Cyber Security and Applications最新文献

筛选
英文 中文
Distributed and trustworthy digital twin platform based on blockchain and Web3 technologies 基于区块链和 Web3 技术的分布式可信数字孪生平台
Cyber Security and Applications Pub Date : 2024-07-05 DOI: 10.1016/j.csa.2024.100064
Seyed Mojtaba Hosseini Bamakan , Saeed Banaeian Far
{"title":"Distributed and trustworthy digital twin platform based on blockchain and Web3 technologies","authors":"Seyed Mojtaba Hosseini Bamakan ,&nbsp;Saeed Banaeian Far","doi":"10.1016/j.csa.2024.100064","DOIUrl":"10.1016/j.csa.2024.100064","url":null,"abstract":"<div><p>The fourth industrial revolution has significantly increased the adoption of Digital Twins (DTs) across various sectors, including intelligent manufacturing, automation, logistics, and medical analysis. Despite substantial progress in deploying DT projects, numerous challenges remain, such as managing distributed data flows, protecting commercial confidentiality, securing intellectual property, and ensuring privacy and security. This research introduces a novel approach to addressing these challenges by leveraging blockchain and Web3 technologies, including non-fungible tokens (NFTs) and Distributed Autonomous Organizations (DAOs). The study aims to develop a distributed, tamper-proof DT cooperation platform that facilitates traceable and trustworthy data sharing while preserving intellectual property rights and enabling decentralized governance. This platform enhances idea and invention ownership, promotes collective decision-making through consensus protocols, and explores innovative solutions like blockchain-based federated learning and efficient DT project fundraising tools. Relying on security models and analysis tools, this study addresses several important security analysis methods/tools/models (e.g., random oracle model, BAN logic, AVISPA tool, and TAMARIN prover) that are known as practical analysis methods. They can strongly prove every claimed security feature of DT projects. The proposed solutions set the stage for future academic and industrial advancements, supported by a comprehensive SWOT (Strongness - Weakness - Opportunity - Threat) analysis, and outline potential future research directions.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100064"},"PeriodicalIF":0.0,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000304/pdfft?md5=5d1abd83937572d1a33c3217975ca8a0&pid=1-s2.0-S2772918424000304-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141639058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel approach for handling missing data to enhance network intrusion detection system 处理缺失数据以增强网络入侵检测系统的新方法
Cyber Security and Applications Pub Date : 2024-07-01 DOI: 10.1016/j.csa.2024.100063
Mahjabeen Tahir , Azizol Abdullah , Nur Izura Udzir , Khairul Azhar Kasmiran
{"title":"A novel approach for handling missing data to enhance network intrusion detection system","authors":"Mahjabeen Tahir ,&nbsp;Azizol Abdullah ,&nbsp;Nur Izura Udzir ,&nbsp;Khairul Azhar Kasmiran","doi":"10.1016/j.csa.2024.100063","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100063","url":null,"abstract":"<div><p>Managing missing data is a critical challenge in Intrusion Detection System (IDS) datasets, significantly affecting the performance of deep learning models. To address this issue, we introduce DeepLearning_Based_MissingData_Imputation (DMDI), a novel method designed to enhance the quality of input data by efficiently handling missing values. Our approach employs the Random Missing Value (RMV) algorithm to simulate missing data, enabling thorough testing and comparison of various imputation techniques. The DMDI method integrates a stacked denoising autoencoder with Gradient Boosting to improve imputation accuracy. We evaluated the effectiveness of our approach through three experimental phases: generating missing data, imputing missing values, and assessing imputation models. Using the NSL-KDD and UNSW-NB15 datasets, our results demonstrate significant improvements in the performance of five different classifiers (SVM, KNN, Logistic Regression, Decision Tree, and Random Forest) after imputation. On average, our method achieved accuracy improvements ranging from 0.95 to 0.97 across these classifiers compared to baseline imputation methods. Detailed analysis using Python 3 validates our findings, demonstrating enhanced model performance and robustness. This study underscores the necessity of precise missing data imputation for enhancing deep learning tasks, particularly in anomaly detection systems. It provides a reliable solution for managing missing data in IDS datasets.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100063"},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000298/pdfft?md5=09e2857fa1c1aad5fc434b6f9663038b&pid=1-s2.0-S2772918424000298-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141605222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved three factor authentication protocol for wireless body area networks 无线体域网络的改进型三因素身份验证协议
Cyber Security and Applications Pub Date : 2024-06-18 DOI: 10.1016/j.csa.2024.100062
Muthukumar Manickam, Ganesh Gopal Devarajan
{"title":"An improved three factor authentication protocol for wireless body area networks","authors":"Muthukumar Manickam,&nbsp;Ganesh Gopal Devarajan","doi":"10.1016/j.csa.2024.100062","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100062","url":null,"abstract":"<div><p>Wireless Body Area Networks (WBAN) is a concrete solution for the healthcare system, and it is paramount to ensure the sensed data by the WBAN sensors is secure against vulnerable threats and inaccessible by unauthorized entities. In light of this, highly robust authentication schemes and solutions are essential for the successful adoption of WBANs. To this end, a plethora of secure authentication solutions have been recommended by investigators over the past few decades. However, the absence of cohesive research work in view of secure mutual authentication schemes does not light on the extensive purpose of offering a bird’s-eye solution to the domain. To address the security issues in the previous schemes, we approach them in the following manner: We reviewed the Ali et al. scheme, a recently proposed authentication scheme for wireless medical sensor networks for healthcare monitoring, asserting that their scheme can withstand various attacks. Despite this, we proved that their scheme still has significant security weaknesses and is vulnerable to various attacks through rigorous cryptanalysis. Afterward, we proposed our three-factor authentication scheme to overcome the vulnerable attacks found in the Ali et al. scheme. Thereafter, we performed an extensive informal and formal analysis using Burrows-Abadi-Needham (BAN) logic to verify the robustness of the proposed scheme. From the analysis, we proved that the proposed authentication scheme is able to withstand various attacks on WBAN. Finally, a critical performance evaluation is done on our scheme. From the results, we identified that our scheme is a robust and identical solution for feature-rich WBAN health-care applications.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100062"},"PeriodicalIF":0.0,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000286/pdfft?md5=34980754b64c7fd31c0726f0060f4be3&pid=1-s2.0-S2772918424000286-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141479566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey of techniques to detect common weaknesses in program binaries 程序二进制文件常见弱点检测技术调查
Cyber Security and Applications Pub Date : 2024-05-28 DOI: 10.1016/j.csa.2024.100061
Ashish Adhikari, Prasad Kulkarni
{"title":"Survey of techniques to detect common weaknesses in program binaries","authors":"Ashish Adhikari,&nbsp;Prasad Kulkarni","doi":"10.1016/j.csa.2024.100061","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100061","url":null,"abstract":"<div><p>Software vulnerabilities resulting from coding weaknesses and poor development practices are common. Attackers can exploit these vulnerabilities and impact the security and privacy of end-users. Most end-user software is distributed as program binaries. Therefore, to increase trust in third-party software, researchers have built techniques and tools to detect and resolve different classes of coding weaknesses in binary software. Our work is motivated by the need to survey the state-of-the-art and understand the capabilities and challenges faced by binary-level techniques that were built to detect the most important coding weaknesses in software binaries. Therefore, in this paper, we first show the most critical coding weaknesses for compiled programming languages. We then survey, explore, and compare the <em>static</em> techniques that were developed to detect each such coding weakness in software binaries. Our other goal in this work is to discover and report the state of published open-source implementations of static binary-level security techniques. For the open-source frameworks that work as documented, we independently evaluate their effectiveness in detecting code vulnerabilities on a suite of program binaries. To our knowledge, this is the first work that surveys and independently evaluates the performance of state-of-the-art binary-level techniques to detect weaknesses in binary software.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100061"},"PeriodicalIF":0.0,"publicationDate":"2024-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000274/pdfft?md5=c9a8e0423e7058b2489659e2c1a52960&pid=1-s2.0-S2772918424000274-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141286033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An approach for assessing the functional vulnerabilities criticality of CPS components 评估 CPS 组件功能脆弱性关键性的方法
Cyber Security and Applications Pub Date : 2024-04-30 DOI: 10.1016/j.csa.2024.100058
Rasim Alguliyev, Ramiz Aliguliyev, Lyudmila Sukhostat
{"title":"An approach for assessing the functional vulnerabilities criticality of CPS components","authors":"Rasim Alguliyev,&nbsp;Ramiz Aliguliyev,&nbsp;Lyudmila Sukhostat","doi":"10.1016/j.csa.2024.100058","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100058","url":null,"abstract":"<div><p>Timely identification of critical security flaws in a cyber-physical system makes identifying risks and potential threats possible. To address this issue, threat models are created to better understand potential vulnerabilities that must be considered to ensure system reliability. Selecting the optimal solution for assessing the functional vulnerabilities criticality of cyber-physical system components is a complex process since all vulnerabilities must be identified, classified, and quantified according to a unified approach as part of the cybersecurity process. An effective tool for cyber-physical systems analysis is the Bayesian attack graph. Each path in the graph represents a sequence of attacks that an attacker can use to achieve a specific goal, such as gaining access to sensitive data or controlling a system. This paper proposes a quantitative method for assessing the vulnerability criticality of cyber-physical system components based on the Promethee II multi-criteria decision-making method. It allows ranking and identification of the system's most vulnerable components. The proposed approach is evaluated using a threat model and three scenarios of cyberattacks on a cyber-physical system. Comparison with TOPSIS, VIKOR, and ELECTRE methods proves the effectiveness of the proposed approach. The proposed approach can help technical specialists make more reasoned decisions when ranking critical vulnerabilities of cyber-physical system components to provide security measures and prevent cyberattacks.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100058"},"PeriodicalIF":0.0,"publicationDate":"2024-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000249/pdfft?md5=537b81fa3158aaa50778331ccc27fb52&pid=1-s2.0-S2772918424000249-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140843839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing IoT devices with fast and energy efficient implementation of PRIDE and PRESENT ciphers 通过快速、节能地实施 PRIDE 和 PRESENT 密码,确保物联网设备的安全
Cyber Security and Applications Pub Date : 2024-04-16 DOI: 10.1016/j.csa.2024.100055
Vijay Dahiphale , Hrishikesh Raut , Gaurav Bansod , Devendra Dahiphale
{"title":"Securing IoT devices with fast and energy efficient implementation of PRIDE and PRESENT ciphers","authors":"Vijay Dahiphale ,&nbsp;Hrishikesh Raut ,&nbsp;Gaurav Bansod ,&nbsp;Devendra Dahiphale","doi":"10.1016/j.csa.2024.100055","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100055","url":null,"abstract":"<div><p>The rise of low-power, cost-efficient internet-connected devices has led to a need for lightweight cryptography. The lightweight block cipher PRIDE, designed by Martin R. Albrecht, is one of the most efficient ciphers designed for IoT-constrained environments. It is useful for connected devices, requires fewer resources to implement, and has high performance. PRIDE is a software-oriented lightweight cipher optimized for microcontrollers. This paper focuses on the FPGA implementation of the PRIDE cipher by keeping throughput, energy, and power consumption metrics focused. The paper also presents a novel and simpler diagrammatical view of a Matrix Layer implementation of the PRIDE cipher. We also implemented the PRESENT cipher using the same metrics. We analyzed different design metrics on Field Programmable Gate Arrays (FPGAs) and compared the metrics of the PRIDE implementation with the well-known cipher PRESENT. This gives us an insight into the efficiency and reliability of PRIDE in IoT-constrained environments. We also proposed different architectures of the PRIDE cipher for 16-bit and 32-bit datapaths.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100055"},"PeriodicalIF":0.0,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000213/pdfft?md5=df43871fa4d22608fccc2bf541243198&pid=1-s2.0-S2772918424000213-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140645519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication, access control and scalability models in Internet of Things Security–A review 物联网安全中的身份验证、访问控制和可扩展性模型--综述
Cyber Security and Applications Pub Date : 2024-04-14 DOI: 10.1016/j.csa.2024.100057
M Kokila, Srinivasa Reddy K
{"title":"Authentication, access control and scalability models in Internet of Things Security–A review","authors":"M Kokila,&nbsp;Srinivasa Reddy K","doi":"10.1016/j.csa.2024.100057","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100057","url":null,"abstract":"<div><p>The Internet of Things (IoT) leads to the next phase of human interaction with technology. With the help of the IoT, physical objects can be given the ability to generate, receive, and seamlessly trade data with one another. The IoT includes a wide variety of applications, each of which focuses on automating a specific task and works to give inanimate objects the ability to act independently of human intervention. The currently available and upcoming IoT applications hold a great deal of promise for enhancing the level of convenience, productivity, and automation enjoyed by users. High levels of security, privacy, authentication, and the ability to recover from attacks are required for the implementation of such a world in a manner that is constantly expanding. In this light, it is necessary to make the necessary adjustments to the architecture of IoT applications to accomplish end-to-end security in IoT environments. In this article, a comprehensive review of the security-related challenges and potential sources of danger posed by IoT applications is provided. Following a discussion of security concerns, a variety of new and established technologies that are focused on achieving a high degree of trust in the applications of the IoT are covered. Machine learning, fog computing, edge computing, and blockchain are just a few of the technologies that help the IoT provide greater security.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100057"},"PeriodicalIF":0.0,"publicationDate":"2024-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000237/pdfft?md5=8fa317b32e24d44f6351a63506f93d8a&pid=1-s2.0-S2772918424000237-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140645449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Navigating the landscape: Safeguarding privacy and security in the era of ambient intelligence within healthcare settings 驾驭全局:在医疗环境中保护环境智能时代的隐私和安全
Cyber Security and Applications Pub Date : 2024-01-01 DOI: 10.1016/j.csa.2024.100046
Tarun Vats , Sudhakar Kumar , Sunil K. Singh , Uday Madan , Mehak Preet , Varsha Arya , Ritika Bansal , Ammar Almomani
{"title":"Navigating the landscape: Safeguarding privacy and security in the era of ambient intelligence within healthcare settings","authors":"Tarun Vats ,&nbsp;Sudhakar Kumar ,&nbsp;Sunil K. Singh ,&nbsp;Uday Madan ,&nbsp;Mehak Preet ,&nbsp;Varsha Arya ,&nbsp;Ritika Bansal ,&nbsp;Ammar Almomani","doi":"10.1016/j.csa.2024.100046","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100046","url":null,"abstract":"<div><p>Ambient intelligence technologies have the potential to transform healthcare by providing personalized, context-aware, and proactive support for patients and healthcare providers. However, the use of these technologies in healthcare settings raises important privacy and security concerns that must be addressed to ensure patient trust and acceptance. This paper explores the privacy and security considerations related to the utilization of ambient intelligence in healthcare, aiming to address the associated risks and establish a robust security infrastructure. By reviewing the inherent privacy and security risks in healthcare settings employing ambient intelligence, discussing the ethical and legal considerations, and proposing mitigation strategies, the focus is on ensuring patient trust and acceptance.The architecture that is being presented is a comprehensive one with interconnected layers that guarantees data confidentiality, integrity, and privacy in the ambient intelligence healthcare system. This protects sensitive data and maintains its continuous availability. This research helps to establish a safe environment that supports the transformational potential of ambient intelligence in healthcare while putting patient privacy and data protection first by thoroughly addressing privacy and security concerns.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"2 ","pages":"Article 100046"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000122/pdfft?md5=efe7200683f294a4dc27ed3363c6368a&pid=1-s2.0-S2772918424000122-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140112969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security analysis of cyber physical system using digital forensic incident response 利用数字取证事件响应对网络物理系统进行安全分析
Cyber Security and Applications Pub Date : 2024-01-01 DOI: 10.1016/j.csa.2023.100034
Pranita Binnar , Sunil Bhirud , Faruk Kazi
{"title":"Security analysis of cyber physical system using digital forensic incident response","authors":"Pranita Binnar ,&nbsp;Sunil Bhirud ,&nbsp;Faruk Kazi","doi":"10.1016/j.csa.2023.100034","DOIUrl":"10.1016/j.csa.2023.100034","url":null,"abstract":"<div><p>There is a great demand for an efficient security tool which can secure IIoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IIoT considering the closed, dynamic and distributed architecture. This motivates the researchers to focus more on investigating the role of forensic tools such as DFIR in the designing of security models. A brief analysis of the security issues, challenges and attacks on IIoT systems is presented in this paper with an emphasis of DFIR for the security of ICS, CPS, and SCADA. The security recommendations for IIoT, forensic challenges in SCADA, ICS and CPS are discussed. The study suggests that forensic tools can overcome the drawbacks of conventional security solutions in terms of maintaining the privacy of data while sharing information with other systems. The study discusses different models, overview, comparisons, and summarization of DFIR and intrusion detection systems (IDS)-based techniques for IIoT security. In addition, this review analyzes the challenges and research gaps based on the existing literary works.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"2 ","pages":"Article 100034"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918423000218/pdfft?md5=5043651ac8c83a8df31150d7471fc04a&pid=1-s2.0-S2772918423000218-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139014533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the road ahead: Machine learning-driven DDoS attack detection in VANET cloud environments 确保前方道路安全:VANET 云环境中机器学习驱动的 DDoS 攻击检测
Cyber Security and Applications Pub Date : 2024-01-01 DOI: 10.1016/j.csa.2024.100037
Himanshu Setia , Amit Chhabra , Sunil K. Singh , Sudhakar Kumar , Sarita Sharma , Varsha Arya , Brij B. Gupta , Jinsong Wu
{"title":"Securing the road ahead: Machine learning-driven DDoS attack detection in VANET cloud environments","authors":"Himanshu Setia ,&nbsp;Amit Chhabra ,&nbsp;Sunil K. Singh ,&nbsp;Sudhakar Kumar ,&nbsp;Sarita Sharma ,&nbsp;Varsha Arya ,&nbsp;Brij B. Gupta ,&nbsp;Jinsong Wu","doi":"10.1016/j.csa.2024.100037","DOIUrl":"10.1016/j.csa.2024.100037","url":null,"abstract":"<div><p>Vehicular ad-hoc network (VANET) technology has gained prominence, especially in the context of the emerging field of VANET Cloud as an integral part of connected and autonomous vehicles. The automotive industry’s move towards automation and the integration of vehicles into the digital ecosystem has revolutionized wireless network communications. Nevertheless, security remains a paramount concern in these advanced technological landscapes. Safeguarding system integrity and data privacy is of utmost importance before the widespread adoption of VANET Cloud solutions. This study addresses the critical challenge of security within the context of VANET Cloud. Specifically, the focus is on anticipating and mitigating Distributed Denial of Service (DDoS) attacks, which can potentially disrupt the functioning of connected vehicles and associated cloud-based services. To tackle this issue, an innovative architectural framework is proposed to capture and analyze network flows within the VANET Cloud environment. Additionally, it leverages machine learning techniques for classification and predictive analytics with an accuracy of 99.59%. The architecture presented in this research offers the potential to significantly enhance security measures in VANET Cloud deployments. Its adaptability ensures practical applicability to real-world systems, enabling timely responses to security threats and breaches.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"2 ","pages":"Article 100037"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000031/pdfft?md5=cb4f1ca958fe6310acbd1c05c848dec3&pid=1-s2.0-S2772918424000031-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139538768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信