In this paper, to solve the problem of detecting network anomalies, a method of forming a set of informative features formalizing the normal and anomalous behavior of the system on the basis of evaluating the Hurst (H) parameter of the network traffic has been proposed. Criteria to detect and prevent various types of network anomalies using the Three Sigma Rule and Hurst parameter have been defined. A rescaled range (RS) method to evaluate the Hurst parameter has been chosen. The practical value of the proposed method is conditioned by a set of the following factors: low time spent on calculations, short time required for monitoring, the possibility of self-training, as well as the possibility of observing a wide range of traffic types. For new DPI (Deep Packet Inspection) system implementation, algorithms for analyzing and captured traffic with protocol detection and determining statistical load parameters have been developed. In addition, algorithms that are responsible for flow regulation to ensure the QoS (Quality of Services) based on the conducted static analysis of flows and the proposed method of detection of anomalies using the parameter Hurst have been developed. We compared the proposed software DPI system with the existing SolarWinds Deep Packet Inspection for the possibility of network traffic anomaly detection and prevention. The created software components of the proposed DPI system increase the efficiency of using standard intrusion detection and prevention systems by identifying and taking into account new non-standard factors and dependencies. The use of the developed system in the IoT communication infrastructure will increase the level of information security and significantly reduce the risks of its loss.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC7146318 | PMC |
http://dx.doi.org/10.3390/s20061637 | DOI Listing |
Sci Rep
January 2025
North Carolina School of Science and Mathematics, Durham, NC, 27705, USA.
Mobile Ad Hoc Networks (MANETs) are increasingly replacing conventional communication systems due to their decentralized and dynamic nature. However, their wireless architecture makes them highly vulnerable to flooding attacks, which can disrupt communication, deplete energy resources, and degrade network performance. This study presents a novel hybrid deep learning approach integrating Convolutional Neural Networks (CNN) with Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) architectures to effectively detect and mitigate flooding attacks in MANETs.
View Article and Find Full Text PDFMicromachines (Basel)
October 2024
National Network New Media Engineering Research Center, Institute of Acoustics, Chinese Academy of Sciences, No. 21, North Fourth Ring Road, Haidian District, Beijing 100190, China.
To increase bandwidth and overcome packet loss in Wide Area Networks (WANs), per-packet multipath transmission and redundant transmission are increasingly being used as Software-Defined Wide Area Network (SD-WAN) solutions. However, this results in out-of-order and duplicate packets in the destination network. To restore sequential and unique data streams for multiple connections, hardware packet buffers with significant depth are required due to the large delay difference between WAN paths.
View Article and Find Full Text PDFSci Rep
November 2024
Computer Science Department, Faculty of Computers and Information, South Valley University, Qena, 83523, Egypt.
With the fast-growing interconnection of smart technologies, the Industrial Internet of Things (IIoT) has revolutionized how industries work by connecting devices and sensors and automating regular operations via the Internet of Things (IoTs). IoT devices provide seamless diversity and connectivity in different application domains. This system and its transmission channels are subjected to targeted cyberattacks due to their round-the-clock connectivity.
View Article and Find Full Text PDFAnal Chim Acta
December 2024
School of Precision Instrument and Opto-electronics Engineering, Tianjin University, Tianjin 300072, China; Key Laboratory of Opto-electronic Information Technology, Ministry of Education, Tianjin 300072, China; Georgia Tech-Shenzhen Institute, Tianjin University, Shenzhen 518055, China; Department of Chemistry, The University of Tokyo, Tokyo 113-0033, Japan; School of Physics and Electronic Engineering, Xinjiang Normal University, Urumqi 830054, China. Electronic address:
Surface-enhanced Raman spectroscopy (SERS) offers a distinctive vibrational fingerprint of the molecules and has led to widespread applications in medical diagnosis, biochemistry, and virology. With the rapid development of artificial intelligence (AI) technology, AI-enabled Raman spectroscopic techniques, as a promising avenue for biosensing applications, have significantly boosted bacteria identification. By converting spectra into images, the dataset is enriched with more detailed information, allowing AI to identify bacterial isolates with enhanced precision.
View Article and Find Full Text PDFPLoS One
November 2024
Information Technology Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia.
Motor imagery (MI) classification has been commonly employed in making brain-computer interfaces (BCI) to manage the outside tools as a substitute neural muscular path. Effectual MI classification in BCI improves communication and mobility for people with a breakdown or motor damage, delivering a bridge between the brain's intentions and exterior actions. Employing electroencephalography (EEG) or aggressive neural recordings, machine learning (ML) methods are used to interpret patterns of brain action linked with motor image tasks.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!