Results (16)
Search Parameters:
Section: ccyEnhancing the Network Anomaly Detection using CNN-Bidirectional LSTM Hybrid Model and Sampling Strategies for Imbalanced Network Traffic Data
The cybercriminal utilized the skills and freely available tools to breach the networks of internet-connected devices by exploiting confidentiality, integrity, and availability. Network anomaly detection is crucial for ensuring the security of information resources. Detecting abnormal network behavior poses challenges because of the extensive data, imbalanced attack class nature, and the abundance of features in…
Read MoreOptimizing the Performance of Network Anomaly Detection Using Bidirectional Long Short-Term Memory (Bi-LSTM) and Over-sampling for Imbalance Network Traffic Data
Cybercriminal exploits integrity, confidentiality, and availability of information resources. Cyberattacks are typically invisible to the naked eye, even though they target a wide range of our digital assets, such as internet-connected smart devices, computers, and networking devices. Implementing network anomaly detection proves to be an effective method for identifying these malicious activities. The traditional anomaly…
Read MoreOntology Based Privacy Preservation over Encrypted Data using Attribute-Based Encryption Technique
The web documents are automatically interacting to discover the information by web mining, which is one of the applications of Cloud Computing (CC) technologies. These documents may be in the form of structured, semi-structured, or unstructured formats. In current web technologies, the Semantic Web is an extension for better enabling the people and computers to…
Read MoreImproved Detection of Advanced Persistent Threats Using an Anomaly Detection Ensemble Approach
Rated a high-risk cyber-attack type, Advanced Persistent Threat (APT) has become a cause for concern to cyber security experts. Detecting the presence of APT in order to mitigate this attack has been a major challenge as successful attacks to large organizations still abound. Our approach combines static rule anomaly detection through pattern recognition and machine…
Read MoreCognitive Cybernetics in the Foresight of Globalitarianism
This paper presents the results of the research conducted with the help of cognitive cybernetics about the “mass” factor from the theory of totalitarianism. According to the expert system model, “big data” analysis sought to discover knowledge for assessing the future status of digital social connectivity. Originally developed models and methods of cognitive and computer…
Read MoreElectronic Warfare Methods Combatting UAVs
This paper describes methods of eliminating Unmanned Aerial Vehicles (UAV) non-destructively, using Electronic Warfare Methods. The aim is to introduce certain methods of UAV detection and elimination in a complex environment and terrain, e.g., in an urban and battlefield environment, that will result in finding the control device position and the UAV itself. Neural networks,…
Read MorePerformance Analysis of Go-Back-N ARQ Protocol Used in Data Transmission Over Noisy Channels
Automatic Repeat reQuest (ARQ) protocols are used to control transmission errors in data communications. They are used at Data Link Control (DLC) sublayer of Data Link Layer (DLL) of OSI (Open Systems Interconnection) network model to achieve flow and error control and provide smooth and reliable transmission between network nodes. ARQ protocols use acknowledgments and…
Read MoreA Comprehensive Study of Privacy Preserving Techniques in Cloud Computing Environment
The huge growth in cloud storage utilization over the past years has made a big demand for an advanced technique and strong tools to make services even more practical and secure. Data privacy in cloud computing has become one of the biggest concerns for both individuals and organizations which adds more pressure on cloud service…
Read MoreNew Solution Implementation to Protect Encryption Keys Inside the Database Management System
Due to the attacks’ growth on sensitive databases by deploying advanced tools, beyond access control and authentication mechanisms, the database encryption remains a useful and effective way to ensure robust security of data stored within it. Any database encryption solution is based on a specific encryption model that determines how data is encrypted inside it.…
Read MoreMonitoring System Using GPS for Logistic’s Key Performance Indicator
Transportation vendors are important for distribution companies to deliver goods or products. Operational problems of logistic process in transportation vendors’ activities are difficult to track and monitor directly in the field, such as driver’s position, the delivery, and so forth. These problems result in the difficulty to measure the performance of vendors’ activities. The aim…
Read MoreArtificial Bee Colony-Optimized LSTM for Bitcoin Price Prediction
In recent years, deep learning has been widely used for time series prediction. Deep learning model that is most often used for time series prediction is LSTM. LSTM is widely used because of its excellence in remembering very long sequences. However, doing training on models that use LSTM requires a long time. Trying from one…
Read MoreSentiment Analysis on Twitter for Predicting Stock Exchange Movement
This paper is proposed to build a model by applying two methods, namely support vector machine and nonnegative matrix factorization in the process of predicting stock market movement using twitter and historical data. The stock exchange is based on the LQ 45 stock with period from August 2018 – January 2019. The features consist of…
Read MoreApplication Layer Security Authentication Protocols for the Internet of Things: A Survey
Network security challenges due to nearly limitless internet connectivity, platform limitations, ubiquitous nodal mobility and huge data transactions is burgeoning by the day and the need for transcend Internet of Things (IoT) based cloud security authentication protocols is on an exponential rise. Even though many secure classic layered security mechanisms are available for implementation, they…
Read MoreBig Data Analytics for Healthcare Organization: A Study of BDA Process, Benefits and Challenges of BDA
Day by day, data grows exponentially large using advanced technology and it requires effective analytical techniques to analyze the unknown and useful facts, patterns, associations and new trends which will provide new way for giving treatment to diseases and to provide good quality healthcare at low cost for everyone. This paper describes uncover valuable insights,…
Read MoreA Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation
Side-Channel Attack (SCA) is an effective method in extracting the secret key of cryptographic algorithms by correlating the physical leakage information with the processed data. In this paper, we propose an arithmetic hiding cum Look-up Table (AHLUT) based Substitution-Box (S-Box) in AES-128 cryptographic algorithm implementation to countermeasure against SCA. There are three key features in…
Read MoreStrong Authentication Protocol based on Java Crypto Chip as a Secure Element
Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509…
Read More
