期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
IDS-INT:Intrusion detection system using transformer-based transfer learning for imbalanced network traffic 被引量:4
1
作者 Farhan Ullah Shamsher Ullah +1 位作者 gautam srivastava Jerry Chun-Wei Lin 《Digital Communications and Networks》 SCIE CSCD 2024年第1期190-204,共15页
A network intrusion detection system is critical for cyber security against llegitimate attacks.In terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a... A network intrusion detection system is critical for cyber security against llegitimate attacks.In terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a subcategory of attack,host information,malicious scripts,etc.In terms of network perspectives,network traffic may contain an imbalanced number of harmful attacks when compared to normal traffic.It is challenging to identify a specific attack due to complex features and data imbalance issues.To address these issues,this paper proposes an Intrusion Detection System using transformer-based transfer learning for Imbalanced Network Traffic(IDS-INT).IDS-INT uses transformer-based transfer learning to learn feature interactions in both network feature representation and imbalanced data.First,detailed information about each type of attack is gathered from network interaction descriptions,which include network nodes,attack type,reference,host information,etc.Second,the transformer-based transfer learning approach is developed to learn detailed feature representation using their semantic anchors.Third,the Synthetic Minority Oversampling Technique(SMOTE)is implemented to balance abnormal traffic and detect minority attacks.Fourth,the Convolution Neural Network(CNN)model is designed to extract deep features from the balanced network traffic.Finally,the hybrid approach of the CNN-Long Short-Term Memory(CNN-LSTM)model is developed to detect different types of attacks from the deep features.Detailed experiments are conducted to test the proposed approach using three standard datasets,i.e.,UNsWNB15,CIC-IDS2017,and NSL-KDD.An explainable AI approach is implemented to interpret the proposed method and develop a trustable model. 展开更多
关键词 Network intrusion detection Transfer learning Features extraction Imbalance data Explainable AI CYBERSECURITY
下载PDF
Privacy‐preserving remote sensing images recognition based on limited visual cryptography 被引量:3
2
作者 Denghui Zhang Muhammad Shafiq +2 位作者 Liguo Wang gautam srivastava Shoulin Yin 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第4期1166-1177,共12页
With the arrival of new data acquisition platforms derived from the Internet of Things(IoT),this paper goes beyond the understanding of traditional remote sensing technologies.Deep fusion of remote sensing and compute... With the arrival of new data acquisition platforms derived from the Internet of Things(IoT),this paper goes beyond the understanding of traditional remote sensing technologies.Deep fusion of remote sensing and computer vision has hit the industrial world and makes it possible to apply Artificial intelligence to solve problems such as automatic extraction of information and image interpretation.However,due to the complex architecture of IoT and the lack of a unified security protection mechanism,devices in remote sensing are vulnerable to privacy leaks when sharing data.It is necessary to design a security scheme suitable for computation‐limited devices in IoT,since traditional encryption methods are based on computational complexity.Visual Cryptography(VC)is a threshold scheme for images that can be decoded directly by the human visual system when superimposing encrypted images.The stacking‐to‐see feature and simple Boolean decryption operation make VC an ideal solution for privacy‐preserving recognition for large‐scale remote sensing images in IoT.In this study,the secure and efficient transmission of high‐resolution remote sensing images by meaningful VC is achieved.By diffusing the error between the encryption block and the original block to adjacent blocks,the degradation of quality in recovery images is mitigated.By fine‐tuning the pre‐trained model from large‐scale datasets,we improve the recognition performance of small encryption datasets for remote sensing images.The experimental results show that the proposed lightweight privacy‐preserving recognition framework maintains high recognition performance while enhancing security. 展开更多
关键词 activity recognition feature extraction image classification KNN privacy protection remote monitoring remote sensing
下载PDF
Accurate threat hunting in industrial internet of things edge devices
3
作者 Abbas Yazdinejad Behrouz Zolfaghari +3 位作者 Ali Dehghantanha Hadis Karimipour gautam srivastava Reza M.Parizi 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1123-1130,共8页
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and processing.Any kind of malicious or abnormal fu... Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and processing.Any kind of malicious or abnormal function by each of these devices can jeopardize the security of the entire IIoT.Moreover,they can allow malicious software installed on end nodes to penetrate the network.This paper presents a parallel ensemble model for threat hunting based on anomalies in the behavior of IIoT edge devices.The proposed model is flexible enough to use several state-of-the-art classifiers as the basic learner and efficiently classifies multi-class anomalies using the Multi-class AdaBoost and majority voting.Experimental evaluations using a dataset consisting of multi-source normal records and multi-class anomalies demonstrate that our model outperforms existing approaches in terms of accuracy,F1 score,recall,and precision. 展开更多
关键词 IIoT Threat hunting Edge devices Multi-class anomalies Ensemble methods
下载PDF
3-Multi ranked encryption with enhanced security in cloud computing
4
作者 YeEun Kim Junggab Son +2 位作者 Reza M.Parizi gautam srivastava Heekuck Oh 《Digital Communications and Networks》 SCIE CSCD 2023年第2期313-326,共14页
Searchable Encryption(SE)enables data owners to search remotely stored ciphertexts selectively.A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple... Searchable Encryption(SE)enables data owners to search remotely stored ciphertexts selectively.A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple data owners/users,and even return the top-k most relevant search results when requested.We refer to a model that satisfies all of the conditions a 3-multi ranked search model.However,SE schemes that have been proposed to date use fully trusted trapdoor generation centers,and several methods assume a secure connection between the data users and a trapdoor generation center.That is,they assume the trapdoor generation center is the only entity that can learn the information regarding queried keywords,but it will never attempt to use it in any other manner than that requested,which is impractical in real life.In this study,to enhance the security,we propose a new 3-multi ranked SE scheme that satisfies all conditions without these security assumptions.The proposed scheme uses randomized keywords to protect the interested keywords of users from both outside adversaries and the honest-but-curious trapdoor generation center,thereby preventing attackers from determining whether two different queries include the same keyword.Moreover,we develop a method for managing multiple encrypted keywords from every data owner,each encrypted with a different key.Our evaluation demonstrates that,despite the trade-off overhead that results from the weaker security assumption,the proposed scheme achieves reasonable performance compared to extant schemes,which implies that our scheme is practical and closest to real life. 展开更多
关键词 Searchable encryption Multi-keyword search Multiple data owners/users Ranked search Enhanced security
下载PDF
An effective communication and computation model based on a hybridgraph-deeplearning approach for SIoT
5
作者 M.S.Mekala gautam srivastava +1 位作者 Ju H.Park Ho-Youl Jung 《Digital Communications and Networks》 SCIE CSCD 2022年第6期900-910,共11页
Social Edge Service(SES)is an emerging mechanism in the Social Internet of Things(SIoT)orchestration for effective user-centric reliable communication and computation.The services are affected by active and/or passive... Social Edge Service(SES)is an emerging mechanism in the Social Internet of Things(SIoT)orchestration for effective user-centric reliable communication and computation.The services are affected by active and/or passive attacks such as replay attacks,message tampering because of sharing the same spectrum,as well as inadequate trust measurement methods among intelligent devices(roadside units,mobile edge devices,servers)during computing and content-sharing.These issues lead to computation and communication overhead of servers and computation nodes.To address this issue,we propose the HybridgrAph-Deep-learning(HAD)approach in two stages for secure communication and computation.First,the Adaptive Trust Weight(ATW)model with relation-based feedback fusion analysis to estimate the fitness-priority of every node based on directed graph theory to detect malicious nodes and reduce computation and communication overhead.Second,a Quotient User-centric Coeval-Learning(QUCL)mechanism to formulate secure channel selection,and Nash equilibrium method for optimizing the communication to share data over edge devices.The simulation results confirm that our proposed approach has achieved effective communication and computation performance,and enhanced Social Edge Services(SES)reliability than state-of-the-art approaches. 展开更多
关键词 Edge computing Adaptive trust weight(ATW)model Quotient user-centric coeval-learning(QUCL)mechanism Deep learning Service reliability
下载PDF
Special issue on machine learning-driven big data and blockchain techniques for communication
6
作者 Shahid Mumtaz gautam srivastava Wei Wei 《Digital Communications and Networks》 SCIE CSCD 2023年第1期1-2,共2页
Guest Editorial Currently,the rapid development of storage technologies combined with some potential factors such as mobile networks,Internet of Things(IoT),cloud computing and the emergence of new technologies pose s... Guest Editorial Currently,the rapid development of storage technologies combined with some potential factors such as mobile networks,Internet of Things(IoT),cloud computing and the emergence of new technologies pose some problems for big data processing and blockchain security in the communication domain.Moreover,the complexity of network security and data processing has increased dramatically,making it more difficult and challenging to solve various problems in the communication domain.Therefore,Machine Learning(ML)algorithms have been proposed to process big data and enhance blockchain security and further enable intelligent analysis in the communication domain. 展开更多
关键词 NETWORKS COMMUNICATION enable
下载PDF
Cooperative Spectrum Sensing Deployment for Cognitive Radio Networks for Internet of Things 5G Wireless Communication
7
作者 Thulasiraman Balachander Kadiyala Ramana +2 位作者 Rasineni Madana Mohana gautam srivastava Thippa Reddy Gadekallu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2024年第3期698-720,共23页
Recently,Cooperative Spectrum Sensing(CSS)for Cognitive Radio Networks(CRN)plays a significant role in efficient 5G wireless communication.Spectrum sensing is a significant technology in CRN to identify underutilized ... Recently,Cooperative Spectrum Sensing(CSS)for Cognitive Radio Networks(CRN)plays a significant role in efficient 5G wireless communication.Spectrum sensing is a significant technology in CRN to identify underutilized spectrums.The CSS technique is highly applicable due to its fast and efficient performance.5G wireless communication is widely employed for the continuous development of efficient and accurate Internet of Things(IoT)networks.5G wireless communication will potentially lead the way for next generation IoT communication.CSS has established significant consideration as a feasible resource to improve identification performance by developing spatial diversity in receiving signal strength in IoT.In this paper,an optimal CSS for CRN is performed using Offset Quadrature Amplitude Modulation Universal Filtered Multi-Carrier Non-Orthogonal Multiple Access(OQAM/UFMC/NOMA)methodologies.Availability of spectrum and bandwidth utilization is a key challenge in CRN for IoT 5G wireless communication.The optimal solution for CRN in IoT-based 5G communication should be able to provide optimal bandwidth and CSS,low latency,Signal Noise Ratio(SNR)improvement,maximum capacity,offset synchronization,and Peak Average Power Ratio(PAPR)reduction.The Energy Efficient All-Pass Filter(EEAPF)algorithm is used to eliminate PAPR.The deployment approach improves Quality of Service(QoS)in terms of system reliability,throughput,and energy efficiency.Our in-depth experimental results show that the proposed methodology provides an optimal solution when directly compares against current existing methodologies. 展开更多
关键词 cooperative spectrum sensing cognitive radio network Internet of Things offset quadratureamplitude modulation universal filtered multi-carrier non-orthogonal multiple access
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部