-
61
Container intrusion detection method based on host system call frequency
Published 2021-08-01“…Container technology has become a widely used virtualization technology in cloud platform due to its lightweight virtualization characteristics.However, it shares the kernel with the host, so it has poor security and isolation, and is vulnerable to flood, denial of service, and escape attacks.In order to effectively detect whether the container is attacked or not, an intrusion detection method based on host system call frequency was proposed.This method took advantage of the different frequency of system call between different attack behaviors, collected the system call generated when the container was running, extracted the system call features by combining the sliding window and TF-IDF algorithm, and classified by comparing the feature similarity.The experimental results show that the detection rate of this method can reach 97%, and the false alarm rate is less than 4%.…”
Get full text
Article -
62
Cooperative spectrum sensing algorithm based on limiting eigenvalue distribution
Published 2015-01-01“…A novel maximum-minimum eigenvalue (NMME) cooperative spectrum sensing algorithm and threshold decision rule are proposed via analyzing minimum eigenvalue limiting distribution of the covariance matrix of the received signals from multiple cognitive users (CU) by means of latest random matrix theory (RMT).The proposed scheme could not need the prior knowledge of the signal transmitted from primary user (PU) and could effectively overcome the noise uncertainty.At a given probability of false alarm (P<sub>fa</sub>),simulation results show that the proposed scheme can get lower decision threshold and higher probability of detection (P<sub>d</sub>) compared with the original algorithm,and it can also get better detection performance with fewer CU and smaller sample numbers.…”
Get full text
Article -
63
FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining
Published 2014-01-01“…The performance evaluation of the proposed model is done on UCSD Data Mining Contest 2009 Dataset (anonymous and imbalanced) and it is found that the proposed model has very high fraud detection rate, balanced classification rate, Matthews correlation coefficient, and very less false alarm rate than other state-of-the-art classifiers.…”
Get full text
Article -
64
Detection of sybil attacks based on periodic ultra wide band distance information in WSN
Published 2016-08-01“…Concerning the problem that wireless sensor network is vulnerable to many kinds of network attacks and compromise of nodes,a complete detecting system of sybil attack based on periodic ultra-bandwidth distance information was proposed.Firstly,the distance between the adjacent nodes was ranging and the hello data packet was exchanged.Then,the distance estimation form was constructed by local estimation,and the form was contained in each node.Meanwhile,multiple distance matching check was periodically executed for each node in the network.Finally,when there was the distance matching between the legitimate node at least two different nodes,it would give an alarm and discard the sybil nodes.If there was no distance matching,the node continued normal operations.IEEE 802.15.4 peer to peer sensor networks were adopted in the simulation experiments.Experimental results show that the proposed system not only can tolerate changes in the number of complicated sybil attacks,but also can successfully deal with the occurrence of complicated,malleable sybil attack.In addition,the probability of false alarm is very small,the entire network performance and its consistency are not affected.…”
Get full text
Article -
65
Fast Two-Step Energy Detection for Spectrum Sensing
Published 2015-01-01“…Moreover, under the constraint of constant false alarm, this paper optimizes the thresholds from maximizing detection probability point of view. …”
Get full text
Article -
66
Cognitive Radio Spectrum Sensing-Based QAM Technique Using Blockchain
Published 2023-01-01“…To address ambiguity, the M-ary QAM technique is provided, which increases aggregate effectiveness in terms of the percentage of false alarm (Pf) and probability of missed detection (Pm) by 5% at a comparable delay period. …”
Get full text
Article -
67
Research on Application of the Feature Transfer Method Based on Fast R-CNN in Smoke Image Recognition
Published 2021-01-01“…Experimental results show that this method not only improves the detection accuracy but also effectively reduces the false alarm rate. It can not only meet the real time and accuracy of fire detection but also realize effective fire detection. …”
Get full text
Article -
68
Ship Detection in High-Resolution Dual-Polarization SAR Amplitude Images
Published 2013-01-01“…A constant false alarm rate (CFAR) detecting method for ships in high-resolution dual-polarization synthetic aperture radar (SAR) amplitude images has been proposed in this paper. …”
Get full text
Article -
69
Covariance matrix opportunistic cooperative spectrum sensing of high detection probability
Published 2019-01-01“…The relationship between the false alarm probability and the threshold of the new algorithm was also analyzed, and the analytic detection probability was deduced for the actualization of the more accurate spectrum sensing detection. …”
Get full text
Article -
70
Research on intrusion response strategy based on static Bayesian game in mobile edge computing network
Published 2023-02-01“…In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion detection network structure suitable for mobile edge computing environment was proposed and an intrusion response decision model based on static Bayesian game was established to simulate the network interaction behavior between edge nodes and external intruders.The probability of attackers and defenders in the game process was predicted respectively.The influence of the system resource, the cost of intrusion response, the detection rate and false alarm rate were considered comprehensively by the intrusion response decision model.The response decision of the intrusion detection system was optimized on the basis of the considering both resource consumption of the intrusion detection and the privacy protection of the edge nodes.The factors that affected the decision-making of intrusion response were analyzed, and the experimental basis for the specific application was provided.…”
Get full text
Article -
71
Low complexity acquisition algorithm for GPS signals with low SNR and high dynamic
Published 2015-03-01“…Last, the maximum correlation value was sent to a constant false alarm rate detector to de-termine whether the acquisition was success. …”
Get full text
Article -
72
Design and performance analysis of energy efficiency based CR primary user emulation attack defensive scheme
Published 2017-08-01“…Energy efficiency based PUEA defensive scheme was investigated with performance analysis.In this scheme,CSS energy efficiency was constructed as the optimum objective in the presence of PUEA with secure detection probability and false alarm probability threshold as the constraint conditions.Secure CSS model and PUEA defensive scheme were proposed to achieve energy efficiency based secure CSS.K-out-of-N criterion is set as global decision criterion in the scheme.Optimal fusion threshold K and optimal cooperative SUs N can be determined in secure CSS with the guarantee of energy efficiency.Compared with the traditional maximum ratio combining (MRC) fusion rule,the proposed PUEA defensive scheme not only guarantees system energy efficiency,but also improves system detection performance.Namely,the proposed scheme makes a trade-off between energy efficiency and detection performance in the presence of PUEA.The numerical simulation results show that the proposed strategy is not affected by the PUE interference power,and it has a high degree of persistence for PUEA attack.…”
Get full text
Article -
73
Spectrum sensing method based on residual dense network
Published 2021-12-01“…Aiming at the problem that the traditional spectrum sensing method based on convolutional neural network(CNN) did not make full use of image feature and the ability of extracting the image feature was limited by the shallow network structure, a spectrum sensing method based on the residual dense network (ResDenNet) was proposed.By adding dense connections in the traditional neural network, the information reuse of the image feature was achieved.Meanwhile, shortcut connections were employed at both ends of the dense unit to implement deeper network training.The spectrum sensing problem was transformed into the image binary classification problem.Firstly, the received signals were integrated into a matrix, which was normalized and transformed by gray level.The obtained gray level images were used as the input of the network.Then, the network was trained through dense learning and residual learning.Finally, the online data was input into the ResDenNet and spectrum sensing was implemented based on image classification.The numerical experiments show that the proposed method is superior to the traditional ones in terms of performance.When the SNR is as low as -19 dB, the detection probability of the proposed method is still high up to 0.96 with a low false alarm probability of 0.1, while a better generalization ability is displayed.…”
Get full text
Article -
74
Spectrum Sensing in Very Low SNR Environment Using Multi-Scale Temporal Correlation Perception with Residual Attention
Published 2025-01-01“…The analysis of the ROC curve indicates that at an SNR of -20 dB, the proposed MSTC-PANet achieves a detection rate of 98% with a false alarm rate of 10%. Furthermore, MSTC-PANet, which has been trained using digital modulation techniques, also demonstrates applicability to analog modulation.…”
Get full text
Article -
75
Multiple Dependent State Sampling-Based Chart Using Belief Statistic under Neutrosophic Statistics
Published 2020-01-01“…The coefficients of the control chart and the neutrosophic average run lengths have been estimated for specific false alarm probabilities under various process conditions. …”
Get full text
Article -
76
Blind detection for image steganography using short du ate codes statistical model for Hilbert scanning sequences
Published 2013-01-01“…By analyzing and proving the correlation between the detection capability of a short duplicate code statistical feature and the probability of cumulating short duplicate codes、the dimension of short duplicate codes,a method to improving the detection capability of a short duplicate code statistical feature was found.Then,a blind detection method for image steganography using short duplicate codes statistical model for Hilbert scanning sequences was proposed.The proposed method used Poisson distribution test to detect the stego-message based on the statistical feature of short duplicate code with same elements in LSB Hilbert scanning sequences.So,the proposed method could make full use of Hilbert curve to maintain the good properties of local correlation,and could not only use the correlation of adjacent elements,but also use the correlation of elements in local regions.Theoretical lysis and experiments show that the proposed method can effectively improve the detection rate under the condition of effectively controlling the false alarm rate.…”
Get full text
Article -
77
Exploiting Optimal Threshold for Decision Fusion in Wireless Sensor Networks
Published 2014-02-01“…The optimal local thresholds and global threshold are derived by using the Minimax criterion based analysis while they are ensuring false alarm rate constraint, without a preestimated target appearance probability. …”
Get full text
Article -
78
Multi scale power spectral density subband gradient-based spectrum sensing algorithm and performance analysis
Published 2016-02-01“…Theoretically expressions of statistical properties, false alarm probability, detection probability and decision threshold in different channels were deduced. …”
Get full text
Article -
79
Fine C/A code acquisition algorithm for weak GPS signal based on averaging correlation and differential coherent accumulation
Published 2015-05-01“…Aiming at the problem of global positioning system (GPS) C/A code acquisition under weak signal conditions,a code acquisition algorithm based on averaging correlation and differential coherent accumulation was proposed.First,the strength ratio of the largest peak to the second largest peak was adopted as the decision variable; optimum decision thresholds can be obtained through the simulation probability of false alarm of all kinds of acquisition algorithms.Second,by setting the decision threshold,the probabilities of detection of different Doppler frequency deviation and signal to noise ratio (SNR) were obtained.Finally,acquisition sensitivities of the code acquisition algorithm based on the differen-tial coherent accumulation were compared with those of the code acquisition algorithm based on coherent and noncoher-ent accumulation and the code acquisition algorithm based on noncoherent accumulation.Simulation results show that acquisition sensitivities of the code acquisition algorithm based on the differential coherent accumulation are improved by about 2.0 dB than those of the other two acquisition algorithms under the same receiving data length condition.…”
Get full text
Article -
80
RESEARCH ON TECHNIQUES TO ENHANCE DDoS ATTACK PREVENTION USING CUMULATIVE SUM AND BACKPROPAGATION ALGORITHMS
Published 2024-12-01“…Second, Backpropagation enables the system to improve automatically over time, reducing false alarm rates and enhancing prevention effectiveness. …”
Get full text
Article