期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
A Robust Security Detection Strategy for Next Generation IoT Networks
1
作者 Hafida Assmi azidine guezzaz +4 位作者 Said Benkirane Mourade Azrour Said Jabbour Nisreen Innab Abdulatif Alabdulatif 《Computers, Materials & Continua》 SCIE EI 2025年第1期443-466,共24页
Internet of Things(IoT)refers to the infrastructures that connect smart devices to the Internet,operating autonomously.This connectivitymakes it possible to harvest vast quantities of data,creating new opportunities f... Internet of Things(IoT)refers to the infrastructures that connect smart devices to the Internet,operating autonomously.This connectivitymakes it possible to harvest vast quantities of data,creating new opportunities for the emergence of unprecedented knowledge.To ensure IoT securit,various approaches have been implemented,such as authentication,encoding,as well as devices to guarantee data integrity and availability.Among these approaches,Intrusion Detection Systems(IDS)is an actual security solution,whose performance can be enhanced by integrating various algorithms,including Machine Learning(ML)and Deep Learning(DL),enabling proactive and accurate detection of threats.This study proposes to optimize the performance of network IDS using an ensemble learning method based on a voting classification algorithm.By combining the strengths of three powerful algorithms,Random Forest(RF),K-Nearest Neighbors(KNN),and Support Vector Machine(SVM)to detect both normal behavior and different categories of attack.Our analysis focuses primarily on the NSL-KDD dataset,while also integrating the recent Edge-IIoT dataset,tailored to industrial IoT environments.Experimental results show significant enhancements on the Edge-IIoT and NSL-KDD datasets,reaching accuracy levels between 72%to 99%,with precision between 87%and 99%,while recall values and F1-scores are also between 72%and 99%,for both normal and attack detection.Despite the promising results of this study,it suffers from certain limitations,notably the use of specific datasets and the lack of evaluations in a variety of environments.Future work could include applying this model to various datasets and evaluating more advanced ensemble strategies,with the aim of further enhancing the effectiveness of IDS. 展开更多
关键词 IoT security intrusion detection RF KNN SVM EL NSL-KDD Edge-IIoT
在线阅读 下载PDF
A Comprehensive Survey of Contemporary Anomaly Detection Methods for Securing Smart IoT Systems
2
作者 Chaimae Hazman azidine guezzaz +3 位作者 Said Benkirane Mourade Azrour Vinayakumar Ravi Abdulatif Alabdulatif 《Computers, Materials & Continua》 2025年第10期301-329,共29页
Attacks are growing more complex and dangerous as network capabilities improve at a rapid pace.Network intrusion detection is usually regarded as an efficient means of dealing with security attacks.Many ways have been... Attacks are growing more complex and dangerous as network capabilities improve at a rapid pace.Network intrusion detection is usually regarded as an efficient means of dealing with security attacks.Many ways have been presented,utilizing various strategies and focusing on different types of visitors.Anomaly-based network intrusion monitoring is an essential area of intrusion detection investigation and development.Despite extensive research on anomaly-based network detection,there is still a lack of comprehensive literature reviews covering current methodologies and datasets.Despite the substantial research into anomaly-based network intrusion detection algorithms,there is a dearth of a research evaluation of new methodologies and datasets.We explore and evaluate 50 highest publications on anomaly-based intrusion detection using an in-depth review of related literature techniques.Our work thoroughly explores the technological environment of the subject in order to help future research in this sector.Our examination is carried out from the relevant angles:application areas,data preprocessing and threat detection approaches,assessment measures,and datasets.We select unresolved research difficulties and underexplored research areas from every viewpoint recommendation of the study.Finally,we outline five potentially increased research areas for the future. 展开更多
关键词 Smart IoT security anomaly detection ATTACKS machine learning deep learning datasets
在线阅读 下载PDF
Internet of Things Authentication Protocols: Comparative Study
3
作者 Souhayla Dargaoui Mourade Azrour +3 位作者 Ahmad ElAllaoui azidine guezzaz Abdulatif Alabdulatif Abdullah Alnajim 《Computers, Materials & Continua》 SCIE EI 2024年第4期65-91,共27页
Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is ... Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions. 展开更多
关键词 ATTACKS CRYPTOGRAPHY Internet of Things SECURITY AUTHENTICATION
在线阅读 下载PDF
Adapted Speed System in a Road Bend Situation in VANET Environment
4
作者 Said Benkirane azidine guezzaz +5 位作者 Mourade Azrour Akber Abid Gardezi Shafiq Ahmad Abdelaty Edrees Sayed Salman Naseer Muhammad Shafiq 《Computers, Materials & Continua》 SCIE EI 2023年第2期3781-3794,共14页
Today,road safety remains a serious concern for governments around the world.In fact,approximately 1.35 million people die and 2–50 million are injured on public roads worldwide each year.Straight bends in road traff... Today,road safety remains a serious concern for governments around the world.In fact,approximately 1.35 million people die and 2–50 million are injured on public roads worldwide each year.Straight bends in road traffic are the main cause of many road accidents,and excessive and inappropriate speed in this very critical area can cause drivers to lose their vehicle stability.For these reasons,new solutions must be considered to stop this disaster and save lives.Therefore,it is necessary to study this topic very carefully and use new technologies such as Vehicle Ad Hoc Networks(VANET),Internet of Things(IoT),Multi-Agent Systems(MAS)and Embedded Systems to create a new system to serve the purpose.Therefore,the efficient and intelligent operation of the VANET network can avoid such problems as it provides drivers with the necessary real-time traffic data.Thus,drivers are able to drive their vehicles under correct and realistic conditions.In this document,we propose a speed adaptation scheme for winding road situations.Our proposed scheme is based on MAS technology,the main goal of which is to provide drivers with the information they need to calculate the speed limit they must not exceed in order to maintain balance in dangerous areas,especially in curves.The proposed scheme provides flexibility,adaptability,and maintainability for traffic information,taking into account the state of infrastructure and metering conditions of the road,as well as the characteristics and behavior of vehicles. 展开更多
关键词 ITS VANET multi-agent systems road safety
在线阅读 下载PDF
Enhanced IDS with Deep Learning for IoT-Based Smart Cities Security 被引量:1
5
作者 Chaimae Hazman azidine guezzaz +1 位作者 Said Benkirane Mourade Azrour 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2024年第4期929-947,共19页
Cyberattacks against highly integrated Internet of Things (IoT) servers, apps, and telecoms infrastructure are rapidly increasing when issues produced by IoT networks go unnoticed for an extended period. IoT interface... Cyberattacks against highly integrated Internet of Things (IoT) servers, apps, and telecoms infrastructure are rapidly increasing when issues produced by IoT networks go unnoticed for an extended period. IoT interface attacks must be evaluated in real-time for effective safety and security measures. This study implements a smart intrusion detection system (IDS) designed for IoT threats, and interoperability with IoT connectivity standards is offered by the identity solution. An IDS is a common type of network security technology that has recently received increasing interest in the research community. The system has already piqued the curiosity of scientific and industrial communities to identify intrusions. Several IDSs based on machine learning (ML) and deep learning (DL) have been proposed. This study introduces IDS-SIoDL, a novel IDS for IoT-based smart cities that integrates long shortterm memory (LSTM) and feature engineering. This model is tested using tensor processing unit (TPU) on the enhanced BoT-IoT, Edge-IIoT, and NSL-KDD datasets. Compared with current IDSs, the obtained results provide good assessment features, such as accuracy, recall, and precision, with approximately 0.9990 recording time and calculating times of approximately 600 and 6 ms for training and classification, respectively. 展开更多
关键词 intrusion detection LSTM IoT security ML DL TPU
原文传递
Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques 被引量:4
6
作者 Hanaa Attou azidine guezzaz +2 位作者 Said Benkirane Mourade Azrour Yousef Farhaoui 《Big Data Mining and Analytics》 EI CSCD 2023年第3期311-320,共10页
Cloud computing(CC)is a novel technology that has made it easier to access network and computer resources on demand such as storage and data management services.In addition,it aims to strengthen systems and make them ... Cloud computing(CC)is a novel technology that has made it easier to access network and computer resources on demand such as storage and data management services.In addition,it aims to strengthen systems and make them useful.Regardless of these advantages,cloud providers suffer from many security limits.Particularly,the security of resources and services represents a real challenge for cloud technologies.For this reason,a set of solutions have been implemented to improve cloud security by monitoring resources,services,and networks,then detect attacks.Actually,intrusion detection system(IDS)is an enhanced mechanism used to control traffic within networks and detect abnormal activities.This paper presents a cloud-based intrusion detection model based on random forest(RF)and feature engineering.Specifically,the RF classifier is obtained and integrated to enhance accuracy(ACC)of the proposed detection model.The proposed model approach has been evaluated and validated on two datasets and gives 98.3%ACC and 99.99%ACC using Bot-IoT and NSL-KDD datasets,respectively.Consequently,the obtained results present good performances in terms of ACC,precision,and recall when compared to the recent related works. 展开更多
关键词 cloud security anomaly detection features engineering random forest
原文传递
An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security 被引量:2
7
作者 Mouaad Mohy-Eddine azidine guezzaz +2 位作者 Said Benkirane Mourade Azrour Yousef Farhaoui 《Big Data Mining and Analytics》 EI CSCD 2023年第3期273-287,共15页
Industrial Internet of Things(IIoT)represents the expansion of the Internet of Things(IoT)in industrial sectors.It is designed to implicate embedded technologies in manufacturing fields to enhance their operations.How... Industrial Internet of Things(IIoT)represents the expansion of the Internet of Things(IoT)in industrial sectors.It is designed to implicate embedded technologies in manufacturing fields to enhance their operations.However,IIoT involves some security vulnerabilities that are more damaging than those of IoT.Accordingly,Intrusion Detection Systems(IDSs)have been developed to forestall inevitable harmful intrusions.IDSs survey the environment to identify intrusions in real time.This study designs an intrusion detection model exploiting feature engineering and machine learning for IIoT security.We combine Isolation Forest(IF)with Pearson’s Correlation Coefficient(PCC)to reduce computational cost and prediction time.IF is exploited to detect and remove outliers from datasets.We apply PCC to choose the most appropriate features.PCC and IF are applied exchangeably(PCCIF and IFPCC).The Random Forest(RF)classifier is implemented to enhance IDS performances.For evaluation,we use the Bot-IoT and NF-UNSW-NB15-v2 datasets.RF-PCCIF and RF-IFPCC show noteworthy results with 99.98%and 99.99%Accuracy(ACC)and 6.18 s and 6.25 s prediction time on Bot-IoT,respectively.The two models also score 99.30%and 99.18%ACC and 6.71 s and 6.87 s prediction time on NF-UNSW-NB15-v2,respectively.Results prove that our designed model has several advantages and higher performance than related models. 展开更多
关键词 Industrial Internet of Things(IIoT) isolation forest Intrusion Detection Dystem(IDS) INTRUSION Pearson’s Correlation Coefficient(PCC) random forest
原文传递
Mathematical Validation of Proposed Machine Learning Classifier for Heterogeneous Traffic and Anomaly Detection 被引量:4
8
作者 azidine guezzaz Younes Asimi +1 位作者 Mourade Azrour Ahmed Asimi 《Big Data Mining and Analytics》 EI 2021年第1期18-24,共7页
The modeling of an efficient classifier is a fundamental issue in automatic training involving a large volume of representative data.Hence,automatic classification is a major task that entails the use of training meth... The modeling of an efficient classifier is a fundamental issue in automatic training involving a large volume of representative data.Hence,automatic classification is a major task that entails the use of training methods capable of assigning classes to data objects by using the input activities presented to learn classes.The recognition of new elements is possible based on predefined classes.Intrusion detection systems suffer from numerous vulnerabilities during analysis and classification of data activities.To overcome this problem,new analysis methods should be derived so as to implement a relevant system to monitor circulated traffic.The main objective of this study is to model and validate a heterogeneous traffic classifier capable of categorizing collected events within networks.The new model is based on a proposed machine learning algorithm that comprises an input layer,a hidden layer,and an output layer.A reliable training algorithm is proposed to optimize the weights,and a recognition algorithm is used to validate the model.Preprocessing is applied to the collected traffic prior to the analysis step.This work aims to describe the mathematical validation of a new machine learning classifier for heterogeneous traffic and anomaly detection. 展开更多
关键词 anomaly detection heterogeneous traffic PREPROCESSING machine learning TRAINING classification
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部