-
321
Research on LEO Satellite Network Routing Security
Published 2023-06-01“…The design of secure mechanisms and failure recovery mechanisms for inter-satellite routing has become pivotal in maintaining dependable communication within the LEO satellite network.To address the potential security threats faced by satellite networks, the impact of different routing attack behaviors on a typical inter-satellite routing protocol was analyzed and differentiated packet security authentication mechanisms and link failure recovery mechanisms were designed.Additionally, a satellite network emulation platform based on virtualization technology was constructed, enabled the verification of the effectiveness of the designed inter-satellite routing security mechanisms through the emulation of various routing attack scenarios.Furthermore, performance metrics such as CPU utilization and packet processing time were also evaluated before and after the introduction of security mechanisms.Experimental results demonstrated that the proposed inter-satellite routing security mechanism effectively mitigated multiple security threats in the space network environment while reduced communication latency caused by sudden link failures, thereby ensured secure and reliable communication within the LEO satellite network.…”
Get full text
Article -
322
Cyber attack detection in IOT-WSN devices with threat intelligence using hidden and connected layer based architectures
Published 2024-12-01“…Abstract In this paper, cyber-attacks in IOT-WSN are detected through proposed optimized-Neural Network algorithms such as (i) Equilibrium Optimizer Neural Network (EO-NN), (ii) Particle Swarm Optimization (PSO-NN), (iii) Single Candidate Optimizer Neural Network (SCO-NN) and (iv) Single Candidate Optimizer Long Short-Term Memory (SCO-LSTM) with different connecting, hidden neural network layers and threat intelligence data. …”
Get full text
Article -
323
A single flow detection enabled method for DDoS attacks in IoT based on traffic feature reconstruction and mapping
Published 2024-01-01“…To address the slow response time of existing detection modules to Internet of things (IoT) distributed denial of service (DDoS) attacks, their low feature differentiation, and poor detection performance, a single flow detection enabled method based on traffic feature reconstruction and mapping (SFDTFRM) was proposed.Firstly, SFDTFRM employed a queue to store previously arrived flow based on the first in, first out rule.Secondly, to address the issue of similarity between normal communication traffic of IoT devices and DDoS attack traffic, a multidimensional reconstruction neural network model more lightweight compared to the baseline model and a function mapping method were proposed.The modified model loss function was utilized to reconstruct the quantitative feature matrix of the queue according to the corresponding index, and transformed into a mapping feature matrix through the function mapping method, enhancing the differences between different types of traffic, including normal communication traffic of IoT devices and DDoS attack traffic.Finally, the frequency information was extracted using a text convolutional network and information entropy calculation and the machine learning classifier was employed for DDoS attack traffic detection.The experimental results on two benchmark datasets show that SFDTFRM can effectively detect different DDoS attacks, and the average metrics value of SFDTFRM is a maximum of 12.01% higher than other existing methods.…”
Get full text
Article -
324
Gradual poisoning of a chest x-ray convolutional neural network with an adversarial attack and AI explainability methods
Published 2025-07-01“…To improve generalizability, we create a generic ResNet pneumonia classification model and then use it as an example by subjecting it to BadNets adversarial attacks. The study uses various poisoned datasets of different compositions (2%, 16.7% and 100% ratios of poisoned data) and two different test sets (a normal set of test data and one that contained poisoned images) to study the effects of BadNets. …”
Get full text
Article -
325
On the use of information theory metrics for detecting DDoS attacks and flash events: an empirical analysis, comparison, and future directions
Published 2021-08-01“…It has observed that the generalized divergence based metrics produce more accuracy in detecting different types of attack flows in contrast to entropy metrics.…”
Get full text
Article -
326
Practical Preimage Attacks on 3-Round Keccak-256 and 4-Round Keccak[r=640, c=160]
Published 2025-03-01“… Recently, linear structures and algebraic attacks have been widely used in preimage attacks on round-reduced Keccak. …”
Get full text
Article -
327
Synthetic EMG Based on Adversarial Style Transfer Can Effectively Attack Biometric-Based Personal Identification Models
Published 2023-01-01“…Therefore, it is necessary to extract the style with the leaked personal signals and generate the attack signals with different contents. With our proposed method and tiny leaked personal EMG fragments, numerous EMG signals with different content can be generated in that person’s style. …”
Get full text
Article -
328
Pilot Contamination Attack Detection Methods—An Exhaustive Performance Evaluation Through Probability Metrics and Statistical Classification Parameters
Published 2024-11-01“…Depending on the particular application of the system in which the PCA detection methods are incorporated and the distribution of attack initiation among all samples, different classification parameters are of varying significance in the efficiency assessment. …”
Get full text
Article -
329
Design of Cyberwar Laboratory Exercises to Implement Common Security Attacks against IEEE 802.11 Wireless Networks
Published 2010-01-01“…This aspect makes the wireless networks vulnerable to various types of attacks. A true understanding of these attacks provides better ability to defend the network against the attacks, thus eliminating potential threats from the wireless systems. …”
Get full text
Article -
330
-
331
Renewable Energy Interconnected Power System Load Frequency Control Under Network Attacks and Communication Time Delay
Published 2025-02-01“…Second, an improved periodic event-triggering mechanism was proposed based on the traditional sliding mode control, which determined the sampling state based on the divided time interval to reduce the amount of data exchange in the network and solve periodic DoS attacks. Finally, simulation experiments were conducted under different scenarios using MATLAB/Simulink to demonstrate that the proposed strategy can effectively overcome the problem of increased frequency deviations caused by network attacks and communication delays. …”
Get full text
Article -
332
Attack-Defense Game between Malicious Programs and Energy-Harvesting Wireless Sensor Networks Based on Epidemic Modeling
Published 2020-01-01“…As energy-harvesting wireless sensor networks (EHWSNs) are increasingly integrated with all walks of life, their security problems have gradually become hot issues. As an attack means, malicious programs often attack sensor nodes in critical locations in the networks to cause paralysis and information leakage of the networks, resulting in security risks. …”
Get full text
Article -
333
Enhanced Deep Autoencoder-Based Reinforcement Learning Model with Improved Flamingo Search Policy Selection for Attack Classification
Published 2025-01-01“…The proposed work introduces an intelligent semi-supervised intrusion detection system based on different algorithms to classify the network attacks accurately. …”
Get full text
Article -
334
DeepTransIDS: Transformer-Based Deep learning Model for Detecting DDoS Attacks on 5G NIDD
Published 2025-06-01“…The confusion matrix analysis also confirms the model's ability to accurately identify intricate attack patterns even in the class of imbalance conditions. …”
Get full text
Article -
335
A multi-factor integration-based semi-supervised learning for address resolution protocol attack detection in SDIIoT
Published 2021-12-01“…MIS considers the address resolution protocol attack features from different aspects to help the model make correct judgment. …”
Get full text
Article -
336
A multilayer deep autoencoder approach for cross layer IoT attack detection using deep learning algorithms
Published 2025-03-01“…A new paradigm for cross-layer based IoT attack detection is presented in this paper, which provides a flexible and robust solution for complete cybersecurity across different IoT domains and thereby improves the field of cyber threat identification. …”
Get full text
Article -
337
Development of 3D satisfaction surface for concrete durability design under chloride attack considering climate change
Published 2025-07-01“…The service life of the target structure against chloride attack was evaluated using the proposed 3D PBE. The result show that the durability life of the structure decreased as the relative humidity decreased and the temperature increased during curing. …”
Get full text
Article -
338
An Efficient Mutual Authentication and Fractional Lyrebird Optimization With Deep Learning–Based SIP-Based DRDoS Attack Detection
Published 2025-01-01“…In this article, a deep learning model fractional lyrebird optimization algorithm–deep stack autoencoder (FLOA-DSA) is developed for the detection of SIP-based distributed reflection denial-of-service (DRDoS) attacks in SIP network. Here, the authentication process is carried out under different phases based on various mathematical model functionalities. …”
Get full text
Article -
339
TOP: A Combined Logical and Physical Obfuscation Method for Securing Networks-on-Chip Against Reverse Engineering Attacks
Published 2025-01-01“…Second, our distributed approach specifically addresses timing-based attacks by introducing timing violations and triggering malfunctions upon applying wrong key. …”
Get full text
Article -
340
DDoS Attack Detection in IoT: A Comparative Resource and Performance Analysis of Deep Learning and Machine Learning Models
Published 2025-01-01“…The proliferation of Internet of Things (IoT) devices has increased susceptibility to Distributed Denial of Service (DDoS) attacks, exposing the limitations of traditional security mechanisms such as firewalls and rule-based intrusion detection systems (IDS), which often fail due to static rules and limited adaptability in resource-constrained environments. …”
Get full text
Article