IDS

ID
  • 文章类型: Journal Article
    在充斥着几乎无穷无尽的网络安全危害的现代数字市场中,复杂的IDS(入侵检测系统)在防御复杂的安全威胁方面变得非常宝贵。基于Sybil-FreeMetric的低功耗和有损网络路由协议(RPL)可信性方案(SF-MRTS)捕获了RPL模块下的低功耗和有损网络路由协议的最大威胁的性质,被称为Sybil攻击。Sybil攻击为RPL网络带来了重大的安全挑战,攻击者可以扭曲至少两个跳路径并破坏网络进程。使用这种计算节点可靠性的新方法,我们引入了一种尖端的方法,评估超越路由指标的参数,如节能和现状。SF-MRTS通过在安全路径上引入这种信任度量来精确地实现可信网络。因此,由于这些安全性改进,这可能被认为更有可能抵御攻击。SF-MRTS的仿真功能清楚地表明了其与安全风险管理功能的一致性,这对于网络的性能和稳定性维护也是必要的。这些机制是基于博弈论的原理,他们将吸引力分配给合作的节点,同时对不合作的节点施加惩罚。这将是避免网络损坏的方法,这将导致节点之间的协作。SF-MRTS是针对新兴工业物联网(IoT)网络攻击的安全技术。它有效地保证了可靠性,并提高了网络在不同情况下的弹性。
    In the modern digital market flooded by nearly endless cyber-security hazards, sophisticated IDS (intrusion detection systems) can become invaluable in defending against intricate security threats. Sybil-Free Metric-based routing protocol for low power and lossy network (RPL) Trustworthiness Scheme (SF-MRTS) captures the nature of the biggest threat to the routing protocol for low-power and lossy networks under the RPL module, known as the Sybil attack. Sybil attacks build a significant security challenge for RPL networks where an attacker can distort at least two hop paths and disrupt network processes. Using such a new way of calculating node reliability, we introduce a cutting-edge approach, evaluating parameters beyond routing metrics like energy conservation and actuality. SF-MRTS works precisely towards achieving a trusted network by introducing such trust metrics on secure paths. Therefore, this may be considered more likely to withstand the attacks because of these security improvements. The simulation function of SF-MRTS clearly shows its concordance with the security risk management features, which are also necessary for the network\'s performance and stability maintenance. These mechanisms are based on the principles of game theory, and they allocate attractions to the nodes that cooperate while imposing penalties on the nodes that do not. This will be the way to avoid damage to the network, and it will lead to collaboration between the nodes. SF-MRTS is a security technology for emerging industrial Internet of Things (IoT) network attacks. It effectively guaranteed reliability and improved the networks\' resilience in different scenarios.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    暂无摘要。
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    本文研究了集成学习技术的应用,特别是元学习,在医疗物联网(IoMT)的入侵检测系统(IDS)中。它强调了IoMT环境的异构性和动态性所带来的现有挑战,这需要适应性,强大的安全解决方案。通过利用元学习以及各种集成策略,如堆叠和装袋,本文旨在完善IDS机制,有效应对不断演变的网络威胁。该研究提出了一种性能驱动的加权元学习技术,用于基于准确性将投票权重动态分配给分类器,损失,和信心水平。通过动态优化集成IDS模型,此方法显着增强了IoMT的入侵检测功能。大量的实验证明了所提出的模型在准确性方面的卓越性能,检测率,F1得分,与现有模型相比,假阳性率,特别是在分析各种大小的输入特征时。研究结果强调了在基于集成的IDS中集成元学习以增强IoMT网络的安全性和完整性的潜力。建议未来研究的途径,以进一步提高IDS在保护敏感医疗数据和物联网基础设施方面的性能。
    This paper investigates the application of ensemble learning techniques, specifically meta-learning, in intrusion detection systems (IDS) for the Internet of Medical Things (IoMT). It underscores the existing challenges posed by the heterogeneous and dynamic nature of IoMT environments, which necessitate adaptive, robust security solutions. By harnessing meta-learning alongside various ensemble strategies such as stacking and bagging, the paper aims to refine IDS mechanisms to effectively counter evolving cyber threats. The study proposes a performance-driven weighted meta-learning technique for dynamic assignment of voting weights to classifiers based on accuracy, loss, and confidence levels. This approach significantly enhances the intrusion detection capabilities for the IoMT by dynamically optimizing ensemble IDS models. Extensive experiments demonstrate the proposed model\'s superior performance in terms of accuracy, detection rate, F1 score, and false positive rate compared to existing models, particularly when analyzing various sizes of input features. The findings highlight the potential of integrating meta-learning in ensemble-based IDS to enhance the security and integrity of IoMT networks, suggesting avenues for future research to further advance IDS performance in protecting sensitive medical data and IoT infrastructures.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    气管插管是用于固定患者气道的常用技术,这对麻醉至关重要。成功的气管插管取决于各种因素,包括手术前对患者气道的评估。近年来,评分系统,如LEMON(气道外观评估的首字母缩写,识别任何牙科问题,Mallampati分类的评估,评估气道阻塞,以及检查颈部活动度)和插管困难量表(IDS)已引起关注。本研究旨在探讨LEMON标准与气管插管中IDS之间的关系。目标是提供有价值的见解,可以通过分析临床数据来帮助医疗专业人员优化他们的气道管理方法。评估患者结果,并评估这些评分系统之间的一致性。
    本研究基于一项描述性分析研究,涉及一组需要插管的患者。这项研究检查了105名计划进行选择性手术的患者,年龄在19至60岁之间,没有特定的潜在疾病,比如喉癌,颞下颌关节僵硬,或者明显的舌头肿大,体重指数(BMI)低于40kg/m²。最初,麻醉专家使用LEMON标准评估患者,然后使用IDS评分系统测量插管困难程度。最后,对这两个标准进行了比较。
    在这项研究中,LEMON评分与IDS评分之间存在显著相关性(P<0.001)。困难插管组(IDS评分高于0)的LEMON评分(最高评分等于4)高于非困难插管组(IDS评分为0)(P=0.017)。LEMON和IDS的平均得分分别为3.11和1.35。在参与者中,96.2%的患者插管困难评分≤5分;尽管如此,3.8%的得分>5。此外,颈部活动受限是插管困难的唯一独立预测因子(P=0.002,比值比=6.152).
    LEMON评分与需要插管的成年患者插管困难有关。
    UNASSIGNED: Tracheal intubation is a common technique used to secure a patient\'s airway, which is crucial in anesthesia. Successful tracheal intubation depends on various factors, including the assessment of the patient\'s airway before the procedure. In recent years, scoring systems, such as LEMON (an acronym for the assessment of the airway\'s appearance, identification of any dental issues, evaluation of Mallampati classification, assessment of airway obstruction, and examination of neck mobility) and intubation difficulty scale (IDS) have gained attention. This study aimed to investigate the relationship between the LEMON criteria and IDS in tracheal intubation. The goal was to provide valuable insights that can assist medical professionals in optimizing their approach to airway management by analyzing clinical data, assessing patient outcomes, and evaluating the consistency between these scoring systems.
    UNASSIGNED: This study was based on a descriptive-analytical study involving a group of patients requiring intubation. This study examined 105 patients scheduled for elective surgeries, aged between 19 and 60 years, without specific underlying diseases, such as laryngeal cancer, temporomandibular joint stiffness, or significant tongue enlargement, and with a body mass index (BMI) below 40 kg/m². Initially, expert anesthesiologists assessed the patients using the LEMON criteria, and then the degree of intubation difficulty was measured using the IDS scoring system. Finally, these two criteria were compared.
    UNASSIGNED: In this study, there was a significant correlation between the LEMON score and the IDS score (P < 0.001). The difficult intubation group (IDS score higher than 0) had higher LEMON scores (with the highest score equal to 4) than the non-difficult intubation group (IDS score of 0) (P = 0.017). The average LEMON and IDS scores were 3.11 and 1.35, respectively. Among the participants, 96.2% had an intubation difficulty score of ≤ 5; nevertheless, 3.8% had a score of > 5. Additionally, limited neck mobility emerged as the sole independent predictor of intubation difficulty (P = 0.002, odds ratio = 6.152).
    UNASSIGNED: The LEMON score is associated with difficult intubation in adult patients requiring intubation.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    目的:马拉维的疾病监测系统建立在几个不同的数据源和系统上,并由综合疾病监测和反应(IDSR)战略提供信息。这项研究是作为一项更大的多国家研究的一部分进行的,目的是确定特定于环境的因素,影响综合疾病监测的可操作性。
    方法:共进行了6次焦点小组讨论,共有43名相关人员参加了两个区(利隆圭区和多瓦区)的初级和中级卫生保健层面以及国家一级的卫生保健。根据国际公共卫生协会概念框架的领域,对讨论进行了分析并分类为预定义的类别。
    结果:我们发现正在努力加强综合疾病监测的可操作性,包括建立马拉维公共卫生研究所进行协调,通过一个健康监测平台将监测系统数字化,并使用WhatsApp改善快速反应团队之间的沟通。世界卫生组织第三版IDSR技术准则的采用也在进行中。尽管如此,存在主要的实施障碍,例如平行和不协调的监视系统,在报告时无法诊断的优先条件,缺乏优先条件的案例定义和诊断代码,用无法解释的首字母缩略词报告表格,难以辨认的数据源,不稳定的电子数据传输,监督和培训不足,私营医疗机构举报执法不力,高报告负担,以及对这些报告的缺乏和反馈。
    结论:结果很好地符合所使用的预定义类别。这项研究揭示了可操作性的基本问题,工具,和用于IDSR的报告表格。这些发现可能对马拉维和其他以IDSR为国家监测战略的国家的实践和政策产生影响。
    OBJECTIVE: Malawi\'s disease surveillance system is built on several different data sources and systems and is informed by the Integrated Diseases Surveillance and Response (IDSR) strategy. This study was carried out as part of a larger multicountry study to identify context-specific factors, which influence the operationalization of integrated disease surveillance.
    METHODS: A total of six focus group discussions were conducted with 43 relevant personnel at the primary and secondary healthcare levels in two districts (Lilongwe and Dowa) and at the national level. The discussions were analyzed and sorted into predefined categories based on the domains of the International Association of Public Health conceptual framework.
    RESULTS: We found ongoing efforts to enhance integrated disease surveillance operationalization, including the establishment of the Public Health Institute of Malawi for coordination, digitalizing the surveillance system through One Health Surveillance Platform, and improving communication among rapid response teams using WhatsApp. The adoption of World Health Organization\'s third edition IDSR technical guidelines was also underway. Nonetheless, there were major implementation barriers such as parallel and uncoordinated surveillance systems, priority conditions that cannot be diagnosed at the point of reporting, lack of case definitions and diagnostic codes for priority conditions, reporting forms with unexplained acronyms, illegible data sources, unstable electronic data transfers, inadequate supervision and training, poor enforcement of reporting from private health facilities, high reporting burden, and lack of and feedback to those reporting.
    CONCLUSIONS: The results fit well into the predefined categories used. The study reveals basic problems with the operationalization, tools, and reporting forms used for IDSR. These findings may have implications for practice and policy in Malawi and other countries where IDSR is the national strategy for surveillance.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    分布式能源的有效运行在很大程度上依赖于微电网中采用的通信系统。本文探讨了基本的通信要求,结构,以及在微电网中建立安全连接所需的协议。本文探讨了目前面临的困难,和进步,智能微电网通信技术,包括有线和无线网络。此外,它评估了不同安全方法的结合。本文展示了一个案例研究,该案例研究说明了在微电网环境中分布式网络安全通信系统的实现。该研究最后强调了正在进行的研究工作,并提出了微电网通信领域潜在的未来研究路径。
    The effective operation of distributed energy sources relies significantly on the communication systems employed in microgrids. This article explores the fundamental communication requirements, structures, and protocols necessary to establish a secure connection in microgrids. This article examines the present difficulties facing, and progress in, smart microgrid communication technologies, including wired and wireless networks. Furthermore, it evaluates the incorporation of diverse security methods. This article showcases a case study that illustrates the implementation of a distributed cyber-security communication system in a microgrid setting. The study concludes by emphasizing the ongoing research endeavors and suggesting potential future research paths in the field of microgrid communications.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    针对物联网(IoT)系统的广泛且不断增加的网络安全攻击正在给个人和组织带来广泛的问题。物联网是自配置和开放的,使其容易受到内部和外部攻击。在IoT中,设备设计为自配置,使他们能够自动连接到网络,而无需大量手动配置。通过使用各种协议,技术,和自动化流程,自配置物联网设备能够无缝连接到网络,发现服务,并调整其配置,而无需手动干预或设置。用户的安全和隐私可能会受到攻击者试图获取其个人信息的访问权限的攻击。造成货币损失,监视他们.拒绝服务(DoS)攻击是针对物联网系统的最具破坏性的攻击之一,因为它阻止合法用户访问服务。这种类型的网络攻击会严重损害IoT网络中的IoT服务和智能环境应用。因此,物联网系统安全已成为一个越来越重要的问题。因此,在这项研究中,我们提出了一种IDS防御机制,以使用异常检测和机器学习(ML)来提高物联网网络对DoS攻击的安全性。在建议的IDS中使用异常检测来连续监视网络流量与正常配置文件的偏差。为此,我们使用了四种类型的监督分类器算法,即,决策树(DT)随机森林(RF),K近邻(kNN),和支持向量机(SVM)。此外,我们使用了两种类型的特征选择算法,基于相关性的特征选择(CFS)算法和遗传算法(GA),并比较了它们的性能。我们还利用了IoTID20数据集,检测物联网网络中异常活动的最新方法之一,来训练我们的模型.当使用GA选择的特征对DT和RF分类器进行训练时,可以获得最佳性能。然而,其他指标,例如培训和测试时间,表明DT是优越的。
    Widespread and ever-increasing cybersecurity attacks against Internet of Things (IoT) systems are causing a wide range of problems for individuals and organizations. The IoT is self-configuring and open, making it vulnerable to insider and outsider attacks. In the IoT, devices are designed to self-configure, enabling them to connect to networks autonomously without extensive manual configuration. By using various protocols, technologies, and automated processes, self-configuring IoT devices are able to seamlessly connect to networks, discover services, and adapt their configurations without requiring manual intervention or setup. Users\' security and privacy may be compromised by attackers seeking to obtain access to their personal information, create monetary losses, and spy on them. A Denial of Service (DoS) attack is one of the most devastating attacks against IoT systems because it prevents legitimate users from accessing services. A cyberattack of this type can significantly damage IoT services and smart environment applications in an IoT network. As a result, securing IoT systems has become an increasingly significant concern. Therefore, in this study, we propose an IDS defense mechanism to improve the security of IoT networks against DoS attacks using anomaly detection and machine learning (ML). Anomaly detection is used in the proposed IDS to continuously monitor network traffic for deviations from normal profiles. For that purpose, we used four types of supervised classifier algorithms, namely, Decision Tree (DT), Random Forest (RF), K Nearest Neighbor (kNN), and Support Vector Machine (SVM). In addition, we utilized two types of feature selection algorithms, the Correlation-based Feature Selection (CFS) algorithm and the Genetic Algorithm (GA) and compared their performances. We also utilized the IoTID20 dataset, one of the most recent for detecting anomalous activity in IoT networks, to train our model. The best performances were obtained with DT and RF classifiers when they were trained with features selected by GA. However, other metrics, such as training and testing times, showed that DT was superior.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    溶酶体贮积病称为II型粘多糖贮积症,是由影响乙酰肝素和硫酸皮肤素分解代谢所需的艾杜糖醛酸-2-硫酸酯酶的突变引起的。中枢神经系统(CNS)主要且严重地受到两种底物的积累的影响。已经有限地探索了在MPSII患者中观察到的CNS损伤的复杂性。使用基于质谱(MS)的蛋白质组学工具来鉴定蛋白质谱可能会产生有关亨特综合征病理机制的有价值的信息。在这项进一步的研究中,我们提供了一个新的比较蛋白质组学分析的MPSII模型,通过使用一个管道组成的天然蛋白质复合物的选择性定位,再加上质谱分析,允许我们识别涉及大量新生物功能的变化,包括特定的大脑抗氧化反应,下调的自噬,抑制硫分解代谢过程,突出的肝脏免疫反应和吞噬作用的刺激等。
    The Lysosomal Storage disease known as Mucopolysaccharidosis type II, is caused by mutations affecting the iduronate-2-sulfatase required for heparan and dermatan sulfate catabolism. The central nervous system (CNS) is mostly and severely affected by the accumulation of both substrates. The complexity of the CNS damage observed in MPS II patients has been limitedly explored. The use of mass spectrometry (MS)-based proteomics tools to identify protein profiles may yield valuable information about the pathological mechanisms of Hunter syndrome. In this further study, we provide a new comparative proteomic analysis of MPS II models by using a pipeline consisting of the identification of native protein complexes positioned selectively by using a specific antibody, coupled with mass spectrometry analysis, allowing us to identify changes involving in a significant number of new biological functions, including a specific brain antioxidant response, a down-regulated autophagic, the suppression of sulfur catabolic process, a prominent liver immune response and the stimulation of phagocytosis among others.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    目的:本研究的目的是探讨制剂特性对生存的影响,成功,部分间接二硅酸锂修复体与牙本质立即密封的临床表现。
    方法:这项回顾性临床研究评估了2018年3月至2021年5月在(前)磨牙中与即时牙本质密封(IDS)结合放置的部分间接二硅酸锂修复体。使用预热的复合材料对修复体进行抛光。这项研究的重点是生存,成功,和临床表现,使用修改后的美国公共卫生服务(USPHS)标准进行评估。使用Kaplan-Meier估计对结果进行了分析,对数秩测试,和Fisher精确测试。
    结果:在214例患者中评估了部分间接二硅酸锂修复体(N=454)。平均评估时间为37个月,累计生存率为99.2%,累计成功率为97.6%。发生了14次故障,以牙髓病理学为主要的失败模式,其次是继发性龋齿,脱粘,牙齿骨折。没有观察到制备变量对存活和成功的统计学显著影响(p>.05)。在>90%的评价中,短期临床表现在临床上是可接受的。
    结论:这项关于部分间接二硅酸锂修复体与IDS结合的回顾性研究表明,在37个月的平均评估期内,生存率和成功率分别为99.2%和96.7%。研究的制剂特性对存活率的显著影响,无法证明二硅酸锂部分修复体的成功和临床表现。部分二硅酸锂修复体在>90%的病例中表现出良好的临床表现。
    结论:这项研究的结果表明,制剂特征对存活率没有显著影响,成功,部分二硅酸锂修复体与IDS的临床表现。结果显示良好的临床表现和较高的生存率和成功率,不管准备的特点。
    The aim of this study was to investigate the influence of preparation characteristics on the survival, success, and clinical performance of partial indirect lithium disilicate restorations with immediate dentin sealing.
    This retrospective clinical study evaluated partial indirect lithium disilicate restorations placed in conjunction with Immediate Dentin Sealing (IDS) in (pre)molar teeth between March 2018 and May 2021. The restorations were luted using pre-heated composite. The study focused on survival, success, and clinical performance, which was evaluated using the modified United States Public Health Service (USPHS) criteria. Results were analyzed using the Kaplan-Meier estimates, log-rank tests, and Fisher exact tests.
    Partial indirect lithium disilicate restorations (N = 454) were evaluated in 214 patients. The mean evaluation time was 37 months, with a cumulative survival rate of 99.2 % and a cumulative success rate of 97.6 %. Fourteen failures occurred, with endodontic pathology as the predominant failure mode, followed by secondary caries, debonding, and tooth fracture. No statistically significant influence of the preparation variables on survival and success was observed (p > .05). The short-term clinical performance was clinically acceptable in > 90 % of the evaluations.
    This retrospective study on partial indirect lithium disilicate restorations in conjunction with IDS demonstrates survival and success rates of 99.2 and 96.7 % over a mean evaluation period of 37 months. A marked influence of the studied preparation characteristics on the survival, success and clinical performance of lithium disilicate partial restorations could not be demonstrated. Partial lithium disilicate restorations exhibit good clinical performance in >90 % of the cases.
    The results of this study suggest that preparation characteristics had no significant impact on the survival, success, and clinical performance of partial lithium disilicate restorations in conjunction with IDS. Results show good clinical performance and high survival and success rates, regardless of preparation characteristics.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    物联网(IoT)技术已经在深度学习(DL)技术中进行了大量研究,以检测网络攻击。关键基础设施(CI)必须能够快速检测边缘设备附近的网络攻击,以防止服务中断。DL方法在攻击检测中优于浅层机器学习技术,为它们提供了用于入侵检测的可行替代方案。然而,由于大量的物联网数据和DL模型的计算需求,传输开销阻碍了距离设备更近的DL模型的成功实施。由于他们没有接受过相关物联网的培训,当前的入侵检测系统(IDS)要么使用传统技术,要么不用于分散的边缘云部署。建议使用新的基于边缘云的IoTIDS来解决这些问题。它使用分布式处理将数据集分成适合不同攻击类的子集,并对时间序列物联网数据执行属性选择。接下来,DL用于训练攻击检测循环神经网络,它由循环神经网络(RNN)和双向长短期记忆(LSTM)组成。高维BoT-IoT数据集,它复制了大量真正的物联网攻击流量,用于测试所提出的模型。尽管通过属性选择方法可以实现数据集大小减少85%,攻击检测能力保持不变。利用较小的数据集构建的模型表现出更高的召回率(98.25%),F1-措施(99.12%),准确度(99.56%),和精度(99.45%),与在整个属性集上训练的模型相比,类辨别性能没有损失。使用较小的属性空间,RNN和Bi-LSTM模型都没有经历过欠拟合或过拟合。提出的基于DL的物联网入侵检测解决方案具有在面对大量物联网数据时高效扩展的能力,从而使其成为边缘云部署的理想候选者。
    The Internet of Things (IoT) technology has seen substantial research in Deep Learning (DL) techniques to detect cyberattacks. Critical Infrastructures (CIs) must be able to quickly detect cyberattacks close to edge devices in order to prevent service interruptions. DL approaches outperform shallow machine learning techniques in attack detection, giving them a viable alternative for use in intrusion detection. However, because of the massive amount of IoT data and the computational requirements for DL models, transmission overheads prevent the successful implementation of DL models closer to the devices. As they were not trained on pertinent IoT, current Intrusion Detection Systems (IDS) either use conventional techniques or are not intended for scattered edge-cloud deployment. A new edge-cloud-based IoT IDS is suggested to address these issues. It uses distributed processing to separate the dataset into subsets appropriate to different attack classes and performs attribute selection on time-series IoT data. Next, DL is used to train an attack detection Recurrent Neural Network, which consists of a Recurrent Neural Network (RNN) and Bidirectional Long Short-Term Memory (LSTM). The high-dimensional BoT-IoT dataset, which replicates massive amounts of genuine IoT attack traffic, is used to test the proposed model. Despite an 85 percent reduction in dataset size made achievable by attribute selection approaches, the attack detection capability was kept intact. The models built utilizing the smaller dataset demonstrated a higher recall rate (98.25%), F1-measure (99.12%), accuracy (99.56%), and precision (99.45%) with no loss in class discrimination performance compared to models trained on the entire attribute set. With the smaller attribute space, neither the RNN nor the Bi-LSTM models experienced underfitting or overfitting. The proposed DL-based IoT intrusion detection solution has the capability to scale efficiently in the face of large volumes of IoT data, thus making it an ideal candidate for edge-cloud deployment.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

公众号