Accelerated transformation in industrial controlsystems (ICS) such as Supervisory control and Data Acquisition (SCADA) from conventional specialized serial-based to internet protocols (TCP/IP) reliant standard commun...
详细信息
ISBN:
(纸本)9798350333077
Accelerated transformation in industrial controlsystems (ICS) such as Supervisory control and Data Acquisition (SCADA) from conventional specialized serial-based to internet protocols (TCP/IP) reliant standard communication protocols such as IEC-60870-5-104 have increased vulnerability to attacks and intrusions. Maintaining the reliability and availability of SCADA systems demands versatile and robust security solutions. This study proposes a monitoring technique to detect and characterize network traffic communication in the IEC-60870-5-104 SCADA network. The proposed anomaly detector employs a Bagged-Decision Tree algorithm (B-DT) for detecting and characterizing IEC-60870-5-104-based SCADA network communication traffic. The proposed B-DT significantly detects and characterizes various network categories and application types. The Matthew correlation coefficient (MCC) validated the predictive performance of the proposed model.
Recently, as networks operate as the infrastructure of modern society, the demands placed on the network by applications have become more complex. In particular, there is an increasing annual demand for high-capacity ...
详细信息
ISBN:
(纸本)9798350390605;9783903176638
Recently, as networks operate as the infrastructure of modern society, the demands placed on the network by applications have become more complex. In particular, there is an increasing annual demand for high-capacity and low-latency services, including real-time streaming. 5G has been launched to meet this demand, but its stability varies depending on location and time and can only sometimes be considered sufficient. One method to improve communication stability is multipath redundant communication, and much research has been conducted in this area. However, most of this research has focused on TCP-based communication and cannot be applied effectively to real-time UDP streaming. Hence, we propose a multipath redundant communication framework to improve the quality of real-time media streaming communication. Our proposed system is verified using multipath redundant communication and multiple mobile networks from a vehicle moving in an urban area. The experiments use a real-time streaming application based on WebRTC, and the framework significantly reduced packet loss and improved bitrate compared to existing multipath redundant communication systems without interfering with the congestion control mechanisms of the application.
Botnets are collections of compromised devices manipulated by malicious entities. To safeguard against their varied and constantly evolving threats, it is essential to have sophisticated detection techniques in place....
详细信息
ISBN:
(数字)9798350375480
ISBN:
(纸本)9798350375480;9798350375497
Botnets are collections of compromised devices manipulated by malicious entities. To safeguard against their varied and constantly evolving threats, it is essential to have sophisticated detection techniques in place. In this work, we investigate the utilization of machine learning methodologies for identifying botnets using CTU-13, a large repository that contains a wide range of botnet examples. By extracting features from the packet payloads and the header data, we are able to distinguish between botnet and harmless network traffic. We utilize a range of supervised machine learning techniques, including a Convolutional Neural network (CNN), to identify botnet behavior. With rigorous evaluation, we see the nuanced performance of various machine learning models. In particular, we find that the naive Bayes classifier is very effective in detecting botnets, while CNN shows remarkable accuracy, especially when it is asked to classify botnet data converted to images. We also explore preprocessing techniques that improve the quality of textual data. This helps to improve feature extraction as well as model performance, emphasizing the importance of proper data preparation for cybersecurity analyses. These insights not only shed light on how effective machine learning can be in detecting botnets but also provide actionable recommendations for improving cyber security strategies.
In response to the problem of poor detection performance of the traditional Sobel operator in edge detection, a high-precision edge detection algorithm based on Sobel operator-assisted Holistically-nested Edge Detecti...
详细信息
The rapid expansion of the internet has revolutionized knowledge sharing and decision-making processes, leading to the emergence of recommender systems that help users navigate vast amounts of information online. Thes...
详细信息
In this paper, we investigate a tactical mobile ad hoc network (MANET) enhanced with software defined networking (SDN) functionality. Radio transmissions of network links are orchestrated using time division multiple ...
详细信息
ISBN:
(纸本)9798350343854
In this paper, we investigate a tactical mobile ad hoc network (MANET) enhanced with software defined networking (SDN) functionality. Radio transmissions of network links are orchestrated using time division multiple access (TDMA) and are subject to adaptive modulation and coding (AMC) to address the dynamic variations in the quality of MANET links. A significant challenge within these networks is meeting the quality of service (QoS) demands of end-user data traffic while maintaining the SDN control plane's responsiveness to MANET topology alterations. To address this challenge, we propose a novel approach that concurrently determines the optimal placement of the SDN controller and the transmission scheduling of links in the MANET. The management of residual resources has a direct impact on both performance metrics. Building upon previous research, we present a more comprehensive model of the quality variations of tactical MANET links, elucidating how these variations dictate transmission modes over each link through software-defined radio (SDR) technology and influence the slot allocation process. We contrast our joint optimization algorithm with alternative techniques that manage these two networkcontrol mechanisms independently. Numerical evaluations suggest that our proposed algorithm achieves superior performance in comparison with the techniques considered.
As the future of networking dives into a new era of connecting every single physical device into the internet termed internet of Things (loT), this significantly means a rapid increase in the number of online connecte...
详细信息
The rapidly growing number of obfuscated malware attacks in the past few years has emerged as a significant threat for organizations and individuals, demanding prompt action to develop systems that accurately detect t...
详细信息
ISBN:
(纸本)9798350371000;9798350370997
The rapidly growing number of obfuscated malware attacks in the past few years has emerged as a significant threat for organizations and individuals, demanding prompt action to develop systems that accurately detect these attacks to block them or mitigate their impacts. These types of malwares use obfuscation techniques to hide their malicious functionalities from intrusion detection systems, which makes their detection more complicated than regular malwares. Most of the obfuscated malware detection systems primarily focus on binary classification. The existing multi-class classification methods mainly have used CNN-based deep learning to improve the model's accuracy. However, this approach is not suitable for resource constrained network nodes, such as IoT devices, which are widely used on the internet to monitor and control different environments. To tackle this issue, in this paper, we propose a lightweight model that accurately and efficiently classifies benign traffic vs. different classes of obfuscated malwares. Our proposed model uses a hybrid method of SMOTE oversampling to synthetically create training records for the minority classes in combination with undersampling the majority class via Tomek Links algorithm to increase the model's performance in malware classification. W applied this hybrid data augmentation technique to our training dataset extracted from CIC-MalMem2022 dataset to build a Random Forest model. Our experimental results demonstrated that the proposed model outperforms the state-of-the-art with 87.1% accuracy in classifying obfuscated malwares.
The proceedings contain 109 papers. The topics discussed include: real-time random body motion elimination based on phase compensation and recurrent neural network prediction;comprehensive calibration and test system ...
ISBN:
(纸本)9781510681767
The proceedings contain 109 papers. The topics discussed include: real-time random body motion elimination based on phase compensation and recurrent neural network prediction;comprehensive calibration and test system for UAVs;exploring the learning approach of multi-UAV task allocation through Voronoi diagram generation;attention-based structural analysis point cloud completion network;consensus iterative learning control for multi-agent systems with non-repetitive perturbations;learn and evolve to optimize robot morphologies;detection of COVID-19 based on attention mechanism and residual network;multimodal fusion contrastive learning framework based on insole and wristband;deep reinforcement learning-based task offloading and service caching in vehicular edge computing;and detection performance analysis of focused beam-forming for acoustic long horizontal array.
Agricultural production relies on a large number of sensors to obtain environmental data, and how to effectively integrate this data has become a major challenge in current agricultural IoT applications. Therefore, th...
详细信息
暂无评论