首页 > 最新文献

Journal of Advances in Information Technology最新文献

英文 中文
Towards Ideal and Efficient Recommendation Systems Based on the Five Evaluation Concepts Promoting Serendipity 基于促进意外发现的五个评价概念的理想高效推荐系统
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.4.701-717
O. Stitini, I. García-Magariño, S. Kaloun, O. Bencharef
.
{"title":"Towards Ideal and Efficient Recommendation Systems Based on the Five Evaluation Concepts Promoting Serendipity","authors":"O. Stitini, I. García-Magariño, S. Kaloun, O. Bencharef","doi":"10.12720/jait.14.4.701-717","DOIUrl":"https://doi.org/10.12720/jait.14.4.701-717","url":null,"abstract":".","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66333392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Part-of-Speech (POS) Tagging for Standard Brunei Malay: A Probabilistic and Neural-Based Approach 标准文莱马来语词性标注:基于概率和神经的方法
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.4.830-837
Izzati Mohaimin, R. Apong, A. R. Damit
—As online information increases over the years, text mining researchers developed Natural Language Processing tools to extract relevant and useful information from textual data such as online news articles. The Malay language is widely spoken, especially in the Southeast Asian region, but there is a lack of Natural Language Processing (NLP) tools such as Malay corpora and Part-of-Speech (POS) taggers. Existing NLP tools are mainly based on Standard Malay of Malaysia and Indonesian language, but there is none for the Bruneian Malay. We addressed this issue by designing a Standard Brunei Malay corpus consisting of over 114,000 lexical tokens, annotated using 17 Malay POS tagsets. Furthermore, we implemented two commonly used POS tagging techniques, Conditional Random Field (CRF) and Bi-directional Long Short-Term Memory (BLSTM), to develop Bruneian POS taggers and compared their performances. The results showed that both CRF and BLSTM models performed well in predicting POS tags on Bruneian texts. However, CRF models outperform BLSTM, where CRF using all features achieved an F-Measure of 92.06% on news articles and 90.71% of F-Measure on crime articles. Adding a batch normalization layer to the BLSTM model architecture increased the performance by 7.13%. To further improve the BLSTM models, we suggested increasing the training data and experimenting with different hyperparameter settings. The findings also indicated that modelling BLSTM with fastText has improved the POS prediction of Bruneian words.
随着近年来在线信息的增加,文本挖掘研究人员开发了自然语言处理工具,从文本数据(如在线新闻文章)中提取相关和有用的信息。马来语被广泛使用,特别是在东南亚地区,但缺乏自然语言处理(NLP)工具,如马来语料库和词性标注器(POS)。现有的NLP工具主要基于马来西亚的标准马来语和印尼语,但没有针对文莱马来语的工具。我们通过设计一个标准文莱马来语语料库来解决这个问题,该语料库包含超过114,000个词汇令牌,使用17个马来语POS标记集进行注释。此外,我们实施了两种常用的词性标注技术,条件随机场(CRF)和双向长短期记忆(BLSTM),以开发文莱词性标注器并比较其性能。结果表明,CRF和BLSTM模型都能很好地预测文莱语文本的词性标注。然而,CRF模型优于BLSTM,在BLSTM中,使用所有特征的CRF在新闻文章上的F-Measure达到了92.06%,在犯罪文章上的F-Measure达到了90.71%。在BLSTM模型架构中加入批处理规范化层,性能提高了7.13%。为了进一步改进BLSTM模型,我们建议增加训练数据并尝试不同的超参数设置。研究结果还表明,使用fastText建模BLSTM可以改善文莱语单词的词性预测。
{"title":"Part-of-Speech (POS) Tagging for Standard Brunei Malay: A Probabilistic and Neural-Based Approach","authors":"Izzati Mohaimin, R. Apong, A. R. Damit","doi":"10.12720/jait.14.4.830-837","DOIUrl":"https://doi.org/10.12720/jait.14.4.830-837","url":null,"abstract":"—As online information increases over the years, text mining researchers developed Natural Language Processing tools to extract relevant and useful information from textual data such as online news articles. The Malay language is widely spoken, especially in the Southeast Asian region, but there is a lack of Natural Language Processing (NLP) tools such as Malay corpora and Part-of-Speech (POS) taggers. Existing NLP tools are mainly based on Standard Malay of Malaysia and Indonesian language, but there is none for the Bruneian Malay. We addressed this issue by designing a Standard Brunei Malay corpus consisting of over 114,000 lexical tokens, annotated using 17 Malay POS tagsets. Furthermore, we implemented two commonly used POS tagging techniques, Conditional Random Field (CRF) and Bi-directional Long Short-Term Memory (BLSTM), to develop Bruneian POS taggers and compared their performances. The results showed that both CRF and BLSTM models performed well in predicting POS tags on Bruneian texts. However, CRF models outperform BLSTM, where CRF using all features achieved an F-Measure of 92.06% on news articles and 90.71% of F-Measure on crime articles. Adding a batch normalization layer to the BLSTM model architecture increased the performance by 7.13%. To further improve the BLSTM models, we suggested increasing the training data and experimenting with different hyperparameter settings. The findings also indicated that modelling BLSTM with fastText has improved the POS prediction of Bruneian words.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66333721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Flight Delays Reduction: The Effect of Aircraft Type and Part of Day on Arrival Delays Prediction 减少航班延误:飞机类型和时间对到达延误预测的影响
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.5.980-990
Hajar Alla, Lahcen Moumoun, Youssef Balouki
—The basic objective of this study is to develop a model that analyzes and predicts the occurrence of flight arrival delays in the United States. Macroscopic and microscopic delay factors are discussed. In this research, we proposed new features that, to the best of our knowledge, were never used in previous studies, namely departure Part and Arrival Part of the day (Mornings, Afternoons, Evenings, Nights) and type of aircraft. U.S. domestic flight data for the year 2018, extracted from the Bureau of Transportation Statistics (BTS), were adopted in order to train the predictive model. We used efficient Machine Learning classifiers such as Decision Trees, K-Nearest Neighbors, Random Forest and Multilayer Perceptron. To overcome the issue of imbalanced data, sampling techniques were performed. We chose Grid Search technique for best parameters selection. The performance of each classifier was compared in terms of evaluation metrics, parameters tuning, data sampling and features selection. The experimental results showed that tuning and sampling techniques have successfully generated the best classifier which is Multilayer Perceptron (MLP) with an accuracy of 98.72% and a higher number of correctly classified flights.
{"title":"Towards Flight Delays Reduction: The Effect of Aircraft Type and Part of Day on Arrival Delays Prediction","authors":"Hajar Alla, Lahcen Moumoun, Youssef Balouki","doi":"10.12720/jait.14.5.980-990","DOIUrl":"https://doi.org/10.12720/jait.14.5.980-990","url":null,"abstract":"—The basic objective of this study is to develop a model that analyzes and predicts the occurrence of flight arrival delays in the United States. Macroscopic and microscopic delay factors are discussed. In this research, we proposed new features that, to the best of our knowledge, were never used in previous studies, namely departure Part and Arrival Part of the day (Mornings, Afternoons, Evenings, Nights) and type of aircraft. U.S. domestic flight data for the year 2018, extracted from the Bureau of Transportation Statistics (BTS), were adopted in order to train the predictive model. We used efficient Machine Learning classifiers such as Decision Trees, K-Nearest Neighbors, Random Forest and Multilayer Perceptron. To overcome the issue of imbalanced data, sampling techniques were performed. We chose Grid Search technique for best parameters selection. The performance of each classifier was compared in terms of evaluation metrics, parameters tuning, data sampling and features selection. The experimental results showed that tuning and sampling techniques have successfully generated the best classifier which is Multilayer Perceptron (MLP) with an accuracy of 98.72% and a higher number of correctly classified flights.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136202086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of ERS Techniques for Next-Generation Opportunistic Networks 下一代机会网络ERS技术性能分析
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.5.1117-1123
Nguyen Minh Quy, Abdellah Chehri, Pham Duc Khai, Dao Manh Linh, Dang Van Anh
.
{"title":"Performance Analysis of ERS Techniques for Next-Generation Opportunistic Networks","authors":"Nguyen Minh Quy, Abdellah Chehri, Pham Duc Khai, Dao Manh Linh, Dang Van Anh","doi":"10.12720/jait.14.5.1117-1123","DOIUrl":"https://doi.org/10.12720/jait.14.5.1117-1123","url":null,"abstract":".","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135211756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reducing the Effect of Denial of Service in Web Service Environment 减少Web服务环境中拒绝服务的影响
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.5.1096-1102
Abdulrahman Alshayea, Mohammad Ali H. Eljinini
—Denial of Service (DoS) attacks can cost online and web service providers money and damage their reputations. The lack of security protection in web services creates a vulnerability attackers can exploit. A new XDoS attack targeting web services has recently emerged, using XML rather than plain old HTML as the attack vector. This paper proposes a middleware tool for detecting and preventing web service XDoS and HTTP flooding attacks. A rule-based technique classifies requests as benign or malicious to detect XDoS attacks. According to the middleware tool’s trial findings, rule-based technology has successfully recognized and blocked XDoS and HTTP flooding assaults such as large payloads, forceful parsing, and external XML elements in near-real time, such as 0.006s across web services. Middleware protects web services from XDoS and distributed XDoS attacks by ensuring nearly 100% service availability for routine requests (DXDoS).
{"title":"Reducing the Effect of Denial of Service in Web Service Environment","authors":"Abdulrahman Alshayea, Mohammad Ali H. Eljinini","doi":"10.12720/jait.14.5.1096-1102","DOIUrl":"https://doi.org/10.12720/jait.14.5.1096-1102","url":null,"abstract":"—Denial of Service (DoS) attacks can cost online and web service providers money and damage their reputations. The lack of security protection in web services creates a vulnerability attackers can exploit. A new XDoS attack targeting web services has recently emerged, using XML rather than plain old HTML as the attack vector. This paper proposes a middleware tool for detecting and preventing web service XDoS and HTTP flooding attacks. A rule-based technique classifies requests as benign or malicious to detect XDoS attacks. According to the middleware tool’s trial findings, rule-based technology has successfully recognized and blocked XDoS and HTTP flooding assaults such as large payloads, forceful parsing, and external XML elements in near-real time, such as 0.006s across web services. Middleware protects web services from XDoS and distributed XDoS attacks by ensuring nearly 100% service availability for routine requests (DXDoS).","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135211758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Zero Trust Security to Reduce Ransomware Attacks in the Philippines: A Literature Review 菲律宾实施零信任安全以减少勒索软件攻击:文献综述
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.5.928-933
Eric Blancaflor, Angelo Dominic D. Abat, Kyle Matthew A. Degrano, Ma. Cassandra M. Lindio, Andrei Daniel A. Pamoso
—Zero Trust Security is an architecture that, as the name implies, trusts no one. This type of architecture is used by several firms globally due to its robust security. The Zero Trust security implementation in the Philippines is very low and it shows by looking at the number of cyberattacks that Philippine companies experience. A prominent form of cyberattack is ransomware that endangers that sensitive information that most companies hold. Ransomware attacks are common, and this is where attackers would lock certain files and will only be unlocked when the victim would pay the appropriate ransom for the information. The Philippines has been deemed by international firms as a risky venture since the cybersecurity levels are low. There are also reports that major companies in the Philippines are victims of large-scale ransomware attacks. This study aims to give an in-depth explanation of Zero Trust and see its fundamental aspects that makes it a better option. This exploratory study considers the possible capabilities of the said architecture to combat ransomware in the context of the Philippines.
{"title":"Implementation of Zero Trust Security to Reduce Ransomware Attacks in the Philippines: A Literature Review","authors":"Eric Blancaflor, Angelo Dominic D. Abat, Kyle Matthew A. Degrano, Ma. Cassandra M. Lindio, Andrei Daniel A. Pamoso","doi":"10.12720/jait.14.5.928-933","DOIUrl":"https://doi.org/10.12720/jait.14.5.928-933","url":null,"abstract":"—Zero Trust Security is an architecture that, as the name implies, trusts no one. This type of architecture is used by several firms globally due to its robust security. The Zero Trust security implementation in the Philippines is very low and it shows by looking at the number of cyberattacks that Philippine companies experience. A prominent form of cyberattack is ransomware that endangers that sensitive information that most companies hold. Ransomware attacks are common, and this is where attackers would lock certain files and will only be unlocked when the victim would pay the appropriate ransom for the information. The Philippines has been deemed by international firms as a risky venture since the cybersecurity levels are low. There are also reports that major companies in the Philippines are victims of large-scale ransomware attacks. This study aims to give an in-depth explanation of Zero Trust and see its fundamental aspects that makes it a better option. This exploratory study considers the possible capabilities of the said architecture to combat ransomware in the context of the Philippines.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135649644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convolutional Neural Network-Based Fall Detection for the Elderly Person Monitoring 基于卷积神经网络的老年人跌倒检测
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.6.1169-1176
Kishanprasad G. Gunale, Prachi Mukherji, Sumitra N. Motade
.
{"title":"Convolutional Neural Network-Based Fall Detection for the Elderly Person Monitoring","authors":"Kishanprasad G. Gunale, Prachi Mukherji, Sumitra N. Motade","doi":"10.12720/jait.14.6.1169-1176","DOIUrl":"https://doi.org/10.12720/jait.14.6.1169-1176","url":null,"abstract":".","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135609318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Language Model Role in Improving Machine Translation Accuracy for Extremely Low Resource Languages 语言模型在提高极低资源语言机器翻译准确率中的作用分析
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.5.1073-1081
Herry Sujaini, Samuel Cahyawijaya, Arif B. Putra
—Several previous studies have suggested using statistical machine translation instead of neural machine translation for extremely low-resource languages. We could translate texts from 12 different regional languages into Indonesian using machine translation experiments. We increased the accuracy of machine translation for 12 extremely low-resource languages by using several monolingual corpus sizes on the language model’s target side. Since many Indonesian sources are available, we added this corpus to improve the model’s performance. Our study aims to analyze and evaluate the impact of different language models trained on various monolingual corpus on the accuracy of machine translation. The increase in accuracy when enlarging the monolingual corpus is not observed every time, according to our experiments. Therefore, it is necessary to perform several experiments to determine the monolingual corpus to optimize the quality. Experiments showed that Melayu Pontianak achieved the highest bilingual evaluation understudy improvement point. Specifically, we found that by adding a monolingual corpus of 50–100K, they performed a bilingual evaluation understudy improvement point of 2.15, the highest improvement point they reached for any of the twelve languages tested.
{"title":"Analysis of Language Model Role in Improving Machine Translation Accuracy for Extremely Low Resource Languages","authors":"Herry Sujaini, Samuel Cahyawijaya, Arif B. Putra","doi":"10.12720/jait.14.5.1073-1081","DOIUrl":"https://doi.org/10.12720/jait.14.5.1073-1081","url":null,"abstract":"—Several previous studies have suggested using statistical machine translation instead of neural machine translation for extremely low-resource languages. We could translate texts from 12 different regional languages into Indonesian using machine translation experiments. We increased the accuracy of machine translation for 12 extremely low-resource languages by using several monolingual corpus sizes on the language model’s target side. Since many Indonesian sources are available, we added this corpus to improve the model’s performance. Our study aims to analyze and evaluate the impact of different language models trained on various monolingual corpus on the accuracy of machine translation. The increase in accuracy when enlarging the monolingual corpus is not observed every time, according to our experiments. Therefore, it is necessary to perform several experiments to determine the monolingual corpus to optimize the quality. Experiments showed that Melayu Pontianak achieved the highest bilingual evaluation understudy improvement point. Specifically, we found that by adding a monolingual corpus of 50–100K, they performed a bilingual evaluation understudy improvement point of 2.15, the highest improvement point they reached for any of the twelve languages tested.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135052618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Philippines' Free Wi-Fi Roll-out Project: Safe or Not? 菲律宾免费Wi-Fi项目:安全与否?
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.1.20-25
E. Blancaflor, Eli Christ Paula C. Castillo, Jan Miguel N. Coretico, Geremie B. Rubiano, Angela Marie D. Tobias
Free Wi-Fi networks are widely implemented in public areas to provide benefits for the people. This paper focuses on the vulnerabilities around Wi-Fi networks that people are unaware of. Discussing the risks of using free internet is viable as public places in the Philippines have started implementing free Wi-Fi networks. Along with this, the Department of Information and Communication Technology (DICT) of the Philippines is expanding the number of free Wi-Fi to help the Filipinos adjust to the new normal caused by the pandemic. With the increase of internet access, Filipinos should be informed of the risks they may have. In this study, the security of free Wi-Fi has been exploited through various technical methods of Wi-Fi penetration testing. The study simulated penetration testing using the Kali Linux in a virtual environment from consented Wi-Fi owners. The overall result of the study shows that free Wi-Fi networks in public areas may not be safe. Free Wi-Fi users must be aware of the risk; hackers accessing their devices and inevitably stealing their private personal information.
在公共场所广泛实施免费Wi-Fi网络,为人民群众带来福祉。本文关注的是人们不知道的Wi-Fi网络的漏洞。讨论使用免费互联网的风险是可行的,因为菲律宾的公共场所已经开始实施免费Wi-Fi网络。与此同时,菲律宾信息和通信技术部(DICT)正在扩大免费Wi-Fi的数量,以帮助菲律宾人适应疫情造成的新常态。随着互联网接入的增加,菲律宾人应该了解他们可能面临的风险。在本研究中,通过Wi-Fi渗透测试的各种技术方法来利用免费Wi-Fi的安全性。这项研究模拟了在虚拟环境中使用Kali Linux进行的渗透测试,测试对象是同意使用Wi-Fi的用户。这项研究的总体结果表明,公共场所的免费Wi-Fi网络可能并不安全。免费Wi-Fi用户必须意识到这种风险;黑客进入他们的设备,不可避免地窃取他们的私人信息。
{"title":"Philippines' Free Wi-Fi Roll-out Project: Safe or Not?","authors":"E. Blancaflor, Eli Christ Paula C. Castillo, Jan Miguel N. Coretico, Geremie B. Rubiano, Angela Marie D. Tobias","doi":"10.12720/jait.14.1.20-25","DOIUrl":"https://doi.org/10.12720/jait.14.1.20-25","url":null,"abstract":"Free Wi-Fi networks are widely implemented in public areas to provide benefits for the people. This paper focuses on the vulnerabilities around Wi-Fi networks that people are unaware of. Discussing the risks of using free internet is viable as public places in the Philippines have started implementing free Wi-Fi networks. Along with this, the Department of Information and Communication Technology (DICT) of the Philippines is expanding the number of free Wi-Fi to help the Filipinos adjust to the new normal caused by the pandemic. With the increase of internet access, Filipinos should be informed of the risks they may have. In this study, the security of free Wi-Fi has been exploited through various technical methods of Wi-Fi penetration testing. The study simulated penetration testing using the Kali Linux in a virtual environment from consented Wi-Fi owners. The overall result of the study shows that free Wi-Fi networks in public areas may not be safe. Free Wi-Fi users must be aware of the risk; hackers accessing their devices and inevitably stealing their private personal information.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66329196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Distributed Machine Learning Model to Detect Attacks on Edge Computing Network 边缘计算网络攻击检测的分布式机器学习模型
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.1.153-159
Trong-Minh Hoang, Trang-Linh Le Thi, N. M. Quy
To meet the growing number and variety of IoT devices in 5G and 6G network environments, the development of edge computing technology is a powerful strategy for offloading processes in data servers by processing at the network and nearby the user. Besides its benefits, several challenges related to decentralized operations for improving performance or security tasks have been identified. A new research direction for distributed operating solutions has emerged from these issues, leading to applying Distributed Machine Learning (DML) techniques for edge computing. It takes advantage of the capacity of edge devices to handle increased data volumes, reduce connection bottlenecks, and enhance data privacy. The designs of DML architectures have to use optimized algorithms (e.g., high accuracy and rapid convergence) and effectively use hardware resources to overcome large-scale problems. However, the trade-off between accuracy and data set volume is always the biggest challenge for practical scenarios. Hence, this paper proposes a novel attack detection model based on the DML technique to detect attacks at network edge devices. A modified voting algorithm is applied to core logic operation between sever and workers in a partition learning fashion. The results of numerical simulations on the UNSW-NB15 dataset have proved that our proposed model is suitable for edge computing and gives better attack detection results than other state of the art solutions.
为了满足5G和6G网络环境中不断增长的物联网设备数量和种类,边缘计算技术的发展是一种强大的策略,可以通过在网络和用户附近进行处理来卸载数据服务器中的流程。除了它的好处之外,已经确定了与提高性能或安全任务的分散操作相关的几个挑战。从这些问题中出现了分布式操作解决方案的一个新的研究方向,即将分布式机器学习(DML)技术应用于边缘计算。它利用边缘设备的容量来处理增加的数据量,减少连接瓶颈,并增强数据隐私。DML架构的设计必须使用优化的算法(如高精度和快速收敛),并有效地利用硬件资源来克服大规模问题。然而,在实际场景中,准确性和数据集数量之间的权衡始终是最大的挑战。为此,本文提出了一种基于DML技术的攻击检测模型,用于检测网络边缘设备的攻击。将一种改进的投票算法以分区学习的方式应用于服务器和worker之间的核心逻辑操作。在UNSW-NB15数据集上的数值模拟结果证明了我们提出的模型适用于边缘计算,并且比其他最先进的解决方案提供了更好的攻击检测结果。
{"title":"A Novel Distributed Machine Learning Model to Detect Attacks on Edge Computing Network","authors":"Trong-Minh Hoang, Trang-Linh Le Thi, N. M. Quy","doi":"10.12720/jait.14.1.153-159","DOIUrl":"https://doi.org/10.12720/jait.14.1.153-159","url":null,"abstract":"To meet the growing number and variety of IoT devices in 5G and 6G network environments, the development of edge computing technology is a powerful strategy for offloading processes in data servers by processing at the network and nearby the user. Besides its benefits, several challenges related to decentralized operations for improving performance or security tasks have been identified. A new research direction for distributed operating solutions has emerged from these issues, leading to applying Distributed Machine Learning (DML) techniques for edge computing. It takes advantage of the capacity of edge devices to handle increased data volumes, reduce connection bottlenecks, and enhance data privacy. The designs of DML architectures have to use optimized algorithms (e.g., high accuracy and rapid convergence) and effectively use hardware resources to overcome large-scale problems. However, the trade-off between accuracy and data set volume is always the biggest challenge for practical scenarios. Hence, this paper proposes a novel attack detection model based on the DML technique to detect attacks at network edge devices. A modified voting algorithm is applied to core logic operation between sever and workers in a partition learning fashion. The results of numerical simulations on the UNSW-NB15 dataset have proved that our proposed model is suitable for edge computing and gives better attack detection results than other state of the art solutions.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66329514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Journal of Advances in Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1