首页 > 最新文献

Journal of Cybersecurity and Information Management最新文献

英文 中文
An Intelligent Spatial Military Intrusion Detection using Reactive Mobility Unmanned Vehicles Based on IoT and metaheuristic Optimization Algorithm 基于物联网和元启发式优化算法的被动机动无人车空间军事入侵智能检测
Pub Date : 1900-01-01 DOI: 10.54216/jcim.090203
Lobna Osman
One of the most significant uses of the Internet of Things is military infiltration detection (IoT). Autonomous drones play a major role in IoT-based vulnerability scanning (UVs). By relocating UVs remotely, this work introduces a new algorithm called the Moth-Flame Optimization Algorithm (MFO). In particular, MFO is used to proactively manage UVs under various scenarios and under different intrusion-covering situations. According to actual studies, the suggested algorithm is both profitable and efficient.
物联网最重要的用途之一是军事渗透检测(IoT)。自主无人机在基于物联网的漏洞扫描(UVs)中发挥着重要作用。通过对紫外线进行远程定位,本文提出了一种新的蛾焰优化算法(MFO)。特别是,MFO可以在不同的场景和不同的入侵覆盖情况下对uv进行主动管理。实际研究表明,本文提出的算法是有效的。
{"title":"An Intelligent Spatial Military Intrusion Detection using Reactive Mobility Unmanned Vehicles Based on IoT and metaheuristic Optimization Algorithm","authors":"Lobna Osman","doi":"10.54216/jcim.090203","DOIUrl":"https://doi.org/10.54216/jcim.090203","url":null,"abstract":"One of the most significant uses of the Internet of Things is military infiltration detection (IoT). Autonomous drones play a major role in IoT-based vulnerability scanning (UVs). By relocating UVs remotely, this work introduces a new algorithm called the Moth-Flame Optimization Algorithm (MFO). In particular, MFO is used to proactively manage UVs under various scenarios and under different intrusion-covering situations. According to actual studies, the suggested algorithm is both profitable and efficient.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121442137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Concentrated Energy Consumption Wireless Sensor Network by Symmetric Encryption and Attribute Based Encryption Technique 基于对称加密和属性加密技术的集中能耗无线传感器网络
Pub Date : 1900-01-01 DOI: 10.54216/jcim.120101
A. Soni
Wireless sensor networks (WSNs) are increasingly used in a wide variety of settings, including defence, industry, healthcare, and education. Hundreds or even thousands of sensor nodes are spread out across a given area and linked to a central Base Station (BS) in order to keep tabs on the environment. The BS then sends the data out to the users over the internet. The sensor network's adaptability, portability, dependability, and quickness are driving its widespread use across industries. The suggested SHS evaluates the efficiency of well-established symmetric algorithms to see where it stands in the spectrum of security. The Blowfish encryption algorithm was proven to require the least amount of processing power after extensive benchmarking. Therefore, the Blowfish algorithm is selected to protect sensitive medical information. The medical database receives the encrypted health records. Only those with proper permissions should be able to access them. Therefore, the CP-ABE is implemented to regulate access to patient records. The SHS's results on the dataset are compared to those of other existing systems. With SHS, health data may be transmitted to doctors rapidly and securely because it requires less computing time and energy. In addition to these benefits, SHS also offers privacy, authentication, and authorization.
无线传感器网络(wsn)越来越多地应用于各种环境,包括国防、工业、医疗保健和教育。数百甚至数千个传感器节点分布在给定的区域,并连接到中央基站(BS),以便密切关注环境。然后,BS将数据通过互联网发送给用户。传感器网络的适应性、便携性、可靠性和快速性正在推动其在各行业的广泛应用。建议的SHS评估已建立的对称算法的效率,以了解它在安全性范围中的位置。经过广泛的基准测试,Blowfish加密算法被证明需要最少的处理能力。因此,选择Blowfish算法来保护敏感的医疗信息。医疗数据库接收加密的健康记录。只有具有适当权限的人才能访问它们。因此,实施CP-ABE来规范对患者记录的访问。SHS在数据集上的结果与其他现有系统的结果进行了比较。有了SHS,健康数据可以快速安全地传输给医生,因为它需要更少的计算时间和精力。除了这些优点之外,SHS还提供隐私、身份验证和授权。
{"title":"A Concentrated Energy Consumption Wireless Sensor Network by Symmetric Encryption and Attribute Based Encryption Technique","authors":"A. Soni","doi":"10.54216/jcim.120101","DOIUrl":"https://doi.org/10.54216/jcim.120101","url":null,"abstract":"Wireless sensor networks (WSNs) are increasingly used in a wide variety of settings, including defence, industry, healthcare, and education. Hundreds or even thousands of sensor nodes are spread out across a given area and linked to a central Base Station (BS) in order to keep tabs on the environment. The BS then sends the data out to the users over the internet. The sensor network's adaptability, portability, dependability, and quickness are driving its widespread use across industries. The suggested SHS evaluates the efficiency of well-established symmetric algorithms to see where it stands in the spectrum of security. The Blowfish encryption algorithm was proven to require the least amount of processing power after extensive benchmarking. Therefore, the Blowfish algorithm is selected to protect sensitive medical information. The medical database receives the encrypted health records. Only those with proper permissions should be able to access them. Therefore, the CP-ABE is implemented to regulate access to patient records. The SHS's results on the dataset are compared to those of other existing systems. With SHS, health data may be transmitted to doctors rapidly and securely because it requires less computing time and energy. In addition to these benefits, SHS also offers privacy, authentication, and authorization.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130572595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity in Networking Devices 网络设备中的网络安全
Pub Date : 1900-01-01 DOI: 10.54216/jcim.080104
Afroj Jahan Badhon, S. Aggarwal
Cybersecurity is training defensive arrangements, systems, and plans to save the information from cyber outbreaks. These virtual outbreaks are typically intended to retrieve, alter, or otherwise extinguish delicate data, extracting currency from manipulators, or disturb usual commercial procedures. System Security defends one’s system and information from breaks, interruptions also other intimidations. Network Security contains admission controller, computer virus and defiant computer virus software program, system safety, system analytics, system-connected protection categories, firewalls, and VPN encoding. System substructure strategies stand the mechanisms of a net that conveyance transportations desired intended for information, submissions, facilities, and multimedia. In this paper, we reflect on Cybersecurity in Networking Devices.
网络安全是训练防御安排、系统和计划,以从网络爆发中保存信息。这些虚拟爆发通常旨在检索、更改或以其他方式销毁敏感数据,从操纵者那里提取货币,或扰乱通常的商业程序。系统安全保护一个人的系统和信息从中断,中断和其他威胁。网络安全包括准入控制器、计算机病毒和对抗计算机病毒软件程序、系统安全、系统分析、系统连接保护类别、防火墙和VPN编码。系统子结构策略代表了一个网络的机制,用于传输信息、提交、设施和多媒体所需的传输。本文对网络设备中的网络安全问题进行了思考。
{"title":"Cybersecurity in Networking Devices","authors":"Afroj Jahan Badhon, S. Aggarwal","doi":"10.54216/jcim.080104","DOIUrl":"https://doi.org/10.54216/jcim.080104","url":null,"abstract":"Cybersecurity is training defensive arrangements, systems, and plans to save the information from cyber outbreaks. These virtual outbreaks are typically intended to retrieve, alter, or otherwise extinguish delicate data, extracting currency from manipulators, or disturb usual commercial procedures. System Security defends one’s system and information from breaks, interruptions also other intimidations. Network Security contains admission controller, computer virus and defiant computer virus software program, system safety, system analytics, system-connected protection categories, firewalls, and VPN encoding. System substructure strategies stand the mechanisms of a net that conveyance transportations desired intended for information, submissions, facilities, and multimedia. In this paper, we reflect on Cybersecurity in Networking Devices.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133040471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection and Classification of Malware Using Guided Whale Optimization Algorithm for Voting Ensemble 基于导向鲸优化算法的投票集合恶意软件检测与分类
Pub Date : 1900-01-01 DOI: 10.54216/jcim.100102
M. Eid, M. I. F. Allah
Malware is software that is designed to cause damage to computer systems. Locating malicious software is a crucial task in the cybersecurity industry. Malware authors and security experts are locked in a never-ending conflict. In order to combat modern malware, which often exhibits polymorphic behavior and a wide range of characteristics, novel countermeasures have had to be created. Here, we present a hybrid learning approach to malware detection and classification. In this scenario, we have merged the machine learning techniques of Random Forest and K-Nearest Neighbor Classifier to develop a hybrid learning model. We used current malware and an updated dataset of 10,000 examples of malicious and benign files, with 78 feature values and 6 different malware classes to deal with. We compared the model's results with those of current approaches after training it for both binary and multi-class classification. The suggested methodology may be utilized to create an anti-malware application that is capable of detecting malware on newly collected data.
恶意软件是一种旨在破坏计算机系统的软件。定位恶意软件是网络安全行业的一项关键任务。恶意软件作者和安全专家陷入了一场永无止境的冲突。现代恶意软件经常表现出多态行为和广泛的特征,为了对抗它,必须创建新的对策。在这里,我们提出了一种用于恶意软件检测和分类的混合学习方法。在这种情况下,我们合并了随机森林和k近邻分类器的机器学习技术来开发混合学习模型。我们使用当前的恶意软件和更新的数据集,其中包含10,000个恶意和良性文件示例,有78个特征值和6个不同的恶意软件类别需要处理。在对模型进行二分类和多分类训练后,我们将模型的结果与现有方法的结果进行了比较。所建议的方法可用于创建能够在新收集的数据上检测恶意软件的反恶意软件应用程序。
{"title":"Detection and Classification of Malware Using Guided Whale Optimization Algorithm for Voting Ensemble","authors":"M. Eid, M. I. F. Allah","doi":"10.54216/jcim.100102","DOIUrl":"https://doi.org/10.54216/jcim.100102","url":null,"abstract":"Malware is software that is designed to cause damage to computer systems. Locating malicious software is a crucial task in the cybersecurity industry. Malware authors and security experts are locked in a never-ending conflict. In order to combat modern malware, which often exhibits polymorphic behavior and a wide range of characteristics, novel countermeasures have had to be created. Here, we present a hybrid learning approach to malware detection and classification. In this scenario, we have merged the machine learning techniques of Random Forest and K-Nearest Neighbor Classifier to develop a hybrid learning model. We used current malware and an updated dataset of 10,000 examples of malicious and benign files, with 78 feature values and 6 different malware classes to deal with. We compared the model's results with those of current approaches after training it for both binary and multi-class classification. The suggested methodology may be utilized to create an anti-malware application that is capable of detecting malware on newly collected data.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134214251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explaining feature detection Mechanisms: A Survey 解释特征检测机制:综述
Pub Date : 1900-01-01 DOI: 10.54216/jcim.060103
Ahmed A. Elngar, Mohamed Arafa, Mustafa Marouf, M. Ahmed, Nehal Fawzy
Feature detection, description and matching are essential components of various computer vision applications; thus, they have received a considerable attention in the last decades. Several feature detectors and descriptors have been proposed in the literature with a variety of definitions for what kind of points in an image is potentially interesting (i.e., a distinctive attribute). This chapter introduces basic notation and mathematical concepts for detecting and describing image features. Then, it discusses properties of perfect features and gives an overview of various existing detection and description methods. Furthermore, it explains some approaches to feature matching. Finally, the chapter discusses the most used techniques for performance evaluation of detection algorithms.
特征检测、描述和匹配是各种计算机视觉应用的重要组成部分;因此,它们在过去几十年中受到了相当大的关注。文献中已经提出了几个特征检测器和描述符,它们对图像中什么样的点可能是有趣的(即,一个独特的属性)有各种各样的定义。本章介绍检测和描述图像特征的基本符号和数学概念。然后,讨论了完美特征的性质,并对现有的各种检测和描述方法进行了概述。在此基础上,介绍了特征匹配的几种方法。最后,本章讨论了检测算法性能评估中最常用的技术。
{"title":"Explaining feature detection Mechanisms: A Survey","authors":"Ahmed A. Elngar, Mohamed Arafa, Mustafa Marouf, M. Ahmed, Nehal Fawzy","doi":"10.54216/jcim.060103","DOIUrl":"https://doi.org/10.54216/jcim.060103","url":null,"abstract":"Feature detection, description and matching are essential components of various computer vision applications; thus, they have received a considerable attention in the last decades. Several feature detectors and descriptors have been proposed in the literature with a variety of definitions for what kind of points in an image is potentially interesting (i.e., a distinctive attribute). This chapter introduces basic notation and mathematical concepts for detecting and describing image features. Then, it discusses properties of perfect features and gives an overview of various existing detection and description methods. Furthermore, it explains some approaches to feature matching. Finally, the chapter discusses the most used techniques for performance evaluation of detection algorithms.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"27 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132363873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Machine Learning Approach to Detecting Deepfake Videos: An Investigation of Feature Extraction Techniques 检测深度假视频的机器学习方法:特征提取技术的研究
Pub Date : 1900-01-01 DOI: 10.54216/jcim.090204
Preeti Singh, Khyati Chaudhary, Gopal Chaudhary, Manju Khari, Bharat Rawal
Deepfake videos are a growing concern today as they can be used to spread misinformation and manipulate public opinion. In this paper, we investigate the use of different feature extraction techniques for detecting deepfake videos using machine learning algorithms. We explore three feature extraction techniques, including facial landmarks detection, optical flow, and frequency analysis, and evaluate their effectiveness in detecting deepfake videos. We compare the performance of different machine learning algorithms and analyze their ability to detect deepfakes using the extracted features. Our experimental results show that the combination of facial landmarks detection and frequency analysis provides the best performance in detecting deepfake videos, with an accuracy of over 95%. Our findings suggest that machine learning algorithms can be a powerful tool in detecting deepfake videos, and feature extraction techniques play a crucial role in achieving high accuracy.
深度造假视频如今越来越受到关注,因为它们可以用来传播错误信息和操纵公众舆论。在本文中,我们研究了使用不同的特征提取技术来使用机器学习算法检测深度假视频。我们探索了三种特征提取技术,包括面部地标检测、光流和频率分析,并评估了它们在检测深度伪造视频中的有效性。我们比较了不同机器学习算法的性能,并分析了它们使用提取的特征检测深度伪造的能力。我们的实验结果表明,人脸标志检测和频率分析相结合的方法在深度假视频检测中提供了最好的性能,准确率超过95%。我们的研究结果表明,机器学习算法可以成为检测深度假视频的强大工具,而特征提取技术在实现高精度方面发挥着至关重要的作用。
{"title":"A Machine Learning Approach to Detecting Deepfake Videos: An Investigation of Feature Extraction Techniques","authors":"Preeti Singh, Khyati Chaudhary, Gopal Chaudhary, Manju Khari, Bharat Rawal","doi":"10.54216/jcim.090204","DOIUrl":"https://doi.org/10.54216/jcim.090204","url":null,"abstract":"Deepfake videos are a growing concern today as they can be used to spread misinformation and manipulate public opinion. In this paper, we investigate the use of different feature extraction techniques for detecting deepfake videos using machine learning algorithms. We explore three feature extraction techniques, including facial landmarks detection, optical flow, and frequency analysis, and evaluate their effectiveness in detecting deepfake videos. We compare the performance of different machine learning algorithms and analyze their ability to detect deepfakes using the extracted features. Our experimental results show that the combination of facial landmarks detection and frequency analysis provides the best performance in detecting deepfake videos, with an accuracy of over 95%. Our findings suggest that machine learning algorithms can be a powerful tool in detecting deepfake videos, and feature extraction techniques play a crucial role in achieving high accuracy.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128244321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating Hot Spot Problem in Wireless Sensor Networks using Political Optimizer Based Unequal Clustering Technique 基于政治优化的不平等聚类技术缓解无线传感器网络中的热点问题
Pub Date : 1900-01-01 DOI: 10.54216/jcim.080201
Sahil Verm, Sanjukta Gain
Wireless Sensor Network (WSN) encompasses a set of wirelessly connected sensor nodes in the network for tracking and data gathering applications. The sensors in WSN are constrained in energy, memory, and processing capabilities. Despite the benefits of WSN, the sensors closer to the base station (BS) expels their energy faster. It suffers from hot spot issues and can be resolved by the use of unequal clustering techniques. In this aspect, this paper presents a political optimizer-based unequal clustering scheme (POUCS) for mitigating hot spot problems in WSN. The goal of the POUCS technique is to choose cluster heads (CHs) and determine unequal cluster sizes. The POUCS technique derives a fitness function involving different input parameters to minimize energy consumption and maximize the lifetime of the network. To showcase the enhanced performance of the POUCS technique, a comprehensive experimental analysis takes place, and the detailed comparison study reported the better performance of the POUCS technique over the recent techniques.
无线传感器网络(WSN)包含一组无线连接的传感器节点,用于跟踪和数据收集应用。无线传感器网络中的传感器受到能量、内存和处理能力的限制。尽管无线传感器网络有很多好处,但离基站越近的传感器消耗能量的速度越快。它存在热点问题,可以通过使用不相等聚类技术来解决。在这方面,本文提出了一种基于政治优化器的不平等聚类方案(POUCS)来缓解无线传感器网络中的热点问题。POUCS技术的目标是选择簇头(CHs)并确定不相等的簇大小。POUCS技术导出了包含不同输入参数的适应度函数,以最小化能量消耗和最大化网络寿命。为了展示POUCS技术的增强性能,进行了全面的实验分析,并进行了详细的比较研究,报告了POUCS技术比最近的技术具有更好的性能。
{"title":"Mitigating Hot Spot Problem in Wireless Sensor Networks using Political Optimizer Based Unequal Clustering Technique","authors":"Sahil Verm, Sanjukta Gain","doi":"10.54216/jcim.080201","DOIUrl":"https://doi.org/10.54216/jcim.080201","url":null,"abstract":"Wireless Sensor Network (WSN) encompasses a set of wirelessly connected sensor nodes in the network for tracking and data gathering applications. The sensors in WSN are constrained in energy, memory, and processing capabilities. Despite the benefits of WSN, the sensors closer to the base station (BS) expels their energy faster. It suffers from hot spot issues and can be resolved by the use of unequal clustering techniques. In this aspect, this paper presents a political optimizer-based unequal clustering scheme (POUCS) for mitigating hot spot problems in WSN. The goal of the POUCS technique is to choose cluster heads (CHs) and determine unequal cluster sizes. The POUCS technique derives a fitness function involving different input parameters to minimize energy consumption and maximize the lifetime of the network. To showcase the enhanced performance of the POUCS technique, a comprehensive experimental analysis takes place, and the detailed comparison study reported the better performance of the POUCS technique over the recent techniques.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130735333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cybersecurity Detection Model using Machine Learning Techniques 使用机器学习技术的网络安全检测模型
Pub Date : 1900-01-01 DOI: 10.54216/jcim.120104
Mustafa El .., Aaras Y Y.kraidi
The use of machine learning methods in cybersecurity is only one of many examples of how this once-emerging innovation has entered the mainstream. Anomaly-based identification of common assaults on vital infrastructures is only one instance of the various applications of malware analysis. Scholars are using machine learning-based identification in numerous cybersecurity solutions since signature-based approaches are inadequate at identifying zero-day threats or even modest modifications of established assaults. In this work, we introduce the machine-learning models-based security framework to detect cyber-attacks. This paper used three machine learning models Logistic Regression, Random Forest, and K-Nearest Neighbor This framework not only reduces the computational difficulty of the framework by minimizing the feature parameters, but it also performs well in terms of accuracy in forecasting unknown scenarios in the tests. Finally, we ran trials using cybersecurity datasets to measure the machine learning model's performance using metrics including precision, recall, and accuracy.
机器学习方法在网络安全领域的应用只是这一新兴创新进入主流的众多例子之一。针对重要基础设施的常见攻击的基于异常的识别只是恶意软件分析各种应用的一个实例。学者们正在许多网络安全解决方案中使用基于机器学习的识别,因为基于签名的方法不足以识别零日威胁,甚至不足以对已建立的攻击进行适度修改。在这项工作中,我们引入了基于机器学习模型的安全框架来检测网络攻击。本文使用了逻辑回归、随机森林和k近邻三种机器学习模型,该框架不仅通过最小化特征参数降低了框架的计算难度,而且在测试中预测未知场景的准确性方面也表现良好。最后,我们使用网络安全数据集进行试验,使用精度、召回率和准确性等指标来衡量机器学习模型的性能。
{"title":"Cybersecurity Detection Model using Machine Learning Techniques","authors":"Mustafa El .., Aaras Y Y.kraidi","doi":"10.54216/jcim.120104","DOIUrl":"https://doi.org/10.54216/jcim.120104","url":null,"abstract":"The use of machine learning methods in cybersecurity is only one of many examples of how this once-emerging innovation has entered the mainstream. Anomaly-based identification of common assaults on vital infrastructures is only one instance of the various applications of malware analysis. Scholars are using machine learning-based identification in numerous cybersecurity solutions since signature-based approaches are inadequate at identifying zero-day threats or even modest modifications of established assaults. In this work, we introduce the machine-learning models-based security framework to detect cyber-attacks. This paper used three machine learning models Logistic Regression, Random Forest, and K-Nearest Neighbor This framework not only reduces the computational difficulty of the framework by minimizing the feature parameters, but it also performs well in terms of accuracy in forecasting unknown scenarios in the tests. Finally, we ran trials using cybersecurity datasets to measure the machine learning model's performance using metrics including precision, recall, and accuracy.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"47 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129958623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective FOG Computing Based Distributed Forecasting of Cyber-Attacks in Internet of Things 基于有效雾计算的物联网网络攻击分布式预测
Pub Date : 1900-01-01 DOI: 10.54216/jcim.120201
Vandana Roy
Existing cloud based security procedures are insufficient to manage the ever-increasing assaults in IoT due to the volume of data generated and the processing latency. IoT applications are vulnerable to cyberattacks, and some of these assaults might have catastrophic results if not stopped or mitigated quickly enough. As a result, IoT calls for self-protect security systems that can automatically interpret attacks in IoT traffic and efficiently handle the attack situation by activating the proper response quickly. Fog computing satisfies this need because it can embed the intelligent self-protection mechanism in the distributed fog nodes, allowing them to swiftly deal with the assault scenario and safeguard the IoT application with little in the way of human interaction. At the fog nodes, the forecasting method employs distributed Gaussian process regression. The cyber-attack may be predicted more quickly and with less mistake for both low- and high-rate attacks thanks to the local forecasting about the IoT traffic characteristics at fog node. One of the fundamental necessities of an IoT security mechanism is the ability to forecast attacks in a timely manner with a high degree of accuracy, and the simulation results highlight this fact.
由于生成的数据量和处理延迟,现有的基于云的安全程序不足以管理物联网中不断增加的攻击。物联网应用很容易受到网络攻击,如果不能及时阻止或缓解,其中一些攻击可能会造成灾难性的后果。因此,物联网需要自我保护的安全系统,这些系统可以自动解释物联网流量中的攻击,并通过快速激活适当的响应来有效地处理攻击情况。雾计算可以满足这一需求,因为它可以在分布式雾节点中嵌入智能自我保护机制,使它们能够快速应对攻击场景,并在很少的人工交互方式下保护物联网应用。在雾节点处,预测方法采用分布高斯过程回归。通过对雾节点物联网流量特征的局部预测,可以更快、更少地预测低速率和高速率的网络攻击。物联网安全机制的基本要求之一是能够及时、高精度地预测攻击,仿真结果突出了这一事实。
{"title":"An Effective FOG Computing Based Distributed Forecasting of Cyber-Attacks in Internet of Things","authors":"Vandana Roy","doi":"10.54216/jcim.120201","DOIUrl":"https://doi.org/10.54216/jcim.120201","url":null,"abstract":"Existing cloud based security procedures are insufficient to manage the ever-increasing assaults in IoT due to the volume of data generated and the processing latency. IoT applications are vulnerable to cyberattacks, and some of these assaults might have catastrophic results if not stopped or mitigated quickly enough. As a result, IoT calls for self-protect security systems that can automatically interpret attacks in IoT traffic and efficiently handle the attack situation by activating the proper response quickly. Fog computing satisfies this need because it can embed the intelligent self-protection mechanism in the distributed fog nodes, allowing them to swiftly deal with the assault scenario and safeguard the IoT application with little in the way of human interaction. At the fog nodes, the forecasting method employs distributed Gaussian process regression. The cyber-attack may be predicted more quickly and with less mistake for both low- and high-rate attacks thanks to the local forecasting about the IoT traffic characteristics at fog node. One of the fundamental necessities of an IoT security mechanism is the ability to forecast attacks in a timely manner with a high degree of accuracy, and the simulation results highlight this fact.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128561278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Cybersecurity and Information Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1