期刊文献+
共找到1,260篇文章
< 1 2 63 >
每页显示 20 50 100
论抗辩与抗辩权 被引量:34
1
作者 杨立新 刘宗胜 《河北法学》 CSSCI 2004年第10期6-12,共7页
抗辩权包含在抗辩之中。抗辩权乃专指对抗他人请求权行使的权利。抗辩权具有永久性、无被侵害可能性、不可单独让与性、无相对义务观念性等四个特征。抗辩和抗辩权之间、抗辩和反诉及否认和反驳之间,都存在着明显的区别。
关键词 抗辩 抗辩权 反诉 民法 当事人
下载PDF
证明责任视角下的抗辩与否认界别 被引量:37
2
作者 袁琳 《现代法学》 CSSCI 北大核心 2016年第6期184-193,共10页
抗辩与否认的根本差异在于对请求原因事实的攻击路径:抗辩排斥请求原因事实发生的法律效果,承认请求原因事实的客观存在;否认直接排斥请求原因事实本身。在结果意义上的证明责任层面,以上本质差异填补了"抗辩者承担证明责任,否认... 抗辩与否认的根本差异在于对请求原因事实的攻击路径:抗辩排斥请求原因事实发生的法律效果,承认请求原因事实的客观存在;否认直接排斥请求原因事实本身。在结果意义上的证明责任层面,以上本质差异填补了"抗辩者承担证明责任,否认者不承担"的论证缺口。进而可知,《最高人民法院关于审理民间借贷案件适用法律若干问题的规定》第17条中的"被告辩称"的性质是积极否认,被告不对该事实主张负担结果意义上的证明责任。在行为意义上的证明责任层面,结合规范意旨以及民间借贷案件事实认定具有相当难度的客观现实,应遵从被告举证在先、原告举证在后的顺位,施以被告事案解明义务,以促进确定争点、发现事实、克服真伪不明。 展开更多
关键词 抗辩 否认 证明责任 要件事实 事案解明义务
下载PDF
上市公司传闻的澄清效果研究——来自中国证券市场的证据 被引量:36
3
作者 刘春林 张宁 《管理科学学报》 CSSCI 北大核心 2012年第5期42-54,共13页
发布澄清公告是上市公司应对市场传闻的重要途径.然而,证券市场中澄清公告的实际效果如何,以及哪些因素会影响澄清效果尚未得到实证检验.为此,收集了从2000年到2008年中国A股市场1 960个澄清公告,从中整理出179个针对负面传闻进行"... 发布澄清公告是上市公司应对市场传闻的重要途径.然而,证券市场中澄清公告的实际效果如何,以及哪些因素会影响澄清效果尚未得到实证检验.为此,收集了从2000年到2008年中国A股市场1 960个澄清公告,从中整理出179个针对负面传闻进行"澄清"的样本.研究发现,澄清公告效果一定程度上依赖于公司的澄清方式,模糊澄清非但达不到效果,而且进一步加剧了传闻的影响,产生"澄清公告澄不清"的现象.多元回归模型的结果显示,澄清效果不仅与澄清方式有显著关系,而且还受到公司声誉、停牌等因素的影响.研究结论为传闻心理学实验研究的发现提供了中国证券市场的直接证据,同时也为上市公司有效应对传闻提供了新思路. 展开更多
关键词 传闻 澄清公告 上市公司 否认 公司声誉
下载PDF
灌输式教育:从怀疑、批判到否定——20世纪西方教育的最大变化 被引量:25
4
作者 郭法奇 《比较教育研究》 CSSCI 北大核心 2004年第11期57-61,共5页
灌输式教育曾经是西方教育中最有影响的教育方式之一。20世纪以来,西方教育的最大变化就是对灌输式教育的彻底否定。这一过程极大地促进了现代西方教育观念的转变,推动了西方教育进入新的发展阶段。目前,中国教育仍然可以看到灌输式教... 灌输式教育曾经是西方教育中最有影响的教育方式之一。20世纪以来,西方教育的最大变化就是对灌输式教育的彻底否定。这一过程极大地促进了现代西方教育观念的转变,推动了西方教育进入新的发展阶段。目前,中国教育仍然可以看到灌输式教育的影响。中国教育改革应当从西方教育家否定灌输式教育的历史过程中进行反思,实现真正的转变。 展开更多
关键词 讲授 灌输 批判 否定
下载PDF
基于两种信任违背类型的信任修复策略研究 被引量:22
5
作者 韩平 宁吉 《管理学报》 CSSCI 北大核心 2013年第3期390-396,共7页
在以往研究的基础上,修订了现有的人际信任修复问卷,对企业内人际信任修复策略进行实证研究。研究结果表明,对于能力型信任违背,道歉、道歉加承诺要比否认和否认加承诺的信任修复效果好;对于能力型信任违背,道歉加承诺要比单纯道歉的信... 在以往研究的基础上,修订了现有的人际信任修复问卷,对企业内人际信任修复策略进行实证研究。研究结果表明,对于能力型信任违背,道歉、道歉加承诺要比否认和否认加承诺的信任修复效果好;对于能力型信任违背,道歉加承诺要比单纯道歉的信任修复效果好;对于正直型信任违背,道歉加承诺要比否认和否认加承诺的信任修复效果好。 展开更多
关键词 人际信任 人际信任修复 道歉 否认 承诺
下载PDF
反情报措施研究 被引量:14
6
作者 高金虎 《保密科学技术》 2014年第6期4-9,共6页
反情报是一种特殊类型的情报活动,是情报工作的组成部分。从广义而言,反情报是指为保卫本国(包括其自身与情报相关的活动)免受敌方情报机构所害而搜集和分析的信息,以及为此目的而开展的行动。从狭义而言,反情报通常专指防备对方获取对... 反情报是一种特殊类型的情报活动,是情报工作的组成部分。从广义而言,反情报是指为保卫本国(包括其自身与情报相关的活动)免受敌方情报机构所害而搜集和分析的信息,以及为此目的而开展的行动。从狭义而言,反情报通常专指防备对方获取对其有利的知识的行动。所有的反情报措施,都可以归结为三类。 展开更多
关键词 双重间谍 联邦调查局 间谍活动 物理安全 苏联人 通信安全 denial 美国海军 测谎器 电子打字
原文传递
DDoS Attack Detection Scheme Based on Entropy and PSO-BP Neural Network in SDN 被引量:8
7
作者 Zhenpeng Liu Yupeng He +1 位作者 Wensheng Wang Bin Zhang 《China Communications》 SCIE CSCD 2019年第7期144-155,共12页
SDN (Software Defined Network) has many security problems, and DDoS attack is undoubtedly the most serious harm to SDN architecture network. How to accurately and effectively detect DDoS attacks has always been a diff... SDN (Software Defined Network) has many security problems, and DDoS attack is undoubtedly the most serious harm to SDN architecture network. How to accurately and effectively detect DDoS attacks has always been a difficult point and focus of SDN security research. Based on the characteristics of SDN, a DDoS attack detection method combining generalized entropy and PSOBP neural network is proposed. The traffic is pre-detected by the generalized entropy method deployed on the switch, and the detection result is divided into normal and abnormal. Locate the switch that issued the abnormal alarm. The controller uses the PSO-BP neural network to detect whether a DDoS attack occurs by further extracting the flow features of the abnormal switch. Experiments show that compared with other methods, the detection accurate rate is guaranteed while the CPU load of the controller is reduced, and the detection capability is better. 展开更多
关键词 software-defined NETWORKING distributed denial of service ATTACKS generalized information ENTROPY particle SWARM optimization back propagation neural network ATTACK detection
下载PDF
Cyberattack Ramifications, The Hidden Cost of a Security Breach
8
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期87-105,共19页
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ... In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain. 展开更多
关键词 Artificial Intelligence (AI) Business Continuity Case Studies Copyright Cost-Benefit Analysis Credit Rating Cyberwarfare Cybersecurity Breaches Data Breaches denial Of Service (DOS) Devaluation Of Trade Name Disaster Recovery Distributed denial of Service (DDOS) Identity Theft Increased Cost to Raise Debt Insurance Premium Intellectual Property Operational Disruption Patent Post-Breach Customer Protection Recovery Point Objective (RPO) Recovery Time Objective (RTO) Regulatory Compliance Risk Assessment Service Level Agreement Stuxnet Trade Secret
下载PDF
Optimization of Stealthwatch Network Security System for the Detection and Mitigation of Distributed Denial of Service (DDoS) Attack: Application to Smart Grid System
9
作者 Emmanuel S. Kolawole Penrose S. Cofie +4 位作者 John H. Fuller Cajetan M. Akujuobi Emmanuel A. Dada Justin F. Foreman Pamela H. Obiomon 《Communications and Network》 2024年第3期108-134,共27页
The Smart Grid is an enhancement of the traditional grid system and employs new technologies and sophisticated communication techniques for electrical power transmission and distribution. The Smart Grid’s communicati... The Smart Grid is an enhancement of the traditional grid system and employs new technologies and sophisticated communication techniques for electrical power transmission and distribution. The Smart Grid’s communication network shares information about status of its several integrated IEDs (Intelligent Electronic Devices). However, the IEDs connected throughout the Smart Grid, open opportunities for attackers to interfere with the communications and utilities resources or take clients’ private data. This development has introduced new cyber-security challenges for the Smart Grid and is a very concerning issue because of emerging cyber-threats and security incidents that have occurred recently all over the world. The purpose of this research is to detect and mitigate Distributed Denial of Service [DDoS] with application to the Electrical Smart Grid System by deploying an optimized Stealthwatch Secure Network analytics tool. In this paper, the DDoS attack in the Smart Grid communication networks was modeled using Stealthwatch tool. The simulated network consisted of Secure Network Analytic tools virtual machines (VMs), electrical Grid network communication topology, attackers and Target VMs. Finally, the experiments and simulations were performed, and the research results showed that Stealthwatch analytic tool is very effective in detecting and mitigating DDoS attacks in the Smart Grid System without causing any blackout or shutdown of any internal systems as compared to other tools such as GNS3, NeSSi2, NISST Framework, OMNeT++, INET Framework, ReaSE, NS2, NS3, M5 Simulator, OPNET, PLC & TIA Portal management Software which do not have the capability to do so. Also, using Stealthwatch tool to create a security baseline for Smart Grid environment, contributes to risk mitigation and sound security hygiene. 展开更多
关键词 Smart Grid System Distributed denial of Service (DDoS) Attack Intrusion Detection and Prevention Systems DETECTION Mitigation and Stealthwatch
下载PDF
Improving Resilience against DDoS Attack in Unstructured P2P Networks 被引量:6
10
作者 马新新 赵洋 秦志光 《Journal of Electronic Science and Technology of China》 2007年第1期18-22,28,共6页
In unstructured peer-to-peer (P2P) systems such as Gnutella, a general routing search algorithm is used to blindly flood a query through network among peers. But unfortunately, malicious nodes could easily make use ... In unstructured peer-to-peer (P2P) systems such as Gnutella, a general routing search algorithm is used to blindly flood a query through network among peers. But unfortunately, malicious nodes could easily make use of the search approach launching distributed denial of service (DDoS) attack which aims at the whole network. In order to alleviate or minimize the bad effect due to behavior of malicious nodes using the flooding search mechanism, the paper proposes a Markov-based evaluation model which exerts the trust and reputation mechanism to computing the level of trustworthy of nodes having the information requested by evaluation of the nodes' history behavior. Moreover, it can differentiate malicious nodes as early as possible for isolating and controlling the ones' message transmitted. The simulation results of the algorithm proposed show that it could effectively isolate malicious nodes, and hold back the transmission of vicious messages so that it could enhance tolerance of DDoS based on flooding in Guutella-like P2P network. 展开更多
关键词 TRUST REPUTATION distributed denial of service (DDoS) peer-to-peer (P2P)
下载PDF
The History, Trend, Types, and Mitigation of Distributed Denial of Service Attacks
11
作者 Richard Kabanda Bertrand Byera +1 位作者 Henrietta Emeka Khaja Taiyab Mohiuddin 《Journal of Information Security》 2023年第4期464-471,共8页
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor... Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat. 展开更多
关键词 DDoS (Distributed denial of Service Attacks) and DoS (denial of Service Attacks) DAC (DDoS Attack Coefficient) Flood SIEM (Security Information and Event Management) CISA (Cybersecurity and Infrastructure Security Agency) NIST (National Institute of Standards and Technology) XDR (Extended Detection and Response) ACK-SYN (Synchronize Acknowledge Packet) ICMP (Internet Control Message Protocol) Cyberwarfare
下载PDF
Flooding attack and defence in Ad hoc networks 被引量:5
12
作者 Yi Ping Hou Yafei +2 位作者 Zhong Yiping Zhang Shiyong Dai Zhoulin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期410-416,共7页
Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. T... Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called AA hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed AM hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a genetic defense against the AM hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the AM hoe Flooding attack efficiently. 展开更多
关键词 computer networks SECURITY mobile Ad hoe networks routing protocol denial of service Ad hoc flooding attack.
下载PDF
西方文论的有效性不应该否定——与张江教授商榷 被引量:7
13
作者 张玉能 《青岛科技大学学报(社会科学版)》 2016年第2期30-39,共10页
张江教授把西方文论的根本缺陷归结为"强制阐释",并以此怀疑西方文论的有效性。就其主观意愿而言,"强制阐释"论是为了反对文艺理论研究的全盘西化,提倡从中国文艺的实践出发来建构中国特色的当代文论,但是,由于从... 张江教授把西方文论的根本缺陷归结为"强制阐释",并以此怀疑西方文论的有效性。就其主观意愿而言,"强制阐释"论是为了反对文艺理论研究的全盘西化,提倡从中国文艺的实践出发来建构中国特色的当代文论,但是,由于从总体上否定了西方文论的有效性,在客观效果上势必会产生文化民族主义和形而上学方法的弊病。"强制阐释"是一种历史的必然,中国近现代文论的发展就是这种历史必然的结果,是中国文论的现代化的必经之路。张江教授所揭示的西方文论的"强制阐释"的话语特征,从本质上来看是西方文论的科学性、系统性、完整性的主要表征,也是中国古代文论传统的不足之处,可以作为中国当代文论建设的借鉴。西方文论包括西方古典文论、马克思主义文论、西方现代主义文论、后现代主义文论,西方文论不仅有科学主义思潮,还有人文主义思潮。中国当代文论建设必须以马克思主义文论为指导,以中国传统文论为基础,以西方文论为参照系。否定了西方文论的有效性,中国当代文论就不可能建构出科学、系统、完整的现代化文论体系。 展开更多
关键词 “强制阐释”论 西方文论 有效性 否定
下载PDF
引进公司法人格否认制度应注意的几个问题 被引量:3
14
作者 杨秋华 《河北法学》 CSSCI 2004年第4期112-113,152,共3页
公司法人格否认法理有其产生和发展的历史基础,但理论体系尚须完善。指出了公司法人格否认法理定义的缺陷,并论证了公司法人格否认法理的归责原则,试图完善该法理的法律处理问题,为我国引进公司人格否认法理作客观剖析。
关键词 公司法人格否认制度 公司法 归责原则 公司法 立法质量
下载PDF
Game-theoretical Model for Dynamic Defense Resource Allocation in Cyber-physical Power Systems Under Distributed Denial of Service Attacks 被引量:1
15
作者 Bingjing Yan Pengchao Yao +2 位作者 Tao Yang Boyang Zhou Qiang Yang 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2024年第1期41-51,共11页
Electric power grids are evolving into complex cyber-physical power systems(CPPSs)that integrate advanced information and communication technologies(ICTs)but face increasing cyberspace threats and attacks.This study c... Electric power grids are evolving into complex cyber-physical power systems(CPPSs)that integrate advanced information and communication technologies(ICTs)but face increasing cyberspace threats and attacks.This study considers CPPS cyberspace security under distributed denial of service(DDoS)attacks and proposes a nonzero-sum game-theoretical model with incomplete information for appropriate allocation of defense resources based on the availability of limited resources.Task time delay is applied to quantify the expected utility as CPPSs have high time requirements and incur massive damage DDoS attacks.Different resource allocation strategies are adopted by attackers and defenders under the three cases of attack-free,failed attack,and successful attack,which lead to a corresponding consumption of resources.A multidimensional node value analysis is designed to introduce physical and cybersecurity indices.Simulation experiments and numerical results demonstrate the effectiveness of the proposed model for the appropriate allocation of defense resources in CPPSs under limited resource availability. 展开更多
关键词 Game theory complex cyber-physical power system(CPPS) multidimensional evaluation distributed denial of service(DDoS)attack
原文传递
Detecting and Preventing of Attacks in Cloud Computing Using Hybrid Algorithm
16
作者 R.S.Aashmi T.Jaya 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期79-95,共17页
Cloud computing is the technology that is currently used to provide users with infrastructure,platform,and software services effectively.Under this system,Platform as a Service(PaaS)offers a medium headed for a web de... Cloud computing is the technology that is currently used to provide users with infrastructure,platform,and software services effectively.Under this system,Platform as a Service(PaaS)offers a medium headed for a web development platform that uniformly distributes the requests and resources.Hackers using Denial of service(DoS)and Distributed Denial of Service(DDoS)attacks abruptly interrupt these requests.Even though several existing methods like signature-based,statistical anomaly-based,and stateful protocol analysis are available,they are not sufficient enough to get rid of Denial of service(DoS)and Distributed Denial of Service(DDoS)attacks and hence there is a great need for a definite algorithm.Concerning this issue,we propose an improved hybrid algorithm which is a combination of Multivariate correlation analysis,Spearman coefficient,and mitigation technique.It can easily differentiate common traffic and attack traffic.Not only that,it greatly helps the network to distribute the resources only for authenticated requests.The effects of comparing with the normalized information have shown an extra encouraging detection accuracy of 99%for the numerous DoS attack as well as DDoS attacks. 展开更多
关键词 Hybrid algorithm(HA) distributed denial of service(DDoS) denial of service(DoS) platform as a service(PaaS) infrastructure as a service(IaaS) software as a service(SaaS)
下载PDF
A Hybrid DNN-RBFNN Model for Intrusion Detection System
17
作者 Wafula Maurice Oboya Anthony Waititu Gichuhi Anthony Wanjoya 《Journal of Data Analysis and Information Processing》 2023年第4期371-387,共17页
Intrusion Detection Systems (IDS) are pivotal in safeguarding computer networks from malicious activities. This study presents a novel approach by proposing a Hybrid Dense Neural Network-Radial Basis Function Neural N... Intrusion Detection Systems (IDS) are pivotal in safeguarding computer networks from malicious activities. This study presents a novel approach by proposing a Hybrid Dense Neural Network-Radial Basis Function Neural Network (DNN-RBFNN) architecture to enhance the accuracy and efficiency of IDS. The hybrid model synergizes the strengths of both dense learning and radial basis function networks, aiming to address the limitations of traditional IDS techniques in classifying packets that could result in Remote-to-local (R2L), Denial of Service (Dos), and User-to-root (U2R) intrusions. 展开更多
关键词 Dense Neural Network (DNN) Radial Basis Function Neural Network (RBFNN) Intrusion Detection System (IDS) denial of Service (DoS) Remote to Local (R2L) User-to-Root (U2R)
下载PDF
医患关系若干现象的思考 被引量:6
18
作者 颜婕 《医学与哲学(A)》 北大核心 2012年第9期55-57,共3页
我国医患关系由"互信、尊重、理解、接受"变化到近年来的多元化。"互信、尊重、理解、接受"依然是我国医患关系的主流,但亦出现了"猜疑、轻视、迷茫、否认"等现象。通过对近年来的不和谐医患关系现象的... 我国医患关系由"互信、尊重、理解、接受"变化到近年来的多元化。"互信、尊重、理解、接受"依然是我国医患关系的主流,但亦出现了"猜疑、轻视、迷茫、否认"等现象。通过对近年来的不和谐医患关系现象的分析描述,可知不和谐医患关系产生的原因为医学科学技术处于发展阶段的必然,我国卫生法制的相对滞后,国人固有的思维定势和科学知识思想的博弈。 展开更多
关键词 医患关系 猜疑 轻视 迷茫 否认
下载PDF
Threshold-Based Software-Defined Networking(SDN)Solution for Healthcare Systems against Intrusion Attacks
19
作者 Laila M.Halman Mohammed J.F.Alenazi 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1469-1483,共15页
The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are ... The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are widely used in healthcare systems,as they ensure effective resource utilization,safety,great network management,and monitoring.In this sector,due to the value of thedata,SDNs faceamajor challengeposed byawide range of attacks,such as distributed denial of service(DDoS)and probe attacks.These attacks reduce network performance,causing the degradation of different key performance indicators(KPIs)or,in the worst cases,a network failure which can threaten human lives.This can be significant,especially with the current expansion of portable healthcare that supports mobile and wireless devices for what is called mobile health,or m-health.In this study,we examine the effectiveness of using SDNs for defense against DDoS,as well as their effects on different network KPIs under various scenarios.We propose a threshold-based DDoS classifier(TBDC)technique to classify DDoS attacks in healthcare SDNs,aiming to block traffic considered a hazard in the form of a DDoS attack.We then evaluate the accuracy and performance of the proposed TBDC approach.Our technique shows outstanding performance,increasing the mean throughput by 190.3%,reducing the mean delay by 95%,and reducing packet loss by 99.7%relative to normal,with DDoS attack traffic. 展开更多
关键词 Network resilience network management attack prediction software defined networking(SDN) distributed denial of service(DDoS) healthcare
下载PDF
Adaptive Cloud Intrusion Detection System Based on Pruned Exact Linear Time Technique
20
作者 Widad Elbakri Maheyzah Md.Siraj +2 位作者 Bander Ali Saleh Al-rimy Sultan Noman Qasem Tawfik Al-Hadhrami 《Computers, Materials & Continua》 SCIE EI 2024年第6期3725-3756,共32页
Cloud computing environments,characterized by dynamic scaling,distributed architectures,and complex work-loads,are increasingly targeted by malicious actors.These threats encompass unauthorized access,data breaches,de... Cloud computing environments,characterized by dynamic scaling,distributed architectures,and complex work-loads,are increasingly targeted by malicious actors.These threats encompass unauthorized access,data breaches,denial-of-service attacks,and evolving malware variants.Traditional security solutions often struggle with the dynamic nature of cloud environments,highlighting the need for robust Adaptive Cloud Intrusion Detection Systems(CIDS).Existing adaptive CIDS solutions,while offering improved detection capabilities,often face limitations such as reliance on approximations for change point detection,hindering their precision in identifying anomalies.This can lead to missed attacks or an abundance of false alarms,impacting overall security effectiveness.To address these challenges,we propose ACIDS(Adaptive Cloud Intrusion Detection System)-PELT.This novel Adaptive CIDS framework leverages the Pruned Exact Linear Time(PELT)algorithm and a Support Vector Machine(SVM)for enhanced accuracy and efficiency.ACIDS-PELT comprises four key components:(1)Feature Selection:Utilizing a hybrid harmony search algorithm and the symmetrical uncertainty filter(HSO-SU)to identify the most relevant features that effectively differentiate between normal and anomalous network traffic in the cloud environment.(2)Surveillance:Employing the PELT algorithm to detect change points within the network traffic data,enabling the identification of anomalies and potential security threats with improved precision compared to existing approaches.(3)Training Set:Labeled network traffic data forms the training set used to train the SVM classifier to distinguish between normal and anomalous behaviour patterns.(4)Testing Set:The testing set evaluates ACIDS-PELT’s performance by measuring its accuracy,precision,and recall in detecting security threats within the cloud environment.We evaluate the performance of ACIDS-PELT using the NSL-KDD benchmark dataset.The results demonstrate that ACIDS-PELT outperforms existing cloud intrusion detection techni 展开更多
关键词 Adaptive cloud IDS harmony search distributed denial of service(DDoS) PELT machine learning SVM ISOTCID NSL-KDD
下载PDF
上一页 1 2 63 下一页 到第
使用帮助 返回顶部