Search Results

Results (10)

Search Parameters:

Keyword: Network traffic
Order results
Results per page
Open AccessArticle
12 Pages, 1,016 KB Download PDF

Enhancing the Network Anomaly Detection using CNN-Bidirectional LSTM Hybrid Model and Sampling Strategies for Imbalanced Network Traffic Data

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 1, Page # 67–78, 2024; DOI: 10.25046/aj090107
Abstract:

The cybercriminal utilized the skills and freely available tools to breach the networks of internet-connected devices by exploiting confidentiality, integrity, and availability. Network anomaly detection is crucial for ensuring the security of information resources. Detecting abnormal network behavior poses challenges because of the extensive data, imbalanced attack class nature, and the abundance of features in…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
11 Pages, 1,143 KB Download PDF

Optimizing the Performance of Network Anomaly Detection Using Bidirectional Long Short-Term Memory (Bi-LSTM) and Over-sampling for Imbalance Network Traffic Data

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 144–154, 2023; DOI: 10.25046/aj080614
Abstract:

Cybercriminal exploits integrity, confidentiality, and availability of information resources. Cyberattacks are typically invisible to the naked eye, even though they target a wide range of our digital assets, such as internet-connected smart devices, computers, and networking devices. Implementing network anomaly detection proves to be an effective method for identifying these malicious activities. The traditional anomaly…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
10 Pages, 738 KB Download PDF

Insight into the IEEE 802.1 Qcr Asynchronous Traffic Shaping in Time Sensitive Network

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 292–301, 2019; DOI: 10.25046/aj040128
Abstract:

TSN is an attractive solution for latency-critical frame transmission built upon IEEE 802 architecture. Traffic scheduling and shaping in TSN aim to achieve bounded low latency and zero congestion loss. However, the most widespread solution (i.e. Time-Aware Shaper) requires a networkwide precision clock reference and only targets on cyclical traffic flows. This paper focuses on…

Read More
(This article belongs to Section Telecommunications (TEL))
Open AccessArticle
10 Pages, 3,910 KB Download PDF

Nonlinear \(\ell_{2,p}\)-norm based PCA for Anomaly Network Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 234–243, 2020; DOI: 10.25046/aj050429
Abstract:

Intrusion detection systems are well known for their ability to detect internal and external intrusions, it usually recognizes intrusions through learning the normal behaviour of users or the normal traffic of activities in the network. So, if any suspicious activity or behaviour is detected, it informs the users of the network. Nonetheless, intrusion detection system…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,440 KB Download PDF

Fuzzy Logic Implementation for Enhanced WCDMA Network Using Selected KPIs

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 114–124, 2019; DOI: 10.25046/aj040112
Abstract:

The paper focused on the implementation of fuzzy logic technology for improved Wideband Code Division Multiple Access (WCDMA) network using selected Key Performance Indicators (KPIs). Empirical and analytical methods were principally deployed for the study analyses. Empirical analyses were conducted on two designated networks which are MTN and AIRTEL observed with high network traffic to…

Read More
(This article belongs to Section Electronic Engineering (EEE))
Open AccessArticle
10 Pages, 1,010 KB Download PDF

Effectiveness of Routing Protocols for Different Networking Scenarios

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 4, Page # 112–121, 2018; DOI: 10.25046/aj030412
Abstract:

Selection of a routing protocol is vital for modern arena of Internet communication as network traffic and network complexities are rapidly increasing. This paper evaluates the effectiveness of three routing protocols namely routing information protocol version 2 (RIPv2), open shortest path first (OSPF), enhanced interior gateway routing protocol (EIGRP), and hybrid protocols based on these…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 931 KB Download PDF

Analysis of Wireless Traffic Data through Machine Learning

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 865–871, 2017; DOI: 10.25046/aj0203107
Abstract:

The paper presents an analytical study on a wireless traffic dataset carried out under the different approaches of machine learning including the backpropagation feedforward neural network, the time-series NARX network, the self-organizing map and the principal component analyses. These approaches are well-known for their usefulness in the modeling and in transforming a high dimensional data…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
7 Pages, 803 KB Download PDF

Network Intrusion Detection System using Apache Storm

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 812–818, 2017; DOI: 10.25046/aj0203102
Abstract:

Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 1,578 KB Download PDF

Improved Nonlinear Fuzzy Robust PCA for Anomaly-based Intrusion Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 249–258, 2020; DOI: 10.25046/aj050332
Abstract:

Among the most popular tools in security field is the anomaly based Intrusion Detection System (IDS), it detects intrusions by learning to classify the normal activities of the network. Thus if any abnormal activity or behaviour is recognized it raises an alarm to inform the users of a given network. Nevertheless, IDS is generally susceptible…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 865 KB Download PDF

Secured Multi-Layer Blockchain Framework for IoT Aggregate Verification

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 3, Page # 106–115, 2022; DOI: 10.25046/aj070312
Abstract:

Technologies designed for digital provenance, especially the Internet of Things (IoT) and blockchain, may allow for security, transparency, and traceability in the global supply chain. However, upstream nodes in the supply chain that work for large-scale production suppliers are not considered. In addition, most IoT blockchain systems adopt an ID-based signature scheme that may affect…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Indigenous Knowledge Systems of the Tribal Communities of the Asia Pacific
Guest Editors: Dr. Anurag Hazarika
Deadline: 31 October 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026