期刊文献+
共找到10,354篇文章
< 1 2 250 >
每页显示 20 50 100
GSLDWOA: A Feature Selection Algorithm for Intrusion Detection Systems in IIoT
1
作者 Wanwei Huang Huicong Yu +3 位作者 Jiawei Ren Kun Wang Yanbu Guo Lifeng Jin 《Computers, Materials & Continua》 2026年第1期2006-2029,共24页
Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity.These challenges hinder traditional IDS from... Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity.These challenges hinder traditional IDS from effectively extracting features while maintaining detection accuracy.This paper proposes an industrial Internet ofThings intrusion detection feature selection algorithm based on an improved whale optimization algorithm(GSLDWOA).The aim is to address the problems that feature selection algorithms under high-dimensional data are prone to,such as local optimality,long detection time,and reduced accuracy.First,the initial population’s diversity is increased using the Gaussian Mutation mechanism.Then,Non-linear Shrinking Factor balances global exploration and local development,avoiding premature convergence.Lastly,Variable-step Levy Flight operator and Dynamic Differential Evolution strategy are introduced to improve the algorithm’s search efficiency and convergence accuracy in highdimensional feature space.Experiments on the NSL-KDD and WUSTL-IIoT-2021 datasets demonstrate that the feature subset selected by GSLDWOA significantly improves detection performance.Compared to the traditional WOA algorithm,the detection rate and F1-score increased by 3.68%and 4.12%.On the WUSTL-IIoT-2021 dataset,accuracy,recall,and F1-score all exceed 99.9%. 展开更多
关键词 Industrial Internet of Things intrusion detection system feature selection whale optimization algorithm Gaussian mutation
在线阅读 下载PDF
Drone-based superconducting nanowire single-photon detection system with a detection efficiency of more than 90% 被引量:1
2
作者 Ruoyan Ma Zhimin Guo +11 位作者 Dai Chen Xiaojun Dai You Xiao Chengjun Zhang Jiamin Xiong Jia Huang Xingyu Zhang Xiaoyu Liu Liangliang Rong Hao Li Xiaofu Zhang Lixing You 《Advanced Photonics Nexus》 2025年第2期25-30,共6页
Conventional superconducting nanowire single-photon detectors(SNSPDs)have been typically limited in their applications due to their size,weight,and power consumption,which confine their use to laboratory settings.Howe... Conventional superconducting nanowire single-photon detectors(SNSPDs)have been typically limited in their applications due to their size,weight,and power consumption,which confine their use to laboratory settings.However,with the rapid development of remote imaging,sensing technologies,and long-range quantum communication with fewer topographical constraints,the demand for high-efficiency single-photon detectors integrated with avionic platforms is rapidly growing.We herein designed and manufactured the first drone-based SNSPD system with a system detection efficiency(SDE)as high as 91.8%.This drone-based system incorporates high-performance NbTiN SNSPDs,a self-developed miniature liquid helium dewar,and custom-built integrated electrical setups,making it capable of being launched in complex topographical conditions.Such a drone-based SNSPD system may open the use of SNSPDs for applications that demand high SDE in complex environments. 展开更多
关键词 superconducting nanowire single-photon detector drone-based single-photon detection system high system detection efficiency dark count rate
在线阅读 下载PDF
An Intrusion Detection System Based on HiTar-2024 Dataset Generation from LOG Files for Smart Industrial Internet-of-Things Environment
3
作者 Tarak Dhaouadi Hichem Mrabet +1 位作者 Adeeb Alhomoud Abderrazak Jemai 《Computers, Materials & Continua》 2025年第3期4535-4554,共20页
The increasing adoption of Industrial Internet of Things(IIoT)systems in smart manufacturing is leading to raise cyberattack numbers and pressing the requirement for intrusion detection systems(IDS)to be effective.How... The increasing adoption of Industrial Internet of Things(IIoT)systems in smart manufacturing is leading to raise cyberattack numbers and pressing the requirement for intrusion detection systems(IDS)to be effective.However,existing datasets for IDS training often lack relevance to modern IIoT environments,limiting their applicability for research and development.To address the latter gap,this paper introduces the HiTar-2024 dataset specifically designed for IIoT systems.As a consequence,that can be used by an IDS to detect imminent threats.Likewise,HiTar-2024 was generated using the AREZZO simulator,which replicates realistic smart manufacturing scenarios.The generated dataset includes five distinct classes:Normal,Probing,Remote to Local(R2L),User to Root(U2R),and Denial of Service(DoS).Furthermore,comprehensive experiments with popular Machine Learning(ML)models using various classifiers,including BayesNet,Logistic,IBK,Multiclass,PART,and J48 demonstrate high accuracy,precision,recall,and F1-scores,exceeding 0.99 across all ML metrics.The latter result is reached thanks to the rigorous applied process to achieve this quite good result,including data pre-processing,features extraction,fixing the class imbalance problem,and using a test option for model robustness.This comprehensive approach emphasizes meticulous dataset construction through a complete dataset generation process,a careful labelling algorithm,and a sophisticated evaluation method,providing valuable insights to reinforce IIoT system security.Finally,the HiTar-2024 dataset is compared with other similar datasets in the literature,considering several factors such as data format,feature extraction tools,number of features,attack categories,number of instances,and ML metrics. 展开更多
关键词 Intrusion detection system industrial IoT machine learning security cyber-attacks DATASET
在线阅读 下载PDF
Design and test of cesium atomic concentration detection system based on TDLAS
4
作者 LIANG Lizhen LIU Shanhu +2 位作者 WU Yong WEI Jianglong XIE Yahong 《Optoelectronics Letters》 2025年第3期167-171,共5页
In order to better build the neutral beam injector with negative ion source(NNBI),the pre-research on key technologies has been carried out for the comprehensive research facility for fusion technology(CRFFT).Cesium s... In order to better build the neutral beam injector with negative ion source(NNBI),the pre-research on key technologies has been carried out for the comprehensive research facility for fusion technology(CRFFT).Cesium seeding into negative-ion sources is a prerequisite to obtain the required negative hydrogen ion.The performance of ion source largely depends on the cesium conditions in the source.It is very necessary to quantitatively measure the amount of cesium in the source during the plasma on and off periods(vacuum stage). 展开更多
关键词 atomic concentration tdlas CESIUM detection system ion source negative hydrogen ionthe negative ion source nnbi neutral beam injector
原文传递
Enhancing Roaming Security in Cloud-Native 5G Core Network through Deep Learning-Based Intrusion Detection System
5
作者 I Wayan Adi Juliawan Pawana Vincent Abella +2 位作者 Jhury Kevin Lastre Yongho Ko Ilsun You 《Computer Modeling in Engineering & Sciences》 2025年第11期2733-2760,共28页
Roaming in 5G networks enables seamless global mobility but also introduces significant security risks due to legacy protocol dependencies,uneven Security Edge Protection Proxy(SEPP)deployment,and the dynamic nature o... Roaming in 5G networks enables seamless global mobility but also introduces significant security risks due to legacy protocol dependencies,uneven Security Edge Protection Proxy(SEPP)deployment,and the dynamic nature of inter-Public Land Mobile Network(inter-PLMN)signaling.Traditional rule-based defenses are inadequate for protecting cloud-native 5G core networks,particularly as roaming expands into enterprise and Internet of Things(IoT)domains.This work addresses these challenges by designing a scalable 5G Standalone testbed,generating the first intrusion detection dataset specifically tailored to roaming threats,and proposing a deep learning based intrusion detection framework for cloud-native environments.Six deep learning models including Multilayer Perceptron(MLP),one-dimensional Convolutional Neural Network(1D CNN),Autoencoder(AE),Recurrent Neural Network(RNN),Gated Recurrent Unit(GRU),and Long Short-Term Memory(LSTM)were evaluated on the dataset using both weighted and balanced metrics to account for strong class imbalance.While all models achieved over 99%accuracy,recurrent architectures such as GRU and LSTM outperformed others in balanced accuracy and macro-level evaluation,demonstrating superior effectiveness in detecting rare but high-impact attacks.These results confirm the importance of sequence-aware Artificial Intelligence(AI)models for securing roaming scenarios,where transient and contextdependent threats are common.The proposed framework provides a foundation for intelligent,adaptive intrusion detection in 5G and offers a path toward resilient security in Beyond 5G and 6G networks. 展开更多
关键词 ROAMING 5G cloud native intrusion detection system deep learning
在线阅读 下载PDF
An Effective Intrusion Detection System Based on the FSA-BGRU Hybrid Model
6
作者 Deng Zaihui Li Zihang +2 位作者 Guo Jianzhong Gan Guangming Kong Dejin 《China Communications》 2025年第2期188-198,共11页
Intrusion detection systems play a vital role in cyberspace security.In this study,a network intrusion detection method based on the feature selection algorithm(FSA)and a deep learning model is developed using a fusio... Intrusion detection systems play a vital role in cyberspace security.In this study,a network intrusion detection method based on the feature selection algorithm(FSA)and a deep learning model is developed using a fusion of a recursive feature elimination(RFE)algorithm and a bidirectional gated recurrent unit(BGRU).Particularly,the RFE algorithm is employed to select features from high-dimensional data to reduce weak correlations between features and remove redundant features in the numerical feature space.Then,a neural network that combines the BGRU and multilayer perceptron(MLP)is adopted to extract deep intrusion behavior features.Finally,a support vector machine(SVM)classifier is used to classify intrusion behaviors.The proposed model is verified by experiments on the NSL-KDD dataset.The results indicate that the proposed model achieves a 90.25%accuracy and a 97.51%detection rate in binary classification and outperforms other machine learning and deep learning models in intrusion classification.The proposed method can provide new insight into network intrusion detection. 展开更多
关键词 bidirectional GRU feature selection intrusion detection system multilayer perceptron recursive feature elimination support vector machine
在线阅读 下载PDF
TIDS: Tensor Based Intrusion Detection System (IDS) and Its Application in Large Scale DDoS Attack Detection
7
作者 Hanqing Sun Xue Li +1 位作者 Qiyuan Fan Puming Wang 《Computers, Materials & Continua》 2025年第7期1659-1679,共21页
The era of big data brings new challenges for information network systems(INS),simultaneously offering unprecedented opportunities for advancing intelligent intrusion detection systems.In this work,we propose a data-d... The era of big data brings new challenges for information network systems(INS),simultaneously offering unprecedented opportunities for advancing intelligent intrusion detection systems.In this work,we propose a data-driven intrusion detection system for Distributed Denial of Service(DDoS)attack detection.The system focuses on intrusion detection from a big data perceptive.As intelligent information processing methods,big data and artificial intelligence have been widely used in information systems.The INS system is an important information system in cyberspace.In advanced INS systems,the network architectures have become more complex.And the smart devices in INS systems collect a large scale of network data.How to improve the performance of a complex intrusion detection system with big data and artificial intelligence is a big challenge.To address the problem,we design a novel intrusion detection system(IDS)from a big data perspective.The IDS system uses tensors to represent large-scale and complex multi-source network data in a unified tensor.Then,a novel tensor decomposition(TD)method is developed to complete big data mining.The TD method seamlessly collaborates with the XGBoost(eXtreme Gradient Boosting)method to complete the intrusion detection.To verify the proposed IDS system,a series of experiments is conducted on two real network datasets.The results revealed that the proposed IDS system attained an impressive accuracy rate over 98%.Additionally,by altering the scale of the datasets,the proposed IDS system still maintains excellent detection performance,which demonstrates the proposed IDS system’s robustness. 展开更多
关键词 Intrusion detection system big data tensor decomposition multi-modal feature DDOS
在线阅读 下载PDF
A Genetic Algorithm-Based Double Auction Framework for Secure and Scalable Resource Allocation in Cloud-Integrated Intrusion Detection Systems
8
作者 Siraj Un Muneer Ihsan Ullah +1 位作者 Zeshan Iqbal Rajermani Thinakaran 《Computers, Materials & Continua》 2025年第12期4959-4975,共17页
The complexity of cloud environments challenges secure resource management,especially for intrusion detection systems(IDS).Existing strategies struggle to balance efficiency,cost fairness,and threat resilience.This pa... The complexity of cloud environments challenges secure resource management,especially for intrusion detection systems(IDS).Existing strategies struggle to balance efficiency,cost fairness,and threat resilience.This paper proposes an innovative approach to managing cloud resources through the integration of a genetic algorithm(GA)with a“double auction”method.This approach seeks to enhance security and efficiency by aligning buyers and sellers within an intelligent market framework.It guarantees equitable pricing while utilizing resources efficiently and optimizing advantages for all stakeholders.The GA functions as an intelligent search mechanism that identifies optimal combinations of bids from users and suppliers,addressing issues arising from the intricacies of cloud systems.Analyses proved that our method surpasses previous strategies,particularly in terms of price accuracy,speed,and the capacity to manage large-scale activities,critical factors for real-time cybersecurity systems,such as IDS.Our research integrates artificial intelligence-inspired evolutionary algorithms with market-driven methods to develop intelligent resource management systems that are secure,scalable,and adaptable to evolving risks,such as process innovation. 展开更多
关键词 Cloud computing combinatorial double auction genetic algorithm optimization resource allocation intrusion detection system(IDS) cloud security
在线阅读 下载PDF
The Application of Machine Vision in Defect Detection Systems
9
作者 Peihang Zhong Jiawei Lin Muling Wang 《Journal of Electronic Research and Application》 2025年第2期191-196,共6页
With the rapid development of computer vision technology,artificial intelligence algorithms,and high-performance computing platforms,machine vision technology has gradually shown its great potential in automated produ... With the rapid development of computer vision technology,artificial intelligence algorithms,and high-performance computing platforms,machine vision technology has gradually shown its great potential in automated production lines,especially in defect detection.Machine vision technology can be applied in many industries such as semiconductor,automobile manufacturing,aerospace,food,and drugs,which can significantly improve detection efficiency and accuracy,reduce labor costs,improve product quality,enhance market competitiveness,and provide strong support for the arrival of Industry 4.0 era.In this article,the concept,advantages,and disadvantages of machine vision and the algorithm framework of machine vision in the defect detection system are briefly described,aiming to promote the rapid development of industry and strengthen China’s industry. 展开更多
关键词 Machine vision Defect detection system Image preprocessing
在线阅读 下载PDF
Enhancing Healthcare Cybersecurity through the Development and Evaluation of Intrusion Detection Systems
10
作者 Muhammad Usama Arshad Aziz +4 位作者 Imtiaz Hassan Shynar Akhmetzhanova Sultan Noman Qasem Abdullah M.Albarrak Tawfik Al-Hadhrami 《Computer Modeling in Engineering & Sciences》 2025年第7期1225-1248,共24页
The increasing reliance on digital infrastructure in modern healthcare systems has introduced significant cybersecurity challenges,particularly in safeguarding sensitive patient data and maintaining the integrity of m... The increasing reliance on digital infrastructure in modern healthcare systems has introduced significant cybersecurity challenges,particularly in safeguarding sensitive patient data and maintaining the integrity of medical services.As healthcare becomes more data-driven,cyberattacks targeting these systems continue to rise,necessitating the development of robust,domain-adapted Intrusion Detection Systems(IDS).However,current IDS solutions often lack access to domain-specific datasets that reflect realistic threat scenarios in healthcare.To address this gap,this study introduces HCKDDCUP,a synthetic dataset modeled on the widely used KDDCUP benchmark,augmented with healthcare-relevant attributes such as patient data,treatments,and diagnoses to better simulate the unique conditions of clinical environments.This research applies standard machine learning algorithms Random Forest(RF),Decision Tree(DT),and K-Nearest Neighbors(KNN)to both the KDDCUP and HCKDDCUP datasets.The methodology includes data preprocessing,feature selection,dimensionality reduction,and comparative performance evaluation.Experimental results show that the RF model performed best,achieving 98%accuracy on KDDCUP and 99%on HCKDDCUP,highlighting its effectiveness in detecting cyber intrusions within a healthcare-specific context.This work contributes a valuable resource for future research and underscores the need for IDS development tailored to sector-specific requirements. 展开更多
关键词 CYBERSECURITY KDDCUP HCKDDCUP machine learning anomaly detection data privacy
暂未订购
Intelligent sitting postural anomaly detection system for wheelchair users with unsupervised techniques
11
作者 Patrick Vermander Aitziber Mancisidor +2 位作者 Raffaele Gravina Itziar Cabanes Giancarlo Fortino 《Digital Communications and Networks》 2025年第3期622-633,共12页
Detecting sitting posture abnormalities in wheelchair users enables early identification of changes in their functional status.To date,this detection has relied on in-person observation by medical specialists.However,... Detecting sitting posture abnormalities in wheelchair users enables early identification of changes in their functional status.To date,this detection has relied on in-person observation by medical specialists.However,given the challenges faced by health specialists to carry out continuous monitoring,the development of an intelligent anomaly detection system is proposed.Unlike other authors,where they use supervised techniques,this work proposes using unsupervised techniques due to the advantages they offer.These advantages include the lack of prior labeling of data,and the detection of anomalies previously not contemplated,among others.In the present work,an individualized methodology consisting of two phases is developed:characterizing the normal sitting pattern and determining abnormal samples.An analysis has been carried out between different unsupervised techniques to study which ones are more suitable for postural diagnosis.It can be concluded,among other aspects,that the utilization of dimensionality reduction techniques leads to improved results.Moreover,the normality characterization phase is deemed necessary for enhancing the system’s learning capabilities.Additionally,employing an individualized approach to the model aids in capturing the particularities of the various pathologies present among subjects. 展开更多
关键词 Sitting posture monitoring Anomaly detection Assistive technology Pressure sensors Unsupervised techniques INDIVIDUALIZATION WHEELCHAIR
在线阅读 下载PDF
Enhanced Fire Detection System for Blind and Visually Challenged People Using Artificial Intelligence with Deep Convolutional Neural Networks
12
作者 Fahd N.Al-Wesabi Hamad Almansour +1 位作者 Huda G.Iskandar Ishfaq Yaseen 《Computers, Materials & Continua》 2025年第12期5765-5787,共23页
Earlier notification and fire detection methods provide safety information and fire prevention to blind and visually impaired(BVI)individuals in a limited timeframe in the event of emergencies,particularly in enclosed... Earlier notification and fire detection methods provide safety information and fire prevention to blind and visually impaired(BVI)individuals in a limited timeframe in the event of emergencies,particularly in enclosed areas.Fire detection becomes crucial as it directly impacts human safety and the environment.While modern technology requires precise techniques for early detection to prevent damage and loss,few research has focused on artificial intelligence(AI)-based early fire alert systems for BVI individuals in indoor settings.To prevent such fire incidents,it is crucial to identify fires accurately and promptly,and alert BVI personnel using a combination of smart glasses,deep learning(DL),and computer vision(CV).The most recent technologies require effective methods to identify fires quickly,preventing damage and physical loss.In this manuscript,an Enhanced Fire Detection System for Blind and Visually Challenged People using Artificial Intelligence with Deep Convolutional Neural Networks(EFDBVC-AIDCNN)model is presented.The EFDBVC-AIDCNN model presents an advanced fire detection system that utilizes AI to detect and classify fire hazards for BVI people effectively.Initially,image pre-processing is performed using the Gabor filter(GF)model to improve texture details and patterns specific to flames and smoke.For the feature extractor,the Swin transformer(ST)model captures fine details across multiple scales to represent fire patterns accurately.Furthermore,the Elman neural network(ENN)technique is implemented to detect fire.The improved whale optimization algorithm(IWOA)is used to efficiently tune ENN parameters,improving accuracy and robustness across varying lighting and environmental conditions to optimize performance.An extensive experimental study of the EFDBVC-AIDCNN technique is accomplished under the fire detection dataset.A short comparative analysis of the EFDBVC-AIDCNN approach portrayed a superior accuracy value of 96.60%over existing models. 展开更多
关键词 Fire detection swin transformer visually challenged people artificial intelligence computer vision image pre-processing
在线阅读 下载PDF
DEMGAN: A Machine Learning-Based Intrusion Detection System Evasion Scheme
13
作者 Dawei Xu Yue Lv +3 位作者 Min Wang Baokun Zheng Jian Zhao Jiaxuan Yu 《Computers, Materials & Continua》 2025年第7期1731-1746,共16页
Network intrusion detection systems(IDS)are a prevalent method for safeguarding network traffic against attacks.However,existing IDS primarily depend on machine learning(ML)models,which are vulnerable to evasion throu... Network intrusion detection systems(IDS)are a prevalent method for safeguarding network traffic against attacks.However,existing IDS primarily depend on machine learning(ML)models,which are vulnerable to evasion through adversarial examples.In recent years,the Wasserstein Generative Adversarial Network(WGAN),based on Wasserstein distance,has been extensively utilized to generate adversarial examples.Nevertheless,several challenges persist:(1)WGAN experiences the mode collapse problem when generating multi-category network traffic data,leading to subpar quality and insufficient diversity in the generated data;(2)Due to unstable training processes,the authenticity of the data produced by WGAN is often low.This study improves WGAN to address these issues and proposes a new adversarial sample generation algorithm called Distortion Enhanced Multi-Generator Generative Adversarial Network(DEMGAN).DEMGAN effectively evades ML-based IDS by proficiently obfuscating network traffic data samples.We assess the efficacy of our attack method against five ML-based IDS using two public datasets.The results demonstrate that our method can successfully bypass IDS,achieving average evasion rates of 97.42%and 87.51%,respectively.Furthermore,empirical findings indicate that retraining the IDS with the generated adversarial samples significantly bolsters the system’s capability to detect adversarial samples,resulting in an average recognition rate increase of 86.78%.This approach not only enhances the performance of the IDS but also strengthens the network’s resilience against potential threats,thereby optimizing network security measures. 展开更多
关键词 Adversarial attacks intrusion detection adversarial traffic examples DEMGAN
在线阅读 下载PDF
Research on multi-view collaborative detection system for UAV swarms based on Pix2Pix framework and BAM attention mechanism
14
作者 Yan Ding Qingxin Cao +2 位作者 Bozhi Zhang Peilin Li Zhongjiao Shi 《Defence Technology(防务技术)》 2025年第4期213-226,共14页
Drone swarm systems,equipped with photoelectric imaging and intelligent target perception,are essential for reconnaissance and strike missions in complex and high-risk environments.They excel in information sharing,an... Drone swarm systems,equipped with photoelectric imaging and intelligent target perception,are essential for reconnaissance and strike missions in complex and high-risk environments.They excel in information sharing,anti-jamming capabilities,and combat performance,making them critical for future warfare.However,varied perspectives in collaborative combat scenarios pose challenges to object detection,hindering traditional detection algorithms and reducing accuracy.Limited angle-prior data and sparse samples further complicate detection.This paper presents the Multi-View Collaborative Detection System,which tackles the challenges of multi-view object detection in collaborative combat scenarios.The system is designed to enhance multi-view image generation and detection algorithms,thereby improving the accuracy and efficiency of object detection across varying perspectives.First,an observation model for three-dimensional targets through line-of-sight angle transformation is constructed,and a multi-view image generation algorithm based on the Pix2Pix network is designed.For object detection,YOLOX is utilized,and a deep feature extraction network,BA-RepCSPDarknet,is developed to address challenges related to small target scale and feature extraction challenges.Additionally,a feature fusion network NS-PAFPN is developed to mitigate the issue of deep feature map information loss in UAV images.A visual attention module(BAM)is employed to manage appearance differences under varying angles,while a feature mapping module(DFM)prevents fine-grained feature loss.These advancements lead to the development of BA-YOLOX,a multi-view object detection network model suitable for drone platforms,enhancing accuracy and effectively targeting small objects. 展开更多
关键词 Drone swarm systems Reconnaissance and strike Image generation Multi-view detection Pix2Pix framework Attention mechanism
在线阅读 下载PDF
ScalaDetect-5G:Ultra High-Precision Highly Elastic Deep Intrusion Detection System for 5G Network
15
作者 Shengjia Chang Baojiang Cui Shaocong Feng 《Computer Modeling in Engineering & Sciences》 2025年第9期3805-3827,共23页
With the rapid advancement of mobile communication networks,key technologies such as Multi-access Edge Computing(MEC)and Network Function Virtualization(NFV)have enhanced the quality of service for 5G users but have a... With the rapid advancement of mobile communication networks,key technologies such as Multi-access Edge Computing(MEC)and Network Function Virtualization(NFV)have enhanced the quality of service for 5G users but have also significantly increased the complexity of network threats.Traditional static defense mechanisms are inadequate for addressing the dynamic and heterogeneous nature of modern attack vectors.To overcome these challenges,this paper presents a novel algorithmic framework,SD-5G,designed for high-precision intrusion detection in 5G environments.SD-5G adopts a three-stage architecture comprising traffic feature extraction,elastic representation,and adaptive classification.Specifically,an enhanced Concrete Autoencoder(CAE)is employed to reconstruct and compress high-dimensional network traffic features,producing compact and expressive representations suitable for large-scale 5G deployments.To further improve accuracy in ambiguous traffic classification,a Residual Convolutional Long Short-Term Memory model with an attention mechanism(ResCLA)is introduced,enabling multi-level modeling of spatial–temporal dependencies and effective detection of subtle anomalies.Extensive experiments on benchmark datasets—including 5G-NIDD,CIC-IDS2017,ToN-IoT,and BoT-IoT—demonstrate that SD-5G consistently achieves F1 scores exceeding 99.19%across diverse network environments,indicating strong generalization and real-time deployment capabilities.Overall,SD-5G achieves a balance between detection accuracy and deployment efficiency,offering a scalable,flexible,and effective solution for intrusion detection in 5G and next-generation networks. 展开更多
关键词 5G security network intrusion detection feature engineering deep learning
在线阅读 下载PDF
The Application of Weighted Association Rules in Host-Based Intrusion Detection System 被引量:1
16
作者 曹元大 薛静锋 《Journal of Beijing Institute of Technology》 EI CAS 2002年第4期418-421,共4页
Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weight... Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weighted association rules are used in this paper to mine intrustion models, which can increase the detection rate and decrease the false positive rate by some extent. Based on this, the structure of host-based IDS using weighted association rules is proposed. 展开更多
关键词 network security intrusion detection system association rules WEIGHT
在线阅读 下载PDF
Design of a road vehicle detection system based on monocular vision 被引量:5
17
作者 王海 张为公 蔡英凤 《Journal of Southeast University(English Edition)》 EI CAS 2011年第2期169-173,共5页
In order to decrease vehicle crashes, a new rear view vehicle detection system based on monocular vision is designed. First, a small and flexible hardware platform based on a DM642 digtal signal processor (DSP) micr... In order to decrease vehicle crashes, a new rear view vehicle detection system based on monocular vision is designed. First, a small and flexible hardware platform based on a DM642 digtal signal processor (DSP) micro-controller is built. Then, a two-step vehicle detection algorithm is proposed. In the first step, a fast vehicle edge and symmetry fusion algorithm is used and a low threshold is set so that all the possible vehicles have a nearly 100% detection rate (TP) and the non-vehicles have a high false detection rate (FP), i. e., all the possible vehicles can be obtained. In the second step, a classifier using a probabilistic neural network (PNN) which is based on multiple scales and an orientation Gabor feature is trained to classify the possible vehicles and eliminate the false detected vehicles from the candidate vehicles generated in the first step. Experimental results demonstrate that the proposed system maintains a high detection rate and a low false detection rate under different road, weather and lighting conditions. 展开更多
关键词 vehicle detection monocular vision edge andsymmetry fusion Gabor feature PNN network
在线阅读 下载PDF
Intrusion Detection System for PS-Poll DoS Attack in 802.11 Networks Using Real Time Discrete Event System 被引量:5
18
作者 Mayank Agarwal Sanketh Purwar +1 位作者 Santosh Biswas Sukumar Nandi 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2017年第4期792-808,共17页
Wi-Fi devices have limited battery life because of which conserving battery life is imperative. The 802.11 Wi-Fi standard provides power management feature that allows stations(STAs) to enter into sleep state to prese... Wi-Fi devices have limited battery life because of which conserving battery life is imperative. The 802.11 Wi-Fi standard provides power management feature that allows stations(STAs) to enter into sleep state to preserve energy without any frame losses. After the STA wakes up, it sends a null data or PS-Poll frame to retrieve frame(s) buffered by the access point(AP), if any during its sleep period. An attacker can launch a power save denial of service(PS-DoS) attack on the sleeping STA(s) by transmitting a spoofed null data or PS-Poll frame(s) to retrieve the buffered frame(s) of the sleeping STA(s) from the AP causing frame losses for the targeted STA(s). Current approaches to prevent or detect the PS-DoS attack require encryption,change in protocol or installation of proprietary hardware. These solutions suffer from expensive setup, maintenance, scalability and deployment issues. The PS-DoS attack does not differ in semantics or statistics under normal and attack circumstances.So signature and anomaly based intrusion detection system(IDS) are unfit to detect the PS-DoS attack. In this paper we propose a timed IDS based on real time discrete event system(RTDES) for detecting PS-DoS attack. The proposed DES based IDS overcomes the drawbacks of existing systems and detects the PS-DoS attack with high accuracy and detection rate. The correctness of the RTDES based IDS is proved by experimenting all possible attack scenarios. 展开更多
关键词 Fault detection and diagnosis intrusion detection system(IDS) null data frame power save attack PS-Poll frame real time discrete event system(DES)
在线阅读 下载PDF
Deep Learning-Based Hybrid Intelligent Intrusion Detection System 被引量:5
19
作者 Muhammad Ashfaq Khan Yangwoo Kim 《Computers, Materials & Continua》 SCIE EI 2021年第7期671-687,共17页
Machine learning(ML)algorithms are often used to design effective intrusion detection(ID)systems for appropriate mitigation and effective detection of malicious cyber threats at the host and network levels.However,cyb... Machine learning(ML)algorithms are often used to design effective intrusion detection(ID)systems for appropriate mitigation and effective detection of malicious cyber threats at the host and network levels.However,cybersecurity attacks are still increasing.An ID system can play a vital role in detecting such threats.Existing ID systems are unable to detect malicious threats,primarily because they adopt approaches that are based on traditional ML techniques,which are less concerned with the accurate classication and feature selection.Thus,developing an accurate and intelligent ID system is a priority.The main objective of this study was to develop a hybrid intelligent intrusion detection system(HIIDS)to learn crucial features representation efciently and automatically from massive unlabeled raw network trafc data.Many ID datasets are publicly available to the cybersecurity research community.As such,we used a spark MLlib(machine learning library)-based robust classier,such as logistic regression(LR),extreme gradient boosting(XGB)was used for anomaly detection,and a state-of-the-art DL,such as a long short-term memory autoencoder(LSTMAE)for misuse attack was used to develop an efcient and HIIDS to detect and classify unpredictable attacks.Our approach utilized LSTM to detect temporal features and an AE to more efciently detect global features.Therefore,to evaluate the efcacy of our proposed approach,experiments were conducted on a publicly existing dataset,the contemporary real-life ISCX-UNB dataset.The simulation results demonstrate that our proposed spark MLlib and LSTMAE-based HIIDS signicantly outperformed existing ID approaches,achieving a high accuracy rate of up to 97.52%for the ISCX-UNB dataset respectively 10-fold crossvalidation test.It is quite promising to use our proposed HIIDS in real-world circumstances on a large-scale. 展开更多
关键词 Machine learning intrusion detection system deep learning spark MLlib LSTM big data
在线阅读 下载PDF
A Real-Time Sequential Deep Extreme Learning Machine Cybersecurity Intrusion Detection System 被引量:5
20
作者 Amir Haider Muhammad Adnan Khan +2 位作者 Abdur Rehman Muhib Ur Rahman Hyung Seok Kim 《Computers, Materials & Continua》 SCIE EI 2021年第2期1785-1798,共14页
In recent years,cybersecurity has attracted significant interest due to the rapid growth of the Internet of Things(IoT)and the widespread development of computer infrastructure and systems.It is thus becoming particul... In recent years,cybersecurity has attracted significant interest due to the rapid growth of the Internet of Things(IoT)and the widespread development of computer infrastructure and systems.It is thus becoming particularly necessary to identify cyber-attacks or irregularities in the system and develop an efficient intrusion detection framework that is integral to security.Researchers have worked on developing intrusion detection models that depend on machine learning(ML)methods to address these security problems.An intelligent intrusion detection device powered by data can exploit artificial intelligence(AI),and especially ML,techniques.Accordingly,we propose in this article an intrusion detection model based on a Real-Time Sequential Deep Extreme Learning Machine Cybersecurity Intrusion Detection System(RTS-DELM-CSIDS)security model.The proposed model initially determines the rating of security aspects contributing to their significance and then develops a comprehensive intrusion detection framework focused on the essential characteristics.Furthermore,we investigated the feasibility of our proposed RTS-DELM-CSIDS framework by performing dataset evaluations and calculating accuracy parameters to validate.The experimental findings demonstrate that the RTS-DELM-CSIDS framework outperforms conventional algorithms.Furthermore,the proposed approach has not only research significance but also practical significance. 展开更多
关键词 SECURITY DELM intrusion detection system machine learning
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部