Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 167
Filtrar
1.
Plant J ; 113(6): 1211-1222, 2023 03.
Artigo em Inglês | MEDLINE | ID: mdl-36628462

RESUMO

Plant immunity largely relies on intracellular nucleotide-binding domain leucine-rich repeat (NLR) immune receptors. Some plant NLRs carry integrated domains (IDs) that mimic authentic pathogen effector targets. We report here the identification of a genetically linked NLR-ID/NLR pair: BnRPR1 and BnRPR2 in Brassica napus. The NLR-ID carries two ID fusions and the mode of action of the pair conforms to the proposed "integrated sensor/decoy" model. The two NLRs interact and the heterocomplex localizes in the plant-cell nucleus and nucleolus. However, the BnRPRs pair does not operate through a negative regulation as it was previously reported for other NLR-IDs. Cell death is induced only upon co-expression of the two proteins and is dependent on the helper genes, EDS1 and NRG1. The nuclear localization of both proteins seems to be essential for cell death activation, while the IDs of BnRPR1 are dispensable for this purpose. In summary, we describe a new pair of NLR-IDs with interesting features in relation to its regulation and the cell death activation.


Assuntos
Brassica napus , Brassica rapa , Brassica napus/genética , Brassica napus/metabolismo , Proteínas NLR/metabolismo , Plantas/metabolismo , Imunidade Vegetal/genética , Proteínas/genética , Receptores Imunológicos , Brassica rapa/metabolismo , Núcleo Celular/metabolismo , Morte Celular , Doenças das Plantas , Proteínas de Plantas/genética , Proteínas de Plantas/química
2.
Biochem Biophys Res Commun ; 696: 149490, 2024 Feb 12.
Artigo em Inglês | MEDLINE | ID: mdl-38241811

RESUMO

The Lysosomal Storage disease known as Mucopolysaccharidosis type II, is caused by mutations affecting the iduronate-2-sulfatase required for heparan and dermatan sulfate catabolism. The central nervous system (CNS) is mostly and severely affected by the accumulation of both substrates. The complexity of the CNS damage observed in MPS II patients has been limitedly explored. The use of mass spectrometry (MS)-based proteomics tools to identify protein profiles may yield valuable information about the pathological mechanisms of Hunter syndrome. In this further study, we provide a new comparative proteomic analysis of MPS II models by using a pipeline consisting of the identification of native protein complexes positioned selectively by using a specific antibody, coupled with mass spectrometry analysis, allowing us to identify changes involving in a significant number of new biological functions, including a specific brain antioxidant response, a down-regulated autophagic, the suppression of sulfur catabolic process, a prominent liver immune response and the stimulation of phagocytosis among others.


Assuntos
Iduronato Sulfatase , Mucopolissacaridose II , Humanos , Mucopolissacaridose II/genética , Proteômica , Iduronato Sulfatase/genética , Iduronato Sulfatase/metabolismo , Glicosaminoglicanos/metabolismo , Encéfalo/metabolismo
3.
Bipolar Disord ; 26(4): 356-363, 2024 Jun.
Artigo em Inglês | MEDLINE | ID: mdl-38311367

RESUMO

BACKGROUND: Bipolar depression is the major cause of morbidity in patients with bipolar disorder. It affects psychosocial functioning and markedly impairs occupational productivity. Anhedonia is one of the most debilitating symptoms of depression contributing to treatment resistance. It correlates with suicidality, low quality of life, social withdrawal, and poor treatment response. Currently, there is no approved treatment specifically targeting anhedonia. Emerging evidence suggests that ketamine possesses anti-anhedonic properties in individuals with depression. OBJECTIVES: The aim of this naturalistic open-label study was to investigate the effect of add-on ketamine treatment on anhedonia in treatment resistant bipolar depression. METHODS: Our main interest was the change in patient-reported (Snaith-Hamilton Pleasure Scale) and rater-based anhedonia measure (Montgomery-Åsberg Depression Rating Scale-anhedonia subscale). The secondary aim was to analyze the score change in three Inventory of Depressive Symptomatology-Self Report (IDS-SR) domains: mood/cognition, anxiety/somatic, and sleep. Patients underwent assessments at several time points, including baseline, after the third, fifth, and seventh ketamine infusions. Additionally, a follow-up assessment was conducted 1 week following the final ketamine administration. RESULTS: We found improvement in anhedonia symptoms according to both patient-reported and rater-based measures. The improvement in IDS-SR domains was most prominent in anxiety/somatic factor and mood/cognition factor, improvement in sleep factor was not observed. No serious adverse events occurred. CONCLUSION: Add-on ketamine seems to be a good choice for the treatment of anhedonia in treatment resistant bipolar depression. It also showed a good effect in reducing symptoms of anxiety in this group of patients. Considering unmet needs and the detrimental effect of anhedonia and anxiety, more studies are needed on ketamine treatment in resistant bipolar depression.


Assuntos
Anedonia , Transtorno Bipolar , Ketamina , Humanos , Ketamina/uso terapêutico , Ketamina/administração & dosagem , Ketamina/farmacologia , Transtorno Bipolar/tratamento farmacológico , Anedonia/efeitos dos fármacos , Anedonia/fisiologia , Masculino , Adulto , Feminino , Pessoa de Meia-Idade , Transtorno Depressivo Resistente a Tratamento/tratamento farmacológico , Escalas de Graduação Psiquiátrica
4.
Immunol Invest ; 53(2): 91-114, 2024 Feb.
Artigo em Inglês | MEDLINE | ID: mdl-37987679

RESUMO

The epithelial ovarian carcinoma (EOC) is one of leading causes of cancer-related mortality in females. For some patients, complete resection cannot be achieved, thus neoadjuvant chemotherapy (NACT) following interval debulking surgery (IDS) could be an alternative choice. In general-held belief, cytotoxic chemotherapy is assumed to be immunosuppressive, because of its toxicity to dividing cells in the bone marrow and peripheral lymphoid tissues. However, increasing evidence highlighted that the anticancer activity of chemotherapy may also be related to its ability to act as an immune modulator. NACT not only changed the morphology of cancer cells, but also changed the transcriptomic and genomic profile of EOC, induced proliferation of cancer stem-like cells, gene mutation, and tumor-related adaptive immune response. This review will provide a comprehensive overview of recent studies evaluating the impact of NACT on cancer cells and immune system of advanced EOC and their relationship to clinical outcome. This information could help us understand the change of immune system during NACT, which might provide new strategies in future investigation of immuno-therapy for maintenance treatment of EOC.


Assuntos
Neoplasias Ovarianas , Feminino , Humanos , Carcinoma Epitelial do Ovário/tratamento farmacológico , Neoplasias Ovarianas/tratamento farmacológico , Neoplasias Ovarianas/patologia , Terapia Neoadjuvante , Estadiamento de Neoplasias , Quimioterapia Adjuvante , Sistema Imunitário , Estudos Retrospectivos
5.
Public Health ; 228: 100-104, 2024 Mar.
Artigo em Inglês | MEDLINE | ID: mdl-38342075

RESUMO

OBJECTIVES: Malawi's disease surveillance system is built on several different data sources and systems and is informed by the Integrated Diseases Surveillance and Response (IDSR) strategy. This study was carried out as part of a larger multicountry study to identify context-specific factors, which influence the operationalization of integrated disease surveillance. STUDY DESIGN AND METHODS: A total of six focus group discussions were conducted with 43 relevant personnel at the primary and secondary healthcare levels in two districts (Lilongwe and Dowa) and at the national level. The discussions were analyzed and sorted into predefined categories based on the domains of the International Association of Public Health conceptual framework. RESULTS: We found ongoing efforts to enhance integrated disease surveillance operationalization, including the establishment of the Public Health Institute of Malawi for coordination, digitalizing the surveillance system through One Health Surveillance Platform, and improving communication among rapid response teams using WhatsApp. The adoption of World Health Organization's third edition IDSR technical guidelines was also underway. Nonetheless, there were major implementation barriers such as parallel and uncoordinated surveillance systems, priority conditions that cannot be diagnosed at the point of reporting, lack of case definitions and diagnostic codes for priority conditions, reporting forms with unexplained acronyms, illegible data sources, unstable electronic data transfers, inadequate supervision and training, poor enforcement of reporting from private health facilities, high reporting burden, and lack of and feedback to those reporting. CONCLUSIONS: The results fit well into the predefined categories used. The study reveals basic problems with the operationalization, tools, and reporting forms used for IDSR. These findings may have implications for practice and policy in Malawi and other countries where IDSR is the national strategy for surveillance.


Assuntos
Controle de Doenças Transmissíveis , Surtos de Doenças , Humanos , Controle de Doenças Transmissíveis/métodos , Malaui/epidemiologia , Saúde Pública , Atenção à Saúde , Vigilância da População/métodos
6.
Sensors (Basel) ; 24(11)2024 May 30.
Artigo em Inglês | MEDLINE | ID: mdl-38894310

RESUMO

This paper investigates the application of ensemble learning techniques, specifically meta-learning, in intrusion detection systems (IDS) for the Internet of Medical Things (IoMT). It underscores the existing challenges posed by the heterogeneous and dynamic nature of IoMT environments, which necessitate adaptive, robust security solutions. By harnessing meta-learning alongside various ensemble strategies such as stacking and bagging, the paper aims to refine IDS mechanisms to effectively counter evolving cyber threats. The study proposes a performance-driven weighted meta-learning technique for dynamic assignment of voting weights to classifiers based on accuracy, loss, and confidence levels. This approach significantly enhances the intrusion detection capabilities for the IoMT by dynamically optimizing ensemble IDS models. Extensive experiments demonstrate the proposed model's superior performance in terms of accuracy, detection rate, F1 score, and false positive rate compared to existing models, particularly when analyzing various sizes of input features. The findings highlight the potential of integrating meta-learning in ensemble-based IDS to enhance the security and integrity of IoMT networks, suggesting avenues for future research to further advance IDS performance in protecting sensitive medical data and IoT infrastructures.

7.
Sensors (Basel) ; 24(2)2024 Jan 22.
Artigo em Inglês | MEDLINE | ID: mdl-38276404

RESUMO

Widespread and ever-increasing cybersecurity attacks against Internet of Things (IoT) systems are causing a wide range of problems for individuals and organizations. The IoT is self-configuring and open, making it vulnerable to insider and outsider attacks. In the IoT, devices are designed to self-configure, enabling them to connect to networks autonomously without extensive manual configuration. By using various protocols, technologies, and automated processes, self-configuring IoT devices are able to seamlessly connect to networks, discover services, and adapt their configurations without requiring manual intervention or setup. Users' security and privacy may be compromised by attackers seeking to obtain access to their personal information, create monetary losses, and spy on them. A Denial of Service (DoS) attack is one of the most devastating attacks against IoT systems because it prevents legitimate users from accessing services. A cyberattack of this type can significantly damage IoT services and smart environment applications in an IoT network. As a result, securing IoT systems has become an increasingly significant concern. Therefore, in this study, we propose an IDS defense mechanism to improve the security of IoT networks against DoS attacks using anomaly detection and machine learning (ML). Anomaly detection is used in the proposed IDS to continuously monitor network traffic for deviations from normal profiles. For that purpose, we used four types of supervised classifier algorithms, namely, Decision Tree (DT), Random Forest (RF), K Nearest Neighbor (kNN), and Support Vector Machine (SVM). In addition, we utilized two types of feature selection algorithms, the Correlation-based Feature Selection (CFS) algorithm and the Genetic Algorithm (GA) and compared their performances. We also utilized the IoTID20 dataset, one of the most recent for detecting anomalous activity in IoT networks, to train our model. The best performances were obtained with DT and RF classifiers when they were trained with features selected by GA. However, other metrics, such as training and testing times, showed that DT was superior.

8.
Sensors (Basel) ; 24(11)2024 May 24.
Artigo em Inglês | MEDLINE | ID: mdl-38894166

RESUMO

The healthcare industry went through reformation by integrating the Internet of Medical Things (IoMT) to enable data harnessing by transmission mediums from different devices, about patients to healthcare staff devices, for further analysis through cloud-based servers for proper diagnosis of patients, yielding efficient and accurate results. However, IoMT technology is accompanied by a set of drawbacks in terms of security risks and vulnerabilities, such as violating and exposing patients' sensitive and confidential data. Further, the network traffic data is prone to interception attacks caused by a wireless type of communication and alteration of data, which could cause unwanted outcomes. The advocated scheme provides insight into a robust Intrusion Detection System (IDS) for IoMT networks. It leverages a honeypot to divert attackers away from critical systems, reducing the attack surface. Additionally, the IDS employs an ensemble method combining Logistic Regression and K-Nearest Neighbor algorithms. This approach harnesses the strengths of both algorithms to improve attack detection accuracy and robustness. This work analyzes the impact, performance, accuracy, and precision outcomes of the used model on two IoMT-related datasets which contain multiple attack types such as Man-In-The-Middle (MITM), Data Injection, and Distributed Denial of Services (DDOS). The yielded results showed that the proposed ensemble method was effective in detecting intrusion attempts and classifying them as attacks or normal network traffic, with a high accuracy of 92.5% for the first dataset and 99.54% for the second dataset and a precision of 96.74% for the first dataset and 99.228% for the second dataset.


Assuntos
Algoritmos , Segurança Computacional , Atenção à Saúde , Internet das Coisas , Humanos , Tecnologia sem Fio , Computação em Nuvem , Confidencialidade
9.
Sensors (Basel) ; 24(3)2024 Jan 28.
Artigo em Inglês | MEDLINE | ID: mdl-38339572

RESUMO

The effective operation of distributed energy sources relies significantly on the communication systems employed in microgrids. This article explores the fundamental communication requirements, structures, and protocols necessary to establish a secure connection in microgrids. This article examines the present difficulties facing, and progress in, smart microgrid communication technologies, including wired and wireless networks. Furthermore, it evaluates the incorporation of diverse security methods. This article showcases a case study that illustrates the implementation of a distributed cyber-security communication system in a microgrid setting. The study concludes by emphasizing the ongoing research endeavors and suggesting potential future research paths in the field of microgrid communications.

10.
Sensors (Basel) ; 23(24)2023 Dec 16.
Artigo em Inglês | MEDLINE | ID: mdl-38139716

RESUMO

The Internet of Things (IoT) technology has seen substantial research in Deep Learning (DL) techniques to detect cyberattacks. Critical Infrastructures (CIs) must be able to quickly detect cyberattacks close to edge devices in order to prevent service interruptions. DL approaches outperform shallow machine learning techniques in attack detection, giving them a viable alternative for use in intrusion detection. However, because of the massive amount of IoT data and the computational requirements for DL models, transmission overheads prevent the successful implementation of DL models closer to the devices. As they were not trained on pertinent IoT, current Intrusion Detection Systems (IDS) either use conventional techniques or are not intended for scattered edge-cloud deployment. A new edge-cloud-based IoT IDS is suggested to address these issues. It uses distributed processing to separate the dataset into subsets appropriate to different attack classes and performs attribute selection on time-series IoT data. Next, DL is used to train an attack detection Recurrent Neural Network, which consists of a Recurrent Neural Network (RNN) and Bidirectional Long Short-Term Memory (LSTM). The high-dimensional BoT-IoT dataset, which replicates massive amounts of genuine IoT attack traffic, is used to test the proposed model. Despite an 85 percent reduction in dataset size made achievable by attribute selection approaches, the attack detection capability was kept intact. The models built utilizing the smaller dataset demonstrated a higher recall rate (98.25%), F1-measure (99.12%), accuracy (99.56%), and precision (99.45%) with no loss in class discrimination performance compared to models trained on the entire attribute set. With the smaller attribute space, neither the RNN nor the Bi-LSTM models experienced underfitting or overfitting. The proposed DL-based IoT intrusion detection solution has the capability to scale efficiently in the face of large volumes of IoT data, thus making it an ideal candidate for edge-cloud deployment.

11.
Sensors (Basel) ; 23(2)2023 Jan 09.
Artigo em Inglês | MEDLINE | ID: mdl-36679553

RESUMO

Integrating IoT devices in SCADA systems has provided efficient and improved data collection and transmission technologies. This enhancement comes with significant security challenges, exposing traditionally isolated systems to the public internet. Effective and highly reliable security devices, such as intrusion detection system (IDSs) and intrusion prevention systems (IPS), are critical. Countless studies used deep learning algorithms to design an efficient IDS; however, the fundamental issue of imbalanced datasets was not fully addressed. In our research, we examined the impact of data imbalance on developing an effective SCADA-based IDS. To investigate the impact of various data balancing techniques, we chose two unbalanced datasets, the Morris power dataset, and CICIDS2017 dataset, including random sampling, one-sided selection (OSS), near-miss, SMOTE, and ADASYN. For binary classification, convolutional neural networks were coupled with long short-term memory (CNN-LSTM). The system's effectiveness was determined by the confusion matrix, which includes evaluation metrics, such as accuracy, precision, detection rate, and F1-score. Four experiments on the two datasets demonstrate the impact of the data imbalance. This research aims to help security researchers in understanding imbalanced datasets and their impact on DL SCADA-IDS.


Assuntos
Algoritmos , Benchmarking , Coleta de Dados , Internet , Memória de Longo Prazo
12.
Sensors (Basel) ; 23(2)2023 Jan 12.
Artigo em Inglês | MEDLINE | ID: mdl-36679684

RESUMO

Recently, with the massive growth of IoT devices, the attack surfaces have also intensified. Thus, cybersecurity has become a critical component to protect organizational boundaries. In networks, Intrusion Detection Systems (IDSs) are employed to raise critical flags during network management. One aspect is malicious traffic identification, where zero-day attack detection is a critical problem of study. Current approaches are aligned towards deep learning (DL) methods for IDSs, but the success of the DL mechanism depends on the feature learning process, which is an open challenge. Thus, in this paper, the authors propose a technique which combines both CNN, and GRU, where different CNN-GRU combination sequences are presented to optimize the network parameters. In the simulation, the authors used the CICIDS-2017 benchmark dataset and used metrics such as precision, recall, False Positive Rate (FPR), True Positive Rate (TRP), and other aligned metrics. The results suggest a significant improvement, where many network attacks are detected with an accuracy of 98.73%, and an FPR rate of 0.075. We also performed a comparative analysis with other existing techniques, and the obtained results indicate the efficacy of the proposed IDS scheme in real cybersecurity setups.


Assuntos
Aprendizado Profundo , Benchmarking , Segurança Computacional , Simulação por Computador
13.
Sensors (Basel) ; 23(22)2023 Nov 17.
Artigo em Inglês | MEDLINE | ID: mdl-38005635

RESUMO

The Internet of Medical Things (IoMT) is a growing trend within the rapidly expanding Internet of Things, enhancing healthcare operations and remote patient monitoring. However, these devices are vulnerable to cyber-attacks, posing risks to healthcare operations and patient safety. To detect and counteract attacks on the IoMT, methods such as intrusion detection systems, log monitoring, and threat intelligence are utilized. However, as attackers refine their methods, there is an increasing shift toward using machine learning and deep learning for more accurate and predictive attack detection. In this paper, we propose a fuzzy-based self-tuning Long Short-Term Memory (LSTM) intrusion detection system (IDS) for the IoMT. Our approach dynamically adjusts the number of epochs and utilizes early stopping to prevent overfitting and underfitting. We conducted extensive experiments to evaluate the performance of our proposed model, comparing it with existing IDS models for the IoMT. The results show that our model achieves high accuracy, low false positive rates, and high detection rates, indicating its effectiveness in identifying intrusions. We also discuss the challenges of using static epochs and batch sizes in deep learning models and highlight the importance of dynamic adjustment. The findings of this study contribute to the development of more efficient and accurate IDS models for IoMT scenarios.


Assuntos
Internet das Coisas , Humanos , Internet , Inteligência , Aprendizado de Máquina , Memória de Longo Prazo
14.
Sensors (Basel) ; 23(10)2023 May 22.
Artigo em Inglês | MEDLINE | ID: mdl-37430886

RESUMO

In healthcare, the Internet of Things (IoT) is used to remotely monitor patients and provide real-time diagnoses, which is referred to as the Internet of Medical Things (IoMT). This integration poses a risk from cybersecurity threats that can harm patient data and well-being. Hackers can manipulate biometric data from biosensors or disrupt the IoMT system, which is a major concern. To address this issue, intrusion detection systems (IDS) have been proposed, particularly using deep learning algorithms. However, developing IDS for IoMT is challenging due to high data dimensionality leading to model overfitting and degraded detection accuracy. Feature selection has been proposed to prevent overfitting, but the existing methods assume that feature redundancy increases linearly with the size of the selected features. Such an assumption does not hold, as the amount of information a feature carries about the attack pattern varies from feature to feature, especially when dealing with early patterns, due to data sparsity that makes it difficult to perceive the common characteristics of selected features. This negatively affects the ability of the mutual information feature selection (MIFS) goal function to estimate the redundancy coefficient accurately. To overcome this issue, this paper proposes an enhanced feature selection technique called Logistic Redundancy Coefficient Gradual Upweighting MIFS (LRGU-MIFS) that evaluates candidate features individually instead of comparing them with common characteristics of the already-selected features. Unlike the existing feature selection techniques, LRGU calculates the redundancy score of a feature using the logistic function. It increases the redundancy value based on the logistic curve, which reflects the nonlinearity of the relationship of the mutual information between features in the selected set. Then, the LRGU was incorporated into the goal function of MIFS as a redundancy coefficient. The experimental evaluation shows that the proposed LRGU was able to identify a compact set of significant features that outperformed those selected by the existing techniques. The proposed technique overcomes the challenge of perceiving common characteristics in cases of insufficient attack patterns and outperforms existing techniques in identifying significant features.


Assuntos
Internet das Coisas , Humanos , Algoritmos , Biometria , Segurança Computacional
15.
Sensors (Basel) ; 23(21)2023 Nov 03.
Artigo em Inglês | MEDLINE | ID: mdl-37960661

RESUMO

With the rapid growth of social media networks and internet accessibility, most businesses are becoming vulnerable to a wide range of threats and attacks. Thus, intrusion detection systems (IDSs) are considered one of the most essential components for securing organizational networks. They are the first line of defense against online threats and are responsible for quickly identifying potential network intrusions. Mainly, IDSs analyze the network traffic to detect any malicious activities in the network. Today, networks are expanding tremendously as the demand for network services is expanding. This expansion leads to diverse data types and complexities in the network, which may limit the applicability of the developed algorithms. Moreover, viruses and malicious attacks are changing in their quantity and quality. Therefore, recently, several security researchers have developed IDSs using several innovative techniques, including artificial intelligence methods. This work aims to propose a support vector machine (SVM)-based deep learning system that will classify the data extracted from servers to determine the intrusion incidents on social media. To implement deep learning-based IDSs for multiclass classification, the CSE-CIC-IDS 2018 dataset has been used for system evaluation. The CSE-CIC-IDS 2018 dataset was subjected to several preprocessing techniques to prepare it for the training phase. The proposed model has been implemented in 100,000 instances of a sample dataset. This study demonstrated that the accuracy, true-positive recall, precision, specificity, false-positive recall, and F-score of the proposed model were 100%, 100%, 100%, 100%, 0%, and 100%, respectively.

16.
Sensors (Basel) ; 23(4)2023 Feb 07.
Artigo em Inglês | MEDLINE | ID: mdl-36850444

RESUMO

Recently proposed methods in intrusion detection are iterating on machine learning methods as a potential solution. These novel methods are validated on one or more datasets from a sparse collection of academic intrusion detection datasets. Their recognition as improvements to the state-of-the-art is largely dependent on whether they can demonstrate a reliable increase in classification metrics compared to similar works validated on the same datasets. Whether these increases are meaningful outside of the training/testing datasets is rarely asked and never investigated. This work aims to demonstrate that strong general performance does not typically follow from strong classification on the current intrusion detection datasets. Binary classification models from a range of algorithmic families are trained on the attack classes of CSE-CIC-IDS2018, a state-of-the-art intrusion detection dataset. After establishing baselines for each class at various points of data access, the same trained models are tasked with classifying samples from the corresponding attack classes in CIC-IDS2017, CIC-DoS2017 and CIC-DDoS2019. Contrary to what the baseline results would suggest, the models have rarely learned a generally applicable representation of their attack class. Stability and predictability of generalized model performance are central issues for all methods on all attack classes. Focusing only on the three best-in-class models in terms of interdataset generalization, reveals that for network-centric attack classes (brute force, denial of service and distributed denial of service), general representations can be learned with flat losses in classification performance (precision and recall) below 5%. Other attack classes vary in generalized performance from stark losses in recall (-35%) with intact precision (98+%) for botnets to total degradation of precision and moderate recall loss for Web attack and infiltration models. The core conclusion of this article is a warning to researchers in the field. Expecting results of proposed methods on the test sets of state-of-the-art intrusion detection datasets to translate to generalized performance is likely a serious overestimation. Four proposals to reduce this overestimation are set out as future work directions.

17.
Sensors (Basel) ; 23(13)2023 Jun 22.
Artigo em Inglês | MEDLINE | ID: mdl-37447678

RESUMO

The advancements and reliance on digital data necessitates dependence on information technology. The growing amount of digital data and their availability over the Internet have given rise to the problem of information security. With the increase in connectivity among devices and networks, maintaining the information security of an asset has now become essential for an organization. Intrusion detection systems (IDS) are widely used in networks for protection against different network attacks. Several machine-learning-based techniques have been used among researchers for the implementation of anomaly-based IDS (AIDS). In the past, the focus primarily remained on the improvement of the accuracy of the system. Efficiency with respect to time is an important aspect of an IDS, which most of the research has thus far somewhat overlooked. For this purpose, we propose a multi-layered filtration framework (MLFF) for feature reduction using a statistical approach. The proposed framework helps reduce the detection time without affecting the accuracy. We use the CIC-IDS2017 dataset for experiments. The proposed framework contains three filters and is connected in sequential order. The accuracy, precision, recall and F1 score are calculated against the selected machine learning models. In addition, the training time and the detection time are also calculated because these parameters are considered important in measuring the performance of a detection system. Generally, decision tree models, random forest methods, and artificial neural networks show better results in the detection of network attacks with minimum detection time.


Assuntos
Filtração , Tecnologia da Informação , Internet , Aprendizado de Máquina , Redes Neurais de Computação
18.
Sensors (Basel) ; 23(7)2023 Mar 28.
Artigo em Inglês | MEDLINE | ID: mdl-37050613

RESUMO

For in-vehicle network communication, the controller area network (CAN) broadcasts to all connected nodes without address validation. Therefore, it is highly vulnerable to all sorts of attack scenarios. This research proposes a novel intrusion detection system (IDS) for CAN to identify in-vehicle network anomalies. The statistical characteristics of attacks provide valuable information about the inherent intrusion patterns and behaviors. We employed two real-world attack scenarios from publicly available datasets to record a real-time response against intrusions with increased precision for in-vehicle network environments. Our proposed IDS can exploit malicious patterns by calculating thresholds and using the statistical properties of attacks, making attack detection more efficient. The optimized threshold value is calculated using brute-force optimization for various window sizes to minimize the total error. The reference values of normality require a few legitimate data frames for effective intrusion detection. The experimental findings validate that our suggested method can efficiently detect fuzzy, merge, and denial-of-service (DoS) attacks with low false-positive rates. It is also demonstrated that the total error decreases with an increasing attack rate for varying window sizes. The results indicate that our proposed IDS minimizes the misclassification rate and is hence better suited for in-vehicle networks.

19.
Sensors (Basel) ; 23(9)2023 May 01.
Artigo em Inglês | MEDLINE | ID: mdl-37177643

RESUMO

Software-defined networking (SDN) is a revolutionary innovation in network technology with many desirable features, including flexibility and manageability. Despite those advantages, SDN is vulnerable to distributed denial of service (DDoS), which constitutes a significant threat due to its impact on the SDN network. Despite many security approaches to detect DDoS attacks, it remains an open research challenge. Therefore, this study presents a systematic literature review (SLR) to systematically investigate and critically analyze the existing DDoS attack approaches based on machine learning (ML), deep learning (DL), or hybrid approaches published between 2014 and 2022. We followed a predefined SLR protocol in two stages on eight online databases to comprehensively cover relevant studies. The two stages involve automatic and manual searching, resulting in 70 studies being identified as definitive primary studies. The trend indicates that the number of studies on SDN DDoS attacks has increased dramatically in the last few years. The analysis showed that the existing detection approaches primarily utilize ensemble, hybrid, and single ML-DL. Private synthetic datasets, followed by unrealistic datasets, are the most frequently used to evaluate those approaches. In addition, the review argues that the limited literature studies demand additional focus on resolving the remaining challenges and open issues stated in this SLR.

20.
Sensors (Basel) ; 23(16)2023 Aug 12.
Artigo em Inglês | MEDLINE | ID: mdl-37631671

RESUMO

The internet of things (IoT) technology presents an intelligent way to improve our lives and contributes to many fields such as industry, communications, agriculture, etc. Unfortunately, IoT networks are exposed to many attacks that may destroy the entire network and consume network resources. This paper aims to propose intelligent process automation and an auto-configured intelligent automation detection model (IADM) to detect and prevent malicious network traffic and behaviors/events at distributed multi-access edge computing in an IoT-based smart city. The proposed model consists of two phases. The first phase relies on the intelligent process automation (IPA) technique and contains five modules named, specifically, dataset collection and pre-processing module, intelligent automation detection module, analysis module, detection rules and action module, and database module. In the first phase, each module composes an intelligent connecting module to give feedback reports about each module and send information to the next modules. Therefore, any change in each process can be easily detected and labeled as an intrusion. The intelligent connection module (ICM) may reduce the search time, increase the speed, and increase the security level. The second phase is the dynamic adaptation of the attack detection model based on reinforcement one-shot learning. The first phase is based on a multi-classification technique using Random Forest Trees (RFT), k-Nearest Neighbor (K-NN), J48, AdaBoost, and Bagging. The second phase can learn the new changed behaviors based on reinforced learning to detect zero-day attacks and malicious events in IoT-based smart cities. The experiments are implemented using a UNSW-NB 15 dataset. The proposed model achieves high accuracy rates using RFT, K-NN, and AdaBoost of approximately 98.8%. It is noted that the accuracy rate of the J48 classifier achieves 85.51%, which is lower than the others. Subsequently, the accuracy rates of AdaBoost and Bagging based on J48 are 98.9% and 91.41%, respectively. Additionally, the error rates of RFT, K-NN, and AdaBoost are very low. Similarly, the proposed model achieves high precision, recall, and F1-measure high rates using RFT, K-NN, AdaBoost, and Bagging. The second phase depends on creating an auto-adaptive model through the dynamic adaptation of the attack detection model based on reinforcement one-shot learning using a small number of instances to conserve the memory of any smart device in an IoT network. The proposed auto-adaptive model may reduce false rates of reporting by the intrusion detection system (IDS). It can detect any change in the behaviors of smart devices quickly and easily. The IADM can improve the performance rates for IDS by maintaining the memory consumption, time consumption, and speed of the detection process.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA