期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
Machine Learning-Based Detection and Selective Mitigation of Denial-of-Service Attacks in Wireless Sensor Networks
1
作者 Soyoung Joo So-Hyun Park +2 位作者 Hye-Yeon Shim Ye-Sol Oh Il-Gu Lee 《Computers, Materials & Continua》 2025年第2期2475-2494,共20页
As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. Ther... As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. There exists a gap in research on the detection and response to attacks on Medium Access Control (MAC) mechanisms themselves, which would lead to service outages between nodes. Classifying exploitation and deceptive jamming attacks on control mechanisms is particularly challengingdue to their resemblance to normal heavy communication patterns. Accordingly, this paper proposes a machine learning-based selective attack mitigation model that detects DoS attacks on wireless networks by monitoring packet log data. Based on the type of detected attack, it implements effective corresponding mitigation techniques to restore performance to nodes whose availability has been compromised. Experimental results reveal that the accuracy of the proposed model is 14% higher than that of a baseline anomaly detection model. Further, the appropriate mitigation techniques selected by the proposed system based on the attack type improve the average throughput by more than 440% compared to the case without a response. 展开更多
关键词 Distributed coordinated function mechanism jamming attack machine learning-based attack detection selective attack mitigation model selective attack mitigation model selfish attack
在线阅读 下载PDF
Hyperbolic Plasmons in Coupled Luttinger Liquids of Homochiral Carbon Nanotube Arrays
2
作者 Saiqun Ma Jiajun Chen +17 位作者 Cheng Hu Kunqi Xu Yufeng Xie Xingdong Luo Zhenghan Wu Yi Chen Xianliang Zhou Shuo Lou Bosai Lyu Peiyue Shen Zhichun Zhang Aolin Deng Chengjia Zhang Qi Liang Ming Tian Neng Wan Ji-Hun Kang Zhiwen Shi 《Chinese Physics Letters》 2025年第9期224-245,共22页
A Luttinger liquid is a theoretical model describing interacting electrons in one-dimensional(1D)conductors.While individual 1D conductors have shown interesting Luttinger-liquid behaviors such as spin-charge separati... A Luttinger liquid is a theoretical model describing interacting electrons in one-dimensional(1D)conductors.While individual 1D conductors have shown interesting Luttinger-liquid behaviors such as spin-charge separation and power-law spectral density,the more interesting phenomena predicted in coupled Luttinger liquids of neighboring 1D conductors have been rarely observed due to the difficulty in creating such structures.Recently,we have successfully grown close-packed carbon nanotube(CNT)arrays with uniform chirality,providing an ideal material system for studying the coupled Luttinger liquids.Here,we report on the observation of tunable hyperbolic plasmons in the coupled Luttinger liquids of CNT arrays using scanning near-field optical microscopy.These hyperbolic plasmons,resulting from the conductivity anisotropy in the CNT array,exhibit strong spatial confinement,in situ tunability,and a wide spectral range.Despite their hyperbolic wavefronts,the plasmon propagation in the axial direction still adheres to the Luttinger-liquid theory.Our work not only demonstrates a fascinating phenomenon in coupled Luttinger liquids for fundamental physics exploration,but also provides a highly confined and in situ tunable hyperbolic plasmon in close-packed CNT arrays for future nanophotonic devices and circuits. 展开更多
关键词 interacting electrons carbon nanotube arrays hyperbolic plasmons luttinger liquid scanning near field optical microscopy d conductors carbon nanotube cnt arrays coupled Luttinger liquids
原文传递
Software Defined Range-Proof Authentication Mechanism for Untraceable Digital ID
3
作者 So-Eun Jeon Yeon-Ji Lee Il-Gu Lee 《Computer Modeling in Engineering & Sciences》 2025年第3期3213-3228,共16页
The Internet of Things(IoT)is extensively applied across various industrial domains,such as smart homes,factories,and intelligent transportation,becoming integral to daily life.Establishing robust policies for managin... The Internet of Things(IoT)is extensively applied across various industrial domains,such as smart homes,factories,and intelligent transportation,becoming integral to daily life.Establishing robust policies for managing and governing IoT devices is imperative.Secure authentication for IoT devices in resource-constrained environments remains challenging due to the limitations of conventional complex protocols.Prior methodologies enhanced mutual authentication through key exchange protocols or complex operations,which are impractical for lightweight devices.To address this,our study introduces the privacy-preserving software-defined range proof(SDRP)model,which achieves secure authentication with low complexity.SDRP minimizes the overhead of confidentiality and authentication processes by utilizing range proof to verify whether the attribute information of a user falls within a specific range.Since authentication is performed using a digital ID sequence generated from indirect personal data,it can avoid the disclosure of actual individual attributes.Experimental results demonstrate that SDRP significantly improves security efficiency,increasing it by an average of 93.02%compared to conventional methods.It mitigates the trade-off between security and efficiency by reducing leakage risk by an average of 98.7%. 展开更多
关键词 Internet of Things AUTHENTICATION digital ID security
在线阅读 下载PDF
Suboptimal Feature Selection Techniques for Effective Malicious Traffic Detection on Lightweight Devices
4
作者 So-Eun Jeon Ye-Sol Oh +1 位作者 Yeon-Ji Lee Il-Gu Lee 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第8期1669-1687,共19页
With the advancement of wireless network technology,vast amounts of traffic have been generated,and malicious traffic attacks that threaten the network environment are becoming increasingly sophisticated.While signatu... With the advancement of wireless network technology,vast amounts of traffic have been generated,and malicious traffic attacks that threaten the network environment are becoming increasingly sophisticated.While signature-based detection methods,static analysis,and dynamic analysis techniques have been previously explored for malicious traffic detection,they have limitations in identifying diversified malware traffic patterns.Recent research has been focused on the application of machine learning to detect these patterns.However,applying machine learning to lightweight devices like IoT devices is challenging because of the high computational demands and complexity involved in the learning process.In this study,we examined methods for effectively utilizing machine learning-based malicious traffic detection approaches for lightweight devices.We introduced the suboptimal feature selection model(SFSM),a feature selection technique designed to reduce complexity while maintaining the effectiveness of malicious traffic detection.Detection performance was evaluated on various malicious traffic,benign,exploits,and generic,using the UNSW-NB15 dataset and SFSM sub-optimized hyperparameters for feature selection and narrowed the search scope to encompass all features.SFSM improved learning performance while minimizing complexity by considering feature selection and exhaustive search as two steps,a problem not considered in conventional models.Our experimental results showed that the detection accuracy was improved by approximately 20%compared to the random model,and the reduction in accuracy compared to the greedy model,which performs an exhaustive search on all features,was kept within 6%.Additionally,latency and complexity were reduced by approximately 96%and 99.78%,respectively,compared to the greedy model.This study demonstrates that malicious traffic can be effectively detected even in lightweight device environments.SFSM verified the possibility of detecting various attack traffic on lightweight devices. 展开更多
关键词 Feature selection lightweight device machine learning Internet of Things malicious traffic
在线阅读 下载PDF
Multi-Binary Classifiers Using Optimal Feature Selection for Memory-Saving Intrusion Detection Systems
5
作者 Ye-Seul Kil Yu-Ran Jeon +1 位作者 Sun-Jin Lee Il-Gu Lee 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1473-1493,共21页
With the rise of remote work and the digital industry,advanced cyberattacks have become more diverse and complex in terms of attack types and characteristics,rendering them difficult to detect with conventional intrus... With the rise of remote work and the digital industry,advanced cyberattacks have become more diverse and complex in terms of attack types and characteristics,rendering them difficult to detect with conventional intrusion detection methods.Signature-based intrusion detection methods can be used to detect attacks;however,they cannot detect new malware.Endpoint detection and response(EDR)tools are attracting attention as a means of detecting attacks on endpoints in real-time to overcome the limitations of signature-based intrusion detection techniques.However,EDR tools are restricted by the continuous generation of unnecessary logs,resulting in poor detection performance and memory efficiency.Machine learning-based intrusion detection techniques for responding to advanced cyberattacks are memory intensive,using numerous features;they lack optimal feature selection for each attack type.To overcome these limitations,this study proposes a memory-efficient intrusion detection approach incorporating multi-binary classifiers using optimal feature selection.The proposed model detects multiple types of malicious attacks using parallel binary classifiers with optimal features for each attack type.The experimental results showed a 2.95%accuracy improvement and an 88.05%memory reduction using only six features compared to a model with 18 features.Furthermore,compared to a conventional multi-classification model with simple feature selection based on permutation importance,the accuracy improved by 11.67%and the memory usage decreased by 44.87%.The proposed scheme demonstrates that effective intrusion detection is achievable with minimal features,making it suitable for memory-limited mobile and Internet of Things devices. 展开更多
关键词 Endpoint detection and response feature selection machine learning malware detection
在线阅读 下载PDF
Wake-Up Security:Effective Security ImprovementMechanism for Low Power Internet of Things 被引量:2
6
作者 Sun-Woo Yun Na-Eun Park Il-Gu Lee 《Intelligent Automation & Soft Computing》 SCIE 2023年第9期2897-2917,共21页
As time and space constraints decrease due to the development of wireless communication network technology,the scale and scope of cyber-attacks targeting the Internet of Things(IoT)are increasing.However,it is difficu... As time and space constraints decrease due to the development of wireless communication network technology,the scale and scope of cyber-attacks targeting the Internet of Things(IoT)are increasing.However,it is difficult to apply high-performance security modules to the IoT owing to the limited battery,memory capacity,and data transmission performance depend-ing on the size of the device.Conventional research has mainly reduced power consumption by lightening encryption algorithms.However,it is difficult to defend large-scale information systems and networks against advanced and intelligent attacks because of the problem of deteriorating security perfor-mance.In this study,we propose wake-up security(WuS),a low-power security architecture that can utilize high-performance security algorithms in an IoT environment.By introducing a small logic that performs anomaly detection on the IoT platform and executes the security module only when necessary according to the anomaly detection result,WuS improves security and power efficiency while using a relatively high-complexity security module in a low-power environment compared to the conventional method of periodically exe-cuting a high-performance security module.In this study,a Python simulator based on the UNSW-NB15 dataset is used to evaluate the power consumption,latency,and security of the proposed method.The evaluation results reveal that the power consumption of the proposed WuS mechanism is approxi-mately 51.8%and 27.2%lower than those of conventional high-performance security and lightweight security modules,respectively.Additionally,the laten-cies are approximately 74.8%and 65.9%lower,respectively.Furthermore,the WuS mechanism achieved a high detection accuracy of approximately 96.5%or greater,proving that the detection efficiency performance improved by approximately 33.5%compared to the conventional model.The performance evaluation results for the proposed model varied depending on the applied anomaly-detection model.Therefore,they can be used in various ways by selecting suitable models based on the performance levels required in each industry. 展开更多
关键词 Internet of Things SECURITY anomaly detection low-power architecture energy efficiency wake-up security
在线阅读 下载PDF
Defocus Blur Segmentation Using Genetic Programming and Adaptive Threshold 被引量:1
7
作者 Muhammad Tariq Mahmood 《Computers, Materials & Continua》 SCIE EI 2022年第3期4867-4882,共16页
Detection and classification of the blurred and the non-blurred regions in images is a challenging task due to the limited available information about blur type,scenarios and level of blurriness.In this paper,we propo... Detection and classification of the blurred and the non-blurred regions in images is a challenging task due to the limited available information about blur type,scenarios and level of blurriness.In this paper,we propose an effective method for blur detection and segmentation based on transfer learning concept.The proposed method consists of two separate steps.In the first step,genetic programming(GP)model is developed that quantify the amount of blur for each pixel in the image.The GP model method uses the multiresolution features of the image and it provides an improved blur map.In the second phase,the blur map is segmented into blurred and non-blurred regions by using an adaptive threshold.A model based on support vector machine(SVM)is developed to compute adaptive threshold for the input blur map.The performance of the proposed method is evaluated using two different datasets and compared with various state-of-the-art methods.The comparative analysis reveals that the proposed method performs better against the state-of-the-art techniques. 展开更多
关键词 Blur measure blur segmentation sharpness measure genetic programming support vector machine
在线阅读 下载PDF
Defocus Blur Segmentation Using Local Binary Patterns with Adaptive Threshold 被引量:1
8
作者 Usman Ali Muhammad Tariq Mahmood 《Computers, Materials & Continua》 SCIE EI 2022年第4期1597-1611,共15页
Enormousmethods have been proposed for the detection and segmentation of blur and non-blur regions of the images.Due to the limited available information about blur type,scenario and the level of blurriness,detection ... Enormousmethods have been proposed for the detection and segmentation of blur and non-blur regions of the images.Due to the limited available information about blur type,scenario and the level of blurriness,detection and segmentation is a challenging task.Hence,the performance of the blur measure operator is an essential factor and needs improvement to attain perfection.In this paper,we propose an effective blur measure based on local binary pattern(LBP)with adaptive threshold for blur detection.The sharpness metric developed based on LBP used a fixed threshold irrespective of the type and level of blur,that may not be suitable for images with variations in imaging conditions,blur amount and type.Contrarily,the proposed measure uses an adaptive threshold for each input image based on the image and blur properties to generate improved sharpness metric.The adaptive threshold is computed based on the model learned through support vector machine(SVM).The performance of the proposed method is evaluated using two different datasets and is compared with five state-of-the-art methods.Comparative analysis reveals that the proposed method performs significantly better qualitatively and quantitatively against all of the compared methods. 展开更多
关键词 Adaptive threshold blur measure defocus blur segmentation local binary pattern support vector machine
在线阅读 下载PDF
An Effective Threat Detection Framework for Advanced Persistent Cyberattacks 被引量:1
9
作者 So-Eun Jeon Sun-Jin Lee +5 位作者 Eun-Young Lee Yeon-Ji Lee Jung-Hwa Ryu Jung-Hyun Moon Sun-Min Yi Il-Gu Lee 《Computers, Materials & Continua》 SCIE EI 2023年第5期4231-4253,共23页
Recently,with the normalization of non-face-to-face online environments in response to the COVID-19 pandemic,the possibility of cyberattacks through endpoints has increased.Numerous endpoint devices are managed meticu... Recently,with the normalization of non-face-to-face online environments in response to the COVID-19 pandemic,the possibility of cyberattacks through endpoints has increased.Numerous endpoint devices are managed meticulously to prevent cyberattacks and ensure timely responses to potential security threats.In particular,because telecommuting,telemedicine,and teleeducation are implemented in uncontrolled environments,attackers typically target vulnerable endpoints to acquire administrator rights or steal authentication information,and reports of endpoint attacks have been increasing considerably.Advanced persistent threats(APTs)using various novel variant malicious codes are a form of a sophisticated attack.However,conventional commercial antivirus and anti-malware systems that use signature-based attack detectionmethods cannot satisfactorily respond to such attacks.In this paper,we propose a method that expands the detection coverage inAPT attack environments.In this model,an open-source threat detector and log collector are used synergistically to improve threat detection performance.Extending the scope of attack log collection through interworking between highly accessible open-source tools can efficiently increase the detection coverage of tactics and techniques used to deal with APT attacks,as defined by MITRE Adversarial Tactics,Techniques,and Common Knowledge(ATT&CK).We implemented an attack environment using an APT attack scenario emulator called Carbanak and analyzed the detection coverage of Google Rapid Response(GRR),an open-source threat detection tool,and Graylog,an open-source log collector.The proposed method expanded the detection coverage against MITRE ATT&CK by approximately 11%compared with that conventional methods. 展开更多
关键词 Advanced persistent threat CYBERSECURITY endpoint security MITRE ATT&CK open-source threat detector threat log collector
在线阅读 下载PDF
Malicious Traffic Compression and Classification Technique for Secure Internet of Things 被引量:1
10
作者 Yu-Rim Lee Na-Eun Park +1 位作者 Seo-Yi Kim Il-Gu Lee 《Computers, Materials & Continua》 SCIE EI 2023年第9期3465-3482,共18页
With the introduction of 5G technology,the application of Internet of Things(IoT)devices is expanding to various industrial fields.However,introducing a robust,lightweight,low-cost,and low-power security solution to t... With the introduction of 5G technology,the application of Internet of Things(IoT)devices is expanding to various industrial fields.However,introducing a robust,lightweight,low-cost,and low-power security solution to the IoT environment is challenging.Therefore,this study proposes two methods using a data compression technique to detect malicious traffic efficiently and accurately for a secure IoT environment.The first method,compressed sensing and learning(CSL),compresses an event log in a bitmap format to quickly detect attacks.Then,the attack log is detected using a machine-learning classification model.The second method,precise re-learning after CSL(Ra-CSL),comprises a two-step training.It uses CSL as the 1st step analyzer,and the 2nd step analyzer is applied using the original dataset for a log that is detected as an attack in the 1st step analyzer.In the experiment,the bitmap rule was set based on the boundary value,which was 99.6%true positive on average for the attack and benign data found by analyzing the training data.Experimental results showed that the CSL was effective in reducing the training and detection time,and Ra-CSL was effective in increasing the detection rate.According to the experimental results,the data compression technique reduced the memory size by up to 20%and the training and detection times by 67%when compared with the conventional technique.In addition,the proposed technique improves the detection accuracy;the Naive Bayes model with the highest performance showed a detection rate of approximately 99%. 展开更多
关键词 IoT security intrusion detection machine learning traffic classification
在线阅读 下载PDF
Machine Learning-Based Efficient Discovery of Software Vulnerability for Internet of Things
11
作者 So-Eun Jeon Sun-Jin Lee Il-Gu Lee 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期2407-2419,共13页
With the development of the 5th generation of mobile communi-cation(5G)networks and artificial intelligence(AI)technologies,the use of the Internet of Things(IoT)has expanded throughout industry.Although IoT networks ... With the development of the 5th generation of mobile communi-cation(5G)networks and artificial intelligence(AI)technologies,the use of the Internet of Things(IoT)has expanded throughout industry.Although IoT networks have improved industrial productivity and convenience,they are highly dependent on nonstandard protocol stacks and open-source-based,poorly validated software,resulting in several security vulnerabilities.How-ever,conventional AI-based software vulnerability discovery technologies cannot be applied to IoT because they require excessive memory and com-puting power.This study developed a technique for optimizing training data size to detect software vulnerabilities rapidly while maintaining learning accuracy.Experimental results using a software vulnerability classification dataset showed that different optimal data sizes did not affect the learning performance of the learning models.Moreover,the minimal data size required to train a model without performance degradation could be determined in advance.For example,the random forest model saved 85.18%of memory and improved latency by 97.82%while maintaining a learning accuracy similar to that achieved when using 100%of data,despite using only 1%. 展开更多
关键词 Lightweight devices machine learning deep learning software vulnerability detection common weakness enumeration
在线阅读 下载PDF
An mm-sized biomimetic directional microphone array for sound source localization in three dimensions 被引量:2
12
作者 Ashiqur ahaman Byungki Kim 《Microsystems & Nanoengineering》 SCIE EI CSCD 2022年第3期77-89,共13页
Fly Ormia ochracea ears have been well-studied and mimicked to achieve subwavelength directional sensing,but their efficacy in sound source localization in three dimensions,utilizing sound from the X-,Y-,and Z-axes,ha... Fly Ormia ochracea ears have been well-studied and mimicked to achieve subwavelength directional sensing,but their efficacy in sound source localization in three dimensions,utilizing sound from the X-,Y-,and Z-axes,has been less explored.This paper focuses on a mm-sized array of three Ormia ochracea ear-inspired piezoelectric MEMS directional microphones,where their in-plane directionality is considered a cue to demonstrate sound source localization in three dimensions.In the array,biomimetic MEMS directional microphones are positioned in a 120°angular rotation;as a result,six diaphragms out of three directional microphones keep a normal-axis relative to the sound source at six diferent angles in the azimuth plane starting from 0°to 360°in intervals of±30°.In addition,the cosine-dependent horizontal component of the applied sound gives cues for Z-axis directional sensing.The whole array is frst analytically simulated and then experimentally measured in an anechoic chamber.Both results are found to be compliant,and the angular resolution of sound source localization in three dimensions is found to be±2°at the normal axis.The resolution at the azimuth plane is found to be±1.28,and the same array shows a±4.28°resolution when sound is varied from the elevation plane.Looking at the scope within this area combined with the presented results,this work provides a clear understanding of sound source localization in three dimensions. 展开更多
关键词 directional DIMENSIONS SOUND
原文传递
Selective Pb^(2+) removal and electrochemical regeneration of fresh and recycled FeOOH
13
作者 Lei Wang Lexane Deligniere +9 位作者 Samantha Husmann Regina Leiner Carsten Bahr Shengjie Zhang Chaochao Dun Matthew M.Montemore Markus Gallei Jeffrey J.Urban Choonsoo Kim Volker Presser 《Nano Research》 SCIE EI CSCD 2023年第7期9352-9363,共12页
Heavy metal pollution is a key environmental problem.Selectively extracting heavy metals could accomplish water purification and resource recycling simultaneously.Adsorption is a promising approach with a facile proce... Heavy metal pollution is a key environmental problem.Selectively extracting heavy metals could accomplish water purification and resource recycling simultaneously.Adsorption is a promising approach with a facile process,adaptability for the broad concentration of feed water,and high selectivity.However,the adsorption method faces challenges in synthesizing highperformance sorbents and regenerating adsorbents effectively.FeOOH is an environmentally friendly sorbent with low-cost production on a large scale.Nevertheless,the selectivity behavior and regeneration of FeOOH are seldom studied.Therefore,we investigated the selectivity of FeOOH in a mixed solution of Co^(2+),Ni^(2+),and Pb^(2+)and proposed to enhance the capacity of FeOOH and regenerate it by using external charges.Without charge,the FeOOH electrode shows a Pb^(2+)uptake capacity of 20 mg/g.After applying a voltage of-0.2/+0.8 V,the uptake capacity increases to a maximum of 42 mg/g and the desorption ratio is 70%-80%.In 35 cycles,FeOOH shows a superior selectivity towards Pb^(2+)compared with Co^(2+)and Ni^(2+),with a purity of 97%±3%in the extracts.The high selectivity is attributed to the lower activation energy for Pb^(2+)sorption.The capacity retentions at the 5^(th)and the 35^(th)cycles are ca.80%and ca.50%,respectively,comparable to the chemical regeneration method.With industrially exhausted granular ferric hydroxide as the electrode material,the system exhibits a Pb^(2+)uptake capacity of 37.4 mg/g with high selectivity.Our work demonstrates the feasibility of regenerating FeOOH by charge and provides a new approach for recycling and upcycling FeOOH sorbent. 展开更多
关键词 FEOOH electrochemical regeneration selective separation heavy metal ions
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部