Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (7)

Search Parameters:
Keywords = CIDDS

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 2595 KiB  
Article
Stratification of Gut Microbiota Profiling Based on Autism Neuropsychological Assessments
by Chiara Marangelo, Pamela Vernocchi, Federica Del Chierico, Matteo Scanu, Riccardo Marsiglia, Emanuela Petrolo, Elisa Fucà, Silvia Guerrera, Giovanni Valeri, Stefano Vicari and Lorenza Putignani
Microorganisms 2024, 12(10), 2041; https://doi.org/10.3390/microorganisms12102041 - 9 Oct 2024
Viewed by 2284
Abstract
Autism spectrum disorder (ASD) is a neurodevelopmental disorder. Investigations of gut microbiota (GM) play an important role in deciphering disease severity and symptoms. Overall, we stratified 70 ASD patients by neuropsychological assessment, based on Calibrated Severity Scores (CSSs) of the Autism Diagnostic Observation [...] Read more.
Autism spectrum disorder (ASD) is a neurodevelopmental disorder. Investigations of gut microbiota (GM) play an important role in deciphering disease severity and symptoms. Overall, we stratified 70 ASD patients by neuropsychological assessment, based on Calibrated Severity Scores (CSSs) of the Autism Diagnostic Observation Schedule-Second edition (ADOS-2), Child Behavior Checklist (CBCL) and intelligent quotient/developmental quotient (IQ/DQ) parameters. Hence, metataxonomy and PICRUSt-based KEGG predictions of fecal GM were assessed for each clinical subset. Here, 60% of ASD patients showed mild to moderate autism, while the remaining 40% showed severe symptoms; 23% showed no clinical symptoms, 21% had a risk of behavior problems and 56% had clinical symptoms based on the CBCL, which assesses internalizing problems; further, 52% had no clinical symptoms, 21% showed risk, and 26% had clinical symptoms classified by CBCL externalizing problems. Considering the total CBCL index, 34% showed no clinical symptoms, 13% showed risk, and 52% had clinical symptoms. Here, 70% of ASD patients showed cognitive impairment/developmental delay (CI/DD). The GM of ASDs with severe autism was characterized by an increase in Veillonella, a decrease in Monoglobus pectinilyticus and a higher microbial dysbiosis index (MDI) when compared to mild-moderate ASDs. Patients at risk for behavior problems and showing clinical symptoms were characterized by a GM with an increase of Clostridium, Eggerthella, Blautia, Intestinibacter, Coprococcus, Ruminococcus, Onthenecus and Bariatricus, respectively. Peptidoglycan biosynthesis and biofilm formation KEGGs characterized patients with clinical symptoms, while potential microbiota-activated PPAR-γ-signaling was seen in CI/DD patients. This evidence derived from GM profiling may be used to further improve ASD understanding, leasing to a better comprehension of the neurological phenotype. Full article
(This article belongs to the Special Issue State of the Art of Gut Microbiota in Italy (2023, 2024))
Show Figures

Figure 1

25 pages, 4981 KiB  
Article
VBQ-Net: A Novel Vectorization-Based Boost Quantized Network Model for Maximizing the Security Level of IoT System to Prevent Intrusions
by Ganeshkumar Perumal, Gopalakrishnan Subburayalu, Qaisar Abbas, Syed Muhammad Naqi and Imran Qureshi
Systems 2023, 11(8), 436; https://doi.org/10.3390/systems11080436 - 21 Aug 2023
Cited by 25 | Viewed by 2289
Abstract
Data sharing with additional devices across wireless networks is made simple and advantageous by the Internet of Things (IoT), an emerging technology. However, IoT systems are more susceptible to cyberattacks because of their continued growth and technological advances, which could lead to powerful [...] Read more.
Data sharing with additional devices across wireless networks is made simple and advantageous by the Internet of Things (IoT), an emerging technology. However, IoT systems are more susceptible to cyberattacks because of their continued growth and technological advances, which could lead to powerful assaults. An intrusion detection system is one of the key defense mechanisms for information and communications technology. The primary shortcomings that plague current IoT security frameworks are their inability to detect intrusions properly, their substantial latency, and their prolonged processing time and delay. Therefore, this work develops a clever and innovative security architecture called Vectorization-Based Boost Quantized Network (VBQ-Net) for protecting IoT networks. Here, a Vector Space Bag of Words (VSBW) methodology is used to reduce the dimensionality of features and identify a key characteristic from the featured data. In addition, a brand-new classification technique, called Boosted Variance Quantization Neural Networks (BVQNNs), is used to classify the different types of intrusions using a weighted feature matrix. A Multi-Hunting Reptile Search Optimization (MH-RSO) algorithm is employed during categorization to calculate the probability value for selecting the right choices while anticipating intrusions. In this study, the most well-known and current datasets, such as IoTID-20, IoT-23, and CIDDS-001, are used to validate and evaluate the effectiveness of the proposed methodology. By evaluating the proposed approach on standard IoT datasets, the study seeks to address the limitations of current IoT security frameworks and provide a more effective defense mechanism against cyberattacks on IoT systems. Full article
(This article belongs to the Special Issue AI, IoT, and Edge Computing for Sustainable Smart Cities)
Show Figures

Figure 1

18 pages, 8556 KiB  
Article
Schistosome Sulfotransferases: Mode of Action, Expression and Localization
by Meghan A. Guzman, Anastasia Rugel, Sevan N. Alwan, Reid Tarpley, Alexander B. Taylor, Frédéric D. Chevalier, George R. Wendt, James J. Collins, Timothy J. C. Anderson, Stanton F. McHardy and Philip T. LoVerde
Pharmaceutics 2022, 14(7), 1416; https://doi.org/10.3390/pharmaceutics14071416 - 6 Jul 2022
Cited by 3 | Viewed by 2513
Abstract
Oxamniquine (OXA) is a prodrug activated by a sulfotransferase (SULT) that was only active against Schistosoma mansoni. We have reengineered OXA to be effective against S. haematobium and S. japonicum. Three derivatives stand out, CIDD-0066790, CIDD-0072229, and CIDD-0149830 as [...] Read more.
Oxamniquine (OXA) is a prodrug activated by a sulfotransferase (SULT) that was only active against Schistosoma mansoni. We have reengineered OXA to be effective against S. haematobium and S. japonicum. Three derivatives stand out, CIDD-0066790, CIDD-0072229, and CIDD-0149830 as they kill all three major human schistosome species. However, questions remain. Is the OXA mode of action conserved in derivatives? RNA-interference experiments demonstrate that knockdown of the SmSULT, ShSULT, and SjSULT results in resistance to CIDD-0066790. Confirming that the OXA-derivative mode of action is conserved. Next is the level of expression of the schistosome SULTs in each species, as well as changes in SULT expression throughout development in S. mansoni. Using multiple tools, our data show that SmSULT has higher expression compared to ShSULT and SjSULT. Third, is the localization of SULT in the adult, multicellular eucaryotic schistosome species. We utilized fluorescence in situ hybridization and uptake of radiolabeled OXA to determine that multiple cell types throughout the adult schistosome worm express SULT. Thus, we hypothesize the ability of many cells to express the sulfotransferase accounts for the ability of the OXA derivatives to kill adult worms. Our studies demonstrate that the OXA derivatives are able to kill all three human schistosome species and thus will be a useful complement to PZQ. Full article
Show Figures

Graphical abstract

17 pages, 3098 KiB  
Article
Adoption of IP Truncation in a Privacy-Based Decision Tree Pruning Design: A Case Study in Network Intrusion Detection System
by Yee Jian Chew, Shih Yin Ooi, Kok-Seng Wong, Ying Han Pang and Nicholas Lee
Electronics 2022, 11(5), 805; https://doi.org/10.3390/electronics11050805 - 4 Mar 2022
Cited by 8 | Viewed by 3115
Abstract
A decision tree is a transparent model where the rules are visible and can represent the logic of classification. However, this structure might allow attackers to infer confidential information if the rules carry some sensitive information. Thus, a tree pruning methodology based on [...] Read more.
A decision tree is a transparent model where the rules are visible and can represent the logic of classification. However, this structure might allow attackers to infer confidential information if the rules carry some sensitive information. Thus, a tree pruning methodology based on an IP truncation anonymisation scheme is proposed in this paper to prune the real IP addresses. However, the possible drawback of carelessly designed tree pruning might degrade the performance of the original tree as some information is intentionally opted out for the tree’s consideration. In this work, the 6-percent-GureKDDCup’99, full-version-GureKDDCup’99, UNSW-NB15, and CIDDS-001 datasets are used to evaluate the performance of the proposed pruning method. The results are also compared to the original unpruned tree model to observe its tolerance and trade-off. The tree model adopted in this work is the C4.5 tree. The findings from our empirical results are very encouraging and spell two main advantages: the sensitive IP addresses can be “pruned” (hidden) throughout the classification process to prevent any potential user profiling, and the number of nodes in the tree is tremendously reduced to make the rule interpretation possible while maintaining the classification accuracy. Full article
Show Figures

Figure 1

13 pages, 2113 KiB  
Article
Secure Cyber Defense: An Analysis of Network Intrusion-Based Dataset CCD-IDSv1 with Machine Learning and Deep Learning Models
by Niraj Thapa, Zhipeng Liu, Addison Shaver, Albert Esterline, Balakrishna Gokaraju and Kaushik Roy
Electronics 2021, 10(15), 1747; https://doi.org/10.3390/electronics10151747 - 21 Jul 2021
Cited by 11 | Viewed by 3383
Abstract
Anomaly detection and multi-attack classification are major concerns for cyber defense. Several publicly available datasets have been used extensively for the evaluation of Intrusion Detection Systems (IDSs). However, most of the publicly available datasets may not contain attack scenarios based on evolving threats. [...] Read more.
Anomaly detection and multi-attack classification are major concerns for cyber defense. Several publicly available datasets have been used extensively for the evaluation of Intrusion Detection Systems (IDSs). However, most of the publicly available datasets may not contain attack scenarios based on evolving threats. The development of a robust network intrusion dataset is vital for network threat analysis and mitigation. Proactive IDSs are required to tackle ever-growing threats in cyberspace. Machine learning (ML) and deep learning (DL) models have been deployed recently to detect the various types of cyber-attacks. However, current IDSs struggle to attain both a high detection rate and a low false alarm rate. To address these issues, we first develop a Center for Cyber Defense (CCD)-IDSv1 labeled flow-based dataset in an OpenStack environment. Five different attacks with normal usage imitating real-life usage are implemented. The number of network features is increased to overcome the shortcomings of the previous network flow-based datasets such as CIDDS and CIC-IDS2017. Secondly, this paper presents a comparative analysis on the effectiveness of different ML and DL models on our CCD-IDSv1 dataset. In this study, we consider both cyber anomaly detection and multi-attack classification. To improve the performance, we developed two DL-based ensemble models: Ensemble-CNN-10 and Ensemble-CNN-LSTM. Ensemble-CNN-10 combines 10 CNN models developed from 10-fold cross-validation, whereas Ensemble-CNN-LSTM combines base CNN and LSTM models. This paper also presents feature importance for both anomaly detection and multi-attack classification. Overall, the proposed ensemble models performed well in both the 10-fold cross-validation and independent testing on our dataset. Together, these results suggest the robustness and effectiveness of the proposed IDSs based on ML and DL models on the CCD-IDSv1 intrusion detection dataset. Full article
(This article belongs to the Special Issue Security in Embedded Systems and IoT: Challenges and New Directions)
Show Figures

Figure 1

21 pages, 595 KiB  
Article
Intelligent Cyber Attack Detection and Classification for Network-Based Intrusion Detection Systems
by Nuno Oliveira, Isabel Praça, Eva Maia and Orlando Sousa
Appl. Sci. 2021, 11(4), 1674; https://doi.org/10.3390/app11041674 - 13 Feb 2021
Cited by 94 | Viewed by 10553
Abstract
With the latest advances in information and communication technologies, greater amounts of sensitive user and corporate information are shared continuously across the network, making it susceptible to an attack that can compromise data confidentiality, integrity, and availability. Intrusion Detection Systems (IDS) are important [...] Read more.
With the latest advances in information and communication technologies, greater amounts of sensitive user and corporate information are shared continuously across the network, making it susceptible to an attack that can compromise data confidentiality, integrity, and availability. Intrusion Detection Systems (IDS) are important security mechanisms that can perform the timely detection of malicious events through the inspection of network traffic or host-based logs. Many machine learning techniques have proven to be successful at conducting anomaly detection throughout the years, but only a few considered the sequential nature of data. This work proposes a sequential approach and evaluates the performance of a Random Forest (RF), a Multi-Layer Perceptron (MLP), and a Long-Short Term Memory (LSTM) on the CIDDS-001 dataset. The resulting performance measures of this particular approach are compared with the ones obtained from a more traditional one, which only considers individual flow information, in order to determine which methodology best suits the concerned scenario. The experimental outcomes suggest that anomaly detection can be better addressed from a sequential perspective. The LSTM is a highly reliable model for acquiring sequential patterns in network traffic data, achieving an accuracy of 99.94% and an f1-score of 91.66%. Full article
Show Figures

Figure 1

16 pages, 1611 KiB  
Article
Comparison of Machine Learning and Deep Learning Models for Network Intrusion Detection Systems
by Niraj Thapa, Zhipeng Liu, Dukka B. KC, Balakrishna Gokaraju and Kaushik Roy
Future Internet 2020, 12(10), 167; https://doi.org/10.3390/fi12100167 - 30 Sep 2020
Cited by 79 | Viewed by 11010
Abstract
The development of robust anomaly-based network detection systems, which are preferred over static signal-based network intrusion, is vital for cybersecurity. The development of a flexible and dynamic security system is required to tackle the new attacks. Current intrusion detection systems (IDSs) suffer to [...] Read more.
The development of robust anomaly-based network detection systems, which are preferred over static signal-based network intrusion, is vital for cybersecurity. The development of a flexible and dynamic security system is required to tackle the new attacks. Current intrusion detection systems (IDSs) suffer to attain both the high detection rate and low false alarm rate. To address this issue, in this paper, we propose an IDS using different machine learning (ML) and deep learning (DL) models. This paper presents a comparative analysis of different ML models and DL models on Coburg intrusion detection datasets (CIDDSs). First, we compare different ML- and DL-based models on the CIDDS dataset. Second, we propose an ensemble model that combines the best ML and DL models to achieve high-performance metrics. Finally, we benchmarked our best models with the CIC-IDS2017 dataset and compared them with state-of-the-art models. While the popular IDS datasets like KDD99 and NSL-KDD fail to represent the recent attacks and suffer from network biases, CIDDS, used in this research, encompasses labeled flow-based data in a simulated office environment with both updated attacks and normal usage. Furthermore, both accuracy and interpretability must be considered while implementing AI models. Both ML and DL models achieved an accuracy of 99% on the CIDDS dataset with a high detection rate, low false alarm rate, and relatively low training costs. Feature importance was also studied using the Classification and regression tree (CART) model. Our models performed well in 10-fold cross-validation and independent testing. CART and convolutional neural network (CNN) with embedding achieved slightly better performance on the CIC-IDS2017 dataset compared to previous models. Together, these results suggest that both ML and DL methods are robust and complementary techniques as an effective network intrusion detection system. Full article
Show Figures

Figure 1

Back to TopTop