8,584 Hits in 5.0 sec

Security Service Function Chain Based on Graph Neural Network

Wei Li, Haomin Wang, Xiaoliang Zhang, Dingding Li, Lijing Yan, Qi Fan, Yuan Jiang, Ruoyu Yao
2022 Information  
using graph neural network.  ...  Building a security service function chain (SSFC) makes the deployment of security service functions more dynamic and scalable.  ...  In the SDN environment, this paper proposes a security service function chain construction model based on the graph neural network.  ... 
doi:10.3390/info13020078 fatcat:w6jvbhqomrcj3afroltoew47ky

ISCC 2020 Keyword Index

2020 2020 IEEE Symposium on Computers and Communications (ISCC)  
algorithm Genetic Algorithm Glaucoma Gossip GPU Grammatical Evolution Graph Convolutional Network Graph Neural Networks grey model group key management guaranteed based approach hardware/software  ...  Multi-party Computation Security security security advisory security automation security network functions Self-monitoring self-similarity Self-Sovereign Identity Semantic-based Content Naming  ... 
doi:10.1109/iscc50000.2020.9219679 fatcat:al6gjafwwneo5g5paprquzp7n4

Table of Contents

2022 IEEE Transactions on Network and Service Management  
Pragati Shrivastava and Kotaro Kataoka 510 Virtualized Network Function Forwarding Graph Placing in SDN and NFV-Enabled IoT Networks: A Graph Neural Network Assisted Deep Reinforcement Learning Method  ...  Mengfei Zhu, Fujun He, and Eiji Oki 452 Management of Softwarized Networks AI-Based Network-Aware Service Function Chain Migration in 5G and Beyond Networks . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/tnsm.2022.3155940 fatcat:fpvw5yly6nfdrjmct2wtirfuj4

Data science and AI in FinTech: An overview [article]

Longbing Cao, Qiang Yang, Philip S. Yu
2021 arXiv   pre-print
Smart FinTech synthesizes broad DSAI and transforms finance and economies to drive intelligent, automated, whole-of-business and personalized economic and financial businesses, services and systems.  ...  The research on data science and AI in FinTech involves many latest progress made in smart FinTech for BankingTech, TradeTech, LendTech, InsurTech, WealthTech, PayTech, RiskTech, cryptocurrencies, and  ...  -Network analysis: including social media-based networks by social network and social media analyses; cryptocurrency and blockchain networks by graph theories; mobile phone calls-based networks by node  ... 
arXiv:2007.12681v2 fatcat:jntzuwaktjg2hmmjypi5lvyht4

Development of module for neural network identification of attacks on applications and services in multi-cloud platforms

D I Parfenov, I P Bolodurina
2018 Journal of Physics, Conference Series  
The proposed approach is based on the combination of two technologies: a softwareconfigurable network and virtualization of network functions.  ...  The approach for searching for anomalous traffic is to use a hybrid neural network consisting of a self-organizing Kohonen network and a multilayer perceptron.  ...  The solution is based on the introduction of a security plane between the switches and the network controller.  ... 
doi:10.1088/1742-6596/1015/5/052024 fatcat:2bqs4jswvnc6bhb5dyzfzcxnbi

Distributed Denial of Service Detection using Multi Layered Feed Forward Artificial Neural Network

Ismaila Idris, Obi Blessing Fabian, Shafi'i M. Abdulhamid, Morufu Olalere, Baba Meshach
2017 International Journal of Computer Network and Information Security  
Most of the services it affects are online applications and procedures, system and network performance, emails and other system resources.  ...  One of the dangers faced by various organizations and institutions operating in the cyberspace is Distributed Denial of Service (DDoS) attacks; it is carried out through the internet.  ...  ACKNOWLEDGEMENTS The authors would like to acknowledge and appreciate the Department of Cyber Security, Federal University of Technology, Minna, Nigeria for their support. Computing  ... 
doi:10.5815/ijcnis.2017.12.04 fatcat:73apkhjhijfhrfaro6c2o435kq

Dynamic Optimization of Government Data Transmission Based on Blockchain Technology

Sheng Peng, Linkai Zhu, Zhiming Cai, Wenjian Liu, Chunjiang He, Weikang Tang, Fazlullah Khan
2021 Mobile Information Systems  
On this basis, taking the Industrial Internet of Things as the research object, a blockchain-based data transmission optimization method was established.  ...  First, an undirected complete graph model is used to describe the network scene. A matrix grid model is used to replace the randomly distributed set of data nodes.  ...  It establishes an energy consumption model through graph theory analysis and refines and models dual data transmission optimization problems. e proposed design is based on an artificial neural network  ... 
doi:10.1155/2021/8948323 fatcat:rppiosihkndprj6l25l3dkhucm

CGNN: Traffic Classification with Graph Neural Network [article]

Bo Pang, Yongquan Fu, Siyuan Ren, Ye Wang, Qing Liao, Yan Jia
2021 arXiv   pre-print
Next, we propose CGNN, a graph neural network based traffic classification method, which builds a graph classifier over automatically extracted features over the chained graph.  ...  In this paper, we present a chained graph model on the packet stream to keep the chained compositional sequence.  ...  on this chained graph model based on a novel graph neural network model to significantly improve the prediction performance.  ... 
arXiv:2110.09726v1 fatcat:mbwowwvsl5fz5h4qdh3242y47u

Methodology for Management of the Protection System of Smart Power Supply Networks in the Context of Cyberattacks

Igor Kotenko, Igor Saenko, Oleg Lauta, Mikhail Karpov
2021 Energies  
It is based on the specification of the protection system by using flat graphs and implementing a neural network with long short-term memory, which makes it possible to predict with a high degree of accuracy  ...  This paper examines an approach that allows one to build an efficient system for protecting the information resources of smart power supply networks from cyberattacks based on the use of graph models and  ...  It is based on the specification of the SG protection system by using flat graphs and implementing a neural network with long short-term memory.  ... 
doi:10.3390/en14185963 fatcat:rxiiel6otfd4jdriwawwjtszli

Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT

Kashif Hameed, Imran Sarwar Bajwa, Nadeem Sarwar, Waheed Anwar, Zaigham Mushtaq, Tayyaba Rashid, B. B. Gupta
2021 Journal of Healthcare Engineering  
In this paper, we proposed an IoT with a cloud-based clinical decision support system for prediction and observation of disease with its severity level with the integration of 5G services and block-chain  ...  The trained Neural Network predicts and intelligently shows the results with more accuracy than other classifiers.  ...  (ii) Service-based A service-based interface of the CDSS provides data ideally as XML back to the sensorbased application for it to process the output on its own.  ... 
doi:10.1155/2021/8814364 pmid:33824715 pmcid:PMC8007349 fatcat:flmlxfpdwjdzbf62ubafljty2q

Artificial Intelligence as a Services (AI-aaS) on Software-Defined Infrastructure [article]

Saeedeh Parsaeefard, Iman Tabrizian, Alberto Leon-Garcia
2019 arXiv   pre-print
Each application is composed as one or more specific service chains embedded in SDI, some of which will include a Machine Learning (ML) pipeline.  ...  This paper investigates a paradigm for offering artificial intelligence as a service (AI-aaS) on software-defined infrastructures (SDIs).  ...  We consider offering MKLs as a new service over SDIs which we refer to as AI as a service (AI-aaS). We refer to each graph of MKL functions as an MKL-chain.  ... 
arXiv:1907.05505v1 fatcat:q5dm2rd4dzhr3id7aits5wlb6u

Blockchain abnormal behavior awareness methods: a survey

Chuyi Yan, Chen Zhang, Zhigang Lu, Zehui Wang, Yuling Liu, Baoxu Liu
2022 Cybersecurity  
AbstractWith the wide application and development of blockchain technology in various fields such as finance, government affairs and medical care, security incidents occur frequently on it, which brings  ...  Many researchers have worked on blockchain abnormal behavior awareness in respond to these threats.  ...  The awareness methods on the public blockchain (generally, the awareness methods based on machine learning, graph neural network and association relationship can be used) can still be used on the consortium  ... 
doi:10.1186/s42400-021-00107-4 fatcat:vbkq4qx3zbfmxjrms52sygva3i

Guest Editorial: Special Issue on Data Analytics and Machine Learning for Network and Service Management—Part II

Nur Zincir-Heywood, Giuliano Casale, David Carrera, Lydia Y. Chen, Amogh Dhamdhere, Takeru Inoue, Hanan Lutfiyya, Taghrid Samak
2021 IEEE Transactions on Network and Service Management  
[item 14) in the Appendix] explore online service function chain provisioning in inter-datacenter elastic optical networks.  ...  In "Deep-FDA: Using Functional Data Analysis and Neural Networks to Characterize Network Services Time Series," Perdices et al.  ... 
doi:10.1109/tnsm.2021.3058742 fatcat:b6lx4i75krcovcqereinvjf6mu

Big Data and Knowledge Extraction for Cyber-Physical Systems

Xiuzhen Cheng, Yunchuan Sun, Antonio Jara, Houbing Song, Yingjie Tian
2015 International Journal of Distributed Sensor Networks  
-value optimization algorithm is put forward based on a distance cost function to find the optimal -values.  ...  The privacy issues are classified into four security categories by PISC, and each category has its own security goal. The paper "A Novel Dynamic Weight Neural Network Ensemble Model" by K.  ... 
doi:10.1155/2015/231527 fatcat:qsobptejnfbrteagyzr2xkebea

On Moving Target Techniques for Network Defense Security

Shouq Mohsen Alnemari, Sabah M Alzahrani
2021 International journal of recent technology and engineering  
The traditional technologies, tools and procedures of any network cannot be protected from attackers due to the unchanged services and configurations of the networks.  ...  A software Defined Networking based scalable moving target defense solution [38] prepares utilization of based on offensive graph approach to execute the security appraisal of large-scale networks.  ...  In this study [31] the authors proposed a moving target defense framework based on deep neural networks that raise the safety and strength of deep neural network against hostile attacks.  ... 
doi:10.35940/ijrte.e5111.019521 fatcat:stts5i22abfvzpcf3cawvjvpmy
« Previous Showing results 1 — 15 out of 8,584 results