首页 > 最新文献

2022 5th Information Technology for Education and Development (ITED)最新文献

英文 中文
Opinion mining analytics of IoT ecosystem by Profile of Mood State with Logistic Regression 基于Logistic回归的情绪状态剖面物联网生态系统意见挖掘分析
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051519
T. Olaleye, Adeola Olaleye, Emmanuel Ofoegbunam, Gbenga Abodunrin, Temitope Abioye, W. Ahiara
Internet of Things continues to redefine modus operandi across diverse socioeconomic and professional domains thereby generating an un-abating global discuss on the adoption and functionalities of smart devices. Since emotions play a critical role in decision making according to the psychological domain of emotion science, the paramount importance of periodic delineation of stakeholders' mood is imperative for policy makers. Whereas opinion mining analytics of IoT discussions have returned state-of-the-arts, there is need to address germane factors seldom factored into existing literatures. This study therefore consolidates on current frameworks through a bi-modal descriptive and content-based analytics of IoT ecosystem for detecting key mood domain and the BlueCheckCredibility status of IoT tweeters using Profile of Mood State and Nomogram-based analytics. With a 99.5% precision rate by Logistic regression model, social characteristic attributes of acquired ethnographic data points turns mutually exclusive to the credibility status of IoT opinion molders while tweet properties contributes higher discriminative tendencies for identifying negative IoT emotions. The impact of Internet of Things on data science is likewise unraveled through bi-gram content analytics to identify topical discussions encapsulated in the acquired tweet corpus.
物联网继续在不同的社会经济和专业领域重新定义运作方式,从而引发了一场关于智能设备采用和功能的持续全球讨论。根据情绪科学的心理领域,情绪在决策中起着至关重要的作用,因此对利益相关者的情绪进行定期描述至关重要,这对政策制定者来说是势在必行的。虽然物联网讨论的意见挖掘分析已经回到了最先进的水平,但需要解决现有文献中很少考虑的相关因素。因此,本研究通过物联网生态系统的双模态描述性和基于内容的分析来巩固当前框架,用于检测关键情绪域和物联网推特者的BlueCheckCredibility状态,使用情绪状态概况和基于nomogram分析。通过Logistic回归模型,获得的民族志数据点的社会特征属性与物联网意见塑造者的可信度状态互斥,推特属性对物联网负面情绪的识别具有较高的判别倾向,准确率为99.5%。物联网对数据科学的影响同样是通过双图内容分析来揭示的,以确定所获得的推文语料库中包含的主题讨论。
{"title":"Opinion mining analytics of IoT ecosystem by Profile of Mood State with Logistic Regression","authors":"T. Olaleye, Adeola Olaleye, Emmanuel Ofoegbunam, Gbenga Abodunrin, Temitope Abioye, W. Ahiara","doi":"10.1109/ITED56637.2022.10051519","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051519","url":null,"abstract":"Internet of Things continues to redefine modus operandi across diverse socioeconomic and professional domains thereby generating an un-abating global discuss on the adoption and functionalities of smart devices. Since emotions play a critical role in decision making according to the psychological domain of emotion science, the paramount importance of periodic delineation of stakeholders' mood is imperative for policy makers. Whereas opinion mining analytics of IoT discussions have returned state-of-the-arts, there is need to address germane factors seldom factored into existing literatures. This study therefore consolidates on current frameworks through a bi-modal descriptive and content-based analytics of IoT ecosystem for detecting key mood domain and the BlueCheckCredibility status of IoT tweeters using Profile of Mood State and Nomogram-based analytics. With a 99.5% precision rate by Logistic regression model, social characteristic attributes of acquired ethnographic data points turns mutually exclusive to the credibility status of IoT opinion molders while tweet properties contributes higher discriminative tendencies for identifying negative IoT emotions. The impact of Internet of Things on data science is likewise unraveled through bi-gram content analytics to identify topical discussions encapsulated in the acquired tweet corpus.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131859370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective Industrial Internet of Things Vulnerability Detection Using Machine Learning 利用机器学习有效的工业物联网漏洞检测
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051622
C. I. Nwakanma, Love Allen Chijioke Ahakonye, J. Njoku, Joy Eze, Dong‐Seong Kim
Protecting the industrial internet of things (IIoT) devices through vulnerability detection is critical as the consequences of attacks can be devastating. Machine learning (ML) has assisted several works in this regard, improving vulnerability detection accuracy. Based on established vulnerability assessment, development and performance comparison of various ML detection algorithms is essential. This work presents a description of the IIoT protocols and their vulnerabilities. The performance of the ML-based detection system was developed using the WUSTL-IIoT-2018 dataset for industrial control systems (SCADA) cy-bersecurity research. The approach was validated using the ICS-SCADA and CICDDoS2019 datasets, a recent dataset that captures new dimensions of distributed denial of service (DDoS) attacks on networks. The evaluation and validation results show that the proposed scheme could help with high vulnerability detection and mitigation accuracy across all evaluated datasets.
通过漏洞检测来保护工业物联网(IIoT)设备至关重要,因为攻击的后果可能是毁灭性的。机器学习(ML)在这方面协助了一些工作,提高了漏洞检测的准确性。基于已建立的漏洞评估,开发各种机器学习检测算法并进行性能比较至关重要。这项工作介绍了工业物联网协议及其漏洞的描述。基于ml的检测系统的性能是使用用于工业控制系统(SCADA)网络安全研究的WUSTL-IIoT-2018数据集开发的。该方法使用ICS-SCADA和CICDDoS2019数据集进行了验证,这是一个最新的数据集,捕获了网络上分布式拒绝服务(DDoS)攻击的新维度。评估和验证结果表明,该方案在所有评估数据集上都具有较高的漏洞检测和缓解精度。
{"title":"Effective Industrial Internet of Things Vulnerability Detection Using Machine Learning","authors":"C. I. Nwakanma, Love Allen Chijioke Ahakonye, J. Njoku, Joy Eze, Dong‐Seong Kim","doi":"10.1109/ITED56637.2022.10051622","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051622","url":null,"abstract":"Protecting the industrial internet of things (IIoT) devices through vulnerability detection is critical as the consequences of attacks can be devastating. Machine learning (ML) has assisted several works in this regard, improving vulnerability detection accuracy. Based on established vulnerability assessment, development and performance comparison of various ML detection algorithms is essential. This work presents a description of the IIoT protocols and their vulnerabilities. The performance of the ML-based detection system was developed using the WUSTL-IIoT-2018 dataset for industrial control systems (SCADA) cy-bersecurity research. The approach was validated using the ICS-SCADA and CICDDoS2019 datasets, a recent dataset that captures new dimensions of distributed denial of service (DDoS) attacks on networks. The evaluation and validation results show that the proposed scheme could help with high vulnerability detection and mitigation accuracy across all evaluated datasets.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133859030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Open and Distance Learning Using an Artificial Intelligence (AI)-Powered Chatbot: a Conceptual Framework 使用人工智能(AI)驱动的聊天机器人增强开放和远程学习:一个概念框架
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051575
J. Ndunagu, R. Jimoh, Ugwuegbulam Chidiebere, George Deborah. Opeoluwa
The data gleaned from the National Open University of Nigeria's (NOUN) E-ticketing system was studied in this paper. NOUN is one of the Open and Distance Learning (ODL) institutions, where students and their facilitators are in different physical locations. Multinomial Naive Bayes algorithm, preferred using “intent” for its classification method for the chatbot system. Within 4 months of the launch of the NOUN E-ticketing system, 38,263 tickets (students' complaints and inquiries) were generated and 30,601 have been manually responded to and closed while the remaining 7,662 tickets are still in progress. The chatbot's goal is to respond to students inquiries quickly and efficiently while easing the burden on the management system. With the availability of chatbot, students' responses will be automated and accessible 24/7. The NOUN chatbot will increase student engagement, strengthen communication and create a seamless interaction for both the ODL institutions and its students all together culminating to a robust congenial student-ODL relationship ultimately leading to a higher attraction rate and more importantly, a lower attrition rate, not just in ODL institutions alone, but to other conventional higher institutions.
本文研究了尼日利亚国立开放大学(名词)电子票务系统收集的数据。名词是开放和远程学习(ODL)机构之一,学生和他们的辅导员在不同的物理位置。多项朴素贝叶斯算法,更倾向于使用“意图”作为其对聊天机器人系统的分类方法。在启动名词电子票务系统的4个月内,共生成38,263张票(学生投诉和查询),手动回复和关闭30,601张票,其余7,662张票仍在进行中。聊天机器人的目标是快速有效地回应学生的询问,同时减轻管理系统的负担。有了聊天机器人,学生的回答将是自动化的,并且可以全天候访问。名词聊天机器人将增加学生的参与度,加强沟通,并为ODL机构和学生创造一个无缝的互动,最终形成一个强大的相投的学生-ODL关系,最终导致更高的吸引力,更重要的是,更低的流动率,不仅在ODL机构,而且在其他传统的高等院校。
{"title":"Enhanced Open and Distance Learning Using an Artificial Intelligence (AI)-Powered Chatbot: a Conceptual Framework","authors":"J. Ndunagu, R. Jimoh, Ugwuegbulam Chidiebere, George Deborah. Opeoluwa","doi":"10.1109/ITED56637.2022.10051575","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051575","url":null,"abstract":"The data gleaned from the National Open University of Nigeria's (NOUN) E-ticketing system was studied in this paper. NOUN is one of the Open and Distance Learning (ODL) institutions, where students and their facilitators are in different physical locations. Multinomial Naive Bayes algorithm, preferred using “intent” for its classification method for the chatbot system. Within 4 months of the launch of the NOUN E-ticketing system, 38,263 tickets (students' complaints and inquiries) were generated and 30,601 have been manually responded to and closed while the remaining 7,662 tickets are still in progress. The chatbot's goal is to respond to students inquiries quickly and efficiently while easing the burden on the management system. With the availability of chatbot, students' responses will be automated and accessible 24/7. The NOUN chatbot will increase student engagement, strengthen communication and create a seamless interaction for both the ODL institutions and its students all together culminating to a robust congenial student-ODL relationship ultimately leading to a higher attraction rate and more importantly, a lower attrition rate, not just in ODL institutions alone, but to other conventional higher institutions.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123828285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Android Application for Human Respiratory System Diagnosis: A Systematic Review Android应用于人类呼吸系统诊断:系统综述
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051603
Adaora Obayi, Obinna Onyedeke, I. Uzo, Azuka Ijeomah
This paper presents a systematic review of android app respiratory system on smartphone. For some diseases, doctors have succeeded in inventing the necessary treatments that lasts for a short period, but in several cases, the treatment can stay for a lifetime. The goal of this system is to detect if a patient has any respiratory disease(s) by specifying the symptoms the patient encounters, schedules an appointement in the hospital for patient through the system to the linked specialist doctors to avoid contact in the case of Covid-19 patient. This research will help raise patient's awareness of the high risk of late discovery of having respiratory diseases (like Lung Cancer. corona virus etc), and also to develop a model that will help detect this disease early through mobile application. The focus of this review is to encourage medical institutions to adopt the health android app that can help patients in self-managing behavioral activities such as physical activities, using symptoms to determine the stage(early or critical) of the disease and drug suggestions with research evaluation using the app, this could help patients monitor and manage their health conditions.
本文对智能手机上的安卓应用呼吸系统进行了系统的综述。对于某些疾病,医生已经成功地发明了短期有效的必要治疗方法,但在某些情况下,这种治疗可以持续一生。该系统的目标是通过指定患者遇到的症状来检测患者是否患有任何呼吸道疾病,通过系统为患者安排与相关专科医生的医院预约,以避免在Covid-19患者的情况下接触。这项研究将有助于提高患者对晚期发现呼吸系统疾病(如肺癌)的高风险的认识。冠状病毒等),并开发一种模型,通过移动应用程序帮助早期发现这种疾病。本综述的重点是鼓励医疗机构采用健康安卓app,帮助患者进行自我管理行为活动,如身体活动,通过症状来确定疾病的阶段(早期或危重),并使用app进行研究评估,提出药物建议,帮助患者监测和管理自己的健康状况。
{"title":"Android Application for Human Respiratory System Diagnosis: A Systematic Review","authors":"Adaora Obayi, Obinna Onyedeke, I. Uzo, Azuka Ijeomah","doi":"10.1109/ITED56637.2022.10051603","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051603","url":null,"abstract":"This paper presents a systematic review of android app respiratory system on smartphone. For some diseases, doctors have succeeded in inventing the necessary treatments that lasts for a short period, but in several cases, the treatment can stay for a lifetime. The goal of this system is to detect if a patient has any respiratory disease(s) by specifying the symptoms the patient encounters, schedules an appointement in the hospital for patient through the system to the linked specialist doctors to avoid contact in the case of Covid-19 patient. This research will help raise patient's awareness of the high risk of late discovery of having respiratory diseases (like Lung Cancer. corona virus etc), and also to develop a model that will help detect this disease early through mobile application. The focus of this review is to encourage medical institutions to adopt the health android app that can help patients in self-managing behavioral activities such as physical activities, using symptoms to determine the stage(early or critical) of the disease and drug suggestions with research evaluation using the app, this could help patients monitor and manage their health conditions.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"301 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122014703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing the Transmission Performance of Step Index Plastic Optical Fiber 提高阶跃折射率塑料光纤的传输性能
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051295
I. Yau, S. Sani, A. D. Usman, A. Tekanyi, A. M. Abba, D. Gambo
The use of Plastic Optical Fiber (POF) cable has the potential to enhance broadband transmission, particularly in the indoor access network. The POF cable offers a cost-effective solution because it is much easier to install and less expensive than glass optical fiber. The biggest drawback of the POF cable is intermodal dispersion, which reduces the link bandwidth of a 100 m length of cable to approximately 40 MHz. Numerous studies are being conducted to enhance the bandwidth-length product of POF. This work seeks to minimize the intermodal dispersion of the cable by finding optimal materials for the core and cladding of the cable with the improved bandwidth-length product. The results obtained indicate that the optimal core and cladding materials have refractive indices of 1.4865 and 1.4756, respectively. The intermodal dispersion per unit length is found to be 36.169 ps/m. The bandwidth of 100 m of the improved POF cable is therefore 121.65 MHz. A RoF communication system based on the developed POF is designed using the Optisystem16 software tool. The Bit Error Rate (BER) performance of the system in terms of quality factor is evaluated. A maximum achievable POF cable length of 117 m is obtained for a transmission data rate of 1 Gbps with an acceptable quality factor of 7.0.
塑料光纤(POF)电缆的使用具有增强宽带传输的潜力,特别是在室内接入网中。POF电缆提供了一种经济有效的解决方案,因为它比玻璃光纤更容易安装,更便宜。POF电缆最大的缺点是多式频散,它将100米长的电缆的链路带宽减少到大约40兆赫兹。人们正在进行大量的研究来提高POF的带宽-长度乘积。这项工作旨在通过寻找具有改进带宽长度产品的电缆芯和包层的最佳材料来最大限度地减少电缆的多式联运色散。结果表明,最优芯和包层材料的折射率分别为1.4865和1.4756。单位长度的多式联运色散为36.169 ps/m。因此,改进后的POF电缆100m带宽为121.65 MHz。利用Optisystem16软件工具设计了基于所开发的POF的RoF通信系统。从质量因子的角度对系统的误码率性能进行了评价。在传输数据速率为1gbps的情况下,可实现的最大POF电缆长度为117米,可接受的质量系数为7.0。
{"title":"Enhancing the Transmission Performance of Step Index Plastic Optical Fiber","authors":"I. Yau, S. Sani, A. D. Usman, A. Tekanyi, A. M. Abba, D. Gambo","doi":"10.1109/ITED56637.2022.10051295","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051295","url":null,"abstract":"The use of Plastic Optical Fiber (POF) cable has the potential to enhance broadband transmission, particularly in the indoor access network. The POF cable offers a cost-effective solution because it is much easier to install and less expensive than glass optical fiber. The biggest drawback of the POF cable is intermodal dispersion, which reduces the link bandwidth of a 100 m length of cable to approximately 40 MHz. Numerous studies are being conducted to enhance the bandwidth-length product of POF. This work seeks to minimize the intermodal dispersion of the cable by finding optimal materials for the core and cladding of the cable with the improved bandwidth-length product. The results obtained indicate that the optimal core and cladding materials have refractive indices of 1.4865 and 1.4756, respectively. The intermodal dispersion per unit length is found to be 36.169 ps/m. The bandwidth of 100 m of the improved POF cable is therefore 121.65 MHz. A RoF communication system based on the developed POF is designed using the Optisystem16 software tool. The Bit Error Rate (BER) performance of the system in terms of quality factor is evaluated. A maximum achievable POF cable length of 117 m is obtained for a transmission data rate of 1 Gbps with an acceptable quality factor of 7.0.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127491052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast Tree Model for Predicting Network Security Incidents 网络安全事件预测的快速树模型
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051219
Marcus Musa Magaji, Abayomi Jegede, Nentawe Gurumdimma, M. Onoja, G. Aimufua, A. Oloyede
Network security personnel are expected to provide uninterrupted services by handling attacks irrespective of the modus operandi. Multiple defensive approaches to prevent, curtail, or mitigate an attack are the primary responsibilities of a security personnel. Considering the fact that, predicting security attacks is an additional technique currently used by most organizations to accurately measure the security risks related to overall system performance, several approaches have been used to predict network security attacks. However, high predicting accuracy and difficulty in analyzing very large amount of dataset and getting a reliable dataset seem to be the major constraints. The uncertain behavior would be subjected to verification and validation by the network administrator. KDDD CUPP 99 dataset and NSL KDD dataset were both used in the research. NSL KDD provides 0.997 average micro and macro accuracy, having average LogLoss of 0.16 and average LogLossReduction of 0.976. Log-Loss Reduction ranges from infinity to 1, where 1 and 0 represent perfect prediction and mean prediction respectively. Log-Loss reduction should be as close to 1 as possible for a good model. Log-Loss in the classification is an evaluation metrics that characterized the accuracy of a classifier. Log-loss is a measure of the performance of a classifier where the prediction input is a probability value between “0.00 to 1.00”. It should be as close to zero as possible. This paper proposes a FastTree Model for predicting network security incidents. Therefore, ML.NET Framework and FastTree Regression Technique have a high prediction accuracy and ability to analyze large datasets of normal, abnormal and uncertain behaviors.
网络安全人员应提供不间断的服务,处理各种攻击行为。预防、限制或减轻攻击的多种防御方法是安全人员的主要职责。考虑到预测安全攻击是目前大多数组织用来准确度量与整体系统性能相关的安全风险的一项附加技术,已经使用了几种方法来预测网络安全攻击。然而,高预测精度和难以分析大量数据集并获得可靠数据集似乎是主要的制约因素。不确定行为将受到网络管理员的验证和确认。本研究采用KDDD cupp99数据集和NSL KDD数据集。NSL KDD提供了0.997的平均微观和宏观精度,平均LogLoss为0.16,平均LogLoss reduction为0.976。Log-Loss Reduction的取值范围是无穷大到1,其中1和0分别代表完美预测和平均预测。对于一个好的模型,Log-Loss减少应该尽可能接近1。分类中的Log-Loss是一种评价分类器准确性的指标。Log-loss是对分类器性能的度量,其中预测输入是介于“0.00到1.00”之间的概率值。它应该尽可能接近于零。本文提出了一种快速树模型来预测网络安全事件。因此,ML.NET框架和FastTree回归技术具有较高的预测精度和分析正常、异常和不确定行为的大数据集的能力。
{"title":"Fast Tree Model for Predicting Network Security Incidents","authors":"Marcus Musa Magaji, Abayomi Jegede, Nentawe Gurumdimma, M. Onoja, G. Aimufua, A. Oloyede","doi":"10.1109/ITED56637.2022.10051219","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051219","url":null,"abstract":"Network security personnel are expected to provide uninterrupted services by handling attacks irrespective of the modus operandi. Multiple defensive approaches to prevent, curtail, or mitigate an attack are the primary responsibilities of a security personnel. Considering the fact that, predicting security attacks is an additional technique currently used by most organizations to accurately measure the security risks related to overall system performance, several approaches have been used to predict network security attacks. However, high predicting accuracy and difficulty in analyzing very large amount of dataset and getting a reliable dataset seem to be the major constraints. The uncertain behavior would be subjected to verification and validation by the network administrator. KDDD CUPP 99 dataset and NSL KDD dataset were both used in the research. NSL KDD provides 0.997 average micro and macro accuracy, having average LogLoss of 0.16 and average LogLossReduction of 0.976. Log-Loss Reduction ranges from infinity to 1, where 1 and 0 represent perfect prediction and mean prediction respectively. Log-Loss reduction should be as close to 1 as possible for a good model. Log-Loss in the classification is an evaluation metrics that characterized the accuracy of a classifier. Log-loss is a measure of the performance of a classifier where the prediction input is a probability value between “0.00 to 1.00”. It should be as close to zero as possible. This paper proposes a FastTree Model for predicting network security incidents. Therefore, ML.NET Framework and FastTree Regression Technique have a high prediction accuracy and ability to analyze large datasets of normal, abnormal and uncertain behaviors.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129424558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blind steganalysis-based predictive analytics of numeric image descriptors for digital forensics with Random Forest & SqueezeNet 基于盲隐写分析的数字图像描述符预测分析,用于随机森林和SqueezeNet的数字取证
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051337
Wasiu Akanji, O. Okey, Saheed Adelanwa, Oluwafunsho Odesanya, T. Olaleye, Mary Amusu, Akinfolarin Akinrinlola, Abiodun Oladejo
Image steganalysis have been a prominent study in digital forensics and the data science use case of artificial intelligence has been widely adopted in conceptual frameworks. In existing studies, deep learners gain prominence for intrusion detection systems while other dissimilar modules are used for feature extraction. Hence, this study rather employs deep learners as image embedding networks aimed at feature extraction for a predictive analytics of image steganalysis. The extracted numeric image descriptors trains three learner algorithms for pattern recognition using a 10 fold cross-validation system. Experimental result indicates the ensemble of Random forest algorithm and SqueezeNet image embedder as the best for steganalysis in digital forensics while the size of the training set turns out to be insignificant for the supervised machine learning study.
图像隐写分析一直是数字取证领域的一个突出研究,人工智能的数据科学用例已被广泛采用于概念框架中。在现有的研究中,深度学习在入侵检测系统中得到了突出的地位,而其他不同的模块则用于特征提取。因此,本研究采用深度学习者作为图像嵌入网络,旨在为图像隐写分析的预测分析提取特征。提取的数字图像描述符使用10倍交叉验证系统训练三种用于模式识别的学习算法。实验结果表明,随机森林算法和SqueezeNet图像嵌入器的集成是数字取证中隐写分析的最佳算法,而训练集的大小对于有监督机器学习研究来说是不重要的。
{"title":"A blind steganalysis-based predictive analytics of numeric image descriptors for digital forensics with Random Forest & SqueezeNet","authors":"Wasiu Akanji, O. Okey, Saheed Adelanwa, Oluwafunsho Odesanya, T. Olaleye, Mary Amusu, Akinfolarin Akinrinlola, Abiodun Oladejo","doi":"10.1109/ITED56637.2022.10051337","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051337","url":null,"abstract":"Image steganalysis have been a prominent study in digital forensics and the data science use case of artificial intelligence has been widely adopted in conceptual frameworks. In existing studies, deep learners gain prominence for intrusion detection systems while other dissimilar modules are used for feature extraction. Hence, this study rather employs deep learners as image embedding networks aimed at feature extraction for a predictive analytics of image steganalysis. The extracted numeric image descriptors trains three learner algorithms for pattern recognition using a 10 fold cross-validation system. Experimental result indicates the ensemble of Random forest algorithm and SqueezeNet image embedder as the best for steganalysis in digital forensics while the size of the training set turns out to be insignificant for the supervised machine learning study.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130572146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Interference Mitigation Technique for Low Power Wide Area Network 低功率广域网干扰抑制技术的发展
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051347
A. Musa, M. Adio, N. Faruk
Evolution of technology has been rapid in recent years and with the wide acceptance of 5G/6G networks, Internet of Things (IoT), Machine Learning (ML), blockchain technologies, there must be a methodology of interconnecting them across large proximity or regions to centralized servers. Existing mobile technologies are not suitable to ensure communications between these devices, and this has necessitated the need to create Low Power Wide Area Network (LPWAN). The LPWAN, assuming a set of networks, is considered to have subsets including Sigfox, LoRaWAN, NB-IoT and others. For any real system, there is always collision between packets upon arrival, thereby subtracting and extracting the weaker ones. In this work, a Repetitive Interference Mitigation algorithm is proposed, with focus on power differences between User Equipment (UE) and guard subcarriers. This process ensures decryption of the packets that arrive at the same time. Usage of just one guard subcarriers and multiple iterations of the developed technique is suitable to ensure a very good system performance and has a throughput of 36% as compared with other methods.
近年来技术发展迅速,随着5G/6G网络、物联网(IoT)、机器学习(ML)、区块链技术的广泛接受,必须有一种方法将它们跨大范围或区域连接到集中式服务器。现有的移动技术不适合确保这些设备之间的通信,这就需要创建低功率广域网(LPWAN)。假设一组网络,LPWAN被认为具有子集,包括Sigfox, LoRaWAN, NB-IoT等。对于任何一个真实的系统,在到达的数据包之间总是存在冲突,因此可以对较弱的数据包进行减法和提取。在这项工作中,提出了一种重复干扰缓解算法,重点关注用户设备(UE)和保护子载波之间的功率差异。此过程确保对同时到达的数据包进行解密。仅使用一个保护子载波和多次迭代所开发的技术适用于确保非常好的系统性能,与其他方法相比,吞吐量为36%。
{"title":"Development of Interference Mitigation Technique for Low Power Wide Area Network","authors":"A. Musa, M. Adio, N. Faruk","doi":"10.1109/ITED56637.2022.10051347","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051347","url":null,"abstract":"Evolution of technology has been rapid in recent years and with the wide acceptance of 5G/6G networks, Internet of Things (IoT), Machine Learning (ML), blockchain technologies, there must be a methodology of interconnecting them across large proximity or regions to centralized servers. Existing mobile technologies are not suitable to ensure communications between these devices, and this has necessitated the need to create Low Power Wide Area Network (LPWAN). The LPWAN, assuming a set of networks, is considered to have subsets including Sigfox, LoRaWAN, NB-IoT and others. For any real system, there is always collision between packets upon arrival, thereby subtracting and extracting the weaker ones. In this work, a Repetitive Interference Mitigation algorithm is proposed, with focus on power differences between User Equipment (UE) and guard subcarriers. This process ensures decryption of the packets that arrive at the same time. Usage of just one guard subcarriers and multiple iterations of the developed technique is suitable to ensure a very good system performance and has a throughput of 36% as compared with other methods.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124997412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy and Security of Content: A Study of User-resilience and Pre-checks on Social Media 内容的隐私和安全:社交媒体用户弹性和预检研究
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051589
C. Nwankwo, Francis Uwadia, W. Nwankwo, Wifred Adigwe, P. Chinedu, Emmanuel Ojei
In recent times, cybercrimes, kidnapping, and ritual killings are being enabled through the use and abuse of social media technologies and students are becoming cheap targets. Consequently, this study seeks to investigate the imperative of electronic communication styles among students via social media channels vis-a-vis the users' resilience before and during communication on social media to ensure that the message is routed to the intended recipient. In this study, we adopted the case study approach and 3500 students were drawn from different academic programmes in a known tertiary institution in Southern Nigeria. Validly completed questionnaires from 1000 students were analyzed. Findings revealed that 96% of the students who use social media are not concerned with any form of security screening before sending messages on social media networks via their smartphones.
近年来,网络犯罪、绑架和仪式杀人通过使用和滥用社交媒体技术得以实现,学生正成为廉价的目标。因此,本研究旨在调查学生通过社交媒体渠道进行电子沟通的必要性,以及用户在社交媒体上沟通之前和期间的弹性,以确保信息被路由到预期的收件人。在这项研究中,我们采用了案例研究方法,从尼日利亚南部一所知名高等教育机构的不同学术课程中抽取了3500名学生。对1000名学生有效填写的问卷进行分析。调查结果显示,96%使用社交媒体的学生在通过智能手机在社交媒体网络上发送信息之前,并不担心任何形式的安全检查。
{"title":"Privacy and Security of Content: A Study of User-resilience and Pre-checks on Social Media","authors":"C. Nwankwo, Francis Uwadia, W. Nwankwo, Wifred Adigwe, P. Chinedu, Emmanuel Ojei","doi":"10.1109/ITED56637.2022.10051589","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051589","url":null,"abstract":"In recent times, cybercrimes, kidnapping, and ritual killings are being enabled through the use and abuse of social media technologies and students are becoming cheap targets. Consequently, this study seeks to investigate the imperative of electronic communication styles among students via social media channels vis-a-vis the users' resilience before and during communication on social media to ensure that the message is routed to the intended recipient. In this study, we adopted the case study approach and 3500 students were drawn from different academic programmes in a known tertiary institution in Southern Nigeria. Validly completed questionnaires from 1000 students were analyzed. Findings revealed that 96% of the students who use social media are not concerned with any form of security screening before sending messages on social media networks via their smartphones.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116972017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Phishing URLs Using Heuristics-Based Approach 基于启发式方法的网络钓鱼url检测
Pub Date : 2022-11-01 DOI: 10.1109/ITED56637.2022.10051199
S. A. Salihu, I. D. Oladipo, Abdul Afeez Wojuade, M. Abdulraheem, Abdulrauph Babatunde, A. Ajiboye, G. B. Balogun
Phishing is one of the types of cybercrime in which the attacker poses as a trustworthy entity with a view to obtaining sensitive information or data from the victim, this occurs usually through email. In the process, the victim may release information such as login credentials, credit card details, and other personally identifiable information that normally should not be revealed. The existing approaches used for phishing detection, therefore, need to be enhanced to effectively detect phishing. This study proposed a novel method for detecting phishing based on some heuristic features by extracting some relevant attributes, filtering these attributes, and classifying the same according to their impact on a website. The data explored for this study was retrieved from PhishTank and Alexa, which was later preprocessed for smooth model creation in python. The model created was evaluated and consistently gives a true positive rate of 85% based on the threshold set and an accuracy of 95.52%. The resulting output of this study has shown its reliability in the detection of phishing and could serve as a good benchmark for similar studies.
网络钓鱼是网络犯罪的一种,攻击者冒充一个值得信赖的实体,目的是获取受害者的敏感信息或数据,这通常通过电子邮件发生。在此过程中,受害者可能会泄露诸如登录凭据、信用卡详细信息和其他通常不应泄露的个人身份信息。因此,为了有效地检测网络钓鱼,需要对现有的网络钓鱼检测方法进行改进。本研究提出了一种基于启发式特征的网络钓鱼检测方法,通过提取相关属性,过滤这些属性,并根据其对网站的影响进行分类。本研究探索的数据是从PhishTank和Alexa中检索的,随后在python中进行预处理以顺利创建模型。对所创建的模型进行了评估,并在阈值设置的基础上始终给出85%的真阳性率和95.52%的准确率。本研究的结果显示了其在网络钓鱼检测中的可靠性,可以作为类似研究的良好基准。
{"title":"Detection of Phishing URLs Using Heuristics-Based Approach","authors":"S. A. Salihu, I. D. Oladipo, Abdul Afeez Wojuade, M. Abdulraheem, Abdulrauph Babatunde, A. Ajiboye, G. B. Balogun","doi":"10.1109/ITED56637.2022.10051199","DOIUrl":"https://doi.org/10.1109/ITED56637.2022.10051199","url":null,"abstract":"Phishing is one of the types of cybercrime in which the attacker poses as a trustworthy entity with a view to obtaining sensitive information or data from the victim, this occurs usually through email. In the process, the victim may release information such as login credentials, credit card details, and other personally identifiable information that normally should not be revealed. The existing approaches used for phishing detection, therefore, need to be enhanced to effectively detect phishing. This study proposed a novel method for detecting phishing based on some heuristic features by extracting some relevant attributes, filtering these attributes, and classifying the same according to their impact on a website. The data explored for this study was retrieved from PhishTank and Alexa, which was later preprocessed for smooth model creation in python. The model created was evaluated and consistently gives a true positive rate of 85% based on the threshold set and an accuracy of 95.52%. The resulting output of this study has shown its reliability in the detection of phishing and could serve as a good benchmark for similar studies.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133638343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 5th Information Technology for Education and Development (ITED)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1