Light CNN Architecture Enhancement for Different Types Spoofing Attack Detection

Author(s):  
Marina Volkova ◽  
Tseren Andzhukaev ◽  
Galina Lavrentyeva ◽  
Sergey Novoselov ◽  
Alexander Kozlov
Author(s):  
Basheer Al-Duwairi ◽  
Wafaa Al-Kahla ◽  
Mhd Ammar AlRefai ◽  
Yazid Abedalqader ◽  
Abdullah Rawash ◽  
...  

The Internet of Things (IoT) is becoming an integral part of our daily life including health, environment, homes, military, etc. The enormous growth of IoT in recent years has attracted hackers to take advantage of their computation and communication capabilities to perform different types of attacks. The major concern is that IoT devices have several vulnerabilities that can be easily exploited to form IoT botnets consisting of millions of IoT devices and posing significant threats to Internet security. In this context, DDoS attacks originating from IoT botnets is a major problem in today’s Internet that requires immediate attention. In this paper, we propose a Security Information and Event Management-based IoT botnet DDoS attack detection and mitigation system. This system detects and blocks DDoS attack traffic from compromised IoT devices by monitoring specific packet types including TCP SYN, ICMP and DNS packets originating from these devices. We discuss a prototype implementation of the proposed system and we demonstrate that SIEM based solutions can be configured to accurately identify and block malicious traffic originating from compromised IoT devices.


The demand of Vehicular Adhoc Networks (VANETs) has been increasing in the area of vehicular and infrastructure communications. It has been felt that there is requirement of sharing of critical information related to safety and traffic management among different types of vehicles in a secure way. To ensure the smooth operation of the network, the availability of network resources is needed. The presence of either malicious vehicles or inaccessibility of network services makes VANET easy target for denial of service (DoS) attacks. The sole purpose of DoS attacks is to prevent the intended users from accessing the available resources and services. When the DoS attack is carried out by multiple vehicles distributed throughout the network, it is referred as Distributed DoS (DDoS) attack. The DDoS attacks are very dangerous and hard to be addressed in real time. The machine learning based DDoS attack detection algorithms have been proposed and presented by the research community in literature. In this paper, a hybrid algorithm of Decision Tree and Neural Network is presented for detecting and preventing different types of DDoS attacks in VANETs with highly efficient results. The simulation based experiments are carried out in order to evaluate and compare the performance of proposed hybrid algorithm with respect to different performance parameters. Based on experiments results, it has been found that the performance of hybrid algorithm has been increased significantly.


Electronics ◽  
2020 ◽  
Vol 9 (1) ◽  
pp. 97 ◽  
Author(s):  
Ramani Sagar ◽  
Rutvij Jhaveri ◽  
Carlos Borrego

In recent years, machine learning (ML) has become an important part to yield security and privacy in various applications. ML is used to address serious issues such as real-time attack detection, data leakage vulnerability assessments and many more. ML extensively supports the demanding requirements of the current scenario of security and privacy across a range of areas such as real-time decision-making, big data processing, reduced cycle time for learning, cost-efficiency and error-free processing. Therefore, in this paper, we review the state of the art approaches where ML is applicable more effectively to fulfill current real-world requirements in security. We examine different security applications’ perspectives where ML models play an essential role and compare, with different possible dimensions, their accuracy results. By analyzing ML algorithms in security application it provides a blueprint for an interdisciplinary research area. Even with the use of current sophisticated technology and tools, attackers can evade the ML models by committing adversarial attacks. Therefore, requirements rise to assess the vulnerability in the ML models to cope up with the adversarial attacks at the time of development. Accordingly, as a supplement to this point, we also analyze the different types of adversarial attacks on the ML models. To give proper visualization of security properties, we have represented the threat model and defense strategies against adversarial attack methods. Moreover, we illustrate the adversarial attacks based on the attackers’ knowledge about the model and addressed the point of the model at which possible attacks may be committed. Finally, we also investigate different types of properties of the adversarial attacks.


2021 ◽  
Vol 26 (jai2021.26(1)) ◽  
pp. 22-30
Author(s):  
Belej O ◽  
◽  
Spas N ◽  
Artyshchuk I ◽  
Fedastsou M ◽  
...  

Statistics of recent years on attacking actions on information systems show both the growth of known attackers and the growth of new models and directions of attacks. In this regard, the task of collecting information about events occurring in the information system and related to the main objects of the information system, and conducting their effective analysis is relevant. The main requirements for the tools of analysis are: speed and ability to adapt to new circumstances - adaptability. Means that meet these requirements are artificial intelligence systems. In particular, there are a number of research that use neural networks as a means of analysis. There are different types of neural networks, which differ depending on the tasks to be solved and are more suitable for different input data. The proposed multi-agent attack detection system collects and analyzes the collected information about the events of the information system using two types of neural networks. A multilayer perceptron is used to analyze various logs of information system objects. The Jordan network is used to analyze directly collected information about the events of information system objects. The use of a multi-agent attack detection system can increase the security of the information system. Features of modern attacks are considered. The urgency of the task of detecting attacks is substantiated. The peculiarities of the attack process were considered. The actions of attackers of different types at different stages of the attack are analyzed. It was shown which methods of detecting attacks should be used at different stages of the attack by an attacker. A model of a multi-agent attack detection system is proposed. An interpretation of the results of the analysis of information system events by the method of detecting attacks was proposed, as well as an algorithm for joint decision-making by agents based on several sources of information about their status. A model of an attack detection system that takes into account these features is proposed. This attack detection system collects information at several levels of the information system and uses it to analyze the artificial intelligence system


1986 ◽  
Vol 23 (04) ◽  
pp. 851-858 ◽  
Author(s):  
P. J. Brockwell

The Laplace transform of the extinction time is determined for a general birth and death process with arbitrary catastrophe rate and catastrophe size distribution. It is assumed only that the birth rates satisfyλ0= 0,λj> 0 for eachj> 0, and. Necessary and sufficient conditions for certain extinction of the population are derived. The results are applied to the linear birth and death process (λj=jλ, µj=jμ) with catastrophes of several different types.


2020 ◽  
Vol 43 ◽  
Author(s):  
Rajen A. Anderson ◽  
Benjamin C. Ruisch ◽  
David A. Pizarro

Abstract We argue that Tomasello's account overlooks important psychological distinctions between how humans judge different types of moral obligations, such as prescriptive obligations (i.e., what one should do) and proscriptive obligations (i.e., what one should not do). Specifically, evaluating these different types of obligations rests on different psychological inputs and has distinct downstream consequences for judgments of moral character.


Author(s):  
P.L. Moore

Previous freeze fracture results on the intact giant, amoeba Chaos carolinensis indicated the presence of a fibrillar arrangement of filaments within the cytoplasm. A complete interpretation of the three dimensional ultrastructure of these structures, and their possible role in amoeboid movement was not possible, since comparable results could not be obtained with conventional fixation of intact amoebae. Progress in interpreting the freeze fracture images of amoebae required a more thorough understanding of the different types of filaments present in amoebae, and of the ways in which they could be organized while remaining functional.The recent development of a calcium sensitive, demembranated, amoeboid model of Chaos carolinensis has made it possible to achieve a better understanding of such functional arrangements of amoeboid filaments. In these models the motility of demembranated cytoplasm can be controlled in vitro, and the chemical conditions necessary for contractility, and cytoplasmic streaming can be investigated. It is clear from these studies that “fibrils” exist in amoeboid models, and that they are capable of contracting along their length under conditions similar to those which cause contraction in vertebrate muscles.


Author(s):  
U. Aebi ◽  
P. Rew ◽  
T.-T. Sun

Various types of intermediate-sized (10-nm) filaments have been found and described in many different cell types during the past few years. Despite the differences in the chemical composition among the different types of filaments, they all yield common structural features: they are usually up to several microns long and have a diameter of 7 to 10 nm; there is evidence that they are made of several 2 to 3.5 nm wide protofilaments which are helically wound around each other; the secondary structure of the polypeptides constituting the filaments is rich in ∞-helix. However a detailed description of their structural organization is lacking to date.


Author(s):  
E. L. Thomas ◽  
S. L. Sass

In polyethylene single crystals pairs of black and white lines spaced 700-3,000Å apart, parallel to the [100] and [010] directions, have been identified as microsector boundaries. A microsector is formed when the plane of chain folding changes over a small distance within a polymer crystal. In order for the different types of folds to accommodate at the boundary between the 2 fold domains, a staggering along the chain direction and a rotation of the chains in the plane of the boundary occurs. The black-white contrast from a microsector boundary can be explained in terms of these chain rotations. We demonstrate that microsectors can terminate within the crystal and interpret the observed terminal strain contrast in terms of a screw dislocation dipole model.


Author(s):  
E.M. Kuhn ◽  
K.D. Marenus ◽  
M. Beer

Fibers composed of different types of collagen cannot be differentiated by conventional electron microscopic stains. We are developing staining procedures aimed at identifying collagen fibers of different types.Pt(Gly-L-Met)Cl binds specifically to sulfur-containing amino acids. Different collagens have methionine (met) residues at somewhat different positions. A good correspondence has been reported between known met positions and Pt(GLM) bands in rat Type I SLS (collagen aggregates in which molecules lie adjacent to each other in exact register). We have confirmed this relationship in Type III collagen SLS (Fig. 1).


Sign in / Sign up

Export Citation Format

Share Document