首页 > 最新文献

Security and Communication Networks最新文献

英文 中文
HMMED: A Multimodal Model with Separate Head and Payload Processing for Malicious Encrypted Traffic Detection HMMED:分别处理头部和有效载荷的多模态模型,用于恶意加密流量检测
4区 计算机科学 Q3 Computer Science Pub Date : 2024-05-30 DOI: 10.1155/2024/8725832
Peng Xiao, Ying Yan, Jian Hu, Zhenhong Zhang
Malicious encrypted traffic detection is a critical component of network security management. Previous detection methods can be categorized into two classes as follows: one is to use the feature engineering method to construct traffic features for classification and the other is to use the end-to-end method that directly inputs the original traffic to obtain traffic features for classification. Both of the abovementioned two methods have the problem that the obtained features cannot fully characterize the traffic. To this end, this paper proposes a hierarchical multimodal deep learning model (HMMED) for malicious encrypted traffic detection. This model adopts the abovementioned two feature generation methods to learn the features of payload and header, respectively, then fuses the features to get the final traffic features, and finally inputs the final traffic features into the softmax classifier for classification. In addition, since traditional deep learning is highly dependent on the training set size and data distribution, resulting in a model that is not very generalizable and difficult to adapt to unseen encrypted traffic, the model proposed in this paper uses a large amount of unlabeled encrypted traffic in the pretraining layer to pretrain a submodel used to obtain a generic packet payload representation. The test results on the USTC-TFC2016 dataset show that the proposed model can effectively solve the problem of insufficient feature extraction of traditional detection methods and improve the ACC of malicious encrypted traffic detection.
恶意加密流量检测是网络安全管理的重要组成部分。以往的检测方法可分为以下两类:一类是使用特征工程方法构建流量特征进行分类,另一类是使用端到端方法直接输入原始流量获取流量特征进行分类。上述两种方法都存在一个问题,即获得的特征不能完全表征流量。为此,本文提出了一种用于恶意加密流量检测的分层多模态深度学习模型(HMMED)。该模型采用上述两种特征生成方法,分别学习有效载荷和头部特征,然后将特征融合得到最终流量特征,最后将最终流量特征输入 softmax 分类器进行分类。此外,由于传统的深度学习高度依赖于训练集的大小和数据分布,导致模型的通用性不强,难以适应未见过的加密流量,因此本文提出的模型在预训练层使用大量未标记的加密流量来预训练一个子模型,用于获得通用的数据包有效载荷表示。在 USTC-TFC2016 数据集上的测试结果表明,本文提出的模型能有效解决传统检测方法特征提取不足的问题,提高恶意加密流量检测的 ACC。
{"title":"HMMED: A Multimodal Model with Separate Head and Payload Processing for Malicious Encrypted Traffic Detection","authors":"Peng Xiao, Ying Yan, Jian Hu, Zhenhong Zhang","doi":"10.1155/2024/8725832","DOIUrl":"https://doi.org/10.1155/2024/8725832","url":null,"abstract":"Malicious encrypted traffic detection is a critical component of network security management. Previous detection methods can be categorized into two classes as follows: one is to use the feature engineering method to construct traffic features for classification and the other is to use the end-to-end method that directly inputs the original traffic to obtain traffic features for classification. Both of the abovementioned two methods have the problem that the obtained features cannot fully characterize the traffic. To this end, this paper proposes a hierarchical multimodal deep learning model (HMMED) for malicious encrypted traffic detection. This model adopts the abovementioned two feature generation methods to learn the features of payload and header, respectively, then fuses the features to get the final traffic features, and finally inputs the final traffic features into the softmax classifier for classification. In addition, since traditional deep learning is highly dependent on the training set size and data distribution, resulting in a model that is not very generalizable and difficult to adapt to unseen encrypted traffic, the model proposed in this paper uses a large amount of unlabeled encrypted traffic in the pretraining layer to pretrain a submodel used to obtain a generic packet payload representation. The test results on the USTC-TFC2016 dataset show that the proposed model can effectively solve the problem of insufficient feature extraction of traditional detection methods and improve the ACC of malicious encrypted traffic detection.","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141190201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features 基于 SURF 特征图像检索的鲁棒无掩码图像隐写术算法
4区 计算机科学 Q3 Computer Science Pub Date : 2024-05-18 DOI: 10.1155/2024/5034640
Fan Li, Chenyang Liu, Zhenbo Dong, Zhibo Sun, Weipeng Qian
With the advancement of image steganography, coverless image steganography has gained widespread attention due to its ability to hide information without modifying the carrier of images. However, existing coverless image steganography methods often require both communicating parties to transmit an amount of additional information including image blocks’ locations or a large number of parameters, which will raise a serious suspicion. In light of this issue, we propose a robust coverless image steganography algorithm based on Speeded-Up Robust Features (SURF). Firstly, the proposed method allows both communicating parties to independently create multiple coverless image datasets (CIDs) using random seeds. Then, a mapping rule is designed for creating one-to-one correspondence between hash sequences and images in CIDs. Finally, the secret information will be carried by the images whose hash sequences are equal to the secret segments. At the receiver side, the robust SURF of images is utilized to retrieve the secret information. Experimental results demonstrate that the proposed algorithm outperforms other methods in terms of capacity, robustness, and security. Furthermore, it is worth noting that the proposed method eliminates the need to transmit a large amount of additional information, which is a significant security issue in existing coverless image steganography algorithms.
随着图像隐写术的发展,无掩盖图像隐写术因其能够在不改变图像载体的情况下隐藏信息而受到广泛关注。然而,现有的无掩码图像隐写方法往往需要通信双方传输大量的附加信息,包括图像块的位置或大量参数,这将引起严重的怀疑。有鉴于此,我们提出了一种基于加速鲁棒特征(SURF)的鲁棒性无掩码图像隐写算法。首先,该方法允许通信双方使用随机种子独立创建多个无掩码图像数据集(CID)。然后,设计一个映射规则,在哈希序列和 CID 中的图像之间建立一一对应关系。最后,哈希序列与秘密片段相等的图像将携带秘密信息。在接收端,利用图像的鲁棒 SURF 来检索秘密信息。实验结果表明,所提出的算法在容量、鲁棒性和安全性方面都优于其他方法。此外,值得注意的是,所提出的方法无需传输大量额外信息,而这正是现有无掩码图像隐写术算法中的一个重要安全问题。
{"title":"A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features","authors":"Fan Li, Chenyang Liu, Zhenbo Dong, Zhibo Sun, Weipeng Qian","doi":"10.1155/2024/5034640","DOIUrl":"https://doi.org/10.1155/2024/5034640","url":null,"abstract":"With the advancement of image steganography, coverless image steganography has gained widespread attention due to its ability to hide information without modifying the carrier of images. However, existing coverless image steganography methods often require both communicating parties to transmit an amount of additional information including image blocks’ locations or a large number of parameters, which will raise a serious suspicion. In light of this issue, we propose a robust coverless image steganography algorithm based on Speeded-Up Robust Features (SURF). Firstly, the proposed method allows both communicating parties to independently create multiple coverless image datasets (CIDs) using random seeds. Then, a mapping rule is designed for creating one-to-one correspondence between hash sequences and images in CIDs. Finally, the secret information will be carried by the images whose hash sequences are equal to the secret segments. At the receiver side, the robust SURF of images is utilized to retrieve the secret information. Experimental results demonstrate that the proposed algorithm outperforms other methods in terms of capacity, robustness, and security. Furthermore, it is worth noting that the proposed method eliminates the need to transmit a large amount of additional information, which is a significant security issue in existing coverless image steganography algorithms.","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"139 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141061296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective and Efficient Android Malware Detection and Category Classification Using the Enhanced KronoDroid Dataset 使用增强型 KronoDroid 数据集有效、高效地进行安卓恶意软件检测和类别分类
4区 计算机科学 Q3 Computer Science Pub Date : 2024-04-08 DOI: 10.1155/2024/7382302
Mudassar Waheed, Sana Qadir
Android is the most widely used mobile operating system and responsible for handling a wide variety of data from simple messages to sensitive banking details. The explosive increase in malware targeting this platform has made it imperative to adopt machine learning approaches for effective malware detection and classification. Since its release in 2008, the Android platform has changed substantially and there has also been a significant increase in the number, complexity, and evolution of malware that target this platform. This rapid evolution quickly renders existing malware datasets out of date and has a degrading impact on machine learning-based detection models. Many studies have been carried out to explore the effectiveness of various machine learning models for Android malware detection. Majority of these studies use datasets that have compiled using static or dynamic analysis of malware but the use of hybrid analysis approaches has not been addressed completely. Likewise, the impact of malware evolution has not been fully investigated. Although some of the models have achieved exceptional results, their performance deteriorated for evolving malware and they were also not effective against antidynamic malware. In this paper, we address both these limitations by creating an enhanced subset of the KronoDroid dataset and using it to develop a supervised machine learning model capable of detecting evolving and antidynamic malware. The original KronoDroid dataset contains malware samples from 2008 to 2020, making it effective for the detection of evolving malware and handling concept drift. Also, the dynamic features are collected by executing the malware on a real device, making it effective for handling antidynamic malware. We create an enhanced subset of this dataset by adding malware category labels with the help of multiple online repositories. Then, we train multiple supervised machine learning models and use the ExtraTree classifier to select the top 50 features. Our results show that the random forest (RF) model has the highest accuracy of 98.03% for malware detection and 87.56% for malware category classification (for 15 malware categories).
安卓是使用最广泛的移动操作系统,负责处理从简单信息到敏感银行信息等各种数据。针对这一平台的恶意软件呈爆炸式增长,因此采用机器学习方法进行有效的恶意软件检测和分类势在必行。自 2008 年发布以来,安卓平台发生了巨大变化,针对该平台的恶意软件的数量、复杂性和演化程度也显著增加。这种快速演变使现有的恶意软件数据集迅速过时,并对基于机器学习的检测模型产生了负面影响。为了探索各种机器学习模型在安卓恶意软件检测中的有效性,已经开展了许多研究。这些研究大多使用对恶意软件进行静态或动态分析后编制的数据集,但混合分析方法的使用尚未完全解决。同样,恶意软件进化的影响也没有得到充分研究。虽然有些模型取得了优异的成绩,但它们在处理不断进化的恶意软件时性能下降,而且对反动态恶意软件也无效。在本文中,我们通过创建 KronoDroid 数据集的增强子集,并利用该子集开发能够检测进化型和反动态型恶意软件的监督机器学习模型,解决了这两个局限性。原始 KronoDroid 数据集包含 2008 年至 2020 年的恶意软件样本,因此能有效检测不断演变的恶意软件并处理概念漂移。此外,动态特征是通过在真实设备上执行恶意软件收集的,因此能有效处理反动态恶意软件。我们借助多个在线资料库添加恶意软件类别标签,创建了该数据集的增强子集。然后,我们训练多个有监督的机器学习模型,并使用 ExtraTree 分类器选择前 50 个特征。结果表明,随机森林(RF)模型的恶意软件检测准确率最高,达到 98.03%,恶意软件类别分类准确率最高,达到 87.56%(15 个恶意软件类别)。
{"title":"Effective and Efficient Android Malware Detection and Category Classification Using the Enhanced KronoDroid Dataset","authors":"Mudassar Waheed, Sana Qadir","doi":"10.1155/2024/7382302","DOIUrl":"https://doi.org/10.1155/2024/7382302","url":null,"abstract":"Android is the most widely used mobile operating system and responsible for handling a wide variety of data from simple messages to sensitive banking details. The explosive increase in malware targeting this platform has made it imperative to adopt machine learning approaches for effective malware detection and classification. Since its release in 2008, the Android platform has changed substantially and there has also been a significant increase in the number, complexity, and evolution of malware that target this platform. This rapid evolution quickly renders existing malware datasets out of date and has a degrading impact on machine learning-based detection models. Many studies have been carried out to explore the effectiveness of various machine learning models for Android malware detection. Majority of these studies use datasets that have compiled using static or dynamic analysis of malware but the use of hybrid analysis approaches has not been addressed completely. Likewise, the impact of malware evolution has not been fully investigated. Although some of the models have achieved exceptional results, their performance deteriorated for evolving malware and they were also not effective against antidynamic malware. In this paper, we address both these limitations by creating an enhanced subset of the KronoDroid dataset and using it to develop a supervised machine learning model capable of detecting evolving and antidynamic malware. The original KronoDroid dataset contains malware samples from 2008 to 2020, making it effective for the detection of evolving malware and handling concept drift. Also, the dynamic features are collected by executing the malware on a real device, making it effective for handling antidynamic malware. We create an enhanced subset of this dataset by adding malware category labels with the help of multiple online repositories. Then, we train multiple supervised machine learning models and use the ExtraTree classifier to select the top 50 features. Our results show that the random forest (RF) model has the highest accuracy of 98.03% for malware detection and 87.56% for malware category classification (for 15 malware categories).","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140602008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the Transmission While Enhancing the Reliability of Communication Using Network Coding in Block-Wise Transfer of CoAP 在 CoAP 的分块传输中使用网络编码确保传输安全并提高通信可靠性
4区 计算机科学 Q3 Computer Science Pub Date : 2024-03-28 DOI: 10.1155/2024/7538203
Mohammed D. Halloush
The practical employment of network coding (NC) has shown major improvements when it comes to the transmission reliability of sender data and bandwidth utilization. Moreover, network coding has been employed recently to secure the transmission of data and prevent unauthorized recovery of sender packets. In this paper, we employ network coding (NC) in a practical way in networks with constrained resources with the goal of improving the reliability and security of data transfer. More specifically, we apply NC on the recent options of block-wise transfer (BWT) of the constrained application protocol (CoAP). The goal is to enhance the reliability of CoAP when used to transfer larger data blocks using BWT. Also, we employ an innovative homomorphic encryption approach to secure the BWT of CoAP.
网络编码(NC)的实际应用在提高发送方数据传输可靠性和带宽利用率方面取得了重大改进。此外,网络编码最近还被用于确保数据传输安全,防止未经授权恢复发送者数据包。在本文中,我们在资源有限的网络中实际应用了网络编码(NC),目的是提高数据传输的可靠性和安全性。更具体地说,我们将 NC 应用于受限应用协议(CoAP)最新的分块传输(BWT)方案。我们的目标是在使用 BWT 传输较大数据块时提高 CoAP 的可靠性。此外,我们还采用了一种创新的同态加密方法来确保 CoAP 的 BWT 安全。
{"title":"Securing the Transmission While Enhancing the Reliability of Communication Using Network Coding in Block-Wise Transfer of CoAP","authors":"Mohammed D. Halloush","doi":"10.1155/2024/7538203","DOIUrl":"https://doi.org/10.1155/2024/7538203","url":null,"abstract":"The practical employment of network coding (NC) has shown major improvements when it comes to the transmission reliability of sender data and bandwidth utilization. Moreover, network coding has been employed recently to secure the transmission of data and prevent unauthorized recovery of sender packets. In this paper, we employ network coding (NC) in a practical way in networks with constrained resources with the goal of improving the reliability and security of data transfer. More specifically, we apply NC on the recent options of block-wise transfer (BWT) of the constrained application protocol (CoAP). The goal is to enhance the reliability of CoAP when used to transfer larger data blocks using BWT. Also, we employ an innovative homomorphic encryption approach to secure the BWT of CoAP.","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140315714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the Security Vulnerability in Frequency-Hiding Order-Preserving Encryption 探索频率隐藏保序加密中的安全漏洞
4区 计算机科学 Q3 Computer Science Pub Date : 2024-02-29 DOI: 10.1155/2024/2764345
JiHye Yang, Kee Sung Kim
Frequency-hiding order-preserving encryption (FH-OPE) has emerged as an important tool in data security, particularly in cloud computing, because of its unique ability to preserve the order of plaintexts in their corresponding ciphertexts and enable efficient range queries on encrypted data. Despite its strong security model, indistinguishability under frequency analyzing ordered chosen plaintext attack (IND-FA-OCPA), our research identifies a vulnerability in its design, particularly the impact of range queries. In our research, we quantify the frequency of data exposure resulting from these range queries and present potential inference attacks on the FH-OPE scheme. Our findings are substantiated through experiments on real-world datasets, with the goal of measuring the frequency of data exposure resulting from range queries on FH-OPE encrypted databases. These results quantify the level of risk in practical applications of FH-OPE and reveal the potential for additional inference attacks and the urgency of addressing these threats. Consequently, our research highlights the need for a more comprehensive security model that considers the potential risks associated with range queries and underscores the importance of developing new range-query methods that prevent exposing these vulnerabilities.
频率隐藏有序保留加密(FH-OPE)已成为数据安全领域,尤其是云计算领域的重要工具,因为它具有独特的能力,可以在相应的密文中保留明文的顺序,并实现对加密数据的高效范围查询。尽管它具有强大的安全模型--频率分析有序选取明文攻击(IND-FA-OCPA)下的无差别性,但我们的研究发现了其设计中的一个漏洞,尤其是范围查询的影响。在研究中,我们量化了这些范围查询导致的数据暴露频率,并提出了对 FH-OPE 方案的潜在推理攻击。我们在真实世界数据集上进行了实验,目的是测量 FH-OPE 加密数据库上范围查询导致的数据暴露频率,从而证实我们的研究结果。这些结果量化了 FH-OPE 实际应用中的风险水平,揭示了额外推理攻击的潜力和应对这些威胁的紧迫性。因此,我们的研究强调了需要一个更全面的安全模型来考虑与范围查询相关的潜在风险,并强调了开发新的范围查询方法以防止暴露这些漏洞的重要性。
{"title":"Exploring the Security Vulnerability in Frequency-Hiding Order-Preserving Encryption","authors":"JiHye Yang, Kee Sung Kim","doi":"10.1155/2024/2764345","DOIUrl":"https://doi.org/10.1155/2024/2764345","url":null,"abstract":"Frequency-hiding order-preserving encryption (FH-OPE) has emerged as an important tool in data security, particularly in cloud computing, because of its unique ability to preserve the order of plaintexts in their corresponding ciphertexts and enable efficient range queries on encrypted data. Despite its strong security model, indistinguishability under frequency analyzing ordered chosen plaintext attack (IND-FA-OCPA), our research identifies a vulnerability in its design, particularly the impact of range queries. In our research, we quantify the frequency of data exposure resulting from these range queries and present potential inference attacks on the FH-OPE scheme. Our findings are substantiated through experiments on real-world datasets, with the goal of measuring the frequency of data exposure resulting from range queries on FH-OPE encrypted databases. These results quantify the level of risk in practical applications of FH-OPE and reveal the potential for additional inference attacks and the urgency of addressing these threats. Consequently, our research highlights the need for a more comprehensive security model that considers the potential risks associated with range queries and underscores the importance of developing new range-query methods that prevent exposing these vulnerabilities.","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140006023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing 在雾计算中使用自适应神经模糊分类器和 SDN 辅助实现 TCP SYN Flood DDoS 实时缓解
4区 计算机科学 Q3 Computer Science Pub Date : 2024-02-23 DOI: 10.1155/2024/6651584
Radjaa Bensaid, Nabila Labraoui, Ado Adamou Abba Ari, Leandros Maglaras, Hafida Saidi, Ahmed Mahmoud Abdu Lwahhab, Sihem Benfriha
The growth of the Internet of Things (IoT) has recently impacted our daily lives in many ways. As a result, a massive volume of data are generated and need to be processed in a short period of time. Therefore, a combination of computing models such as cloud computing is necessary. The main disadvantage of the cloud platform is its high latency due to the centralized mainframe. Fortunately, a distributed paradigm known as fog computing has emerged to overcome this problem, offering cloud services with low latency and high-access bandwidth to support many IoT application scenarios. However, attacks against fog servers can take many forms, such as distributed denial of service (DDoS) attacks that severely affect the reliability and availability of fog services. To address these challenges, we propose mitigation of fog computing-based SYN Flood DDoS attacks using an adaptive neuro-fuzzy inference system (ANFIS) and software defined networking (SDN) assistance (FASA). The simulation results show that the FASA system outperforms other algorithms in terms of accuracy, precision, recall, and F1-score. This shows how crucial our system is for detecting and mitigating TCP-SYN floods and DDoS attacks.
最近,物联网(IoT)的发展以多种方式影响着我们的日常生活。因此,产生了大量数据,需要在短时间内进行处理。因此,有必要结合云计算等计算模式。云平台的主要缺点是由于集中式主机而导致的高延迟。幸运的是,一种被称为雾计算的分布式计算模式的出现克服了这一问题,它提供低延迟和高访问带宽的云服务,支持许多物联网应用场景。然而,针对雾服务器的攻击有多种形式,例如严重影响雾服务可靠性和可用性的分布式拒绝服务(DDoS)攻击。为了应对这些挑战,我们提出利用自适应神经模糊推理系统(ANFIS)和软件定义网络(SDN)辅助(FASA)来缓解基于雾计算的 SYN Flood DDoS 攻击。仿真结果表明,FASA 系统在准确度、精确度、召回率和 F1 分数方面均优于其他算法。这表明我们的系统对检测和缓解 TCP-SYN 泛洪和 DDoS 攻击至关重要。
{"title":"Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing","authors":"Radjaa Bensaid, Nabila Labraoui, Ado Adamou Abba Ari, Leandros Maglaras, Hafida Saidi, Ahmed Mahmoud Abdu Lwahhab, Sihem Benfriha","doi":"10.1155/2024/6651584","DOIUrl":"https://doi.org/10.1155/2024/6651584","url":null,"abstract":"The growth of the Internet of Things (IoT) has recently impacted our daily lives in many ways. As a result, a massive volume of data are generated and need to be processed in a short period of time. Therefore, a combination of computing models such as cloud computing is necessary. The main disadvantage of the cloud platform is its high latency due to the centralized mainframe. Fortunately, a distributed paradigm known as fog computing has emerged to overcome this problem, offering cloud services with low latency and high-access bandwidth to support many IoT application scenarios. However, attacks against fog servers can take many forms, such as distributed denial of service (DDoS) attacks that severely affect the reliability and availability of fog services. To address these challenges, we propose mitigation of fog computing-based SYN Flood DDoS attacks using an adaptive neuro-fuzzy inference system (ANFIS) and software defined networking (SDN) assistance (FASA). The simulation results show that the FASA system outperforms other algorithms in terms of accuracy, precision, recall, and <i>F</i>1-score. This shows how crucial our system is for detecting and mitigating TCP-SYN floods and DDoS attacks.","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139952834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retracted: A Review of Motion Vector-Based Video Steganography 撤回:基于运动矢量的视频隐写术综述
4区 计算机科学 Q3 Computer Science Pub Date : 2024-01-24 DOI: 10.1155/2024/9824673
Security and Communication Networks
{"title":"Retracted: A Review of Motion Vector-Based Video Steganography","authors":"Security and Communication Networks","doi":"10.1155/2024/9824673","DOIUrl":"https://doi.org/10.1155/2024/9824673","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"38 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139602354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retracted: Secure and Energy-Efficient Computational Offloading Using LSTM in Mobile Edge Computing 撤回:在移动边缘计算中使用 LSTM 实现安全、节能的计算卸载
4区 计算机科学 Q3 Computer Science Pub Date : 2024-01-09 DOI: 10.1155/2024/9762430
Security and Communication Networks
{"title":"Retracted: Secure and Energy-Efficient Computational Offloading Using LSTM in Mobile Edge Computing","authors":"Security and Communication Networks","doi":"10.1155/2024/9762430","DOIUrl":"https://doi.org/10.1155/2024/9762430","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"59 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139441622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retracted: A K-Means Clustering Algorithm for Early Warning of Financial Risks in Agricultural Industry 撤回:用于农业金融风险预警的 K-Means 聚类算法
4区 计算机科学 Q3 Computer Science Pub Date : 2024-01-09 DOI: 10.1155/2024/9780872
Security and Communication Networks
{"title":"Retracted: A K-Means Clustering Algorithm for Early Warning of Financial Risks in Agricultural Industry","authors":"Security and Communication Networks","doi":"10.1155/2024/9780872","DOIUrl":"https://doi.org/10.1155/2024/9780872","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"53 15","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139442067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retracted: More General Form of Interval-Valued Fuzzy Ideals of BCK/BCI-Algebras 撤回:BCK/BCI-代数的区间值模糊理想的更一般形式
4区 计算机科学 Q3 Computer Science Pub Date : 2024-01-09 DOI: 10.1155/2024/9794857
Security and Communication Networks
{"title":"Retracted: More General Form of Interval-Valued Fuzzy Ideals of BCK/BCI-Algebras","authors":"Security and Communication Networks","doi":"10.1155/2024/9794857","DOIUrl":"https://doi.org/10.1155/2024/9794857","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"39 45","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139442567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Security and Communication Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1