Nowadays, abnormal traffic detection for Software-Defined Networking (SDN) faces the challenges of large data volume and high dimensionality. Since traditional machine learning-based detection methods have the problem...
详细信息
Nowadays, abnormal traffic detection for Software-Defined Networking (SDN) faces the challenges of large data volume and high dimensionality. Since traditional machine learning-based detection methods have the problem of data redundancy, the Metaheuristic algorithm (MA) is introduced to select features before machine learning to reduce the dimensionality of data. Since a tyrannosaurus optimization algorithm (TROA) has the advantages of few parameters, simple implementation, and fast convergence, and it shows better results in feature selection, TROA can be applied to abnormal traffic detection for SDN. However, TROA suffers from insufficient global search capability, is easily trapped in local optimums, and has poor search accuracy. Then, this paper tries to improve TROA, namely the Improved tyrannosaurus optimization algorithm (ITROA). It proposes a metaheuristic-driven abnormal traffic detection model for SDN based on ITROA. Finally, the validity of the ITROA is verified by the benchmark function and the UCI dataset, and the feature selection optimization operation is performed on the InSDN dataset by ITROA and other MAs to obtain the optimized feature subset for SDN abnormal traffic detection. The experiment shows that the performance of the proposed ITROA outperforms compared MAs in terms of the metaheuristic-driven model for SDN, achieving an accuracy of 99.37% on binary classification and 96.73% on multiclassification.
Cybersecurity has become a critical concern due to the exponential growth of the Internet of Things (IoT), computer networks, and associated applications, which have introduced new vulnerabilities and increased the ri...
详细信息
Cybersecurity has become a critical concern due to the exponential growth of the Internet of Things (IoT), computer networks, and associated applications, which have introduced new vulnerabilities and increased the risk of cyberattacks. Detecting such anomalies and designing an efficient intrusion detection system (IDS) is essential to secure interconnected systems. Therefore, this paper proposes an enhancing cybersecurity using optimized anti-interference dynamic integral neural network-based intrusion detection system (AIDINN-CSD). Here, the input data is collected through CIC IoT 2022 dataset. The input CIC IoT 2022 dataset is preprocessed using smoothing-sharpening filter (SSF) for handling missing values and data normalization. Synthetic minority oversampling technique (SMOTE) is used for data balancing. Then, the tyrannosaurus optimization algorithm (TOA) selects relevant features from the preprocessed data. The selected features are used by anti-interference dynamic integral neural network (AIDINN) for detecting normal and attack class from the data. Then, the weight parameters of AIDINN are optimized using Capuchin search optimizationalgorithm (CSOA) for improving accuracy and lowering computational time. The results show that the proposed technique attains 99.23% accuracy rate, 98.97% precision and 98.47% detection rate by outperforming existing techniques. These results show the effectiveness of the AIDINN-CSD in addressing the limitations of conventional IDS, particularly its ability to handle imbalanced datasets and reduce false positives thereby offering a promising solution for enhancing IoT network security and mitigating cyber threats.
Menstrual Hygiene Management is not only a health issue but also a crucial aspect of social and economic development. When women and girls have proper menstrual hygiene, it positively impacts their overall wellbeing, ...
详细信息
Menstrual Hygiene Management is not only a health issue but also a crucial aspect of social and economic development. When women and girls have proper menstrual hygiene, it positively impacts their overall wellbeing, educational opportunities, and participation in the workforce. This study proposed the Hybrid Recurrent Long Short-term based tyrannosaurus Search (HRLS-TS) algorithm for real-time health monitoring during menstruation. The integration of these advanced techniques offers real-time data processing and analysis, especially when combined with IoT devices. In this work, a Recurrent Neural Network is employed to predict menstrual cycle-related historical data and analyze menstrual cycle patterns, also Long Short-term Memory (LSTM) is utilized to analyze menstrual flow data and capture rapid changes and fluctuations. To enhance accuracy, an initial search-based tyrannosaurusoptimization technique is applied. Notably, the incorporation of tyrannosaurusoptimization ensures efficient hyperparameter tuning, enhancing the overall performance of the developed method. Experiments were conducted based on performance evaluation measures such as recall, F1score, precision, Area Under the Curve-Receiver Operating Characteristic (AUC-ROC), accuracy and specificity, Mean Absolute Percentage error (MAPE), computational time, Mean Squared Error (MSE), Mean Absolute Error (MAE) and residual error, were used to assess the proposed and existing methods. The results are then compared with existing methods, demonstrating the efficiency of the HRLS-TS technique in real-time health monitoring.
Wind turbines are predominantly situated in remote, high-altitude regions, where they face a myriad of harsh environmental conditions. Factors such as high humidity, strong gusts, lightning strikes, and heavy snowfall...
详细信息
Wind turbines are predominantly situated in remote, high-altitude regions, where they face a myriad of harsh environmental conditions. Factors such as high humidity, strong gusts, lightning strikes, and heavy snowfall significantly increase the vulnerability of turbine blades to fatigue damage. This susceptibility poses serious risks to the normal operation and longevity of the turbines, necessitating effective monitoring and maintenance strategies. In response to these challenges, this paper proposes a novel fault detection method specifically designed for analyzing wind turbine blade noise signals. This method integrates the tyrannosaurus optimization algorithm (TROA) with a support vector machine (SVM), aiming to enhance the accuracy and reliability of fault detection. The process begins with the careful preprocessing of raw noise signals collected from wind turbines during actual operational conditions. The method extracts vital features from three key perspectives: the time domain, frequency domain, and cepstral domain. By constructing a comprehensive feature matrix that encapsulates multi-dimensional characteristics, the approach ensures that all relevant information is captured. Rigorous analysis and feature selection are subsequently conducted to eliminate redundant data, thereby focusing on retaining the most significant features for classification. A TROA-SVM classification model is then developed to effectively identify the faults of the turbine blades. The performance of this method is validated through extensive experiments, which indicate that the recognition accuracy rate is 98.7%. This accuracy is higher than that of the traditional methods, such as SVM, K-Nearest Neighbors (KNN), and random forest, demonstrating the proposed method's superiority and effectiveness.
As digitalization permeates all aspects of life, the Internet has become a critical platform for communication across various domains. Workstations within organizations often handle sensitive and private data, undersc...
详细信息
As digitalization permeates all aspects of life, the Internet has become a critical platform for communication across various domains. Workstations within organizations often handle sensitive and private data, underscoring the need for encryption to safeguard information and prevent unauthorized access. Despite advances in system security, challenges remain in the form of system vulnerabilities and evolving cyber threats. Intrusion detection using deep learning (DL), which serves as the second line of defense after firewalls, has progressed rapidly, yet still faces issues such as misclassification, false positives, and delayed or inadequate responses to attacks. These ongoing problems necessitate continuous improvement in system security screening and intrusion detection to protect networks effectively. Therefore, in this research, a novel DL framework called capsule convolutional polymorphic graph attention neural network with tyrannosaurus optimization algorithm (CCPGANN-TOA) is utilized for attack detection due to its advanced feature representation, graph attention for focusing on key data points, polymorphic graphs for adaptability, and TOA for performance optimization. Normal data are then encrypted using the digital signature algorithm based on elliptic curve cryptography (DSA-ECC) because it provides strong security with smaller key sizes, resulting in faster computations and efficient resource utilization. The proposed method outperforms traditional approaches in terms of 99.98% accuracy of data set I, 99.9% accuracy of data set II, and 900 Kbps higher throughput with low delay.
The change in transportation efficiency in the last several years has seen several new engine technologies like EVs and HEVs being more prevalent. Integration of RES wind energy technique, solar photovoltaics, and bio...
详细信息
The rapid increase in Internet users has made web applications essential for daily services, rendering them targets for various cyber-attacks like path traversal, zero-day attacks, and injection attacks. While traditi...
详细信息
The rapid increase in Internet users has made web applications essential for daily services, rendering them targets for various cyber-attacks like path traversal, zero-day attacks, and injection attacks. While traditional security measures can prevent many familiar attacks, they are often ineffective against OPTIONS attacks, which involve injecting malicious code via hyperlinks to obstruct user access to legitimate webpage content. To address this novel challenge, we propose the OAD-WSN-MMRCNN technique, leveraging an Optimized Multitask MultiAttention Residual Shrinkage Convolutional Neural Network for OPTIONS attack detection in Wireless Sensor Networks (WSNs). This approach begins by selecting a CPU parameters dataset for attack detection, followed by pre-processing with a Variational Bayesian-Based Maximum Correntropy Cubature Kalman Filter to remove redundant data. Key features such as handles, threads, processor, context switch, deferred procedure call (DPC), interrupt delta, CPU socket, and core are extracted using a variable velocity strategy particle swarm optimizationalgorithm. The MMRCNN, optimized with the tyrannosaurus optimization algorithm, is then employed to detect normal and OPTIONS attacks. Implemented in Python, the efficacy of OAD-WSN-MMRCNN is evaluated using metrics such as energy consumption, target window, accuracy, precision, F-measure, recall, and CPU utilization. Experimental results demonstrate that OAD-WSN-MMRCNN outperforms existing techniques, achieving a 20 % improvement in detection accuracy and a 25 % reduction in energy consumption, highlighting its effectiveness and potential for enhancing web application cyber security.
暂无评论