Deep Neural Networks(DNNs)are integral to various aspects of modern life,enhancing work ***-less,their susceptibility to diverse attack methods,including backdoor attacks,raises security *** aim to investigate backdoo...
详细信息
Deep Neural Networks(DNNs)are integral to various aspects of modern life,enhancing work ***-less,their susceptibility to diverse attack methods,including backdoor attacks,raises security *** aim to investigate backdoor attack methods for image categorization tasks,to promote the development of DNN towards higher *** on backdoor attacks currently faces significant challenges due to the distinct and abnormal data patterns of malicious samples,and the meticulous data screening by developers,hindering practical attack *** overcome these challenges,this study proposes a Gaussian Noise-Targeted Universal Adversarial Perturbation(GN-TUAP)*** approach restricts the direction of perturbations and normalizes abnormal pixel values,ensuring that perturbations progress as much as possible in a direction perpendicular to the decision hyperplane in linear *** limits anomalies within the perturbations improves their visual stealthiness,and makes them more challenging for defense methods to *** verify the effectiveness,stealthiness,and robustness of GN-TUAP,we proposed a comprehensive threat *** on this model,extensive experiments were conducted using the CIFAR-10,CIFAR-100,GTSRB,and MNIST datasets,comparing our method with existing state-of-the-art attack *** also tested our perturbation triggers using various defense methods and further experimented on the robustness of the triggers against noise filtering *** experimental outcomes demonstrate that backdoor attacks leveraging perturbations generated via our algorithm exhibit cross-model attack effectiveness and superior ***,they possess robust anti-detection capabilities and maintain commendable performance when subjected to noise-filtering methods.
While encryption technology safeguards the security of network communications,malicious traffic also uses encryption protocols to obscure its malicious *** address the issues of traditional machine learning methods re...
详细信息
While encryption technology safeguards the security of network communications,malicious traffic also uses encryption protocols to obscure its malicious *** address the issues of traditional machine learning methods relying on expert experience and the insufficient representation capabilities of existing deep learning methods for encrypted malicious traffic,we propose an encrypted malicious traffic classification method that integrates global semantic features with local spatiotemporal features,called BERT-based Spatio-Temporal Features Network(BSTFNet).At the packet-level granularity,the model captures the global semantic features of packets through the attention mechanism of the Bidirectional Encoder Representations from Transformers(BERT)*** the byte-level granularity,we initially employ the Bidirectional Gated Recurrent Unit(BiGRU)model to extract temporal features from bytes,followed by the utilization of the Text Convolutional Neural Network(TextCNN)model with multi-sized convolution kernels to extract local multi-receptive field spatial *** fusion of features from both granularities serves as the ultimate multidimensional representation of malicious *** approach achieves accuracy and F1-score of 99.39%and 99.40%,respectively,on the publicly available USTC-TFC2016 dataset,and effectively reduces sample confusion within the Neris and Virut *** experimental results demonstrate that our method has outstanding representation and classification capabilities for encrypted malicious traffic.
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** the...
详细信息
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** these devices are constrained in numerous aspects,it leaves network designers and administrators with no choice but to deploy them with minimal or no security at *** have seen distributed denial-ofservice attacks being raised using such devices during the infamous Mirai botnet attack in *** we propose a lightweight authentication protocol to provide proper access to such *** have considered several aspects while designing our authentication protocol,such as scalability,movement,user registration,device registration,*** define the architecture we used a three-layered model consisting of cloud,fog,and edge *** have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and *** also provide a fail-safe mechanism for a situation where an authenticating server might fail,and the deployed IoT devices can self-organize to keep providing services with no human *** find that our protocol works the fastest when using ring learning with *** prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications *** conclusion,we propose a safe,hybrid,and fast authentication protocol for authenticating IoT devices in a fog computing environment.
Intrusion detection systems(IDS)are one of the most promising ways for securing data and networks;In recent decades,IDS has used a variety of categorization *** classifiers,on the other hand,do not work effectively un...
详细信息
Intrusion detection systems(IDS)are one of the most promising ways for securing data and networks;In recent decades,IDS has used a variety of categorization *** classifiers,on the other hand,do not work effectively unless they are combined with additional algorithms that can alter the classifier’s parameters or select the optimal sub-set of features for the *** are used in tandem with classifiers to increase the stability and with efficiency of the classifiers in detecting *** algorithms,on the other hand,have a number of limitations,particularly when used to detect new types of *** this paper,the NSL KDD dataset and KDD Cup 99 is used to find the performance of the proposed classifier model and compared;These two IDS dataset is preprocessed,then Auto Cryptographic Denoising(ACD)adopted to remove noise in the feature of the IDS dataset;the classifier algorithms,K-Means and Neural network classifies the dataset with adam *** classifier is evaluated by measuring performance measures like f-measure,recall,precision,detection rate and *** neural network obtained the highest classifying accuracy as 91.12%with drop-out function that shows the efficiency of the classifier model with drop-out function for KDD Cup99 *** their power and limitations in the proposed methodology that could be used in future works in the IDS area.
A Recommender System(RS)is a crucial part of several firms,particularly those involved in *** conventional RS,a user may only offer a single rating for an item-that is insufficient to perceive consumer ***,businesses ...
详细信息
A Recommender System(RS)is a crucial part of several firms,particularly those involved in *** conventional RS,a user may only offer a single rating for an item-that is insufficient to perceive consumer ***,businesses in industries like e-learning and tourism enable customers to rate a product using a variety of factors to comprehend customers’*** the other hand,the collaborative filtering(CF)algorithm utilizing AutoEncoder(AE)is seen to be effective in identifying user-interested ***,the cost of these computations increases nonlinearly as the number of items and users *** triumph over the issues,a novel expanded stacked autoencoder(ESAE)with Kernel Fuzzy C-Means Clustering(KFCM)technique is proposed with two *** the first phase of offline,the sparse multicriteria rating matrix is smoothened to a complete matrix by predicting the users’intact rating by the ESAE approach and users are clustered using the KFCM *** the next phase of online,the top-N recommendation prediction is made by the ESAE approach involving only the most similar user from multiple *** the ESAE_KFCM model upgrades the prediction accuracy of 98.2%in Top-N recommendation with a minimized recommendation generation *** experimental check on the Yahoo!Movies(YM)movie dataset and TripAdvisor(TA)travel dataset confirmed that the ESAE_KFCM model constantly outperforms conventional RS algorithms on a variety of assessment measures.
For Future networks, many research projects have proposed different architectures around the globe;Software Defined Network(SDN) architectures, through separating Data and Control Layers, offer a crucial structure for...
详细信息
For Future networks, many research projects have proposed different architectures around the globe;Software Defined Network(SDN) architectures, through separating Data and Control Layers, offer a crucial structure for it. With a worldwide view and centralized Control, the SDN network provides flexible and reliable network management that improves network throughput and increases link utilization. In addition, it supports an innovative flow scheduling system to help advance Traffic engineering(TE). For Medium and large-scale networks migrating directly from a legacy network to an SDN Network seems more complicated & even impossible, as there are High potential challenges, including technical, financial, security, shortage of standards, and quality of service degradation challenges. These challenges cause the birth and pave the ground for Hybrid SDN networks, where SDN devices coexist with traditional network devices. This study explores a Hybrid SDN network’s Traffic engineering and Quality of Services Issues. Quality of service is described by network characteristics such as latency, jitter, loss, bandwidth,and network link utilization, using industry standards and mechanisms in a Hybrid SDN Network. We have organized the related studies in a way that the Quality of Service may gain the most benefit from the concept of Hybrid SDN networks using different algorithms and mechanisms: Deep Reinforcement Learning(DRL), Heuristic algorithm, K path partition algorithm, Genetic algorithm, SOTE algorithm, ROAR method, and Routing Optimization with different optimization mechanisms that help to ensure high-quality performance in a Hybrid SDN Network.
At present,hundreds of cloud vendors in the global market provide various services based on a customer’s *** cloud vendors are not the same in terms of the number of services,infrastructure availability,security stra...
详细信息
At present,hundreds of cloud vendors in the global market provide various services based on a customer’s *** cloud vendors are not the same in terms of the number of services,infrastructure availability,security strategies,cost per customer,and reputation in the ***,software developers and organizations face a dilemma when choosing a suitable cloud vendor for their developmental ***,there is a need to evaluate various cloud service providers(CSPs)and platforms before choosing a suitable *** existing solutions are either based on simulation tools as per the requirements or evaluated concerning the quality of service ***,they require more time to collect data,simulate and evaluate the *** proposed work compares various CSPs in terms of major metrics,such as establishment,services,infrastructure,tools,pricing models,market share,etc.,based on the comparison,parameter ranking,and weightage ***,the parameters are categorized depending on the priority *** weighted average is calculated for each CSP,after which the values are sorted in descending *** experimental results show the unbiased selection of CSPs based on the chosen *** proposed parameter-ranking priority level weightage(PRPLW)algorithm simplifies the selection of the best-suited cloud vendor in accordance with the requirements of software development.
Over the past era,subgraph mining from a large collection of graph database is a crucial *** addition,scalability is another big problem due to insufficient *** are several security challenges associated with subgraph...
详细信息
Over the past era,subgraph mining from a large collection of graph database is a crucial *** addition,scalability is another big problem due to insufficient *** are several security challenges associated with subgraph mining in today’s on-demand *** address this downside,our proposed work introduces a Blockchain-based Consensus algorithm for Authenticated query search in the Large-Scale Dynamic Graphs(BCCA-LSDG).The two-fold process is handled in the proposed BCCA-LSDG:graph indexing and authenticated query search(query processing).A blockchain-based reputation system is meant to maintain the trust blockchain and cloud server of the proposed *** resolve the issues and provide safe big data transmission,the proposed technique also combines blockchain with a consensus algorithm *** of the big data is ensured by dividing the BC network into distinct networks,each with a restricted number of allowed entities,data kept in the cloud gate server,and data analysis in the *** consensus algorithm is crucial for maintaining the speed,performance and security of the *** Dual Similarity based MapReduce helps in mapping and reducing the relevant subgraphs with the use of optimal feature ***,the graph index refinement process is undertaken to improve the query *** query error,fuzzy logic is used to refine the index of the graph *** proposed technique outperforms advanced methodologies in both blockchain and non-blockchain systems,and the combination of blockchain and subgraph provides a secure communication platform,according to the findings.
In today's Internet routing infrastructure,designers have addressed scal-ing concerns in routing constrained multiobjective optimization problems examining latency and mobility concerns as a secondary *** tactical...
详细信息
In today's Internet routing infrastructure,designers have addressed scal-ing concerns in routing constrained multiobjective optimization problems examining latency and mobility concerns as a secondary *** tactical Mobile Ad-hoc Network(MANET),hubs can function based on the work plan in various social affairs and the internally connected hubs are almost having the related moving standards where the topology between one and the other are tightly coupled in steady support by considering the touchstone of hubs such as a self-sorted out,self-mending and *** in the routing process is one of the key aspects to increase MANET performance by coordinat-ing the pathways using multiple criteria and *** present a Group Adaptive Hybrid Routing Algorithm(GAHRA)for gathering portability,which pursues table-driven directing methodology in stable accumulations and on-request steering strategy for versatile *** on this aspect,the research demonstrates an adjustable framework for commuting between the table-driven approach and the on-request approach,with the objectives of enhancing the out-put of MANET routing computation in each *** analysis and replication results reveal that the proposed method is promising than a single well-known existing routing approach and is well-suited for sensitive MANET applications.
Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, f...
详细信息
Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, fingerprintsand faces have been widely used for person identification, which has the risk of information leakage as a resultof reproducing fingers or faces by taking a snapshot. Recently, people have focused on creating an identifiablepattern, which will not be reproducible falsely by capturing psychological and behavioral information of a personusing vision and sensor-based techniques. In existing studies, most of the researchers used very complex patternsin this direction, which need special training and attention to remember the patterns and failed to capturethe psychological and behavioral information of a person properly. To overcome these problems, this researchdevised a novel dynamic hand gesture-based person identification system using a Leap Motion sensor. Thisstudy developed two hand gesture-based pattern datasets for performing the experiments, which contained morethan 500 samples, collected from 25 subjects. Various static and dynamic features were extracted from the handgeometry. Randomforest was used to measure feature importance using the Gini Index. Finally, the support vectormachinewas implemented for person identification and evaluate its performance using identification accuracy. Theexperimental results showed that the proposed system produced an identification accuracy of 99.8% for arbitraryhand gesture-based patterns and 99.6% for the same dynamic hand gesture-based patterns. This result indicatedthat the proposed system can be used for person identification in the field of security.
暂无评论