This paper proposes a text classification model based on a bi-directional LSTM network with attention mechanism and subsampling in the word vector stage. Firstly, we use the Skip-gram model in Word2Vec for feature ext...
详细信息
The Internet of Things (IoT) has greatly increased the possibility for developing intelligent connections and applications in many facets of daily life. Traditional security solutions frequently fail to solve security...
详细信息
Graph structures can effectively replicate intricate relationships among diverse entities, offering valuable insights into the interconnections among nodes. In this paper, we leverage graph neural network (GNN) algori...
详细信息
ISBN:
(纸本)9798350381771;9798350381764
Graph structures can effectively replicate intricate relationships among diverse entities, offering valuable insights into the interconnections among nodes. In this paper, we leverage graph neural network (GNN) algorithms for the classification of Internet of Things (IoT) nodes based on their connectivity and features. The node classification task involves transforming the IoT network into a graph structure, encompassing both fully connected and randomly connected graphs. In fully connected graph each node is connected to other nodes and randomly connected graphs have missing connections. Furthermore, two GNN methodologies, namely ARMAConv and Cluster-GCN, are employed for precise classification. The simulation results reveal that Cluster-GCN outperforms ARMAConv, achieving a higher success rate in node classification.
The primary motivator after the evolution of cognitive radio is the lack of utilization of the spectrum. This technology adds new functionality in the physical layer, data link sub-layer, Transmission Control Protocol...
详细信息
Smartphones are equipped with a wide variety of sensors, which can pose significant security and privacy risks if not properly protected. To assess the privacy and security risks of smartphone sensors, we first system...
详细信息
The size and market worth of the Internet of Things (IoT) have expanded, but unfortunately, the likelihood of user data being compromised has also risen. This presents a notable danger that has the potential to create...
详细信息
The networksecurity assessment is vital for improving the overall security posture. With diverse opportunities for using networking devices and configuring them, varying software application portfolios, and the incre...
详细信息
ISBN:
(纸本)9781665477062
The networksecurity assessment is vital for improving the overall security posture. With diverse opportunities for using networking devices and configuring them, varying software application portfolios, and the increased flexibility of using numerous applications, today's computernetworks are subject to continuous evolution. Such ever-growing computernetworks in size and complexity lead to information exposure to an increased threat landscape and attack surface variation. The network attack surface constitutes exploitable technical vulnerabilities, software/hardware misconfigurations (i.e., configuration gaps), vulnerable service connectivities, and service-cum-user privileges. An adversary may exploit the network attack surface to penetrate the enterprise networks incrementally. The discovery of new vulnerabilities and vague access control rules can further set off the attack surface variation. Hence, it is essential to consider the temporal aspect of networksecurity. Attack graph, a graphical networksecurity modeling tool, succinctly captures the attack surface of a vulnerable network in the form of initial security conditions, much needed for an adversary for successful incremental network penetration. Existing attack graph-based metrics are inadequate in capturing the variation in the attack surface. We propose to use a Boolean similarity metric to assess the similarity between the goal-oriented attack graphs generated successively for an enterprise network within the chosen sampling interval. We represent individual attack graphs as a Boolean expression to serve our purpose. A Boolean expression is a sum-of-product expression, i.e., a disjunction of attack paths, each a conjunction of initial conditions. We have conducted a set of experiments to validate the efficacy and applicability of the Boolean similarity metric. The results indicate that the Boolean similarity measure can detect the variation in the network attack surface.
With the emergence and successful deployment of software defined networks (SDN), zero-trust security architecture, and network function virtualization (NFV) in large scale modern enterprise and 5G networks, it is poss...
详细信息
In the rapidly evolving landscape of software Defined networks (SDNs), networksecurity is of paramount importance. This research paper presents a comprehensive study on anomaly detection and traffic analysis in SDNs ...
详细信息
network Function Virtualization (NFV) is proposed as new technology to address massive proprietary devices, high operation costs, poor flexibility and other problems in current traditional network. By separating netwo...
详细信息
暂无评论