
Intelligent Systems with Applications, Год журнала: 2024, Номер unknown, С. 200462 - 200462
Опубликована: Ноя. 1, 2024
Язык: Английский
Intelligent Systems with Applications, Год журнала: 2024, Номер unknown, С. 200462 - 200462
Опубликована: Ноя. 1, 2024
Язык: Английский
Alexandria Engineering Journal, Год журнала: 2025, Номер 118, С. 261 - 277
Опубликована: Янв. 22, 2025
Язык: Английский
Процитировано
1Cluster Computing, Год журнала: 2025, Номер 28(4)
Опубликована: Фев. 25, 2025
Язык: Английский
Процитировано
1Scientific Reports, Год журнала: 2024, Номер 14(1)
Опубликована: Июль 26, 2024
The Internet of Things (IoT) permeates various sectors, including healthcare, smart cities, and agriculture, alongside critical infrastructure management. However, its susceptibility to malware due limited processing power security protocols poses significant challenges. Traditional antimalware solutions fall short in combating evolving threats. To address this, the research work developed a feature selection-based classification model. At first stage, preprocessing stage enhances dataset quality through data smoothing consistency improvement. Feature selection via Zebra Optimization Algorithm (ZOA) reduces dimensionality, while phase integrates Graph Attention Network (GAN), specifically Dual-channel GAN (DGAN). DGAN incorporates Node Networks Semantic capture intricate IoT device interactions detect anomalous behaviors like botnet activity. model's accuracy is further boosted by leveraging both structural semantic with Sooty Tern (STOA) for hyperparameter tuning. proposed STOA-DGAN model achieves an impressive 99.87% activity classification, showcasing robustness reliability compared existing approaches.
Язык: Английский
Процитировано
6International Journal of Cognitive Computing in Engineering, Год журнала: 2025, Номер unknown
Опубликована: Фев. 1, 2025
Язык: Английский
Процитировано
0Security and Privacy, Год журнала: 2025, Номер 8(2)
Опубликована: Март 1, 2025
ABSTRACT Machine learning (ML) and deep (DL) models have become vital tools in Intrusion Detection Systems (IDS), yet their effectiveness depends heavily on the quality distribution of training data. This study investigates impact dataset size balance performance ML DL using CIC‐IDS 2017 dataset. Five subsets (20%, 40%, 60%, 80%, 100% dataset) were created to assess across varying sizes. Four models, including Random Forest (RF), Artificial Neural Network, Convolutional Network (CNN), CNN+Long‐Term Short Memory (CNN+LSTM), trained evaluated these subsets, focusing precision, recall, F1‐score. To test model generalizability, a synthetic 20 million over‐sampled samples was generated Synthetic Minority Oversampling Technique, followed by manual under‐sampling create balanced 1.5 with approximately 100 000 per attack class. Upon generalizability assessment already synthetically datasets, CNN+LSTM consistently outperformed other but utilized more time for testing each case. The RF showed weakest performances fastest both scenarios. Moreover, evaluate importance general particular, we also considered NSL‐KDD all four multiple classifications binary classification. Our results highlight dataset, structure models.
Язык: Английский
Процитировано
0Algorithms, Год журнала: 2025, Номер 18(5), С. 253 - 253
Опубликована: Апрель 26, 2025
Private consumers, small businesses, and even large enterprises are all at risk from botnets. These botnets known for spearheading Distributed Denial-Of-Service (DDoS) attacks, spamming populations of users, causing critical harm to major organizations. The development Internet Things (IoT) devices led the use these cryptocurrency mining, in-transit data interception, sending logs containing private master botnet. Different techniques were developed identify botnet activities, but only a few Graph Neural Networks (GNNs) analyze host activity by representing their communications with directed graph. Although GNNs intended extract structural graph properties, they overfitting, which leads failure when attempting do so an unidentified network. In this study, we test notion that patterns might be used efficient detection. also present SIR-GN, iterative representation learning methodology nodes. Our approach is built work well untested data, our model able provide vector every node captures its information. Finally, demonstrate that, collection vectors incorporated into neural network classifier, outperforms state-of-the-art GNN-based algorithms in detection bot nodes within unknown networks.
Язык: Английский
Процитировано
0International Journal on Semantic Web and Information Systems, Год журнала: 2024, Номер 20(1), С. 1 - 23
Опубликована: Ноя. 15, 2024
The susceptibility of Deep Neural Networks (DNNs) to adversarial attacks in Automatic Speech Recognition (ASR) systems has drawn significant attention. Most work focuses on white-box methods, but the assumption full transparency model architecture and parameters is unrealistic real-world scenarios. Although several targeted black-box attack methods have been proposed recent years, due complexity ASR systems, they primarily rely query-based approaches with limited search capabilities, leading low success rates noticeable noise. To address this, we propose DE-gradient, a new approach using differential evolution (DE), population-based algorithm. Inspired by Semantic Web ideas, introduce modulation noise preserve semantic coherence while enhancing imperceptibility. In experiments two public datasets, DE-gradient improved 19% increased signal-to-noise ratio (SNR) silent parts from 27 dB 54 dB, establishing strong baseline for evaluating systems.
Язык: Английский
Процитировано
1World Journal of Advanced Research and Reviews, Год журнала: 2024, Номер 21(3), С. 1828 - 1853
Опубликована: Март 26, 2024
TCP (Transmission Control Protocol), is a reliable connection oriented end-to-end protocol. It contains within itself, mechanisms for ensuring reliability by requiring the receiver to acknowledge segments that it receives. The network not perfect and small percentage of packets are lost enroute, either due error or fact there congestion in routers dropping packets. ensures starting timer whenever sends segment. If does receive an acknowledgement from ‘time-out’ interval then retransmits In this paper review various carried out. There number variants application management efficiency terms transmission efficiency. These include: - Tahoe, Reno, New Vegas, SACK, FACK, Asym, RBP, Full CUBIC. Therefore, main objective study tcp types on performance variances. All have different features advantages but with maximal throughput as objective, which termed clones TCP, been incorporated into TCP/IP protocol handling efficiently scenarios.
Язык: Английский
Процитировано
0Intelligent Systems with Applications, Год журнала: 2024, Номер unknown, С. 200462 - 200462
Опубликована: Ноя. 1, 2024
Язык: Английский
Процитировано
0