hassan

The Internet of Things (IoT) can offer more precise, intelligent, and low- or non-human involvement approaches to various sectors. One of the significant uses of the IoT is in smart cities, which includes a variety of services, including smart home, garbage disposal, and smart grid. Many different collaborative IoT integrations are available in smart cities because of these diverse services. A digitized smart city was created to offer complete government cooperation solutions based on digitization and automation to improve residents' quality of life. Information safety and privacy concerns arise when various services need to work together seamlessly. Trustworthy data is vital to the federal government and its constituents, and data accuracy and privacy must be ensured. In this work, we presented a smart contract-enabled smart city and software-defined networking (SDN) in limited contexts during collaborative activities based on a controlled network and decentralization. The proposed collaborative application safety structure is being tested on the Hyperledger blockchain networks. We describe a unique approach to data security through collaborative work in intelligent city governmental design, utilizing Proof-of-Trust Collaboration (PoTC) in Hyperledger blockchains. A security approach based on SDN and smart contracts is employed to safely manage and monitor all connections and transactions across diverse IoT networks. To assess the viability of the proposed decentralized security framework, we created a supported scenario for collaborative activities in an SDN-enabled IoT design. We have conducted various experimental simulations to test the proposed blockchain-integrated SDN-based IoT architecture for a smart city, including throughput, access delay, and trust evaluation. The simulation results show that the proposed SDN-enabled blockchain networks provide better results than existing works.

物联网(IoT)可以为各个部门提供更精确、更智能、更低或非人类参与的方法。物联网的重要用途之一是智能城市,其中包括各种服务,包括智能家居,垃圾处理和智能电网。由于这些不同的服务,智能城市中可以使用许多不同的协作物联网集成。创建数字化智慧城市,提供基于数字化和自动化的完整政府合作解决方案,以提高居民的生活质量。当各种服务需要无缝地协同工作时,就会出现信息安全和隐私问题。可靠的数据对联邦政府及其选民至关重要,必须确保数据的准确性和隐私性。在这项工作中,我们在基于受控网络和去中心化的协作活动中,在有限的环境中提出了一个支持智能合约的智能城市和软件定义网络(SDN)。提议的协作应用程序安全结构正在Hyperledger区块链网络上进行测试。我们描述了一种独特的数据安全方法,通过智能城市政府设计中的协作工作,利用超级账本区块链中的信任证明协作(PoTC)。采用基于SDN和智能合约的安全方法,安全管理和监控各种物联网网络的所有连接和交易。为了评估提议的分散安全框架的可行性,我们在支持sdn的物联网设计中创建了一个支持协作活动的场景。我们进行了各种实验模拟,以测试针对智慧城市提出的基于区块链集成sdn的物联网架构,包括吞吐量、访问延迟和信任评估。仿真结果表明,所提出的基于sdn的区块链网络具有比现有网络更好的性能。
{"title":"A Blockchain-Empowered Trust Management System for Collaborative Services in Sustainable Smart Cities","authors":"Sasikumar Asaithambi,&nbsp;Sunil Prajapat,&nbsp;Mohammed Wasim Bhatt,&nbsp;Syed Rizwan Hassan","doi":"10.1002/ett.70296","DOIUrl":"https://doi.org/10.1002/ett.70296","url":null,"abstract":"<div>\u0000 \u0000 <p>The Internet of Things (IoT) can offer more precise, intelligent, and low- or non-human involvement approaches to various sectors. One of the significant uses of the IoT is in smart cities, which includes a variety of services, including smart home, garbage disposal, and smart grid. Many different collaborative IoT integrations are available in smart cities because of these diverse services. A digitized smart city was created to offer complete government cooperation solutions based on digitization and automation to improve residents' quality of life. Information safety and privacy concerns arise when various services need to work together seamlessly. Trustworthy data is vital to the federal government and its constituents, and data accuracy and privacy must be ensured. In this work, we presented a smart contract-enabled smart city and software-defined networking (SDN) in limited contexts during collaborative activities based on a controlled network and decentralization. The proposed collaborative application safety structure is being tested on the Hyperledger blockchain networks. We describe a unique approach to data security through collaborative work in intelligent city governmental design, utilizing Proof-of-Trust Collaboration (PoTC) in Hyperledger blockchains. A security approach based on SDN and smart contracts is employed to safely manage and monitor all connections and transactions across diverse IoT networks. To assess the viability of the proposed decentralized security framework, we created a supported scenario for collaborative activities in an SDN-enabled IoT design. We have conducted various experimental simulations to test the proposed blockchain-integrated SDN-based IoT architecture for a smart city, including throughput, access delay, and trust evaluation. The simulation results show that the proposed SDN-enabled blockchain networks provide better results than existing works.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145555728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of DDoS Attack Using Taylor Elephant Herd Optimization (TEH) and Univariate Ensemble Feature (UEF) 基于泰勒象群优化和单变量集成特征的DDoS攻击检测
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-11-14 DOI: 10.1002/ett.70288
Alka Shrivastava, Vikas Thada, Amit kumar Mishra, Pratiksha Gautam

The digital world has significantly evolved with advancements in internet services and cloud computing. While these improvements have enabled better data protection in cloud environments, they have also introduced new challenges due to the rapid development of various technologies. One of the greatest serious and ever-growing threats is DDoS attacks, which can severely disrupt critical computer systems and render them ineffective. A novel approach is proposed to address this issue by integrating Taylor Elephant Herd Optimization (TEHO) with Univariate Ensemble Feature (UEF) selection. The bio-inspired TEHO algorithm enhances intrusion network features, improving attack detection efficiency and solving complex network challenges. Meanwhile, UEF is employed to extract and refine relevant intrusion network features. The ensemble classification technique further strengthens detection accuracy by combining the results of four different classifiers through a majority voting process. This innovative method is crucial in fortifying the security of essential internet networks and systems against evolving cyber threats. The proposed TEHbUEF framework enhances DDoS attack detection through advanced feature extraction, optimization, and ensemble classification techniques. Initially, the UEF method identifies and selects the greatest significant features using Gain Ratio, Information Gain and Chi-Square tests. These features are further refined using the Relief algorithm to reduce noise and focus on the most relevant data points. The TEHO algorithm then optimizes these selected features by iteratively adjusting their weights to improve their effectiveness within the network, significantly enhancing the system's ability to detect threats. Finally, an ensemble classification approach—combining Support Vector Machine (SVM), Naïve Bayes (NB), Logistic Regression, and Decision Trees (DT)—ensures robust and accurate detection through majority voting. The comprehensive nature of this approach leads to superior performance in accuracy, false detection rate, recall, precision, detection rate, and F-measure, proving the effectiveness of TEHbUEF over existing methods. With an accuracy of 99.35%, recall of 99.36%, precision of 99.19%, detection rate of 98.47%, and an F-measure of 99.28%, the TEHbUEF approach demonstrates outstanding performance. These results highlight its exceptional ability to detect DDoS attacks with greater accuracy and efficiency, surpassing existing techniques in both detection effectiveness and overall system performance.

随着互联网服务和云计算的进步,数字世界已经发生了重大变化。虽然这些改进在云环境中实现了更好的数据保护,但由于各种技术的快速发展,它们也带来了新的挑战。最严重且不断增长的威胁之一是DDoS攻击,它可以严重破坏关键计算机系统并使其失效。为了解决这一问题,提出了一种将泰勒象群优化(TEHO)与单变量集成特征(UEF)选择相结合的新方法。仿生TEHO算法增强了入侵网络的特征,提高了攻击检测效率,解决了复杂的网络挑战。同时,利用UEF提取和细化相关的入侵网络特征。集成分类技术通过多数投票过程将四种不同分类器的结果组合在一起,进一步提高了检测精度。这种创新方法对于加强基本互联网网络和系统的安全,抵御不断变化的网络威胁至关重要。提出的TEHbUEF框架通过先进的特征提取、优化和集成分类技术增强了DDoS攻击检测能力。最初,UEF方法使用增益比、信息增益和卡方检验来识别和选择最大显著特征。使用Relief算法进一步细化这些特征,以减少噪声并专注于最相关的数据点。然后,TEHO算法通过迭代调整其权重来优化这些选定的特征,以提高其在网络中的有效性,显著增强系统检测威胁的能力。最后,集成分类方法-结合支持向量机(SVM), Naïve贝叶斯(NB),逻辑回归和决策树(DT) -通过多数投票确保鲁棒和准确的检测。该方法的综合性使其在准确率、误检率、召回率、精密度、检出率和F-measure等方面表现优异,证明了该方法相对于现有方法的有效性。该方法的准确率为99.35%,召回率为99.36%,精密度为99.19%,检出率为98.47%,F-measure为99.28%。这些结果突出了其以更高的准确性和效率检测DDoS攻击的卓越能力,在检测效率和整体系统性能方面超越了现有技术。
{"title":"Detection of DDoS Attack Using Taylor Elephant Herd Optimization (TEH) and Univariate Ensemble Feature (UEF)","authors":"Alka Shrivastava,&nbsp;Vikas Thada,&nbsp;Amit kumar Mishra,&nbsp;Pratiksha Gautam","doi":"10.1002/ett.70288","DOIUrl":"https://doi.org/10.1002/ett.70288","url":null,"abstract":"<div>\u0000 \u0000 <p>The digital world has significantly evolved with advancements in internet services and cloud computing. While these improvements have enabled better data protection in cloud environments, they have also introduced new challenges due to the rapid development of various technologies. One of the greatest serious and ever-growing threats is DDoS attacks, which can severely disrupt critical computer systems and render them ineffective. A novel approach is proposed to address this issue by integrating Taylor Elephant Herd Optimization (TEHO) with Univariate Ensemble Feature (UEF) selection. The bio-inspired TEHO algorithm enhances intrusion network features, improving attack detection efficiency and solving complex network challenges. Meanwhile, UEF is employed to extract and refine relevant intrusion network features. The ensemble classification technique further strengthens detection accuracy by combining the results of four different classifiers through a majority voting process. This innovative method is crucial in fortifying the security of essential internet networks and systems against evolving cyber threats. The proposed TEHbUEF framework enhances DDoS attack detection through advanced feature extraction, optimization, and ensemble classification techniques. Initially, the UEF method identifies and selects the greatest significant features using Gain Ratio, Information Gain and Chi-Square tests. These features are further refined using the Relief algorithm to reduce noise and focus on the most relevant data points. The TEHO algorithm then optimizes these selected features by iteratively adjusting their weights to improve their effectiveness within the network, significantly enhancing the system's ability to detect threats. Finally, an ensemble classification approach—combining Support Vector Machine (SVM), Naïve Bayes (NB), Logistic Regression, and Decision Trees (DT)—ensures robust and accurate detection through majority voting. The comprehensive nature of this approach leads to superior performance in accuracy, false detection rate, recall, precision, detection rate, and F-measure, proving the effectiveness of TEHbUEF over existing methods. With an accuracy of 99.35%, recall of 99.36%, precision of 99.19%, detection rate of 98.47%, and an F-measure of 99.28%, the TEHbUEF approach demonstrates outstanding performance. These results highlight its exceptional ability to detect DDoS attacks with greater accuracy and efficiency, surpassing existing techniques in both detection effectiveness and overall system performance.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145530014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Transactions on Emerging Telecommunications Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1