Cyber Security and Applications最新文献

筛选
英文 中文
Advancements in secure quantum communication and robust key distribution techniques for cybersecurity applications 安全量子通信和鲁棒密钥分发技术在网络安全应用中的进展
Cyber Security and Applications Pub Date : 2025-03-14 DOI: 10.1016/j.csa.2025.100089
Sunil K. Singh , Sudhakar Kumar , Anureet Chhabra , Akash Sharma , Varsha Arya , M. Srinivasan , Brij B. Gupta
{"title":"Advancements in secure quantum communication and robust key distribution techniques for cybersecurity applications","authors":"Sunil K. Singh ,&nbsp;Sudhakar Kumar ,&nbsp;Anureet Chhabra ,&nbsp;Akash Sharma ,&nbsp;Varsha Arya ,&nbsp;M. Srinivasan ,&nbsp;Brij B. Gupta","doi":"10.1016/j.csa.2025.100089","DOIUrl":"10.1016/j.csa.2025.100089","url":null,"abstract":"<div><div>Quantum communication is a rapidly evolving field that leverages quantum physics to enable secure and efficient information exchange. A cornerstone of quantum cryptography is Quantum Key Distribution (QKD), a secure key exchange mechanism that ensures the confidentiality of transmitted data by employing the no-cloning theorem and the uncertainty principle of quantum mechanics. This study explores key aspects of quantum networks and communication, including quantum states, QKD, and quantum cryptographic protocols, with a focus on photon polarization states and entangled qubits as fundamental building blocks of quantum information. Additionally, two well-established quantum cryptographic protocols, BB84 and E91, are analyzed for their principles and advantages in secure communication. However, challenges such as quantum state loss in communication channels hinder the long-distance transmission of quantum information. To address these issues, error detection, measurement, and correction techniques are investigated, with quantum error correction methods playing a crucial role in mitigating noise and imperfections, ensuring accurate quantum information transmission, and enhancing the overall efficiency of quantum communication systems. Beyond conventional networks, quantum communication holds vast potential for cybersecurity applications, paving the way for next-generation secure communication frameworks.</div></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100089"},"PeriodicalIF":0.0,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144895371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing security in IIoT: RFID authentication protocol for edge computing and blockchain-enabled supply chain 增强工业物联网的安全性:用于边缘计算和区块链支持的供应链的RFID认证协议
Cyber Security and Applications Pub Date : 2025-02-24 DOI: 10.1016/j.csa.2025.100087
Vikash Kumar , Santosh Kumar Das
{"title":"Enhancing security in IIoT: RFID authentication protocol for edge computing and blockchain-enabled supply chain","authors":"Vikash Kumar ,&nbsp;Santosh Kumar Das","doi":"10.1016/j.csa.2025.100087","DOIUrl":"10.1016/j.csa.2025.100087","url":null,"abstract":"<div><div>This paper addresses security challenges, especially in the authentication mechanism of Industrial Internet of Things (IIoT)-enabled supply chain systems by proposing an enhanced Radio Frequency Identification (RFID) authentication protocol. The current system faces significant security risks due to increased connectivity and data exchange within supply chain networks. The proposed protocol integrates edge computing and blockchain to ensure secure, efficient mutual authentication between RFID tags and supply chain nodes. By utilizing the real-time processing capabilities of edge computing and the decentralization and immutability of blockchain, the protocol enhances the security of data transmitted in the system. The proposed protocol utilizes lightweight cryptographic functions optimized for resource-constrained edge devices, ensuring secure authentication and data transmission without compromising scalability or efficiency. Permissioned blockchain technology further strengthens trust and transparency in the supply chain by providing a decentralized, tamper-resistant ledger. The protocol employs cryptographic techniques such as a cryptographically secure one-way hash function, random number generation function, and circular shift operations to ensure data integrity and confidentiality, achieving mutual authentication, forward secrecy, and resistance to cryptographic attacks. Formal security analysis of the proposed authentication protocol is performed using the Real-Or-Random (ROR) model. The results demonstrate that the protocol offers superior trade-offs in term of security, computational cost, and communication efficiency compared to existing authentication protocols in this field. Simulation of the protocol is performed using Automated Validation of Internet Security Protocols and Applications (AVISPA) tools. Its lightweight design makes it suitable for real-world application in resource-constrained IIoT environments.</div></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100087"},"PeriodicalIF":0.0,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143636745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging blockchain for robust and transparent E-voting systems 利用区块链建立健全和透明的电子投票系统
Cyber Security and Applications Pub Date : 2025-02-22 DOI: 10.1016/j.csa.2025.100086
Fatima Abo-Akleek , Moad Mowafi , Eyad S. Taqieddin , Ahmed S. Shatnawi
{"title":"Leveraging blockchain for robust and transparent E-voting systems","authors":"Fatima Abo-Akleek ,&nbsp;Moad Mowafi ,&nbsp;Eyad S. Taqieddin ,&nbsp;Ahmed S. Shatnawi","doi":"10.1016/j.csa.2025.100086","DOIUrl":"10.1016/j.csa.2025.100086","url":null,"abstract":"<div><div>Voting is considered one of the most critical actions for proper decision-making in governmental entities, boards of directors, and the financial sector. Many researchers proposed E-voting systems where the voting process is done online or through secure voting stations with high levels of trust for recording and counting the votes. Moreover, with the recent pandemic highlighting the need for remote voting, transitioning to E-voting is becoming even more critical. One way to build such technology is through Blockchain, which can be employed to guarantee the voting system requirements such as reliability, anonymity, decentralization, and privacy. This work proposes a blockchain-based E-voting system that consists of a distributed architecture for the voter, intermediate servers, and blockchain network components. The intermediate servers are mainly used to balance the workload between the voters and the blockchain servers. The system servers apply a scheduling algorithm to distribute the workload amongst themselves. In addition to the distributed architecture, a new algorithm for storing the blocks within each server’s database is introduced. Emphasis is further placed on how these blocks are broadcast to the other servers. Simulation results show a clear difference in execution time when comparing the proposed distributed architecture with the centralized system. In addition, the new proposed blockchain algorithm shows better results in executing the vote-counting task and identifying any corrupted blocks.</div></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100086"},"PeriodicalIF":0.0,"publicationDate":"2025-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143508397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber intrusion detection using ensemble of deep learning with prediction scoring based optimized feature sets for IOT networks 使用基于预测评分的物联网网络优化特征集的深度学习集成的网络入侵检测
Cyber Security and Applications Pub Date : 2025-02-21 DOI: 10.1016/j.csa.2025.100088
Deepesh M. Dhanvijay , Mrinai M. Dhanvijay , Vaishali H. Kamble
{"title":"Cyber intrusion detection using ensemble of deep learning with prediction scoring based optimized feature sets for IOT networks","authors":"Deepesh M. Dhanvijay ,&nbsp;Mrinai M. Dhanvijay ,&nbsp;Vaishali H. Kamble","doi":"10.1016/j.csa.2025.100088","DOIUrl":"10.1016/j.csa.2025.100088","url":null,"abstract":"<div><div>Detecting intrusions in Internet of Things (IoT) networks is critical for maintaining cybersecurity. Traditional Intrusion Detection Systems (IDS) often face challenges in identifying unknown attacks and tend to have high false positive rates. To address these issues, we propose the Ensemble of Deep Learning Models with Prediction Scoring-based Optimized Feature Sets (EDLM-PSOFS). Our approach begins with data preprocessing utilizing MissForest imputation and label one-hot encoding, effectively managing incomplete and categorical data.</div><div>For feature selection, we employ the Median-based Shapiro-Wilk test alongside Correlation-Adaptive LASSO Regression (CALR) to ensure robust feature extraction. To capture temporal patterns effectively, our ensemble integrates Global Attention Long Short-Term Memory networks (GA-LSTMs), utilizing layered structures, residual connections, and attention mechanisms. Additionally, to enhance interpretability and support decision-making, we incorporate the Exploit Prediction Scoring System (EPSS), which evaluates prediction scores and provides detailed insights, thereby improving overall model performance. This comprehensive methodology aims to strengthen the detection capabilities of IDS in IoT environments, reducing false positives while effectively identifying unknown threats.</div></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100088"},"PeriodicalIF":0.0,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143577844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments 云计算环境下深度学习驱动的DDoS攻击防御策略
Cyber Security and Applications Pub Date : 2025-01-10 DOI: 10.1016/j.csa.2025.100085
Doaa Mohsin Abd Ali Afraji , Jaime Lloret , Lourdes Peñalver
{"title":"Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments","authors":"Doaa Mohsin Abd Ali Afraji ,&nbsp;Jaime Lloret ,&nbsp;Lourdes Peñalver","doi":"10.1016/j.csa.2025.100085","DOIUrl":"10.1016/j.csa.2025.100085","url":null,"abstract":"<div><div>The kind of cyber threat prevalent and most dangerous to networked systems is the Distributed Denial of Service (DDoS), especially with expanded connection of Internet of Things (IoT) devices. This article categorizes DDoS attacks into three primary types: volumetric, protocol based and application layer of cyber attacks. It discusses the application of security threats that arise from the use of the DL models, accusing recently introduced ideas and stressing pitfalls: the issues of data and methods scarcity. There is the same need for the greater use of explainable and transparent AI to improve confidence in such security systems as is noted in the review. It also reveals that present detection performance is constrained and frequently obstructed by the poor quality of the datasets. The future work is proposed to build superior datasets and use accurate algorithm to improve the security models. This paper focuses on explainability as a way of making the AI model creation process and any consequent decisions explainable and transparent. The use of deep learning enhances the capability of cybersecurity in handling DDoS attacks and preventing or controlling them. But it has to be a part of a more large-scope platform, based on multiple types of longitudinal or cross-sectional data combined with high efficiency, explainable AI. The article ends with call to proceed with studying and advancing the AI application in response to new threats, and make the most of it to enhance protection of the contemporary networked environment.</div></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100085"},"PeriodicalIF":0.0,"publicationDate":"2025-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143178619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving security of IoT networks: A comparative analysis of methods and applications 物联网网络的隐私保护安全:方法和应用的比较分析
Cyber Security and Applications Pub Date : 2025-01-06 DOI: 10.1016/j.csa.2025.100084
Abubakar Wakili, Sara Bakkali
{"title":"Privacy-preserving security of IoT networks: A comparative analysis of methods and applications","authors":"Abubakar Wakili,&nbsp;Sara Bakkali","doi":"10.1016/j.csa.2025.100084","DOIUrl":"10.1016/j.csa.2025.100084","url":null,"abstract":"<div><div>The Internet of Things (IoT) connects devices to enhance efficiency, productivity, and quality of life. However, deploying IoT networks introduces critical privacy and security challenges, including resource constraints, scalability issues, interoperability gaps, and risks to data privacy. Addressing these challenges is vital to ensure the reliability and trustworthiness of IoT applications. This study provides a comprehensive analysis of privacy-preserving security methods, evaluating cryptography, blockchain, machine learning, and fog/edge computing against performance indicators such as scalability, efficiency, robustness, and usability. Through a structured literature review and thorough data analysis, the study reveals that while cryptography offers high security, it faces scalability challenges; blockchain excels in decentralization but struggles with efficiency; machine learning provides adaptive intelligence but raises privacy concerns; and fog/edge computing delivers low-latency processing yet encounters operational complexities. The findings highlight the importance of adopting a hybrid approach that combines the strengths of various methods to overcome their limitations. This study serves as a valuable resource for academia, industry professionals, and policymakers, providing guidance to strengthen IoT infrastructures and influence the direction of future research.</div></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100084"},"PeriodicalIF":0.0,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143178618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Earthworm optimization algorithm based cascade LSTM-GRU model for android malware detection 基于级联LSTM-GRU模型的蚯蚓优化算法的android恶意软件检测
Cyber Security and Applications Pub Date : 2025-01-02 DOI: 10.1016/j.csa.2024.100083
Brij B. Gupta , Akshat Gaurav , Varsha Arya , Shavi Bansal , Razaz Waheeb Attar , Ahmed Alhomoud , Konstantinos Psannis
{"title":"Earthworm optimization algorithm based cascade LSTM-GRU model for android malware detection","authors":"Brij B. Gupta ,&nbsp;Akshat Gaurav ,&nbsp;Varsha Arya ,&nbsp;Shavi Bansal ,&nbsp;Razaz Waheeb Attar ,&nbsp;Ahmed Alhomoud ,&nbsp;Konstantinos Psannis","doi":"10.1016/j.csa.2024.100083","DOIUrl":"10.1016/j.csa.2024.100083","url":null,"abstract":"<div><div>The rise in mobile malware risks brought on by the explosion of Android smartphones required more efficient detection techniques. Inspired by a cascade of Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) networks, optimized using the Earthworm Optimization Algorithm (EOA), this study presents an android malware detection model. The paper used random forest model for feature selection. With a 99% accuracy and the lowest loss values, the proposed model performs better than conventional models including GRU, LSTM, RNN, Logistic Regression, and SVM.. The findings highlight the possibility of proposed method in improving Android malware detection, thereby providing a strong answer in the changing scene of cybersecurity.</div></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100083"},"PeriodicalIF":0.0,"publicationDate":"2025-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143178617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on intrusion detection system in IoT networks 物联网网络中入侵检测系统研究综述
Cyber Security and Applications Pub Date : 2024-12-20 DOI: 10.1016/j.csa.2024.100082
Md Mahbubur Rahman , Shaharia Al Shakil , Mizanur Rahman Mustakim
{"title":"A survey on intrusion detection system in IoT networks","authors":"Md Mahbubur Rahman ,&nbsp;Shaharia Al Shakil ,&nbsp;Mizanur Rahman Mustakim","doi":"10.1016/j.csa.2024.100082","DOIUrl":"10.1016/j.csa.2024.100082","url":null,"abstract":"<div><div>As the Internet of Things (IoT) expands, the security of IoT networks has becoming more critical. Intrusion Detection Systems (IDS) are essential for protecting these networks against malicious activities. Artificial intelligence, with its adaptive and self-learning capabilities, has emerged as a promising approach to enhancing intrusion detection in IoT environments. Machine learning facilitates dynamic threat identification, reduces false positives, and addresses evolving vulnerabilities. This survey provides an analysis of contemporary intrusion detection techniques, models, and their performances in IoT networks, offering insights into IDS design and implementation. It reviews data extraction techniques, useful matrices, and loss functions in IDS for IoT networks, ranking top-cited algorithms and categorizing IDS studies based on different approaches. The survey evaluates various datasets used in IoT intrusion detection, examining their attributes, benefits, and drawbacks, and emphasizes performance metrics and computational efficiency, providing insights into IDS effectiveness and practicality. Standardized evaluation metrics and real-world testing are stressed to ensure reliability. Additionally, the survey identifies significant challenges and open issues in ML and DL-based IDS for IoT networks, such as computational complexity and high false positive rates, and recommends potential research directions, emerging trends, and perspectives for future work. This forward-looking perspective aids in shaping the future direction of research in this dynamic field, emphasizing the need for lightweight, efficient IDS models suitable for resource- constrained IoT devices and the importance of comprehensive, representative datasets.</div></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100082"},"PeriodicalIF":0.0,"publicationDate":"2024-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143178616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of mitigating DDoS attacks in software defined networking and IoT platforms 软件定义网络和物联网平台中缓解DDoS攻击的比较
Cyber Security and Applications Pub Date : 2024-12-08 DOI: 10.1016/j.csa.2024.100080
Sivanesan. N , N. Parthiban , S. Vijay , S.N. Sheela
{"title":"Comparison of mitigating DDoS attacks in software defined networking and IoT platforms","authors":"Sivanesan. N ,&nbsp;N. Parthiban ,&nbsp;S. Vijay ,&nbsp;S.N. Sheela","doi":"10.1016/j.csa.2024.100080","DOIUrl":"10.1016/j.csa.2024.100080","url":null,"abstract":"<div><div>The Software-Defined Networking (SDN) paradigm redefines the term \"network\" by enabling network managers to programmatically initialize, control, alter, and govern network behavior. Network engineers benefit from SDN's ability to rapidly track networks, centrally manage networks, and quickly and effectively detect malicious traffic and connection failure. The attacker will have total control over the system if he is able to access the main controller. The system's resources can be completely exhausted by Distributed Denial of Service (DDoS) assaults, rendering the controller's services entirely unavailable. The low computational and power capabilities of everyday Internet of Things (IoT) devices render the controller highly susceptible to these attacks; the IoT ecosystem prioritizes functionality over security features, making DDoS attacks a significant problem. This paper conducts a comparative study on the use of machine learning (ML) to mitigate DDoS attack traffic, distinguishing it from benign traffic. This is done to prevent several assaults and to provide mitigation security threats in the network, according to specific requirements. So, the study used machine learning-based techniques to make both traditional and SDN-IoT environments less vulnerable to DDoS attacks. Therefore, the primary goals of the comparative study are to determine which SDN and SDN-IoT platform is better at detecting DDoS attacks and to evaluate how well both platforms work when combined with ML techniques.</div></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100080"},"PeriodicalIF":0.0,"publicationDate":"2024-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143178614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software defined network and graph neural network-based anomaly detection scheme for high speed networks 基于软件定义网络和图神经网络的高速网络异常检测方案
Cyber Security and Applications Pub Date : 2024-11-30 DOI: 10.1016/j.csa.2024.100079
Archan Dadhania , Poojan Dave , Jitendra Bhatia , Rachana Mehta , Malaram Kumhar , Sudeep Tanwar , Abdulatif Alabdulatif
{"title":"Software defined network and graph neural network-based anomaly detection scheme for high speed networks","authors":"Archan Dadhania ,&nbsp;Poojan Dave ,&nbsp;Jitendra Bhatia ,&nbsp;Rachana Mehta ,&nbsp;Malaram Kumhar ,&nbsp;Sudeep Tanwar ,&nbsp;Abdulatif Alabdulatif","doi":"10.1016/j.csa.2024.100079","DOIUrl":"10.1016/j.csa.2024.100079","url":null,"abstract":"<div><div>In recent years, the proliferation of Software-Defined Networking (SDN) has revolutionized network management and operation. However, with SDN’s increased connectivity and dynamic nature, security threats like Denial-of-Service (DoS) attacks have also evolved, posing significant challenges to network administrators. This research uses the GraphSAGE algorithm to improve DoS attack detection using SDN and Graph Neural Network (GNN) to address the abovementioned problems. The study further explores the effectiveness of four anomaly detection techniques - Histogram-Based Outlier Score (HBOS), Cluster-Based Local Outlier Factor (CBLOF), Isolation Forest (IF), and Principal Component Analysis (PCA) - to identify and mitigate potential DoS attacks accurately. Through extensive experimentation and evaluation, the proposed framework achieves an better accuracy of detecting the anomalies than one without GraphSAGE model underscoring its potential to strengthen the security of SDN architectures against DoS attacks.</div></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100079"},"PeriodicalIF":0.0,"publicationDate":"2024-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143177278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信