| تعداد نشریات | 31 |
| تعداد شمارهها | 834 |
| تعداد مقالات | 8,015 |
| تعداد مشاهده مقاله | 14,852,479 |
| تعداد دریافت فایل اصل مقاله | 9,586,505 |
Enhance Data Security with Efficient Anomaly Detection in a Real Network Environment | ||
| Iranian Journal of Fuzzy Systems | ||
| دوره 22، شماره 6، بهمن و اسفند 2025، صفحه 1-20 اصل مقاله (1.73 M) | ||
| نوع مقاله: Research Paper | ||
| شناسه دیجیتال (DOI): 10.22111/ijfs.2025.49590.8748 | ||
| نویسندگان | ||
| Priyadharshini M* ؛ B. Vanathi | ||
| SRM Valliammai Engineering College | ||
| چکیده | ||
| Security in share markets is essential to affirm the integrity, stability, and trust of financial transactions, protecting investors from fraud and cyber threats. Current methods face challenges in high-volume attacks due to their scalability and static rule-based mechanisms. To resolve these issues, this paper develops a Hybrid Isolated Fuzzy Logic to detect anomalies in transactions. The Fuzzy Logic System with the Zebra Optimization Algorithm is utilized to enhance the attack detection accuracy. The isolation forest algorithm computes the threshold abnormal score to distinguish the normal from the malicious transactions. The Reinforcement Learning-based Proximal Policy Optimization algorithm dynamically updates network policies. The Network Function Virtualization for Distributed Denial-of-Service Scrubbing is combined to improve scalability and deliver cost-effective mitigation. The experimental analysis utilizing stock anomaly detection datasets is conducted. The experimental outcomes affirm that the proposed model attains an accuracy of 98.90%, a false positive rate of 2.9%, and improved mitigation efficiency than existing methods. | ||
| کلیدواژهها | ||
| Software Defined Networking؛ Fuzzy Logic System؛ Zebra Optimization Algorithm؛ Reinforcement Learning؛ Proximal Policy Optimization | ||
| مراجع | ||
|
[1] M. Abdallah, N. An Le Khac, H. Jahromi, A. Delia Jurcut, A hybrid CNN-LSTM based approach for anomaly detection systems in SDNs, In Proceedings of the 16th International Conference on Availability, Reliability and Security, (2021), 1-7. https://doi.org/10.1145/3465481.3469190 [2] M. G. Abdolrasol, A. Ayob, A. H. Mutlag, T. S. Ustun, Optimal fuzzy logic controller based PSO for photovoltaic system, Energy Reports, 9 (2023), 427-434. https://doi.org/10.1016/j.egyr.2022.11.039 [3] M. Alonso, H. Amaris, D. Martin, A. de la Escalera, Proximal policy optimization for energy management of electric vehicles and PV storage units, Energies, 16(15) (2023), 5689. https://doi.org/10.3390/en16155689 [4] H. Chen, P. Chen, B. Wang, X. Yu, X. Chen, D. Ma, Z. Zheng, Graph neural network based robust anomaly detection at service level in SDN driven microservice system, Computer Networks, 239 (2024), 110135. https: //doi.\org/10.1016/j.comnet.2023.110135 [5] L. Chen, Z. Wang, R. Huo, T. Huang, An adversarial DBN-LSTM method for detecting and defending against DDoS attacks in SDN environments, Algorithms, 16(4) (2023), 197. https://doi.org/10.3390/a16040197 [6] A. Dadhania, P. Dave, J. Bhatia, R. Mehta, M. Kumhar, S. Tanwar, A. Alabdulatif, Software defined network and graph neural network-based anomaly detection scheme for high speed networks, Cyber Security and Applications, 3 (2025), 100079. https://doi.org/10.1016/j.csa.2024.100079 [7] M. Dom´ınguez-Dorado, J. Calle-Cancho, J. Galeano-Brajones, F. J. Rodr´ıguez-P´ere, D. Cort´es-Polo, Detection and mitigation of security threats using virtualized network functions in software-defined networks, Applied Sciences, 14(1) (2023), 374. https://doi.org/10.3390/app14010374 [8] Z. Elgamal, A. Q. M. Sabri, M. Tubishat, D. Tbaishat, S. N. Makhadmeh, O. A. Alomari, Improved reptile search optimization algorithm using chaotic map and simulated annealing for feature selection in medical field, IEEE Access, 10 (2022), 51428-51446. https://doi.org/10.1109/ACCESS.2022.3174854 [9] R. Guo, X. Zhu, T. Liu, Automatic detection of crop lodging from multitemporal satellite data based on the isolation forest algorithm, Computers and Electronics in Agriculture, 215 (2023), 108415. https://doi.org/10.1016/j. compag.2023.108415 [10] A. Hirsi, M. A. Alhartomi, L. Audah, A. Salh, N. Bin Mad Sahar, S. Ahmed, G. O. Ansa, A. Farah, Comprehensive analysis of ddos anomaly detection in software-defined networks, IEEE Access, (2025). https://doi.org/10.1109/ ACCESS.2025.3535943 [11] T. Jafarian, M. Masdari, A. Ghaffari, K. Majidzadeh, SADM-SDNC: Security anomaly detection and mitigation in software-defined networking using C-support vector classification, Computing, 103(4) (2021), 641-673. https: //doi.org/10.1007/s00607-020-00866-x [12] S. Jiang, L. Yang, X. Gao, Y. Zhou, T. Feng, Y. Song, K. Liu, G. Cheng, BSD-Guard: A collaborative blockchainbased approach for detection and mitigation of SDN-Targeted DDoS attacks, Security and Communication Networks, 2022(1) (2022), 1608689. https://doi.org/10.1155/2022/1608689 [13] A. V. Kachavimath, D. G. Narayan, A hybrid deep learning model with consensus-based feature selection for DDoS attacks detection in SDN, Procedia Computer Science, 252 (2025), 643-652. https://doi.org/10.1016/j.procs. 2025.01.024 [14] Y. Medjadba, H. Drid, M. Rahouti, Intrusion detection in software-defined networking using hybrid Bayesian model averaging for reliable uncertainty quantification, Computer Networks, (2025), 111436. https://doi.org/10.1016/ j.comnet.2025.111436 [15] A. A. Najar, S. M. Naik, Cyber-secure SDN: A CNN-based approach for efficient detection and mitigation of DDoS attacks, Computers and Security, 139 (2024), 103716. https://doi.org/10.1016/j.cose.2024.103716 [16] T. Park, Enhancing anomaly detection in financial markets with an llm-based multi-agent framework, arXiv preprint arXiv:2403.19735, (2024). https://doi.org/10.48550/arXiv.2403.19735 [17] C. Pazhanimuthu, G. Saravanan, K. P. Suresh, R. S. Kumar, Performance analysis of voltage profile improvement in AVR system using zebra optimization algorithms based on PID controller, e-Prime-Advances in Electrical Engineering, Electronics and Energy, 6 (2023), 100380. https://doi.org/10.1016/j.prime.2023.100380 [18] L. Praharaj, D. Gupta, M. Gupta, Efficient federated transfer learning-based network anomaly detection for cooperative smart farming infrastructure, Smart Agricultural Technology, 10 (2025), 100727. https://doi.org/10. 101\6/j.atech.2024.100727 [19] M. Shariatzadeh, M. J. Rostami, M. Eftekhari, An adaptive image encryption scheme guided by fuzzy models, Iranian Journal of Fuzzy Systems, 21 (2022), 1-8. https://doi.org/10.22111/ijfs.2023.44875.7915 [20] K. Wang, Y. Fu, X. Duan, T. Liu, Detection and mitigation of DDoS attacks based on multi-dimensional characteristics in SDN, Scientific Reports, 14(1) (2024), 16421. https://doi.org/10.1038/s41598-024-66907-z [21] K. Wang, Y. Fu, X. Duan, T. Liu, J. Xu, Abnormal traffic detection system in SDN based on deep learning hybrid models, Computer Communications, 216 (2024), 183-194. https://doi.org/10.1016/j.comcom.2023.12.041 [22] J. Wang, L. Wang, SDN-Defend: A lightweight online attack detection and mitigation system for DDoS attacks in SDN, Sensors, 22(21) (2022), 8287. https://doi.org/10.3390/s22218287 [23] X. Wang, H. Wang, B. Bhandari, L. Cheng, AI-empowered methods for smart energy consumption: A review of load forecasting, anomaly detection and demand response, International Journal of Precision Engineering and Manufacturing-Green Technology, 11(3) (2024), 963-993. https://doi.org/10.1007/s40684-023-00537-0 [24] W. Yang, Y. Shan, J. Wang, Y. Yao, An industrial network intrusion detection algorithm based on IGWO-GRU, Cluster Computing, 27(6) (2024), 7199-7217. [25] M. Yue, H. Yan, R. Han, Z. Wu, A DDoS attack detection method based on IQR and DFFCNN in SDN, Journal of Network and Computer Applications, (2025), 104203. https://doi.org/10.1016/j.jnca.2025.104203 [26] S. Zavrak, M. Iskefiyeli, Flow-based intrusion detection on software-defined networks: A multivariate time series anomaly detection approach, Neural Computing and Applications, 35(16) (2023), 12175-12193. https://doi.org/ 10\.1007/s00521-023-08376-5 [27] Z. Zulfiqar, S. U. Malik, S. A. Moqurrab, Z. Zulfiqar, U. Yaseen, G. Srivastava, DeepDetect: An innovative hybrid deep learning framework for anomaly detection in IoT networks, Journal of Computational Science, 83 (2024), 102426. https://doi.org/10.1016/j.jocs.2024.102426 | ||
|
آمار تعداد مشاهده مقاله: 473 تعداد دریافت فایل اصل مقاله: 531 |
||