期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Evaluation and Benchmarking of Cybersecurity DDoS Attacks Detection Models through the Integration of FWZIC and MABAC Methods
1
作者 Alaa Mahmood Isa Avcı 《Computer Systems Science & Engineering》 2025年第1期401-417,共17页
A Distributed Denial-of-Service(DDoS)attack poses a significant challenge in the digital age,disrupting online services with operational and financial consequences.Detecting such attacks requires innovative and effect... A Distributed Denial-of-Service(DDoS)attack poses a significant challenge in the digital age,disrupting online services with operational and financial consequences.Detecting such attacks requires innovative and effective solutions.The primary challenge lies in selecting the best among several DDoS detection models.This study presents a framework that combines several DDoS detection models and Multiple-Criteria Decision-Making(MCDM)techniques to compare and select the most effective models.The framework integrates a decision matrix from training several models on the CiC-DDOS2019 dataset with Fuzzy Weighted Zero Inconsistency Criterion(FWZIC)and MultiAttribute Boundary Approximation Area Comparison(MABAC)methodologies.FWZIC assigns weights to evaluate criteria,while MABAC compares detection models based on the assessed criteria.The results indicate that the FWZIC approach assigns weights to criteria reliably,with time complexity receiving the highest weight(0.2585)and F1 score receiving the lowest weight(0.14644).Among the models evaluated using the MABAC approach,the Support Vector Machine(SVM)ranked first with a score of 0.0444,making it the most suitable for this work.In contrast,Naive Bayes(NB)ranked lowest with a score of 0.0018.Objective validation and sensitivity analysis proved the reliability of the framework.This study provides a practical approach and insights for cybersecurity practitioners and researchers to evaluate DDoS detection models. 展开更多
关键词 Cybersecurity attack DDoS attacks DDoS detection MABAC fwzic
在线阅读 下载PDF
在区块链环境下基于新型模糊加权零不一致性的医疗数据访问控制模型
2
作者 董建行 姜茸 田生湖 《计算机应用研究》 北大核心 2025年第5期1319-1324,共6页
随着医疗数据量的持续增长,传统数据存储与访问方式已难以适应当前需求。为确保医疗数据的安全访问控制,结合区块链平台,创新性地融合了新型模糊加权零不一致性(FWZIC)与逼近理想解(TOPSIS)方法,提出了基于TFWZIC的综合评分访问控制模型... 随着医疗数据量的持续增长,传统数据存储与访问方式已难以适应当前需求。为确保医疗数据的安全访问控制,结合区块链平台,创新性地融合了新型模糊加权零不一致性(FWZIC)与逼近理想解(TOPSIS)方法,提出了基于TFWZIC的综合评分访问控制模型(TF-ABAC)。该模型首先依据医生对数据内容的评价,利用FWZIC和TOPSIS计算数据的综合评分,以此评估数据的重要性;随后,基于用户的访问历史记录,生成医生的信任值,并据此设计智能合约部署于区块链上,以精准控制用户的访问权限;同时,模型还引入了奖励机制,针对不同访问行为给予用户相应的奖惩,从而强化了医疗数据的安全访问管理;最终,通过仿真实验验证,TF-ABAC在访问控制方面展现出显著优势,有效提升了医疗数据的安全防护水平。 展开更多
关键词 区块链 fwzic 访问控制 ABAC TOPSIS
在线阅读 下载PDF
Prioritizing Network-On-Chip Routers for Countermeasure Techniques against Flooding Denial-of-Service Attacks:A Fuzzy Multi-Criteria Decision-Making Approach
3
作者 Ahmed Abbas Jasim Al-Hchaimi Yousif Raad Muhsen +4 位作者 Wisam Hazim Gwad Entisar Soliman Alkayal Riyadh Rahef Nuiaa Al Ogaili Zaid Abdi Alkareem Alyasseri Alhamzah Alnoor 《Computer Modeling in Engineering & Sciences》 2025年第3期2661-2689,共29页
The implementation of Countermeasure Techniques(CTs)in the context of Network-On-Chip(NoC)based Multiprocessor System-On-Chip(MPSoC)routers against the Flooding Denial-of-Service Attack(F-DoSA)falls under Multi-Criter... The implementation of Countermeasure Techniques(CTs)in the context of Network-On-Chip(NoC)based Multiprocessor System-On-Chip(MPSoC)routers against the Flooding Denial-of-Service Attack(F-DoSA)falls under Multi-Criteria Decision-Making(MCDM)due to the three main concerns,called:traffic variations,multiple evaluation criteria-based traffic features,and prioritization NoC routers as an alternative.In this study,we propose a comprehensive evaluation of various NoC traffic features to identify the most efficient routers under the F-DoSA scenarios.Consequently,an MCDM approach is essential to address these emerging challenges.While the recent MCDM approach has some issues,such as uncertainty,this study utilizes Fuzzy-Weighted Zero-Inconsistency(FWZIC)to estimate the criteria weight values and Fuzzy Decision by Opinion Score Method(FDOSM)for ranking the routers with fuzzy Single-valued Neutrosophic under names(SvN-FWZIC and SvN-FDOSM)to overcome the ambiguity.The results obtained by using the SvN-FWZIC method indicate that the Max packet count has the highest importance among the evaluated criteria,with a weighted score of 0.1946.In contrast,the Hop count is identified as the least significant criterion,with a weighted score of 0.1090.The remaining criteria fall within a range of intermediate importance,with enqueue time scoring 0.1845,packet count decremented and traversal index scoring 0.1262,packet count incremented scoring 0.1124,and packet count index scoring 0.1472.In terms of ranking,SvN-FDOSM has two approaches:individual and group.Both the individual and group ranking processes show that(Router 4)is the most effective router,while(Router 3)is the lowest router under F-DoSA.The sensitivity analysis provides a high stability in ranking among all 10 scenarios.This approach offers essential feedback in making proper decisions in the design of countermeasure techniques in the domain of NoC-based MPSoC. 展开更多
关键词 NoC-based MPSoC security flooding DoS attack MCDM FDOSM fwzic fuzzy set
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部