malicious attack
Recently Published Documents


TOTAL DOCUMENTS

121
(FIVE YEARS 58)

H-INDEX

7
(FIVE YEARS 2)

2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Yuxia Chang ◽  
Chen Fang ◽  
Wenzhuo Sun

The development of artificial intelligence and worldwide epidemic events has promoted the implementation of smart healthcare while bringing issues of data privacy, malicious attack, and service quality. The Medical Internet of Things (MIoT), along with the technologies of federated learning and blockchain, has become a feasible solution for these issues. In this paper, we present a blockchain-based federated learning method for smart healthcare in which the edge nodes maintain the blockchain to resist a single point of failure and MIoT devices implement the federated learning to make full of the distributed clinical data. In particular, we design an adaptive differential privacy algorithm to protect data privacy and gradient verification-based consensus protocol to detect poisoning attacks. We compare our method with two similar methods on a real-world diabetes dataset. Promising experimental results show that our method can achieve high model accuracy in acceptable running time while also showing good performance in reducing the privacy budget consumption and resisting poisoning attacks.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Wei Ma ◽  
Zhihui Xin ◽  
Licun Sun ◽  
Jun Zhang

How to improve utility performance when securing sensitive data is an important research problem in Internet of smart sensors. In this paper, we study secured image speckle denoising for networked synthetic aperture radar (SAR). Speckle noise of SAR affects image quality and has a great influence on target detection and recognition. MSTAR dataset is often used in image target recognition. In this paper, a subregion-based method is proposed in order to improve the accuracy of target recognition and better retain target information while filtering and denoising the image. The new method applies advanced encryption techniques to protect sensitive data against malicious attack. Firstly, the image is divided into marked areas and unmarked areas through edge extraction and hole filling. Secondly, we use different size windows and filtering methods to filter the image in different areas. The experimental results show that the proposed algorithm has obvious advantages over MR-NLM, SSIM-NLM, Frost, and BM3D filtering in terms of equivalent view number and preserving edge and structure.


2021 ◽  
Vol 13 (22) ◽  
pp. 12514
Author(s):  
Chih-Hsiang Hsieh ◽  
Wei-Kuan Wang ◽  
Cheng-Xun Wang ◽  
Shi-Chun Tsai ◽  
Yi-Bing Lin

The DDoS attack is one of the most notorious attacks, and the severe impact of the DDoS attack on GitHub in 2018 raises the importance of designing effective defense methods for detecting this type of attack. Unlike the traditional network architecture that takes too long to cope with DDoS attacks, we focus on link-flooding attacks that do not directly attack the target. An effective defense mechanism is crucial since as long as a link-flooding attack is undetected, it will cause problems over the Internet. With the flexibility of software-defined networking, we design a novel framework and implement our ideas with a deep learning approach to improve the performance of the previous work. Through rerouting techniques and monitoring network traffic, our system can detect a malicious attack from the adversary. A CNN architecture is combined to assist in finding an appropriate rerouting path that can shorten the reaction time for detecting DDoS attacks. Therefore, the proposed method can efficiently distinguish the difference between benign traffic and malicious traffic and prevent attackers from carrying out link-flooding attacks through bots.


2021 ◽  
Author(s):  
E. Arul ◽  
A. Punidha ◽  
K. Gunasekaran ◽  
P Radhakrishnan ◽  
VD Ashok Kumar

Online media have flourished in modern years to connect with the world. Most of those stuff users share on blogs like facebook, twitter and many other are pessimistic or just middle spirited. Further, an increasingly professional anti - spyware technologies are dependent on Machine Learning(ML) technology to secure malicious consumers. Over the past few years, revolutionary learning approaches have yielded remarkable outcomes and have immediately generated photos, characters and text interpretations of dynamic weak points. The Purple consumer frequency makes the troll and attacker aim an enticing one. The users will learn the controversial topics and techniques used by malware from articles with ties to harmful material and bogus applications. It is essential to build and customize a lot of potential functionality in vulnerability and application developers around the world. To represent a public web firmware assault with deep logistic inference using Extreme Spontaneous Tree (FAI-DLB). A corresponding output device is named harmful or benign by training an FAI-DLB with different modulation clustered with such a normal or anomalous API. It was therefore equipped to locate a suspicious sequence in unidentified firmware of FAI Deep LB. The outcome demonstrates a good actual meaning of 96.25% and a low spyware assault of 0.03%.


2021 ◽  
pp. 11-19
Author(s):  
Aatif Sarfaraz ◽  
Atul Jha ◽  
Avijit Mondal ◽  
Radha Tamal Goswami

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Han Su ◽  
Minglun Ren ◽  
Anning Wang ◽  
Xiaoan Tang ◽  
Xin Ni ◽  
...  

Forum comments are valuable information for enterprises to discover public preferences and market trends. However, extensive marketing and malicious attack behaviors in forums are always an obstacle for enterprises to make effective use of this information. And these forum spammers are constantly updating technology to prevent detection. Therefore, how to accurately recognize forum spammers has become an important issue. Aiming to accurately recognize forum spammers, this paper changes the research target from understanding abnormal reviews and the suspicious relationship among forum spammers to discover how they must behave (follow or be followed) to achieve their monetary goals. First, we classify forum spammers into automated forum spammers and marketing forum spammers based on different behavioral features. Then, we propose a support vector machine-based automated spammer recognition (ASR) model and a k-means clustering-based marketing spammer recognition (MSR) model. The experimental results on the real-world labelled dataset illustrate the effectiveness of our methods on classification spammer from common users. To the best of our knowledge, this work is among the first to construct behavior-driven recognition models according to the different behavioral patterns of forum spammers.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Xiaoyang Liu ◽  
Jiamiao Liu

AbstractGiven the gradual intensification of the current network security situation, malicious attack traffic is flooding the entire network environment, and the current malicious traffic detection model is insufficient in detection efficiency and detection performance. This paper proposes a data processing method that divides the flow data into data flow segments so that the model can improve the throughput per unit time to meet its detection efficiency. For this kind of data, a malicious traffic detection model with a hierarchical attention mechanism is also proposed and named HAGRU (Hierarchical Attention Gated Recurrent Unit). By fusing the feature information of the three hierarchies, the detection ability of the model is improved. An attention mechanism is introduced to focus on malicious flows in the data flow segment, which can reasonably utilize limited computing resources. Finally, compare the proposed model with the current state of the method on the datasets. The experimental results show that: the novel model performs well in different evaluation indicators (detection rate, false-positive rate, F-score), and it can improve the performance of category recognition with fewer samples when the data is unbalanced. At the same time, the training of the novel model on larger datasets will enhance the generalization ability and reduce the false alarm rate. The proposed model not only improves the performance of malicious traffic detection but also provides a new research method for improving the efficiency of model detection.


Electronics ◽  
2021 ◽  
Vol 10 (11) ◽  
pp. 1314
Author(s):  
Abdulwahab Alazeb ◽  
Brajendra Panda ◽  
Sultan Almakdi ◽  
Mohammed Alshehri

The volume of data generated worldwide is rapidly growing. Cloud computing, fog computing, and the Internet of Things (IoT) technologies have been adapted to compute and process this high data volume. In coming years information technology will enable extensive developments in the field of healthcare and offer health care providers and patients broadened opportunities to enhance their healthcare experiences and services owing to heightened availability and enriched services through real-time data exchange. As promising as these technological innovations are, security issues such as data integrity and data consistency remain widely unaddressed. Therefore, it is important to engineer a solution to these issues. Developing a damage assessment and recovery control model for fog computing is critical. This paper proposes two models for using fog computing in healthcare: one for private fog computing distribution and one for public fog computing distribution. For each model, we propose a unique scheme to assess the damage caused by malicious attack, to accurately identify affected transactions and recover damaged data if needed. A transaction-dependency graph technique is used for both models to observe and monitor all transactions in the whole system. We conducted a simulation study to assess the applicability and efficacy of the proposed models. The evaluation rendered these models practicable and effective.


Sign in / Sign up

Export Citation Format

Share Document