Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 3 de 3
Filter
Add more filters










Database
Language
Publication year range
1.
Sensors (Basel) ; 23(4)2023 Feb 12.
Article in English | MEDLINE | ID: mdl-36850675

ABSTRACT

New techniques and tactics are being used to gain unauthorized access to the web that harm, steal, and destroy information. Protecting the system from many threats such as DDoS, SQL injection, cross-site scripting, etc., is always a challenging issue. This research work makes a comparative analysis between normal HTTP traffic and attack traffic that identifies attack-indicating parameters and features. Different features of standard datasets ISCX, CISC, and CICDDoS were analyzed and attack and normal traffic were compared by taking different parameters into consideration. A layered architecture model for DDoS, XSS, and SQL injection attack detection was developed using a dataset collected from the simulation environment. In the long short-term memory (LSTM)-based layered architecture, the first layer was the DDoS detection model designed with an accuracy of 97.57% and the second was the XSS and SQL injection layer with an obtained accuracy of 89.34%. The higher rate of HTTP traffic was investigated first and filtered out, and then passed to the second layer. The web application firewall (WAF) adds an extra layer of security to the web application by providing application-level filtering that cannot be achieved by the traditional network firewall system.

2.
Comput Intell Neurosci ; 2022: 5324202, 2022.
Article in English | MEDLINE | ID: mdl-36059392

ABSTRACT

One of the important and challenging tasks in cloud computing is to obtain the usefulness of cloud by implementing several specifications for our needs, to meet the present growing demands, and to minimize energy consumption as much as possible and ensure proper utilization of computing resources. An excellent mapping scheme has been derived which maps virtual machines (VMs) to physical machines (PMs), which is also known as virtual machine (VM) placement, and this needs to be implemented. The tremendous diversity of computing resources, tasks, and virtualization processes in the cloud causes the consolidation method to be more complex, tedious, and problematic. An algorithm for reducing energy use and resource allocation is proposed for implementation in this article. This algorithm was developed with the help of a Cloud System Model, which enables mapping between VMs and PMs and among tasks of VMs. The methodology used in this algorithm also supports lowering the number of PMs that are in an active state and optimizes the total time taken to process a set of tasks (also known as makespan time). Using the CloudSim Simulator tool, we evaluated and assessed the energy consumption and makespan time. The results are compiled and then compared graphically with respect to other existing energy-efficient VM placement algorithms.

3.
Sensors (Basel) ; 22(1)2021 Dec 26.
Article in English | MEDLINE | ID: mdl-35009686

ABSTRACT

Internet and telecom service providers worldwide are facing financial sustainability issues in migrating their existing legacy IPv4 networking system due to backward compatibility issues with the latest generation networking paradigms viz. Internet protocol version 6 (IPv6) and software-defined networking (SDN). Bench marking of existing networking devices is required to identify their status whether the existing running devices are upgradable or need replacement to make them operable with SDN and IPv6 networking so that internet and telecom service providers can properly plan their network migration to optimize capital and operational expenditures for future sustainability. In this paper, we implement "adaptive neuro fuzzy inference system (ANFIS)", a well-known intelligent approach for network device status identification to classify whether a network device is upgradable or requires replacement. Similarly, we establish a knowledge base (KB) system to store the information of device internetwork operating system (IoS)/firmware version, its SDN, and IPv6 support with end-of-life and end-of-support. For input to ANFIS, device performance metrics such as average CPU utilization, throughput, and memory capacity are retrieved and mapped with data from KB. We run the experiment with other well-known classification methods, for example, support vector machine (SVM), fine tree, and liner regression to compare performance results with ANFIS. The comparative results show that the ANFIS-based classification approach is more accurate and optimal than other methods. For service providers with a large number of network devices, this approach assists them to properly classify the device and make a decision for the smooth transitioning to SDN-enabled IPv6 networks.


Subject(s)
Algorithms , Computer Communication Networks , Internet , Software
SELECTION OF CITATIONS
SEARCH DETAIL
...