首页 > 最新文献

Journal of Cybersecurity and Information Management最新文献

英文 中文
Smart Model for Securing Software Defined Networks 保护软件定义网络的智能模型
Pub Date : 1900-01-01 DOI: 10.54216/jcim.0100101
Mohammed I. Alghamdi, Abeer. Y. Salawi, Salwa Alghamdi
Software defined networks (SDN) remain a hot research field as it provides controllable networking operations. The SDN controller can be treated as the operating system of the SDN model and it holds the responsibility of performing different networking applications. Despite the benefits of SDN, security remains a challenging problem. At the same time, distributed denial of services (DDoS) is a typical attack on SDN owing to centralized architecture, especially at the control layer of the SDN. This article develops a new Cat Swarm Optimization with Fuzzy Rule Base Classification (CSO-FRBCC) model for cybersecurity in SDN. The presented CSO-FRBCC model intends to effectually categorize the occurrence of DDoS attacks in SDN. To achieve this, the CSO-FRBCC model primarily pre-processes the input data to transform it to a uniform format. Besides, the CSO-FRBCC model employs FRBCC classifier for the recognition and classification of intrusions. Moreover, the parameter optimization of the FRBCC classification model is adjusted by the use of cat swarm optimization (CSO) algorithm which results in improved performance. A comprehensive set of simulations were carried out on benchmark dataset and the results highlighted the enhanced outcomes of the CSO-FRBCC model over the other recent approaches.
软件定义网络(SDN)由于能够提供可控的网络操作,一直是研究的热点。SDN控制器可以看作是SDN模型的操作系统,它负责执行不同的网络应用程序。尽管SDN有很多好处,但安全性仍然是一个具有挑战性的问题。同时,分布式拒绝服务(DDoS, distributed denial of services)是针对SDN的一种典型攻击方式,其集中式架构尤其体现在SDN的控制层。本文提出了一种新的基于模糊规则基分类的Cat群优化(CSO-FRBCC)网络安全模型。本文提出的CSO-FRBCC模型旨在对SDN中DDoS攻击的发生进行有效的分类。为了实现这一点,CSO-FRBCC模型主要对输入数据进行预处理,将其转换为统一的格式。此外,CSO-FRBCC模型采用FRBCC分类器对入侵进行识别和分类。此外,采用猫群优化(CSO)算法对FRBCC分类模型的参数优化进行调整,提高了分类性能。在基准数据集上进行了一组全面的模拟,结果突出了CSO-FRBCC模型优于其他最新方法的结果。
{"title":"Smart Model for Securing Software Defined Networks","authors":"Mohammed I. Alghamdi, Abeer. Y. Salawi, Salwa Alghamdi","doi":"10.54216/jcim.0100101","DOIUrl":"https://doi.org/10.54216/jcim.0100101","url":null,"abstract":"Software defined networks (SDN) remain a hot research field as it provides controllable networking operations. The SDN controller can be treated as the operating system of the SDN model and it holds the responsibility of performing different networking applications. Despite the benefits of SDN, security remains a challenging problem. At the same time, distributed denial of services (DDoS) is a typical attack on SDN owing to centralized architecture, especially at the control layer of the SDN. This article develops a new Cat Swarm Optimization with Fuzzy Rule Base Classification (CSO-FRBCC) model for cybersecurity in SDN. The presented CSO-FRBCC model intends to effectually categorize the occurrence of DDoS attacks in SDN. To achieve this, the CSO-FRBCC model primarily pre-processes the input data to transform it to a uniform format. Besides, the CSO-FRBCC model employs FRBCC classifier for the recognition and classification of intrusions. Moreover, the parameter optimization of the FRBCC classification model is adjusted by the use of cat swarm optimization (CSO) algorithm which results in improved performance. A comprehensive set of simulations were carried out on benchmark dataset and the results highlighted the enhanced outcomes of the CSO-FRBCC model over the other recent approaches.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122786785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting Medical Data on the Internet of Things with an Integrated Chaotic-GIFT Lightweight Encryption Algorithm 基于集成混沌- gift轻量级加密算法的物联网医疗数据保护
Pub Date : 1900-01-01 DOI: 10.54216/jcim.120105
H. Fadhil, M. Elhoseny, B. M. Mushgil
The secure transmission of medical data is crucial for the protection of patients' privacy and confidentiality. With the advent of IoT in healthcare, medical data is being transmitted over networks that are vulnerable to cyberattacks. Therefore, there is an urgent need for lightweight yet secure encryption algorithms that can protect medical data in transit. In this paper, we propose an integrated Chaotic-GIFT algorithm for lightweight and robust encryption of medical data transmitted over IoT networks. The proposed algorithm combines the chaos theory with a lightweight block cipher to provide secure and efficient encryption of medical data. The Chaotic-GIFT algorithm employs bit-level shuffling and substitution of medical images to provide encryption, while the chaotic sequence generated by the logistic map is used as the cryptographic key for added security. The proposed Chaotic-GIFT algorithm provides a lightweight and efficient solution for the secure transmission of medical data over IoT networks. Evaluation of the algorithm's effectiveness was conducted using multiple metrics including encryption and decryption time, throughput, avalanche effect, non-linearity analysis, and correlation coefficient.
医疗数据的安全传输对于保护患者的隐私和保密性至关重要。随着物联网在医疗保健领域的出现,医疗数据正在通过易受网络攻击的网络传输。因此,迫切需要一种轻量级且安全的加密算法来保护传输中的医疗数据。在本文中,我们提出了一种集成的混沌- gift算法,用于在物联网网络上传输的医疗数据的轻量级和鲁棒加密。该算法将混沌理论与轻量级分组密码相结合,提供安全高效的医疗数据加密。chaotic - gift算法采用医学图像的位级变换和替换来提供加密,同时使用逻辑映射生成的混沌序列作为加密密钥来增加安全性。本文提出的Chaotic-GIFT算法为医疗数据在物联网网络上的安全传输提供了一种轻量级、高效的解决方案。使用加解密时间、吞吐量、雪崩效应、非线性分析和相关系数等多个指标对算法的有效性进行了评估。
{"title":"Protecting Medical Data on the Internet of Things with an Integrated Chaotic-GIFT Lightweight Encryption Algorithm","authors":"H. Fadhil, M. Elhoseny, B. M. Mushgil","doi":"10.54216/jcim.120105","DOIUrl":"https://doi.org/10.54216/jcim.120105","url":null,"abstract":"The secure transmission of medical data is crucial for the protection of patients' privacy and confidentiality. With the advent of IoT in healthcare, medical data is being transmitted over networks that are vulnerable to cyberattacks. Therefore, there is an urgent need for lightweight yet secure encryption algorithms that can protect medical data in transit. In this paper, we propose an integrated Chaotic-GIFT algorithm for lightweight and robust encryption of medical data transmitted over IoT networks. The proposed algorithm combines the chaos theory with a lightweight block cipher to provide secure and efficient encryption of medical data. The Chaotic-GIFT algorithm employs bit-level shuffling and substitution of medical images to provide encryption, while the chaotic sequence generated by the logistic map is used as the cryptographic key for added security. The proposed Chaotic-GIFT algorithm provides a lightweight and efficient solution for the secure transmission of medical data over IoT networks. Evaluation of the algorithm's effectiveness was conducted using multiple metrics including encryption and decryption time, throughput, avalanche effect, non-linearity analysis, and correlation coefficient.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114226236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unraveling the Decision-making Process Interpretable Deep Learning IDS for Transportation Network Security 交通网络安全决策过程的可解释深度学习IDS
Pub Date : 1900-01-01 DOI: 10.54216/jcim.120205
Rajit Nair
The growing ubiquity of IoT-enabled devices in recent years emphasizes the critical need to strengthen transportation network safety and dependability. Intrusion detection systems (IDS) are crucial in preventing attacks on transport networks that rely on the Internet of Things (IoT). However, understanding the rationale behind deep learning-based IDS models may be challenging because they do not explain their findings. We offer an interpretable deep learning system that may be used to improve transportation network safety using IoT. To develop naturally accessible explanations for IDS projections, we integrate deep learning models with the Shapley Additive Reasons (SHAP) approach. By adding weight to distinct elements of the input data needed to develop the model, we increase the readability of so-called black box processes. We use the ToN_IoT dataset, which provides statistics on the volume of network traffic created by IoT-enabled transport systems, to assess the success of our strategy. We use a tool called CICFlowMeter to create network flows and collect data. The regularity of the flows, as well as their correlation with specific assaults, has been documented, allowing us to train and evaluate the IDS model. The experiment findings show that our explainable deep learning system is extremely accurate at detecting and categorising intrusions in IoT-enabled transportation networks. By examining data using the SHAP approach, cybersecurity specialists may learn more about the IDS's decision-making process. This enables the development of robust solutions, which improves the overall security of the Internet of Things. Aside from simplifying IDS predictions, the proposed technique provides useful recommendations for strengthening the resilience of IoT-enabled transportation systems against cyberattacks. The usefulness of IDS in defending mission critical IoT infrastructure has been questioned by security experts in the Internet of Vehicles (IoV) industry. The IoV is the primary research object in this case. Deep learning algorithms' versatility in processing many forms of data has contributed to their growing prominence in the field of anomaly detection in intrusion detection systems. Although machine learning models may be highly useful, they frequently yield false positives, and the path they follow to their conclusions is not always obvious to humans. Cybersecurity experts who want to evaluate the performance of a system or design more secure solutions need to understand the thinking process behind an IDS's results. The SHAP approach is employed in our proposed framework to give greater insight into the decisions made by IDSs that depend on deep learning. As a result, IoT network security is strengthened, and more cyber-resilient systems are developed. We demonstrate the effectiveness of our technique by comparing it to other credible methods and utilising the ToN_IoT dataset. Our framework has the best success rate when compared to other framew
近年来,物联网设备的日益普及强调了加强交通网络安全性和可靠性的迫切需要。入侵检测系统(IDS)对于防止对依赖物联网(IoT)的传输网络的攻击至关重要。然而,理解基于深度学习的IDS模型背后的基本原理可能具有挑战性,因为它们不能解释他们的发现。我们提供了一个可解释的深度学习系统,可用于通过物联网提高交通网络的安全性。为了开发IDS预测的自然解释,我们将深度学习模型与Shapley加性原因(SHAP)方法集成在一起。通过为开发模型所需的输入数据的不同元素添加权重,我们增加了所谓的黑盒过程的可读性。我们使用ToN_IoT数据集,该数据集提供了由支持物联网的传输系统创建的网络流量的统计数据,以评估我们战略的成功。我们使用一个名为CICFlowMeter的工具来创建网络流并收集数据。流量的规律性,以及它们与特定攻击的相关性,已经被记录下来,使我们能够训练和评估IDS模型。实验结果表明,我们的可解释深度学习系统在检测和分类物联网交通网络中的入侵方面非常准确。通过使用SHAP方法检查数据,网络安全专家可以更多地了解IDS的决策过程。这样可以开发健壮的解决方案,从而提高物联网的整体安全性。除了简化IDS预测之外,所提出的技术还为加强物联网运输系统抵御网络攻击的弹性提供了有用的建议。IDS在保护关键任务物联网基础设施方面的实用性受到了车联网(IoV)行业安全专家的质疑。在这种情况下,IoV是主要的研究对象。深度学习算法在处理多种形式数据方面的通用性使其在入侵检测系统中的异常检测领域日益突出。尽管机器学习模型可能非常有用,但它们经常产生误报,而且它们得出结论的路径对人类来说并不总是显而易见的。想要评估系统性能或设计更安全解决方案的网络安全专家需要了解IDS结果背后的思考过程。在我们提出的框架中采用了SHAP方法,以更深入地了解依赖深度学习的ids做出的决策。因此,物联网网络安全性得到加强,并开发出更多的网络弹性系统。我们通过将其与其他可信方法进行比较并利用ToN_IoT数据集来证明我们技术的有效性。与其他框架相比,我们的框架具有最好的成功率,测试结果显示F1得分为98.83%,准确率为99.15%。这些发现表明,该架构成功抵御了对物联网网络的各种破坏性攻击。通过整合深度学习和强调可解释性的方法,我们的方法显着提高了物联网使用场景中的网络安全性。评估和掌握IDS选项的能力为网络安全专家设计和构建更安全的物联网系统提供了途径。
{"title":"Unraveling the Decision-making Process Interpretable Deep Learning IDS for Transportation Network Security","authors":"Rajit Nair","doi":"10.54216/jcim.120205","DOIUrl":"https://doi.org/10.54216/jcim.120205","url":null,"abstract":"The growing ubiquity of IoT-enabled devices in recent years emphasizes the critical need to strengthen transportation network safety and dependability. Intrusion detection systems (IDS) are crucial in preventing attacks on transport networks that rely on the Internet of Things (IoT). However, understanding the rationale behind deep learning-based IDS models may be challenging because they do not explain their findings. We offer an interpretable deep learning system that may be used to improve transportation network safety using IoT. To develop naturally accessible explanations for IDS projections, we integrate deep learning models with the Shapley Additive Reasons (SHAP) approach. By adding weight to distinct elements of the input data needed to develop the model, we increase the readability of so-called black box processes. We use the ToN_IoT dataset, which provides statistics on the volume of network traffic created by IoT-enabled transport systems, to assess the success of our strategy. We use a tool called CICFlowMeter to create network flows and collect data. The regularity of the flows, as well as their correlation with specific assaults, has been documented, allowing us to train and evaluate the IDS model. The experiment findings show that our explainable deep learning system is extremely accurate at detecting and categorising intrusions in IoT-enabled transportation networks. By examining data using the SHAP approach, cybersecurity specialists may learn more about the IDS's decision-making process. This enables the development of robust solutions, which improves the overall security of the Internet of Things. Aside from simplifying IDS predictions, the proposed technique provides useful recommendations for strengthening the resilience of IoT-enabled transportation systems against cyberattacks. The usefulness of IDS in defending mission critical IoT infrastructure has been questioned by security experts in the Internet of Vehicles (IoV) industry. The IoV is the primary research object in this case. Deep learning algorithms' versatility in processing many forms of data has contributed to their growing prominence in the field of anomaly detection in intrusion detection systems. Although machine learning models may be highly useful, they frequently yield false positives, and the path they follow to their conclusions is not always obvious to humans. Cybersecurity experts who want to evaluate the performance of a system or design more secure solutions need to understand the thinking process behind an IDS's results. The SHAP approach is employed in our proposed framework to give greater insight into the decisions made by IDSs that depend on deep learning. As a result, IoT network security is strengthened, and more cyber-resilient systems are developed. We demonstrate the effectiveness of our technique by comparing it to other credible methods and utilising the ToN_IoT dataset. Our framework has the best success rate when compared to other framew","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116265223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Chaos-based Approach for Robust Image Encryption 一种基于混沌的鲁棒图像加密新方法
Pub Date : 1900-01-01 DOI: 10.54216/jcim.070104
F. Khalifa, A. Khalil, M. A. Mohamed
Chaotic encryptions offered various advantages over traditional encryption methods, like high security, speed, reasonable computational overheads. This paper introduces novel perturbation techniques for data encryption based on double chaotic systems. A new technique for image encryption utilizing mixed the proposed chaotic maps is presented. The proposed hybrid system parallels and combines two chaotic maps as part of a new chaotification method. It based on permutation, diffusion and system parameters, which are then involved in pixel shuffling and substitution operations, respectively. Many statistical test and security analysis indicate the validity of the results, e.g., the average values for NPCR and UACI are 99.67145% and 33.63288%, respectively. The proposed technique can achieve low residual intelligibility, high sensitivity and quality of recovered data, high security performance, and it show that the encrypted image has good resistance against attacks.
与传统加密方法相比,混沌加密具有安全性高、速度快、计算开销合理等优点。介绍了一种新的基于双混沌系统的数据加密摄动技术。提出了一种利用混合混沌映射进行图像加密的新技术。该混合系统平行并结合了两个混沌映射,作为新的混沌化方法的一部分。它基于排列、扩散和系统参数,然后分别涉及像素洗牌和替换操作。许多统计检验和安全性分析表明了结果的有效性,如NPCR和UACI的平均值分别为99.67145%和33.63288%。该技术可以实现低残差清晰度、高灵敏度和高质量的恢复数据,具有较高的安全性能,表明加密后的图像具有良好的抗攻击能力。
{"title":"A New Chaos-based Approach for Robust Image Encryption","authors":"F. Khalifa, A. Khalil, M. A. Mohamed","doi":"10.54216/jcim.070104","DOIUrl":"https://doi.org/10.54216/jcim.070104","url":null,"abstract":"Chaotic encryptions offered various advantages over traditional encryption methods, like high security, speed, reasonable computational overheads. This paper introduces novel perturbation techniques for data encryption based on double chaotic systems. A new technique for image encryption utilizing mixed the proposed chaotic maps is presented. The proposed hybrid system parallels and combines two chaotic maps as part of a new chaotification method. It based on permutation, diffusion and system parameters, which are then involved in pixel shuffling and substitution operations, respectively. Many statistical test and security analysis indicate the validity of the results, e.g., the average values for NPCR and UACI are 99.67145% and 33.63288%, respectively. The proposed technique can achieve low residual intelligibility, high sensitivity and quality of recovered data, high security performance, and it show that the encrypted image has good resistance against attacks.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114638897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Efficient Smartphone Assisted Indoor Localization with Tracking Approach using Glowworm Swarm Optimization Algorithm 基于萤火虫群优化算法的智能手机辅助室内定位方法
Pub Date : 1900-01-01 DOI: 10.54216/jcim.060203
Mohammad Alshehri
Presently, a precise localization and tracking process becomes significant to enable smartphone-assisted navigation to maximize accuracy in the real-time environment. Fingerprint-based localization is the commonly available model for accomplishing effective outcomes. With this motivation, this study focuses on designing efficient smartphone-assisted indoor localization and tracking models using the glowworm swarm optimization (ILT-GSO) algorithm. The ILT-GSO algorithm involves creating a GSO algorithm based on the light-emissive characteristics of glowworms to determine the location. In addition, the Kalman filter is applied to mitigate the estimation process and update the initial position of the glowworms. A wide range of experiments was carried out, and the results are investigated in terms of distinct evaluation metrics. The simulation outcome demonstrated considerable enhancement in the real-time environment and reduced the computational complexity. The ILT-GSO algorithm has resulted in an increased localization performance with minimal error over the recent techniques.
目前,精确的定位和跟踪过程对于使智能手机辅助导航在实时环境中最大限度地提高精度变得至关重要。基于指纹的定位是实现有效结果的常用模型。基于这一动机,本研究的重点是利用萤火虫群优化(ILT-GSO)算法设计高效的智能手机辅助室内定位和跟踪模型。ILT-GSO算法是根据萤火虫的发光特性创建GSO算法来确定位置。此外,还采用卡尔曼滤波来缓解估计过程,并更新萤火虫的初始位置。进行了广泛的实验,并根据不同的评价指标对结果进行了调查。仿真结果表明,该方法在实时环境下具有显著的增强效果,并降低了计算复杂度。与最近的技术相比,ILT-GSO算法以最小的误差提高了定位性能。
{"title":"An Efficient Smartphone Assisted Indoor Localization with Tracking Approach using Glowworm Swarm Optimization Algorithm","authors":"Mohammad Alshehri","doi":"10.54216/jcim.060203","DOIUrl":"https://doi.org/10.54216/jcim.060203","url":null,"abstract":"Presently, a precise localization and tracking process becomes significant to enable smartphone-assisted navigation to maximize accuracy in the real-time environment. Fingerprint-based localization is the commonly available model for accomplishing effective outcomes. With this motivation, this study focuses on designing efficient smartphone-assisted indoor localization and tracking models using the glowworm swarm optimization (ILT-GSO) algorithm. The ILT-GSO algorithm involves creating a GSO algorithm based on the light-emissive characteristics of glowworms to determine the location. In addition, the Kalman filter is applied to mitigate the estimation process and update the initial position of the glowworms. A wide range of experiments was carried out, and the results are investigated in terms of distinct evaluation metrics. The simulation outcome demonstrated considerable enhancement in the real-time environment and reduced the computational complexity. The ILT-GSO algorithm has resulted in an increased localization performance with minimal error over the recent techniques.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132271092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data Driven Machine Learning For Fault Detection And Classification In Binary Distillation Column 数据驱动机器学习在二元精馏塔故障检测与分类中的应用
Pub Date : 1900-01-01 DOI: 10.54216/jcim.110105
S. -, M. Mythily, D. ., D. Manamalli
Mathematical programming can express competency concepts in a well-defined mathematical model for a particular Any system that runs is always be expected to experience faults in different ways. Any change in the physical state of numerous components, control machinery, as well as environmental factors, might result in these problems. In process industries, where prompt detection is crucial in maintaining high product quality, dependability, and safety under various operating situations, finding these flaws is one of the most difficult tasks. The goal of this project is to implement several machine learning techniques for fault identification and classification in a binary distillation column. A pilot binary distillation unit (UOP3CC) is utilized for this purpose. The set up is run under normal operating conditions and the real time data is collected. Three common faults namely reboiler fault, feed pump fault and sensor fault are introduced one at a time and the faulty data is collected. These data are then introduced in to different machine learning algorithms like Logistic Regression, KNN, Naive Bayes, Decision Tree, Gradient Boosting, X Gradient Boosting, SVC and Light Gradient Boosting for model development. 70% of the data samples used for training and 30% of data samples are used for testing. It is found the Decision tree algorithm gives the best accuracy possible with 99.9%. Using decision tree algorithm, fault classification is performed for different datasets and is found that the algorithm was able to classify accurately even for new untrained datasets.
数学规划可以在一个定义良好的数学模型中表达能力概念,用于特定的任何运行的系统总是被期望以不同的方式经历故障。许多部件、控制机械以及环境因素的物理状态的任何变化都可能导致这些问题。在过程工业中,及时检测对于在各种操作情况下保持高产品质量、可靠性和安全性至关重要,发现这些缺陷是最困难的任务之一。本项目的目标是实现几种机器学习技术,用于二元精馏塔的故障识别和分类。为此目的使用了一个中试二元蒸馏装置(UOP3CC)。该装置在正常运行条件下运行,并实时收集数据。分别介绍了再沸器故障、给水泵故障和传感器故障三种常见故障,并收集了故障数据。然后将这些数据引入到不同的机器学习算法中,如逻辑回归、KNN、朴素贝叶斯、决策树、梯度增强、X梯度增强、SVC和轻梯度增强,用于模型开发。70%的数据样本用于训练,30%的数据样本用于测试。结果表明,决策树算法的准确率达到了99.9%。利用决策树算法对不同的数据集进行故障分类,发现该算法即使对新的未经训练的数据集也能准确分类。
{"title":"Data Driven Machine Learning For Fault Detection And Classification In Binary Distillation Column","authors":"S. -, M. Mythily, D. ., D. Manamalli","doi":"10.54216/jcim.110105","DOIUrl":"https://doi.org/10.54216/jcim.110105","url":null,"abstract":"Mathematical programming can express competency concepts in a well-defined mathematical model for a particular Any system that runs is always be expected to experience faults in different ways. Any change in the physical state of numerous components, control machinery, as well as environmental factors, might result in these problems. In process industries, where prompt detection is crucial in maintaining high product quality, dependability, and safety under various operating situations, finding these flaws is one of the most difficult tasks. The goal of this project is to implement several machine learning techniques for fault identification and classification in a binary distillation column. A pilot binary distillation unit (UOP3CC) is utilized for this purpose. The set up is run under normal operating conditions and the real time data is collected. Three common faults namely reboiler fault, feed pump fault and sensor fault are introduced one at a time and the faulty data is collected. These data are then introduced in to different machine learning algorithms like Logistic Regression, KNN, Naive Bayes, Decision Tree, Gradient Boosting, X Gradient Boosting, SVC and Light Gradient Boosting for model development. 70% of the data samples used for training and 30% of data samples are used for testing. It is found the Decision tree algorithm gives the best accuracy possible with 99.9%. Using decision tree algorithm, fault classification is performed for different datasets and is found that the algorithm was able to classify accurately even for new untrained datasets.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128557368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dragonfly Algorithm with Gated Recurrent Unit for Cybersecurity in Social Networking 基于门控循环单元的网络安全蜻蜓算法
Pub Date : 1900-01-01 DOI: 10.54216/jcim.000107
Yutao Han, I. M. El-Hasnony, Wenbo Cai
The advancements of information technologies and wireless networks have created open online communication channels. Inappropriately, trolls have abused the technologies to impose cyberattacks and threats. Automated cybersecurity solutions are essential to avoid the threats and security issues in social media. This paper presents an efficient dragonfly algorithm (DFA) with gated recurrent unit (GRU) for cybersecurity in social networking. The proposed DFA-GRU model aims to determine the social networking data into neural statements or insult (cyberbullying) statements. Besides, the DFA-GRU model primarily undergoes preprocessing to get rid of unwanted data and TF-IDF vectorizer is used. In addition, the GRU model is employed for the classification process in which the hyperparameters are optimally adjusted by the use of DFA, and thereby the overall classification results get improved. The performance validation of the DFA-GRU model is carried out using benchmark dataset and the results are examined under varying aspects. The experimental outcome highlighted the enhanced performance of the DFA-GRU model interms of distinct measures.
信息技术和无线网络的进步创造了开放的在线交流渠道。网络喷子不恰当地滥用这些技术实施网络攻击和威胁。自动化网络安全解决方案对于避免社交媒体中的威胁和安全问题至关重要。本文提出了一种有效的带有门控循环单元(GRU)的蜻蜓算法(DFA),用于社交网络中的网络安全。提出的DFA-GRU模型旨在将社交网络数据确定为神经语句或侮辱(网络欺凌)语句。DFA-GRU模型主要通过预处理去除不需要的数据,并使用TF-IDF矢量器。此外,在分类过程中采用GRU模型,利用DFA对超参数进行最优调整,从而提高了整体分类结果。使用基准数据集对DFA-GRU模型进行了性能验证,并从多个方面对结果进行了检验。实验结果突出了DFA-GRU模型在不同测量指标方面的增强性能。
{"title":"Dragonfly Algorithm with Gated Recurrent Unit for Cybersecurity in Social Networking","authors":"Yutao Han, I. M. El-Hasnony, Wenbo Cai","doi":"10.54216/jcim.000107","DOIUrl":"https://doi.org/10.54216/jcim.000107","url":null,"abstract":"The advancements of information technologies and wireless networks have created open online communication channels. Inappropriately, trolls have abused the technologies to impose cyberattacks and threats. Automated cybersecurity solutions are essential to avoid the threats and security issues in social media. This paper presents an efficient dragonfly algorithm (DFA) with gated recurrent unit (GRU) for cybersecurity in social networking. The proposed DFA-GRU model aims to determine the social networking data into neural statements or insult (cyberbullying) statements. Besides, the DFA-GRU model primarily undergoes preprocessing to get rid of unwanted data and TF-IDF vectorizer is used. In addition, the GRU model is employed for the classification process in which the hyperparameters are optimally adjusted by the use of DFA, and thereby the overall classification results get improved. The performance validation of the DFA-GRU model is carried out using benchmark dataset and the results are examined under varying aspects. The experimental outcome highlighted the enhanced performance of the DFA-GRU model interms of distinct measures.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132730504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Brain Storm Optimization with Long Short Term Memory Enabled Phishing Webpage Classification for Cybersecurity 头脑风暴优化与长短期记忆支持网络钓鱼网页分类
Pub Date : 1900-01-01 DOI: 10.54216/jcim.090202
M. Zaher, N. M. Eldakhly
Phishing is a familiar kind of cyberattack in the present digital world. Phishing detection with maximum performance accuracy and minimum computational complexity is continuously a topic of much interest. A novel technology was established for improving the phishing detection rate and decreasing computational constraints recently. But, one solution has inadequate for addressing every problem due to attackers from cyberspace. Thus, the initial objective of this work is for analysing the performance of different deep learning (DL) techniques from detection phishing activity. This study introduces a novel Brain Storm Optimization with Long Short Term Memory Enabled Phishing Webpage Classification (BSOLSTM-PWC) for Cybersecurity. The proposed BSOLSTM-PWC technique enables to accomplish cybersecurity by the identification and classification of phishing webpages. To accomplish this, the BSOLSTM-PWC technique initially employs data pre-processing technique to transform the data into actual format. Besides, the BSOLSTM-PWC technique employs LSTM classifier for the identification and categorization of phishing webpages. Moreover, the BSO algorithm is utilized to appropriately adjust the hyperparameters involved in the LSTM model. For reporting the improved outcomes of the BSOLSTM-PWC method, a wide-ranging simulation analysis is made using benchmark dataset. The experimental outcomes reported the enhanced outcomes of the BSOLSTM-PWC method on existing methods.
网络钓鱼是当今数字世界中常见的一种网络攻击。如何以最大的性能精度和最小的计算复杂度进行网络钓鱼检测一直是人们关注的话题。近年来,为了提高网络钓鱼检测率和减少计算约束,建立了一种新的网络钓鱼检测技术。但是,一个解决方案不足以解决网络空间攻击者带来的所有问题。因此,这项工作的初始目标是分析检测网络钓鱼活动的不同深度学习(DL)技术的性能。本文介绍了一种基于长短期记忆的网络钓鱼网页分类(BSOLSTM-PWC)的网络安全头脑风暴优化方法。提出的BSOLSTM-PWC技术能够通过对网络钓鱼网页的识别和分类来实现网络安全。为此,BSOLSTM-PWC技术首先采用数据预处理技术将数据转换为实际格式。此外,BSOLSTM-PWC技术采用LSTM分类器对网络钓鱼网页进行识别和分类。此外,利用BSO算法对LSTM模型中涉及的超参数进行适当调整。为了报告BSOLSTM-PWC方法的改进结果,使用基准数据集进行了广泛的模拟分析。实验结果报告了BSOLSTM-PWC方法对现有方法的增强结果。
{"title":"Brain Storm Optimization with Long Short Term Memory Enabled Phishing Webpage Classification for Cybersecurity","authors":"M. Zaher, N. M. Eldakhly","doi":"10.54216/jcim.090202","DOIUrl":"https://doi.org/10.54216/jcim.090202","url":null,"abstract":"Phishing is a familiar kind of cyberattack in the present digital world. Phishing detection with maximum performance accuracy and minimum computational complexity is continuously a topic of much interest. A novel technology was established for improving the phishing detection rate and decreasing computational constraints recently. But, one solution has inadequate for addressing every problem due to attackers from cyberspace. Thus, the initial objective of this work is for analysing the performance of different deep learning (DL) techniques from detection phishing activity. This study introduces a novel Brain Storm Optimization with Long Short Term Memory Enabled Phishing Webpage Classification (BSOLSTM-PWC) for Cybersecurity. The proposed BSOLSTM-PWC technique enables to accomplish cybersecurity by the identification and classification of phishing webpages. To accomplish this, the BSOLSTM-PWC technique initially employs data pre-processing technique to transform the data into actual format. Besides, the BSOLSTM-PWC technique employs LSTM classifier for the identification and categorization of phishing webpages. Moreover, the BSO algorithm is utilized to appropriately adjust the hyperparameters involved in the LSTM model. For reporting the improved outcomes of the BSOLSTM-PWC method, a wide-ranging simulation analysis is made using benchmark dataset. The experimental outcomes reported the enhanced outcomes of the BSOLSTM-PWC method on existing methods.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132838427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chaos Based Stego Color Image Encryption 基于混沌的Stego彩色图像加密
Pub Date : 1900-01-01 DOI: 10.54216/jcim.100201
M. I. F. Allah
Intensive studies have been done to get robust encryption algorithms. Due to the importance of image information, image encryption has become played a vital rule in information security. Many image encryption schemes have been proposed but most of them suffer from poor robustness against severe types of attacks. In this paper two proposed techniques will be presented for color image encryption to be robust to severe attacks: composite attack. One of these approaches is represented by hybrid use of both steganography and Discrete Wavelet Transform (DWT) based encryption and the other one in which Fractional Fast Fourier Transform (FRFFT) has been used with DWT. Not only new techniques will be presented but also a new chaotic map has been used as random keys for both algorithms. After extensive comparative study with some traditional techniques, it has been found that the proposed algorithms have achieved better performance.
为了获得健壮的加密算法,已经进行了深入的研究。由于图像信息的重要性,图像加密在信息安全中发挥着至关重要的作用。目前已经提出了许多图像加密方案,但大多数方案对严重攻击的鲁棒性较差。本文提出了两种彩色图像加密技术,以使其对严重的攻击具有鲁棒性:复合攻击。其中一种方法是混合使用隐写术和基于离散小波变换(DWT)的加密,另一种方法是将分数阶快速傅立叶变换(FRFFT)与DWT结合使用。这两种算法不仅提出了新的技术,而且还使用了一种新的混沌映射作为随机密钥。经过与一些传统技术的广泛对比研究,发现所提出的算法取得了更好的性能。
{"title":"Chaos Based Stego Color Image Encryption","authors":"M. I. F. Allah","doi":"10.54216/jcim.100201","DOIUrl":"https://doi.org/10.54216/jcim.100201","url":null,"abstract":"Intensive studies have been done to get robust encryption algorithms. Due to the importance of image information, image encryption has become played a vital rule in information security. Many image encryption schemes have been proposed but most of them suffer from poor robustness against severe types of attacks. In this paper two proposed techniques will be presented for color image encryption to be robust to severe attacks: composite attack. One of these approaches is represented by hybrid use of both steganography and Discrete Wavelet Transform (DWT) based encryption and the other one in which Fractional Fast Fourier Transform (FRFFT) has been used with DWT. Not only new techniques will be presented but also a new chaotic map has been used as random keys for both algorithms. After extensive comparative study with some traditional techniques, it has been found that the proposed algorithms have achieved better performance.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123854549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comprehensive Analysis of Cyber Security Protection Approaches for Financial Firms: A Case of Al Rajhi Bank, Saudi Arabia 金融企业网络安全保护方法的综合分析——以沙特阿拉伯Al Rajhi银行为例
Pub Date : 1900-01-01 DOI: 10.54216/jcim.090101
Mohammed I. Alghamdi
In the modern internet-connected society, technologies underpin almost every action in society. Although there have been positive effects of technologies in the organization, there have been forensic specialists indicating the issues and challenges with cyber security threats. The real-time conditions provide the capability of the organization in detecting, analyzing, and defending individuals against such threats. In this research project, the focus is on understanding the cyber security threats and the protection approaches to be utilized in safeguarding threats from financial institutions. With the Covid-19 pandemic, most of the financial firms, including Al Rajhi Bank, are utilizing technologies in their operations, and this has exposed them to cyber security threats. From the literature review conducted, the financial firms need to consider cyber security approaches including implementing triple DES, RSA, and blowfish algorithms in improving the security measures of the organizations.
在现代互联网连接的社会中,技术几乎支撑着社会的每一个行动。尽管技术在组织中产生了积极影响,但也有法医专家指出了网络安全威胁的问题和挑战。实时条件为组织提供了检测、分析和保护个人免受此类威胁的能力。在这个研究项目中,重点是了解网络安全威胁和保护方法,用于保护来自金融机构的威胁。随着Covid-19大流行,包括Al Rajhi银行在内的大多数金融公司都在其业务中使用技术,这使他们面临网络安全威胁。从所进行的文献综述来看,金融公司需要考虑网络安全方法,包括实施三重DES, RSA和河豚算法,以改善组织的安全措施。
{"title":"A Comprehensive Analysis of Cyber Security Protection Approaches for Financial Firms: A Case of Al Rajhi Bank, Saudi Arabia","authors":"Mohammed I. Alghamdi","doi":"10.54216/jcim.090101","DOIUrl":"https://doi.org/10.54216/jcim.090101","url":null,"abstract":"In the modern internet-connected society, technologies underpin almost every action in society. Although there have been positive effects of technologies in the organization, there have been forensic specialists indicating the issues and challenges with cyber security threats. The real-time conditions provide the capability of the organization in detecting, analyzing, and defending individuals against such threats. In this research project, the focus is on understanding the cyber security threats and the protection approaches to be utilized in safeguarding threats from financial institutions. With the Covid-19 pandemic, most of the financial firms, including Al Rajhi Bank, are utilizing technologies in their operations, and this has exposed them to cyber security threats. From the literature review conducted, the financial firms need to consider cyber security approaches including implementing triple DES, RSA, and blowfish algorithms in improving the security measures of the organizations.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127552221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Journal of Cybersecurity and Information Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1