首页 > 最新文献

Journal of Cybersecurity and Information Management最新文献

英文 中文
Cyber Attacks Evaluation Targeting Internet Facing IoT: An Experimental Evaluation 面向物联网的网络攻击评估:一项实验性评估
Pub Date : 1900-01-01 DOI: 10.54216/jcim.090102
N. Thilakarathne, N. .., Rakesh Kumar Mahendran
The rapid growth of Information and Communication Technology (ICT) in the 21st century has resulted in the emergence of a novel technological paradigm; known as the Internet of Things, or IoT. The IoT, which is at the heart of today's smart infrastructure, aids in the creation of a ubiquitous network of things by simplifying interconnection between smart digital devices and enabling Machine to Machine (M2M) communication. As of now, there are numerous examples of IoT use cases available, assisting every person in this world towards making their lives easier and more convenient. The latest advancement of IoT in a variety of domains such as healthcare, smart city, smart agriculture has led to an exponential growth of cyber-attacks that targets these pervasive IoT environments, which can even lead to jeopardizing the lives of people; that is involved with it. In general, this IoT can be considered as every digital object that is connected to the Internet for intercommunication. Hence in this regard to analyze cyber threats that come through the Internet, here we are doing an experimental evaluation to analyze the requests, received to exploit the opened Secure Shell (SSH) connection service of an IoT device, which in our case a Raspberry Pi devices, which connected to the Internet for more than six consecutive days. By opening the SSH service on Raspberry Pi, it acts as a Honeypot device where we can log and retrieve all login attempt requests received to the SSH service opened. Inspired by evaluating the IoT security attacks that target objects in the pervasive IoT environment, after retrieving all the login requests made through the open SSH connection we then provide a comprehensive analysis along with our observations about the origin of the requests and the focus areas of intruders; in this study.
信息通信技术(ICT)在21世纪的快速发展导致了一种新的技术范式的出现;即物联网(IoT)。物联网是当今智能基础设施的核心,通过简化智能数字设备之间的互连和实现机器对机器(M2M)通信,有助于创建无处不在的物联网。到目前为止,有许多物联网用例的例子,帮助这个世界上的每个人使他们的生活更轻松,更方便。物联网在医疗保健、智慧城市、智慧农业等各个领域的最新进展,导致针对这些无处不在的物联网环境的网络攻击呈指数级增长,甚至可能危及人们的生命;这与它有关。一般来说,这个物联网可以被认为是连接到互联网进行交互的每个数字对象。因此,为了分析来自互联网的网络威胁,我们在这里进行了一项实验评估,以分析收到的请求,以利用物联网设备打开的SSH连接服务,在我们的情况下,树莓派设备连接到互联网超过连续六天。通过在树莓派上打开SSH服务,它就像一个蜜罐设备,我们可以在这里记录和检索所有收到的登录尝试请求到打开的SSH服务。受评估物联网安全攻击的启发,目标对象在普遍的物联网环境中,检索通过开放的SSH连接发出的所有登录请求后,我们提供了一个全面的分析,以及我们对请求的来源和入侵者的重点领域的观察;在这项研究中。
{"title":"Cyber Attacks Evaluation Targeting Internet Facing IoT: An Experimental Evaluation","authors":"N. Thilakarathne, N. .., Rakesh Kumar Mahendran","doi":"10.54216/jcim.090102","DOIUrl":"https://doi.org/10.54216/jcim.090102","url":null,"abstract":"The rapid growth of Information and Communication Technology (ICT) in the 21st century has resulted in the emergence of a novel technological paradigm; known as the Internet of Things, or IoT. The IoT, which is at the heart of today's smart infrastructure, aids in the creation of a ubiquitous network of things by simplifying interconnection between smart digital devices and enabling Machine to Machine (M2M) communication. As of now, there are numerous examples of IoT use cases available, assisting every person in this world towards making their lives easier and more convenient. The latest advancement of IoT in a variety of domains such as healthcare, smart city, smart agriculture has led to an exponential growth of cyber-attacks that targets these pervasive IoT environments, which can even lead to jeopardizing the lives of people; that is involved with it. In general, this IoT can be considered as every digital object that is connected to the Internet for intercommunication. Hence in this regard to analyze cyber threats that come through the Internet, here we are doing an experimental evaluation to analyze the requests, received to exploit the opened Secure Shell (SSH) connection service of an IoT device, which in our case a Raspberry Pi devices, which connected to the Internet for more than six consecutive days. By opening the SSH service on Raspberry Pi, it acts as a Honeypot device where we can log and retrieve all login attempt requests received to the SSH service opened. Inspired by evaluating the IoT security attacks that target objects in the pervasive IoT environment, after retrieving all the login requests made through the open SSH connection we then provide a comprehensive analysis along with our observations about the origin of the requests and the focus areas of intruders; in this study.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114602919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review on Privacy-Preserving Data Preprocessing 隐私保护数据预处理研究进展
Pub Date : 1900-01-01 DOI: 10.54216/jcim.040202
M. Soni, Yashkumar Barot, S. Gomathi
Health care information has great potential for improving the health care system and also providing fast and accurate outcomes for patients, predicting disease outbreaks, gaining valuable information for prediction in future, preventing such diseases, reducing healthcare costs, and improving overall health. In any case, deciding the genuine utilization of information while saving the patient's identity protection is an overwhelming task. Regardless of the amount of medical data it can help advance clinical science and it is essential to the accomplishment of all medicinal services associations, at the end information security is vital. To guarantee safe and solid information security and cloud-based conditions, It is critical to consider the constraints of existing arrangements and systems for the social insurance of information security and assurance. Here we talk about the security and privacy challenges of high-quality important data as it is used mainly by the healthcare structure and similar industry to examine how privacy and security issues occur when there is a large amount of healthcare information to protect from all possible threats. We will discuss ways that these can be addressed. The main focus will be on recently analyzed and optimized methods based on anonymity and encryption, and we will compare their strengths and limitations, and this chapter closes at last the privacy and security recommendations for best practices for privacy of preprocessing healthcare data.
医疗保健信息在改善医疗保健系统,为患者提供快速准确的结果,预测疾病爆发,获得未来预测的有价值信息,预防此类疾病,降低医疗保健成本和改善整体健康方面具有巨大潜力。无论如何,在保护患者身份的同时,决定信息的真正利用是一项艰巨的任务。无论医疗数据的数量如何,它都可以帮助推进临床科学,并且对于所有医疗服务协会的实现至关重要,最终信息安全至关重要。为保障信息安全和云基础条件下的安全、稳固,必须考虑现有信息安全社会保障安排和制度的约束。在这里,我们将讨论高质量重要数据的安全和隐私挑战,因为它主要由医疗保健结构和类似行业使用,以研究当存在大量医疗保健信息以防止所有可能的威胁时,隐私和安全问题是如何发生的。我们将讨论解决这些问题的方法。重点将放在最近分析和优化的基于匿名和加密的方法上,我们将比较它们的优点和局限性,本章最后结束了对预处理医疗数据隐私的最佳实践的隐私和安全建议。
{"title":"A review on Privacy-Preserving Data Preprocessing","authors":"M. Soni, Yashkumar Barot, S. Gomathi","doi":"10.54216/jcim.040202","DOIUrl":"https://doi.org/10.54216/jcim.040202","url":null,"abstract":"Health care information has great potential for improving the health care system and also providing fast and accurate outcomes for patients, predicting disease outbreaks, gaining valuable information for prediction in future, preventing such diseases, reducing healthcare costs, and improving overall health. In any case, deciding the genuine utilization of information while saving the patient's identity protection is an overwhelming task. Regardless of the amount of medical data it can help advance clinical science and it is essential to the accomplishment of all medicinal services associations, at the end information security is vital. To guarantee safe and solid information security and cloud-based conditions, It is critical to consider the constraints of existing arrangements and systems for the social insurance of information security and assurance. Here we talk about the security and privacy challenges of high-quality important data as it is used mainly by the healthcare structure and similar industry to examine how privacy and security issues occur when there is a large amount of healthcare information to protect from all possible threats. We will discuss ways that these can be addressed. The main focus will be on recently analyzed and optimized methods based on anonymity and encryption, and we will compare their strengths and limitations, and this chapter closes at last the privacy and security recommendations for best practices for privacy of preprocessing healthcare data.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126312247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Maximizing Anomaly Detection Performance in Next-Generation Networks 下一代网络中异常检测性能最大化
Pub Date : 1900-01-01 DOI: 10.54216/jcim.120203
P. ., Sarika Chaudhary
The paper discusses major components of the proposed intrusion detection system as well as associated ideas. Dimensionality reduction solutions are highly valued for their potential to improve the efficiency of anomaly detection. Furthermore, feature selection and fusion methods are applied to optimise the system's capabilities. The following summary of network control, management, and cloud-based network processing aspects highlights operations managers, cloud resources, network function virtualization (NFV), and hardware and software components. We discuss prospective Deep Autoencoders (DAEs) applications, such as their use in the dimensionality reduction module, training methodologies, and benefits. Data transformation utilising coded representations is also graphically displayed and described in the text using an encoder and decoder system. The role of the anomaly detection via virtual network function in the suggested technique is also investigated. This component leverages a deep neural network (DNN) to identify anomalies in the 5G network's peripherals. DNN design issues, optimisation methodologies, and the trade-off between model complexity and detection efficacy are also discussed. Overall, the passage provides an overview of the proposed intrusion detection scheme, its components, and the techniques employed, underscoring their contributions to improving efficiency, accuracy, and security in Next Generation Networks.
本文讨论了所提出的入侵检测系统的主要组成部分以及相关思想。降维解决方案因其提高异常检测效率的潜力而受到高度重视。此外,应用特征选择和融合方法优化系统的性能。下面总结了网络控制、管理和基于云的网络处理方面的内容,重点介绍了运营管理人员、云资源、网络功能虚拟化(NFV)以及硬件和软件组件。我们讨论了深度自动编码器(DAEs)的应用前景,例如它们在降维模块中的使用、训练方法和好处。利用编码表示的数据转换也以图形方式显示,并使用编码器和解码器系统在文本中描述。本文还探讨了虚拟网络功能异常检测在该方法中的作用。该组件利用深度神经网络(DNN)来识别5G网络外设中的异常情况。文中还讨论了深度神经网络的设计问题、优化方法以及模型复杂性和检测效率之间的权衡。总的来说,本文概述了入侵检测方案、其组成部分和所采用的技术,强调了它们对提高下一代网络的效率、准确性和安全性的贡献。
{"title":"Maximizing Anomaly Detection Performance in Next-Generation Networks","authors":"P. ., Sarika Chaudhary","doi":"10.54216/jcim.120203","DOIUrl":"https://doi.org/10.54216/jcim.120203","url":null,"abstract":"The paper discusses major components of the proposed intrusion detection system as well as associated ideas. Dimensionality reduction solutions are highly valued for their potential to improve the efficiency of anomaly detection. Furthermore, feature selection and fusion methods are applied to optimise the system's capabilities. The following summary of network control, management, and cloud-based network processing aspects highlights operations managers, cloud resources, network function virtualization (NFV), and hardware and software components. We discuss prospective Deep Autoencoders (DAEs) applications, such as their use in the dimensionality reduction module, training methodologies, and benefits. Data transformation utilising coded representations is also graphically displayed and described in the text using an encoder and decoder system. The role of the anomaly detection via virtual network function in the suggested technique is also investigated. This component leverages a deep neural network (DNN) to identify anomalies in the 5G network's peripherals. DNN design issues, optimisation methodologies, and the trade-off between model complexity and detection efficacy are also discussed. Overall, the passage provides an overview of the proposed intrusion detection scheme, its components, and the techniques employed, underscoring their contributions to improving efficiency, accuracy, and security in Next Generation Networks.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115945901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Study of Cybersecurity Threats and Countermeasures: Strategies for Mitigating Risks in the Digital Age 网络安全威胁与对策的综合研究:数字时代降低风险的策略
Pub Date : 1900-01-01 DOI: 10.54216/jcim.100204
A. Sleem
The digital age has ushered in a new era of connectivity and opportunity. However, it has also made us more vulnerable to cyber threats. In recent years, we have seen a rise in the number and sophistication of cyberattacks. These attacks can have a devastating impact on businesses, governments, and individuals. This paper provides a comprehensive overview of cybersecurity threats and countermeasures. It begins by discussing the different types of cybersecurity threats, including malware, phishing, denial-of-service attacks, and data breaches. The paper then discusses the different types of cybersecurity countermeasures, including firewalls, antivirus software, and intrusion detection systems. The paper concludes by discussing strategies for mitigating risks in the digital age including 1) Investing in cybersecurity solutions, 2) Educating employees about cybersecurity best practices, and 3) Having a plan in place to respond to cyberattacks. By following these strategies, businesses, governments, and individuals can help to protect themselves from cyber threats.
数字时代开启了一个互联互通、充满机遇的新时代。然而,它也使我们更容易受到网络威胁。近年来,我们看到网络攻击的数量和复杂程度都在上升。这些攻击会对企业、政府和个人造成毁灭性的影响。本文全面概述了网络安全威胁及其应对措施。本文首先讨论了不同类型的网络安全威胁,包括恶意软件、网络钓鱼、拒绝服务攻击和数据泄露。然后,本文讨论了不同类型的网络安全对策,包括防火墙、杀毒软件和入侵检测系统。本文最后讨论了在数字时代降低风险的策略,包括1)投资网络安全解决方案,2)对员工进行网络安全最佳实践教育,以及3)制定应对网络攻击的计划。通过遵循这些策略,企业、政府和个人都可以帮助保护自己免受网络威胁。
{"title":"A Comprehensive Study of Cybersecurity Threats and Countermeasures: Strategies for Mitigating Risks in the Digital Age","authors":"A. Sleem","doi":"10.54216/jcim.100204","DOIUrl":"https://doi.org/10.54216/jcim.100204","url":null,"abstract":"The digital age has ushered in a new era of connectivity and opportunity. However, it has also made us more vulnerable to cyber threats. In recent years, we have seen a rise in the number and sophistication of cyberattacks. These attacks can have a devastating impact on businesses, governments, and individuals. This paper provides a comprehensive overview of cybersecurity threats and countermeasures. It begins by discussing the different types of cybersecurity threats, including malware, phishing, denial-of-service attacks, and data breaches. The paper then discusses the different types of cybersecurity countermeasures, including firewalls, antivirus software, and intrusion detection systems. The paper concludes by discussing strategies for mitigating risks in the digital age including 1) Investing in cybersecurity solutions, 2) Educating employees about cybersecurity best practices, and 3) Having a plan in place to respond to cyberattacks. By following these strategies, businesses, governments, and individuals can help to protect themselves from cyber threats.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122335744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning Model for Digital Sales Increasing and Forecasting: Towards Smart E-Commerce 面向智能电子商务的数字销售增长与预测的深度学习模型
Pub Date : 1900-01-01 DOI: 10.54216/jcim.080103
A. Admin
In this paper, we have proposed a system that will be able to forecast the sales of the e-commerce systems by using the techniques of the deep learning, the main goal of this paper is to help the business and the top management level of the company in decision making in order to provide the workplace the effectiveness and the efficiency in the workplace and to provide an efficient and effective system that it is intelligence to forecast and increase the sales of an e-commerce system, this paper will start with building an e-commerce website using different programming languages which are HTML, CSS, Django, JavaScript Bootstrap, and it this e-commerce website will have a specific database that contains different tables for the product list, the orders, and for the user information and many other tables, then the deep learning algorithms such as Deep Belief Networks and Convolutional Neural Networks will be applied in order to provide an effective system for digital marketing usage, so, it will be able to function as a marketing manager.
在本文中,我们提出了一个系统,能够预测的销售电子商务系统通过使用深度学习的技术,本文的主要目的是帮助企业和公司的最高管理层决策提供工作场所有效性和效率在工作场所和提供一个高效和有效的系统,它是智能预测和提高电子商务系统的销售,本文将从使用不同的编程语言(HTML, CSS, Django, JavaScript Bootstrap)建立一个电子商务网站开始,如果这个电子商务网站将有一个特定的数据库,其中包含不同的表,用于产品列表,订单,用户信息和许多其他表,然后,深度学习算法,如深度信念网络和卷积神经网络将被应用,以提供一个有效的系统,为数字营销的使用,所以,它将能够作为一个营销经理。
{"title":"Deep Learning Model for Digital Sales Increasing and Forecasting: Towards Smart E-Commerce","authors":"A. Admin","doi":"10.54216/jcim.080103","DOIUrl":"https://doi.org/10.54216/jcim.080103","url":null,"abstract":"In this paper, we have proposed a system that will be able to forecast the sales of the e-commerce systems by using the techniques of the deep learning, the main goal of this paper is to help the business and the top management level of the company in decision making in order to provide the workplace the effectiveness and the efficiency in the workplace and to provide an efficient and effective system that it is intelligence to forecast and increase the sales of an e-commerce system, this paper will start with building an e-commerce website using different programming languages which are HTML, CSS, Django, JavaScript Bootstrap, and it this e-commerce website will have a specific database that contains different tables for the product list, the orders, and for the user information and many other tables, then the deep learning algorithms such as Deep Belief Networks and Convolutional Neural Networks will be applied in order to provide an effective system for digital marketing usage, so, it will be able to function as a marketing manager.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126766649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
History, Present 2021 and Future of Cyber Attacks 网络攻击的历史、现在、2021和未来
Pub Date : 1900-01-01 DOI: 10.54216/jcim.080204
Mohammed I. Alghamdi
Cyber-attacks are the attacks that target organizations and individuals either as a tool for other activities like identity theft, stalking, etc. or with a computer as a crime object like phishing, hacking, and spamming. Cyber-attacks are rapidly increasing and making cyber security a major concern currently. When launched successfully, cyber-attacks can cause massive damage to individuals and businesses. Hence, immediate response is mandatory to contain the situation in case cyber-attacks occur. In this paper, we will discuss the history, present and future of cyber-attacks and measures for organizations to prevent those attacks in future. The ever-elusive strategies and suspicious nature of criminals should also be identified. We have outlined some of the practices to prevent those attacks while recommending incidence response measures and updates in enterprises.
网络攻击是针对组织和个人的攻击,或者作为其他活动的工具,如身份盗窃,跟踪等,或者作为犯罪对象,如网络钓鱼,黑客攻击和垃圾邮件。网络攻击日益增多,网络安全问题日益突出。一旦成功发动,网络攻击会对个人和企业造成巨大损害。因此,一旦发生网络攻击,必须立即作出反应以控制局势。在本文中,我们将讨论网络攻击的历史、现在和未来,以及组织在未来防止这些攻击的措施。还应查明罪犯难以捉摸的策略和多疑的性质。我们概述了一些防止这些攻击的实践,同时建议企业采取事件响应措施和更新。
{"title":"History, Present 2021 and Future of Cyber Attacks","authors":"Mohammed I. Alghamdi","doi":"10.54216/jcim.080204","DOIUrl":"https://doi.org/10.54216/jcim.080204","url":null,"abstract":"Cyber-attacks are the attacks that target organizations and individuals either as a tool for other activities like identity theft, stalking, etc. or with a computer as a crime object like phishing, hacking, and spamming. Cyber-attacks are rapidly increasing and making cyber security a major concern currently. When launched successfully, cyber-attacks can cause massive damage to individuals and businesses. Hence, immediate response is mandatory to contain the situation in case cyber-attacks occur. In this paper, we will discuss the history, present and future of cyber-attacks and measures for organizations to prevent those attacks in future. The ever-elusive strategies and suspicious nature of criminals should also be identified. We have outlined some of the practices to prevent those attacks while recommending incidence response measures and updates in enterprises.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127550920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the IoT: An Efficient Intrusion Detection System Using Convolutional Network 保护物联网:使用卷积网络的高效入侵检测系统
Pub Date : 1900-01-01 DOI: 10.54216/jcim.010105
H. Yas, Manal M. Nasir
The Internet of Things (IoT) is an ever-expanding network of interconnected devices that enables various applications, such as smart homes, smart cities, and industrial automation. However, with the proliferation of IoT devices, security risks have increased significantly, making it necessary to develop effective intrusion detection systems (IDS) for IoT networks. In this paper, we propose an efficient IDS for complex IoT environments based on convolutional neural networks (CNNs). Our approach uses IoT traffics as input to our CNN architecture to capture representational knowledge required to discriminate different forms of attacks. Our system achieves high accuracy and low false positive rates, even in the presence of complex and dynamic network traffic patterns. We evaluate the performance of our system using public datasets and compare it with other cutting-edge IDS approaches. Our results show that the proposed system outperforms the other approaches in terms of accuracy and false positive rates. The proposed IDS can enhance the security of IoT networks and protect them against various types of cyber-attacks.
物联网(IoT)是一个不断扩展的互联设备网络,可实现各种应用,如智能家居,智能城市和工业自动化。然而,随着物联网设备的激增,安全风险显著增加,因此有必要为物联网网络开发有效的入侵检测系统(IDS)。在本文中,我们提出了一种基于卷积神经网络(cnn)的复杂物联网环境的高效IDS。我们的方法使用物联网流量作为CNN架构的输入,以捕获区分不同形式攻击所需的代表性知识。即使在复杂动态的网络流量模式下,我们的系统也实现了高准确率和低误报率。我们使用公共数据集评估系统的性能,并将其与其他先进的IDS方法进行比较。我们的结果表明,该系统在准确率和误报率方面优于其他方法。提出的IDS可以增强物联网网络的安全性,保护物联网网络免受各种类型的网络攻击。
{"title":"Securing the IoT: An Efficient Intrusion Detection System Using Convolutional Network","authors":"H. Yas, Manal M. Nasir","doi":"10.54216/jcim.010105","DOIUrl":"https://doi.org/10.54216/jcim.010105","url":null,"abstract":"The Internet of Things (IoT) is an ever-expanding network of interconnected devices that enables various applications, such as smart homes, smart cities, and industrial automation. However, with the proliferation of IoT devices, security risks have increased significantly, making it necessary to develop effective intrusion detection systems (IDS) for IoT networks. In this paper, we propose an efficient IDS for complex IoT environments based on convolutional neural networks (CNNs). Our approach uses IoT traffics as input to our CNN architecture to capture representational knowledge required to discriminate different forms of attacks. Our system achieves high accuracy and low false positive rates, even in the presence of complex and dynamic network traffic patterns. We evaluate the performance of our system using public datasets and compare it with other cutting-edge IDS approaches. Our results show that the proposed system outperforms the other approaches in terms of accuracy and false positive rates. The proposed IDS can enhance the security of IoT networks and protect them against various types of cyber-attacks.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129014801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systematic Literature Review on Quantum Cryptography 量子密码学的系统文献综述
Pub Date : 1900-01-01 DOI: 10.54216/jcim.070101
M. Sandhu, Manav .., Rupinder Kaur
In the field of cryptography, new tasks are generated when advancement has taken place from conventional computing to quantum computing. In the case of computer security, cryptography had always been a valuable and essential tool. When quantum mechanics principles are applied to cryptography, it gives rise to a new system that will secure communication and also assures that no spying can take place. The work below presents the review on quantum cryptography, which includes the concept of quantum cryptography and what can be its evaluation measures. Articles of quantum cryptography from various databases have been studied. In this SLR various research questions are identified and on the basis of the results of their answers have been formulated for this review along with that various performance measures are also discussed.
在密码学领域,从传统计算到量子计算的进步产生了新的任务。就计算机安全而言,密码学一直是一种有价值和必不可少的工具。当量子力学原理应用于密码学时,它会产生一个新的系统,它将确保通信安全,并确保不会发生间谍活动。下面的工作介绍了量子密码学的综述,包括量子密码学的概念和量子密码学的评价方法。研究了来自不同数据库的量子密码学文章。在本单反中,确定了各种研究问题,并根据他们的答案结果制定了本综述,同时还讨论了各种性能指标。
{"title":"Systematic Literature Review on Quantum Cryptography","authors":"M. Sandhu, Manav .., Rupinder Kaur","doi":"10.54216/jcim.070101","DOIUrl":"https://doi.org/10.54216/jcim.070101","url":null,"abstract":"In the field of cryptography, new tasks are generated when advancement has taken place from conventional computing to quantum computing. In the case of computer security, cryptography had always been a valuable and essential tool. When quantum mechanics principles are applied to cryptography, it gives rise to a new system that will secure communication and also assures that no spying can take place. The work below presents the review on quantum cryptography, which includes the concept of quantum cryptography and what can be its evaluation measures. Articles of quantum cryptography from various databases have been studied. In this SLR various research questions are identified and on the basis of the results of their answers have been formulated for this review along with that various performance measures are also discussed.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130291237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the Internet of Things (IoT) with Blockchain: A Proof-of-Concept Implementation and Analysis 用区块链保护物联网(IoT):概念验证实施和分析
Pub Date : 1900-01-01 DOI: 10.54216/jcim.100203
Mahmoud A. Zaher, N. M. Eldakhly
The Internet of Things (IoT) has revolutionized the way we interact with everyday objects, enabling devices to collect and share data seamlessly. However, this increased connectivity has also increased the security risks associated with these devices, as they often lack the necessary security mechanisms to prevent malicious attacks. To address this issue, we propose using blockchain technology to secure IoT devices. In this paper, we present a proof-of-concept implementation of a blockchain-based IoT security system and analyze its effectiveness. Our system leverages blockchain's distributed ledger technology to ensure data integrity, decentralization, and transparency, making it more resilient to attacks. We evaluate our system's performance and compare it with other existing IoT security solutions. Our results show that our blockchain-based approach outperforms traditional security measures and is a viable solution for securing IoT devices. Finally, we discuss the limitations of our study and suggest future research directions for improving the security of IoT devices.
物联网(IoT)彻底改变了我们与日常物品的交互方式,使设备能够无缝地收集和共享数据。然而,这种增加的连接性也增加了与这些设备相关的安全风险,因为它们通常缺乏必要的安全机制来防止恶意攻击。为了解决这个问题,我们建议使用区块链技术来保护物联网设备。在本文中,我们提出了基于区块链的物联网安全系统的概念验证实现,并分析了其有效性。我们的系统利用区块链的分布式账本技术来确保数据的完整性、去中心化和透明度,使其更能抵御攻击。我们评估了系统的性能,并将其与其他现有的物联网安全解决方案进行了比较。我们的研究结果表明,基于区块链的方法优于传统的安全措施,是保护物联网设备的可行解决方案。最后,我们讨论了本研究的局限性,并提出了提高物联网设备安全性的未来研究方向。
{"title":"Securing the Internet of Things (IoT) with Blockchain: A Proof-of-Concept Implementation and Analysis","authors":"Mahmoud A. Zaher, N. M. Eldakhly","doi":"10.54216/jcim.100203","DOIUrl":"https://doi.org/10.54216/jcim.100203","url":null,"abstract":"The Internet of Things (IoT) has revolutionized the way we interact with everyday objects, enabling devices to collect and share data seamlessly. However, this increased connectivity has also increased the security risks associated with these devices, as they often lack the necessary security mechanisms to prevent malicious attacks. To address this issue, we propose using blockchain technology to secure IoT devices. In this paper, we present a proof-of-concept implementation of a blockchain-based IoT security system and analyze its effectiveness. Our system leverages blockchain's distributed ledger technology to ensure data integrity, decentralization, and transparency, making it more resilient to attacks. We evaluate our system's performance and compare it with other existing IoT security solutions. Our results show that our blockchain-based approach outperforms traditional security measures and is a viable solution for securing IoT devices. Finally, we discuss the limitations of our study and suggest future research directions for improving the security of IoT devices.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116023637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Artificial Face Mask based Nanofibers with Special Intelligent Engineered Nanocomposite Against Covid-19 基于纳米纤维的新型人工面罩及其特殊智能工程纳米复合材料抗Covid-19
Pub Date : 1900-01-01 DOI: 10.54216/jcim.050203
Ahmed A. Elngar, S. El-dek
We introduce our idea about a new face mask against Covid-19. Herein our novel face mask is a polymeric matrix of nanofibers. These nanofibers are decorated with special engineered nanocomposite. The later possesses antiviral, antimicrobial. A well-established IR temperature biosensor will be implanted in the face mask and connected to the mobile phone using App (Seek thermal) to allow temperature monitoring. Artificial Intelligence can play a vital role in the fight against COVID-19. AI is being successfully used in the identification of disease clusters, monitoring of cases, prediction of the future outbreaks, mortality risk, diagnosis of COVID-19, disease management by resource allocation, facilitating training, record maintenance and pattern recognition for studying the disease trend. Therefore, AI is used as a type of alarm which be connected through Global Position System (GPS) to a central networking system to monitor the crowded areas of probable infections. In this case, the hospital in this neighborhood will be charged to let a mobile unit of assessment travel quickly to the infected people areas.
我们介绍了一种新型口罩的想法。在这里,我们的新型面罩是纳米纤维的聚合物基质。这些纳米纤维用特殊的工程纳米复合材料装饰。后者具有抗病毒、抗菌作用。将成熟的红外温度生物传感器植入口罩内,使用App (Seek thermal)与手机连接,进行温度监测。人工智能可以在抗击COVID-19中发挥至关重要的作用。人工智能正在成功地应用于疾病聚集性识别、病例监测、未来疫情预测、死亡风险、COVID-19诊断、通过资源分配进行疾病管理、促进培训、记录维护和模式识别以研究疾病趋势。因此,人工智能被用作一种警报,通过全球定位系统(GPS)连接到中央网络系统,对可能感染的人群密集地区进行监测。在这种情况下,该社区的医院将被要求让一个流动评估小组迅速前往感染者地区。
{"title":"A Novel Artificial Face Mask based Nanofibers with Special Intelligent Engineered Nanocomposite Against Covid-19","authors":"Ahmed A. Elngar, S. El-dek","doi":"10.54216/jcim.050203","DOIUrl":"https://doi.org/10.54216/jcim.050203","url":null,"abstract":"We introduce our idea about a new face mask against Covid-19. Herein our novel face mask is a polymeric matrix of nanofibers. These nanofibers are decorated with special engineered nanocomposite. The later possesses antiviral, antimicrobial. A well-established IR temperature biosensor will be implanted in the face mask and connected to the mobile phone using App (Seek thermal) to allow temperature monitoring. Artificial Intelligence can play a vital role in the fight against COVID-19. AI is being successfully used in the identification of disease clusters, monitoring of cases, prediction of the future outbreaks, mortality risk, diagnosis of COVID-19, disease management by resource allocation, facilitating training, record maintenance and pattern recognition for studying the disease trend. Therefore, AI is used as a type of alarm which be connected through Global Position System (GPS) to a central networking system to monitor the crowded areas of probable infections. In this case, the hospital in this neighborhood will be charged to let a mobile unit of assessment travel quickly to the infected people areas.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114432785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
Journal of Cybersecurity and Information Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1