期刊文献+
共找到42篇文章
< 1 2 3 >
每页显示 20 50 100
A comprehensive survey of cyberattacks on EVs: Research domains,attacks, defensive mechanisms, and verification methods
1
作者 Tawfiq Aljohani Abdulaziz Almutairi 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第12期31-58,共28页
With the continuous development of transportation electrification,the cybersecurity of energy infrastructure has become increasingly prominent.Explicitly,EVs resemble a significant tool to carryout cyberattacks since ... With the continuous development of transportation electrification,the cybersecurity of energy infrastructure has become increasingly prominent.Explicitly,EVs resemble a significant tool to carryout cyberattacks since EVs are not only seen as dynamic loads but also as mobile energy sources that establish two-way communications with several players in the grid.This taxonomy aims to provide a comprehensive overview of cyberattacks against EVs from four distinct perspectives.The first is the research domains of EVs application,which investigates the different fields of research related to the development and application of EVs and how they are susceptible to cyber threats.The second is the CIAbased attacks,which examines the threats to the confidentiality,integrity,and availability of EVs'sensitive information and critical systems.The third taxonomy discusses the countermeasures and defensive mechanisms to secure the EVs against cyberattacks,including preventive measures,detection algorithms,response strategy,and recovery techniques.The fourth taxonomy is the verification and validation methodologies,which explores the software tools and hardware testbeds used to test and evaluate the security of EVs against cyber threats.Finally,this taxonomy presents an understanding of the current state of cyberattacks against EVs and serves as a valuable resource for researchers and practitioners in the fields of cybersecurity and electric mobility. 展开更多
关键词 CYBERSECURITY Electric vehicles Charging stations Cybersecurity of energy systems cyberattacks
在线阅读 下载PDF
The Looming Threat Blackout of the National Grid and Critical Infrastructure (A National Security Crisis) 被引量:1
2
作者 Bahman Zohuri 《Journal of Energy and Power Engineering》 2025年第1期31-35,共5页
The national grid and other life-sustaining critical infrastructures face an unprecedented threat from prolonged blackouts,which could last over a year and pose a severe risk to national security.Whether caused by phy... The national grid and other life-sustaining critical infrastructures face an unprecedented threat from prolonged blackouts,which could last over a year and pose a severe risk to national security.Whether caused by physical attacks,EMP(electromagnetic pulse)events,or cyberattacks,such disruptions could cripple essential services like water supply,healthcare,communication,and transportation.Research indicates that an attack on just nine key substations could result in a coast-to-coast blackout lasting up to 18 months,leading to economic collapse,civil unrest,and a breakdown of public order.This paper explores the key vulnerabilities of the grid,the potential impacts of prolonged blackouts,and the role of AI(artificial intelligence)and ML(machine learning)in mitigating these threats.AI-driven cybersecurity measures,predictive maintenance,automated threat response,and EMP resilience strategies are discussed as essential solutions to bolster grid security.Policy recommendations emphasize the need for hardened infrastructure,enhanced cybersecurity,redundant power systems,and AI-based grid management to ensure national resilience.Without proactive measures,the nation remains exposed to a catastrophic power grid failure that could have dire consequences for society and the economy. 展开更多
关键词 National grid blackout critical infrastructure security EMP cyberattack resilience AI-powered grid protection ML in energy security power grid vulnerabilities physical attacks on infrastructure predictive maintenance for power grids energy crisis and national security
在线阅读 下载PDF
A Hybrid Machine Learning and Blockchain Framework for IoT DDoS Mitigation
3
作者 Singamaneni Krishnapriya Sukhvinder Singh 《Computer Modeling in Engineering & Sciences》 2025年第8期1849-1881,共33页
The explosive expansion of the Internet of Things(IoT)systems has increased the imperative to have strong and robust solutions to cyber Security,especially to curtail Distributed Denial of Service(DDoS)attacks,which c... The explosive expansion of the Internet of Things(IoT)systems has increased the imperative to have strong and robust solutions to cyber Security,especially to curtail Distributed Denial of Service(DDoS)attacks,which can cripple critical infrastructure.The proposed framework presented in the current paper is a new hybrid scheme that induces deep learning-based traffic classification and blockchain-enabledmitigation tomake intelligent,decentralized,and real-time DDoS countermeasures in an IoT network.The proposed model fuses the extracted deep features with statistical features and trains them by using traditional machine-learning algorithms,which makes them more accurate in detection than statistical features alone,based on the Convolutional Neural Network(CNN)architecture,which can extract deep features.A permissioned blockchain will be included to record the threat cases immutably and automatically execute mitigation measures through smart contracts to provide transparency and resilience.When tested on two test sets,BoT-IoT and IoT-23,the framework obtains a maximum F1-score at 97.5 percent and only a 1.8 percent false positive rate,which compares favorably to other solutions regarding effectiveness and the amount of time required to respond.Our findings support the feasibility of our method as an extensible and secure paradigm of nextgeneration IoT security,which has constrictive utility in mission-critical or resource-constrained settings.The work is a substantial milestone in autonomous and trustful mitigation against DDoS attacks through intelligent learning and decentralized enforcement. 展开更多
关键词 IoT security DDoS mitigation machine learning CNN random forest blockchain smart contracts cyberattack detection
在线阅读 下载PDF
Deducing cascading failures caused by cyberattacks based on attack gains and cost principle in cyber-physical power systems 被引量:9
4
作者 Yufei WANG Yanli LIU Jun’e LI 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2019年第6期1450-1460,共11页
To warn the cascading failures caused by cyberattacks(CFCAs)in real time and reduce their damage on cyber-physical power systems(CPPSs),a novel early warning method based on attack gains and cost principle(AGCP)is pro... To warn the cascading failures caused by cyberattacks(CFCAs)in real time and reduce their damage on cyber-physical power systems(CPPSs),a novel early warning method based on attack gains and cost principle(AGCP)is proposed.Firstly,according to the CFCA characteristics,the leading role of attackers in the whole evolutionary process is discussed.The breaking out of a CFCA is deduced based on the AGCP from the view of attackers,and the priority order of all CFCAs is then provided.Then,the method to calculate the probability of CFCAs is proposed,and an early warning model for CFCA is designed.Finally,to verify the effectiveness of this method,a variety of CFCAs are simulated in a local CPPS model based on the IEEE 39-bus system.The experimental results demonstrate that this method can be used as a reliable assistant analysis technology to facilitate early warning of CFCAs. 展开更多
关键词 Cyber-physical power system CASCADING failure Cyberattack Early WARNING Fault probability ATTACK GAINS and COST PRINCIPLE ATTACK route choice
原文传递
Three-stage Defensive Framework for Distributed Microgrid Control Against Cyberattacks 被引量:1
5
作者 Xuanyi Xiao Quan Zhou +1 位作者 Feng Wang Wen Huang 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2022年第6期1669-1678,共10页
With the wide integration of various distributed communication and control techniques,the cyber-physical microgrids face critical challenges raised by the emerging cyberattacks.This paper proposes a three-stage defens... With the wide integration of various distributed communication and control techniques,the cyber-physical microgrids face critical challenges raised by the emerging cyberattacks.This paper proposes a three-stage defensive framework for distributed microgrids against denial of service(DoS)and false data injection(FDI)attacks,including resilient control,communication network reconfiguration,and switching of local control.The resilient control in the first stage is capable of tackling simultaneous DoS and FDI attacks when the connectivity of communication network could be maintained under cyberattacks.The communication network reconfiguration method in the second stage and the subsequent switching of local control in the third stage based on the software-defined network(SDN)layer aim to cope with the network partitions caused by cyberattacks.The proposed defensive framework could effectively mitigate the impacts of a wide range of simultaneous DoS and FDI attacks in microgrids without requiring the specific assumptions of attacks and prompt detections,which would not incorporate additional cyberattack risks.Extensive case studies using a 13-bus microgrid system are conducted to validate the effectiveness of the proposed three-stage defensive framework against the simultaneous DoS and FDI attacks. 展开更多
关键词 MICROGRID cyber-physical systems cyberattack distributed control defensive framework
原文传递
Suppression strategies in different propagation periods of cyberattacks in merging area under connected environment
6
作者 Qiuling Wang Kailiang An +1 位作者 Zhizhen Liu Wenying Guan 《Journal of Traffic and Transportation Engineering(English Edition)》 EI CSCD 2023年第6期1148-1161,共14页
In order to ensure the safety of connected and automated vehicles(CAVs)threatened by cyberattack in the confluence area and mitigate the adverse impact of cyberattack propagation,a framework is built to depict the imp... In order to ensure the safety of connected and automated vehicles(CAVs)threatened by cyberattack in the confluence area and mitigate the adverse impact of cyberattack propagation,a framework is built to depict the impact of cyberattacks on traffic operation.Based on this framework,corresponding propagation suppression strategies are proposed for different types of cyberattacks in different periods.Under centralized control,game theory is used to solve the confluence sequence corresponding to the strategies.The results show that the proposed method can effectively inhibit the spread of cyberattacks on the premise of security.The initial control effect is the best.Compared with uncontrolled condition,in the 100 timesteps,11 susceptible vehicles are finally added,and the second is the immunity period,in which 10 susceptible vehicles were protected from cyberattack.Outbreak and latency control strategies also protect some vehicles.Under the control strategy of each stage,the peak value of infected vehicles and the duration of cyberattack are improved compared with the uncontrolled strategy.In addition,the traffic efficiency in the confluence area is also improved.This method can also be extended to such road types as diverging section,weaving section and intersection,so as to reduce the impact of cyberattacks on road network scale. 展开更多
关键词 Connected and automated vehicles Cyberattack Propagation dynamics Game theory Vehicle control
原文传递
A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTM
7
作者 Navaneetha Krishnan Muthunambu Senthil Prabakaran +3 位作者 Balasubramanian Prabhu Kavin Kishore Senthil Siruvangur Kavitha Chinnadurai Jehad Ali 《Computers, Materials & Continua》 SCIE EI 2024年第3期3089-3127,共39页
The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the Internet.Regrettably,this d... The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the Internet.Regrettably,this development has expanded the potential targets that hackers might exploit.Without adequate safeguards,data transmitted on the internet is significantly more susceptible to unauthorized access,theft,or alteration.The identification of unauthorised access attempts is a critical component of cybersecurity as it aids in the detection and prevention of malicious attacks.This research paper introduces a novel intrusion detection framework that utilizes Recurrent Neural Networks(RNN)integrated with Long Short-Term Memory(LSTM)units.The proposed model can identify various types of cyberattacks,including conventional and distinctive forms.Recurrent networks,a specific kind of feedforward neural networks,possess an intrinsic memory component.Recurrent Neural Networks(RNNs)incorporating Long Short-Term Memory(LSTM)mechanisms have demonstrated greater capabilities in retaining and utilizing data dependencies over extended periods.Metrics such as data types,training duration,accuracy,number of false positives,and number of false negatives are among the parameters employed to assess the effectiveness of these models in identifying both common and unusual cyberattacks.RNNs are utilised in conjunction with LSTM to support human analysts in identifying possible intrusion events,hence enhancing their decision-making capabilities.A potential solution to address the limitations of Shallow learning is the introduction of the Eccentric Intrusion Detection Model.This model utilises Recurrent Neural Networks,specifically exploiting LSTM techniques.The proposed model achieves detection accuracy(99.5%),generalisation(99%),and false-positive rate(0.72%),the parameters findings reveal that it is superior to state-of-the-art techniques. 展开更多
关键词 CYBERSECURITY intrusion detection machine learning leveraging long short-term memory(LLSTM) CICIDS2019 dataset innovative cyberattacks
在线阅读 下载PDF
IoT-CDS:Internet of Things Cyberattack Detecting System Based on Deep Learning Models
8
作者 Monir Abdullah 《Computers, Materials & Continua》 SCIE EI 2024年第12期4265-4283,共19页
The rapid growth and pervasive presence of the Internet of Things(IoT)have led to an unparalleled increase in IoT devices,thereby intensifying worries over IoT security.Deep learning(DL)-based intrusion detection(ID)h... The rapid growth and pervasive presence of the Internet of Things(IoT)have led to an unparalleled increase in IoT devices,thereby intensifying worries over IoT security.Deep learning(DL)-based intrusion detection(ID)has emerged as a vital method for protecting IoT environments.To rectify the deficiencies of current detection methodologies,we proposed and developed an IoT cyberattacks detection system(IoT-CDS)based on DL models for detecting bot attacks in IoT networks.The DL models—long short-term memory(LSTM),gated recurrent units(GRUs),and convolutional neural network-LSTM(CNN-LSTM)were suggested to detect and classify IoT attacks.The BoT-IoT dataset was used to examine the proposed IoT-CDS system,and the dataset includes six attacks with normal packets.The experiments conducted on the BoT-IoT network dataset reveal that the LSTM model attained an impressive accuracy rate of 99.99%.Compared with other internal and external methods using the same dataset,it is observed that the LSTM model achieved higher accuracy rates.LSTMs are more efficient than GRUs and CNN-LSTMs in real-time performance and resource efficiency for cyberattack detection.This method,without feature selection,demonstrates advantages in training time and detection accuracy.Consequently,the proposed approach can be extended to improve the security of various IoT applications,representing a significant contribution to IoT security. 展开更多
关键词 cyberattacks intrusion detection system deep learning internet of things
在线阅读 下载PDF
Performance Analysis of Machine Learning-Based Intrusion Detection with Hybrid Feature Selection
9
作者 Mohammad Al-Omari Qasem Abu Al-Haija 《Computer Systems Science & Engineering》 2024年第6期1537-1555,共19页
More businesses are deploying powerful Intrusion Detection Systems(IDS)to secure their data and physical assets.Improved cyber-attack detection and prevention in these systems requires machine learning(ML)approaches.T... More businesses are deploying powerful Intrusion Detection Systems(IDS)to secure their data and physical assets.Improved cyber-attack detection and prevention in these systems requires machine learning(ML)approaches.This paper examines a cyber-attack prediction system combining feature selection(FS)and ML.Our technique’s foundation was based on Correlation Analysis(CA),Mutual Information(MI),and recursive feature reduction with cross-validation.To optimize the IDS performance,the security features must be carefully selected from multiple-dimensional datasets,and our hybrid FS technique must be extended to validate our methodology using the improved UNSW-NB 15 and TON_IoT datasets.Our technique identified 22 key characteristics in UNSW-NB-15 and 8 in TON_IoT.We evaluated prediction using seven ML methods:Decision Tree(DT),Random Forest(RF),Logistic Regression(LR),Naive Bayes(NB),K-Nearest Neighbors(KNN),Support Vector Machines(SVM),and Multilayer Perceptron(MLP)classifiers.The DT,RF,NB,and MLP classifiers helped our model surpass the competition on both datasets.Therefore,the investigational outcomes of our hybrid model may help IDSs defend business assets from various cyberattack vectors. 展开更多
关键词 Machine learning CYBERSECURITY cyberattacks feature selection classification intrusion detection system
在线阅读 下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
10
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information Security Network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
在线阅读 下载PDF
Artificial Intelligence Adoption for Cybersecurity in Africa
11
作者 Nadine Nibigira Vincent Havyarimana Zhu Xiao 《Journal of Information Security》 2024年第2期134-147,共14页
Legacy-based threat detection systems have not been able to keep up with the exponential growth in scope, frequency, and effect of cybersecurity threats. Artificial intelligence is being used as a result to help with ... Legacy-based threat detection systems have not been able to keep up with the exponential growth in scope, frequency, and effect of cybersecurity threats. Artificial intelligence is being used as a result to help with the issue. This paper’s primary goal is to examine how African nations are utilizing artificial intelligence to defend their infrastructure against cyberattacks. Artificial intelligence (AI) systems will make decisions that impact Africa’s future. The lack of technical expertise, the labor pool, financial resources, data limitations, uncertainty, lack of structured data, absence of government policies, ethics, user attitudes, insufficient investment in research and development, and the requirement for more adaptable and dynamic regulatory systems all pose obstacles to the adoption of AI technologies in Africa. The paper discusses how African countries are adopting artificial intelligence solutions for cybersecurity. And it shows the impact of AI to identify shadow data, monitor for abnormalities in data access and alert cyber security professionals about potential threats by anyone accessing the data or sensitive information saving valuable time in detecting and remediating issues in real-time. The study finds that 69.16% of African companies are implementing information security strategies and of these, 45% said they use technologies based on AI algorithms. This study finds that a large number of African businesses use tools that can track and analyze user behaviour in designated areas and spot anomalies, such as new users, strange IP addresses and login activity, changes to permissions on files, folders, and other resources, and the copying or erasure of massive amounts of data. Thus, we discover that just 18.18% of the target has no national cybersecurity strategy or policy. The study proposes using big data security analytics to integrate AI. Adopting it would be beneficial for all African nations, as it provides a range of cyberattack defense techniques. 展开更多
关键词 Artificial Intelligence (AI) CYBERSECURITY cyberattacks Cybercriminals
在线阅读 下载PDF
Augmenting Internet of Medical Things Security:Deep Ensemble Integration and Methodological Fusion
12
作者 Hamad Naeem Amjad Alsirhani +2 位作者 Faeiz MAlserhani Farhan Ullah Ondrej Krejcar 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第12期2185-2223,共39页
When it comes to smart healthcare business systems,network-based intrusion detection systems are crucial for protecting the system and its networks from malicious network assaults.To protect IoMT devices and networks ... When it comes to smart healthcare business systems,network-based intrusion detection systems are crucial for protecting the system and its networks from malicious network assaults.To protect IoMT devices and networks in healthcare and medical settings,our proposed model serves as a powerful tool for monitoring IoMT networks.This study presents a robust methodology for intrusion detection in Internet of Medical Things(IoMT)environments,integrating data augmentation,feature selection,and ensemble learning to effectively handle IoMT data complexity.Following rigorous preprocessing,including feature extraction,correlation removal,and Recursive Feature Elimi-nation(RFE),selected features are standardized and reshaped for deep learning models.Augmentation using the BAT algorithm enhances dataset variability.Three deep learning models,Transformer-based neural networks,self-attention Deep Convolutional Neural Networks(DCNNs),and Long Short-Term Memory(LSTM)networks,are trained to capture diverse data aspects.Their predictions form a meta-feature set for a subsequent meta-learner,which combines model strengths.Conventional classifiers validate meta-learner features for broad algorithm suitability.This comprehensive method demonstrates high accuracy and robustness in IoMT intrusion detection.Evaluations were conducted using two datasets:the publicly available WUSTL-EHMS-2020 dataset,which contains two distinct categories,and the CICIoMT2024 dataset,encompassing sixteen categories.Experimental results showcase the method’s exceptional performance,achieving optimal scores of 100%on the WUSTL-EHMS-2020 dataset and 99%on the CICIoMT2024. 展开更多
关键词 Cyberattack ensemble learning feature selection intrusion detection smart cities machine learning BAT augmentation
在线阅读 下载PDF
ResNeSt-biGRU: An Intrusion Detection Model Based on Internet of Things
13
作者 Yan Xiang Daofeng Li +2 位作者 Xinyi Meng Chengfeng Dong Guanglin Qin 《Computers, Materials & Continua》 SCIE EI 2024年第4期1005-1023,共19页
The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasingdemands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device has... The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasingdemands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device hascaught the attention of cyber hackers, as it provides them with expanded avenues to access valuable data. Thishas resulted in a myriad of security challenges, including information leakage, malware propagation, and financialloss, among others. Consequently, developing an intrusion detection system to identify both active and potentialintrusion traffic in IoT networks is of paramount importance. In this paper, we propose ResNeSt-biGRU, a practicalintrusion detection model that combines the strengths of ResNeSt, a variant of Residual Neural Network, andbidirectionalGated RecurrentUnitNetwork (biGRU).Our ResNeSt-biGRUframework diverges fromconventionalintrusion detection systems (IDS) by employing this dual-layeredmechanism that exploits the temporal continuityand spatial feature within network data streams, a methodological innovation that enhances detection accuracy.In conjunction with this, we introduce the PreIoT dataset, a compilation of prevalent IoT network behaviors, totrain and evaluate IDSmodels with a focus on identifying potential intrusion traffics. The effectiveness of proposedscheme is demonstrated through testing, wherein it achieved an average accuracy of 99.90% on theN-BaIoT datasetas well as on the PreIoT dataset and 94.45% on UNSW-NB15 dataset. The outcomes of this research reveal thepotential of ResNeSt-biGRU to bolster security measures, diminish intrusion-related vulnerabilities, and preservethe overall security of IoT ecosystems. 展开更多
关键词 Internet of Things cyberattack intrusion detection internet security
在线阅读 下载PDF
Encrypted Cyberattack Detection System over Encrypted IoT Traffic Based onStatistical Intelligence
14
作者 Il Hwan Ji Ju Hyeon Lee +1 位作者 Seungho Jeon Jung Taek Seo 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1519-1549,共31页
In the early days of IoT’s introduction, it was challenging to introduce encryption communication due to the lackof performance of each component, such as computing resources like CPUs and batteries, to encrypt and d... In the early days of IoT’s introduction, it was challenging to introduce encryption communication due to the lackof performance of each component, such as computing resources like CPUs and batteries, to encrypt and decryptdata. Because IoT is applied and utilized in many important fields, a cyberattack on IoT can result in astronomicalfinancial and human casualties. For this reason, the application of encrypted communication to IoT has beenrequired, and the application of encrypted communication to IoT has become possible due to improvements inthe computing performance of IoT devices and the development of lightweight cryptography. The applicationof encrypted communication in IoT has made it possible to use encrypted communication channels to launchcyberattacks. The approach of extracting evidence of an attack based on the primary information of a networkpacket is no longer valid because critical information, such as the payload in a network packet, is encrypted byencrypted communication. For this reason, technology that can detect cyberattacks over encrypted network trafficoccurring in IoT environments is required. Therefore, this research proposes an encrypted cyberattack detectionsystem for the IoT (ECDS-IoT) that derives valid features for cyberattack detection from the cryptographic networktraffic generated in the IoT environment and performs cyberattack detection based on the derived features. ECDS-IoT identifies identifiable information from encrypted traffic collected in IoT environments and extracts statistics-based features through statistical analysis of identifiable information. ECDS-IoT understands information aboutnormal data by learning only statistical features extracted from normal data. ECDS-IoT detects cyberattacks basedonly on the normal data information it has trained. To evaluate the cyberattack detection performance of theproposed ECDS-IoT in this research, ECDS-IoT used CICIoT2023, a dataset containing encrypted traffic generatedby normal and seven categories of cyberattacks in the IoT environment and experimented with cyberattackdetection on encrypted traffic using Autoencoder, RNN, GRU, LSTM, BiLSTM, and AE-LSTM algorithms. Asa result of evaluating the performance of cyberattack detection for encrypted traffic, ECDS-IoT achieved highperformance such as accuracy 0.99739, precision 0.99154, recall 1.0, F1 score 0.99575, and ROC_AUC 0.99822when using the AE-LSTM algorithm. As shown by the cyberattack detection results of ECDS-IoT, it is possibleto detect most cyberattacks through encrypted traffic. By applying ECDS-IoT to IoT, it can effectively detectcyberattacks concealed in encrypted traffic, promoting the efficient operation of IoT and preventing financial andhuman damage caused by cyberattacks. 展开更多
关键词 IoT cybersecurity IoT encrypted traffic IoT cyberattack detection
在线阅读 下载PDF
Distributed Fault-Tolerant Consensus Tracking of Multi-Agent Systems Under Cyber-Attacks 被引量:4
15
作者 Chun Liu Bin Jiang +2 位作者 Xiaofan Wang Huiliao Yang Shaorong Xie 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第6期1037-1048,共12页
This paper investigates the distributed fault-tolerant consensus tracking problem of nonlinear multi-agent systems with general incipient and abrupt time-varying actuator faults under cyber-attacks.First,a decentraliz... This paper investigates the distributed fault-tolerant consensus tracking problem of nonlinear multi-agent systems with general incipient and abrupt time-varying actuator faults under cyber-attacks.First,a decentralized unknown input observer is established to estimate relative states and actuator faults.Second,the estimated and output neighboring information is combined with distributed fault-tolerant consensus tracking controllers.Criteria of reaching leader-following exponential consensus tracking of multi-agent systems under both connectivity-maintained and connectivity-mixed attacks are derived with average dwelling time,attack frequency,and attack activation rate technique,respectively.Simulation example verifies the effectiveness of the fault-tolerant consensus tracking algorithm. 展开更多
关键词 cyberattacks fault-tolerant consensus tracking incipient and abrupt actuator faults nonlinear multi-agent systems unknown input observer
在线阅读 下载PDF
DeepIoT.IDS:Hybrid Deep Learning for Enhancing IoT Network Intrusion Detection 被引量:5
16
作者 Ziadoon K.Maseer Robiah Yusof +3 位作者 Salama A.Mostafa Nazrulazhar Bahaman Omar Musa Bander Ali Saleh Al-rimy 《Computers, Materials & Continua》 SCIE EI 2021年第12期3945-3966,共22页
With an increasing number of services connected to the internet,including cloud computing and Internet of Things(IoT)systems,the prevention of cyberattacks has become more challenging due to the high dimensionality of... With an increasing number of services connected to the internet,including cloud computing and Internet of Things(IoT)systems,the prevention of cyberattacks has become more challenging due to the high dimensionality of the network traffic data and access points.Recently,researchers have suggested deep learning(DL)algorithms to define intrusion features through training empirical data and learning anomaly patterns of attacks.However,due to the high dynamics and imbalanced nature of the data,the existing DL classifiers are not completely effective at distinguishing between abnormal and normal behavior line connections for modern networks.Therefore,it is important to design a self-adaptive model for an intrusion detection system(IDS)to improve the detection of attacks.Consequently,in this paper,a novel hybrid weighted deep belief network(HW-DBN)algorithm is proposed for building an efficient and reliable IDS(DeepIoT.IDS)model to detect existing and novel cyberattacks.The HW-DBN algorithm integrates an improved Gaussian–Bernoulli restricted Boltzmann machine(Deep GB-RBM)feature learning operator with a weighted deep neural networks(WDNN)classifier.The CICIDS2017 dataset is selected to evaluate the DeepIoT.IDS model as it contains multiple types of attacks,complex data patterns,noise values,and imbalanced classes.We have compared the performance of the DeepIoT.IDS model with three recent models.The results show the DeepIoT.IDS model outperforms the three other models by achieving a higher detection accuracy of 99.38%and 99.99%for web attack and bot attack scenarios,respectively.Furthermore,it can detect the occurrence of low-frequency attacks that are undetectable by other models. 展开更多
关键词 cyberattacks internet of things intrusion detection system deep learning neural network supervised and unsupervised deep learning
在线阅读 下载PDF
COVID-19 pandemic and the cyberthreat landscape:Research challenges and opportunities
17
作者 Heba Saleous Muhusina Ismail +4 位作者 Saleh HAlDaajeh Nisha Madathil Saed Alrabaee Kim-Kwang Raymond Choo Nabeel Al-Qirim 《Digital Communications and Networks》 SCIE CSCD 2023年第1期211-222,共12页
Although cyber technologies benefit our society,there are also some related cybersecurity risks.For example,cybercriminals may exploit vulnerabilities in people,processes,and technologies during trying times,such as t... Although cyber technologies benefit our society,there are also some related cybersecurity risks.For example,cybercriminals may exploit vulnerabilities in people,processes,and technologies during trying times,such as the ongoing COVID-19 pandemic,to identify opportunities that target vulnerable individuals,organizations(e.g.,medical facilities),and systems.In this paper,we examine the various cyberthreats associated with the COVID-19 pandemic.We also determine the attack vectors and surfaces of cyberthreats.Finally,we will discuss and analyze the insights and suggestions generated by different cyberattacks against individuals,organizations,and systems. 展开更多
关键词 COVID-19 cyberattacks Security and privacy MITIGATION Potential solutions
暂未订购
Hunger Search Optimization with Hybrid Deep Learning Enabled Phishing Detection and Classification Model
18
作者 Hadil Shaiba Jaber S.Alzahrani +3 位作者 Majdy M.Eltahir Radwa Marzouk Heba Mohsen Manar Ahmed Hamza 《Computers, Materials & Continua》 SCIE EI 2022年第12期6425-6441,共17页
Phishing is one of the simplest ways in cybercrime to hack the reliable data of users such as passwords,account identifiers,bank details,etc.In general,these kinds of cyberattacks are made at users through phone calls... Phishing is one of the simplest ways in cybercrime to hack the reliable data of users such as passwords,account identifiers,bank details,etc.In general,these kinds of cyberattacks are made at users through phone calls,emails,or instant messages.The anti-phishing techniques,currently under use,aremainly based on source code features that need to scrape the webpage content.In third party services,these techniques check the classification procedure of phishing Uniform Resource Locators(URLs).Even thoughMachine Learning(ML)techniques have been lately utilized in the identification of phishing,they still need to undergo feature engineering since the techniques are not well-versed in identifying phishing offenses.The tremendous growth and evolution of Deep Learning(DL)techniques paved the way for increasing the accuracy of classification process.In this background,the current research article presents a Hunger Search Optimization with Hybrid Deep Learning enabled Phishing Detection and Classification(HSOHDL-PDC)model.The presented HSOHDL-PDC model focuses on effective recognition and classification of phishing based on website URLs.In addition,SOHDL-PDC model uses character-level embedding instead of word-level embedding since the URLs generally utilize words with no importance.Moreover,a hybrid Convolutional Neural Network-Long Short Term Memory(HCNN-LSTM)technique is also applied for identification and classification of phishing.The hyperparameters involved in HCNN-LSTM model are optimized with the help of HSO algorithm which in turn produced improved outcomes.The performance of the proposed HSOHDL-PDC model was validated using different datasets and the outcomes confirmed the supremacy of the proposed model over other recent approaches. 展开更多
关键词 Uniform resource locators PHISHING cyberattacks machine learning deep learning hyperparameter optimization
在线阅读 下载PDF
Hybrid Metaheuristics Feature Selection with Stacked Deep Learning-Enabled Cyber-Attack Detection Model
19
作者 Mashael M Asiri Heba G.Mohamed +5 位作者 Mohamed K Nour Mesfer Al Duhayyim Amira Sayed A.Aziz Abdelwahed Motwakel Abu Sarwar Zamani Mohamed I.Eldesouki 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1679-1694,共16页
Due to exponential increase in smart resource limited devices and high speed communication technologies,Internet of Things(IoT)have received significant attention in different application areas.However,IoT environment... Due to exponential increase in smart resource limited devices and high speed communication technologies,Internet of Things(IoT)have received significant attention in different application areas.However,IoT environment is highly susceptible to cyber-attacks because of memory,processing,and communication restrictions.Since traditional models are not adequate for accomplishing security in the IoT environment,the recent developments of deep learning(DL)models find beneficial.This study introduces novel hybrid metaheuristics feature selection with stacked deep learning enabled cyber-attack detection(HMFS-SDLCAD)model.The major intention of the HMFS-SDLCAD model is to recognize the occurrence of cyberattacks in the IoT environment.At the preliminary stage,data pre-processing is carried out to transform the input data into useful format.In addition,salp swarm optimization based on particle swarm optimization(SSOPSO)algorithm is used for feature selection process.Besides,stacked bidirectional gated recurrent unit(SBiGRU)model is utilized for the identification and classification of cyberattacks.Finally,whale optimization algorithm(WOA)is employed for optimal hyperparameter optimization process.The experimental analysis of the HMFS-SDLCAD model is validated using benchmark dataset and the results are assessed under several aspects.The simulation outcomes pointed out the improvements of the HMFS-SDLCAD model over recent approaches. 展开更多
关键词 cyberattacks SECURITY deep learning internet of things feature selection data classification
在线阅读 下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部