首页 > 最新文献

Journal of Internet Services and Information Security最新文献

英文 中文
Anomaly Detection for Internet of Things Security Attacks Based on Recent Optimal Federated Deep Learning Model 基于最新最优联合深度学习模型的物联网安全攻击异常检测
Q2 Computer Science Pub Date : 2023-08-31 DOI: 10.58346/jisis.2023.i3.007
Udayakumar Dr.R., Anuradha Dr.M., Dr. Yogesh Manohar Gajmal, Elankavi Dr.R.
The mushrooming of IoTs (Internet of Things) and decentralised paradigm in cyber security have attracted a lot of interest from the government, academic, and business sectors in recent years. The use of MLT-assisted techniques in the IoT security arena has attracted a lot of attention in recent years. Many current studies presume that massive training data is readily accessible from IoT devices and transferable to main servers. However, since data is hosted on single servers, security and privacy concerns regarding this data also increase. It is suggested to use decentralised on-device data in OFDL (Optimal Federated Deep Learning) based anomaly detections to proactively identify infiltration in networks for IoTs. The GRUs (Gated Recurrent Units) used in OFDL's training rounds share only learned weights with the main OFDL servers, protecting data integrity on local devices. The model's training costs are reduced by the use of appropriate parameters, which also secures the edge or IoT device. In order to optimise the hyper-parameter environments for the limited OFDL environment, this paper suggests an MSSO (Modified Salp Swarm Optimisation) approach. Additionally, ensembles combine updates from multiple techniques to enhance accuracies. The experimental findings show that this strategy secures user data privacy better than traditional/centralized MLTs and offers the best accuracy rate for attack detection.
近年来,物联网(iot)和分散的网络安全范式在网络安全领域的蓬勃发展引起了政府、学术界和商界的广泛关注。近年来,在物联网安全领域使用mlt辅助技术引起了很多关注。目前的许多研究假设,大量的训练数据很容易从物联网设备访问,并可转移到主服务器。然而,由于数据托管在单个服务器上,因此有关这些数据的安全和隐私问题也会增加。建议在基于OFDL(最优联邦深度学习)的异常检测中使用分散的设备上数据,以主动识别物联网网络中的渗透。在OFDL的训练轮次中使用的gru(门控循环单元)只与主要OFDL服务器共享已学习的权重,以保护本地设备上的数据完整性。通过使用适当的参数来降低模型的培训成本,这也保证了边缘或物联网设备的安全。为了优化有限OFDL环境下的超参数环境,本文提出了一种修正Salp群优化(MSSO)方法。此外,合奏结合了多种技术的更新,以提高准确性。实验结果表明,该策略比传统/集中式mlt更好地保护了用户数据隐私,并提供了最佳的攻击检测准确率。
{"title":"Anomaly Detection for Internet of Things Security Attacks Based on Recent Optimal Federated Deep Learning Model","authors":"Udayakumar Dr.R., Anuradha Dr.M., Dr. Yogesh Manohar Gajmal, Elankavi Dr.R.","doi":"10.58346/jisis.2023.i3.007","DOIUrl":"https://doi.org/10.58346/jisis.2023.i3.007","url":null,"abstract":"The mushrooming of IoTs (Internet of Things) and decentralised paradigm in cyber security have attracted a lot of interest from the government, academic, and business sectors in recent years. The use of MLT-assisted techniques in the IoT security arena has attracted a lot of attention in recent years. Many current studies presume that massive training data is readily accessible from IoT devices and transferable to main servers. However, since data is hosted on single servers, security and privacy concerns regarding this data also increase. It is suggested to use decentralised on-device data in OFDL (Optimal Federated Deep Learning) based anomaly detections to proactively identify infiltration in networks for IoTs. The GRUs (Gated Recurrent Units) used in OFDL's training rounds share only learned weights with the main OFDL servers, protecting data integrity on local devices. The model's training costs are reduced by the use of appropriate parameters, which also secures the edge or IoT device. In order to optimise the hyper-parameter environments for the limited OFDL environment, this paper suggests an MSSO (Modified Salp Swarm Optimisation) approach. Additionally, ensembles combine updates from multiple techniques to enhance accuracies. The experimental findings show that this strategy secures user data privacy better than traditional/centralized MLTs and offers the best accuracy rate for attack detection.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44788536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling and Compensation of SIC Imperfection in IRS-NOMA based 5G-System 基于IRS-NOMA的5g系统SIC缺陷建模与补偿
Q2 Computer Science Pub Date : 2023-08-31 DOI: 10.58346/jisis.2023.i3.003
Basman M. Alnedawi, W. Ibraheem, Z. Al-Abbasi
This article considers the impairments in the application of successive interference cancellation (SIC) at the detection phase of non-orthogonal multiple access (NOMA) users. A practical approach is proposed to model the SIC impairment which takes into account the number of multiplexed users in NOMA’s power domain, in addition to the overall number of shared radio resources. In such case the imperfection of the SIC varies in accordance with the number of users. This strategy is closer to the situation in practice than the case where the SIC is modeled with fixed error factor as in the previous research articles that already considered the matter. A channel estimation approach is also proposed, which depends on the user’s channel gain variations to predict the change in its peers’ channel so as to compensate for the error resulting from SIC imperfection. The outcome of the proposed compensation strategy is promising as the simulation results reflect significant improvement in the achievable rate and energy efficiency.
本文研究了在非正交多址(NOMA)用户检测阶段应用连续干扰消除(SIC)技术的缺陷。除了考虑共享无线电资源的总数外,还考虑了NOMA功率域中复用用户的数量,提出了一种实用的SIC损伤建模方法。在这种情况下,SIC的不完善程度会随着用户的数量而变化。这种策略更接近于实际情况,而不是像以前的研究文章那样使用固定的误差因子对SIC进行建模。本文还提出了一种信道估计方法,该方法根据用户信道增益的变化来预测其对端信道的变化,以补偿由SIC不完善引起的误差。所提出的补偿策略的结果是有希望的,因为仿真结果反映了可实现率和能源效率的显着提高。
{"title":"Modelling and Compensation of SIC Imperfection in IRS-NOMA based 5G-System","authors":"Basman M. Alnedawi, W. Ibraheem, Z. Al-Abbasi","doi":"10.58346/jisis.2023.i3.003","DOIUrl":"https://doi.org/10.58346/jisis.2023.i3.003","url":null,"abstract":"This article considers the impairments in the application of successive interference cancellation (SIC) at the detection phase of non-orthogonal multiple access (NOMA) users. A practical approach is proposed to model the SIC impairment which takes into account the number of multiplexed users in NOMA’s power domain, in addition to the overall number of shared radio resources. In such case the imperfection of the SIC varies in accordance with the number of users. This strategy is closer to the situation in practice than the case where the SIC is modeled with fixed error factor as in the previous research articles that already considered the matter. A channel estimation approach is also proposed, which depends on the user’s channel gain variations to predict the change in its peers’ channel so as to compensate for the error resulting from SIC imperfection. The outcome of the proposed compensation strategy is promising as the simulation results reflect significant improvement in the achievable rate and energy efficiency.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42015424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web-Service Security and The Digital Skills of Users: An Exploratory Study of Countries in Europe 网络服务安全和用户的数字技能:欧洲国家的探索性研究
Q2 Computer Science Pub Date : 2023-08-31 DOI: 10.58346/jisis.2023.i3.004
B. Blažič, Primoz Cigoj, Andrej Jerman Blažič
This study explores the impact of internet users’ and web owners’ knowledge, measured by the level of digital skills, on the number of insecure websites based on a survey of the internet. The influence of the affordability of internet access to the web space on the vulnerability of a particular European country is also considered. The study introduces a quantifiable index for assessing the insecurity of websites that is incorporated into a newly developed tool that scans websites and identifies the vulnerability in the Web Content Management System (WCMS). The collected vulnerability data and the digital skills are analyzed with statistical methods for finding the interdependences and relationships. Higher levels of digital skills and lower fixed-internet-access costs contribute to a smaller number of insecure websites. The vulnerability of the websites for different economic sectors is explored as well. The paper discusses the differences in the digital development pathways and governmental policies applied in European countries that have been affected by user knowledge and digital skills. The study brings original results and findings, as there are no similar studies addressing the impact of the knowledge of a country’s population on the level of insecurity found in the WCMS, including plug-ins.
本研究通过对互联网的调查,探讨了互联网用户和网站所有者的知识(通过数字技能水平来衡量)对不安全网站数量的影响。还考虑了互联网访问网络空间的可负担性对某一欧洲国家脆弱性的影响。该研究引入了一个可量化的指标,用于评估网站的不安全性,该指标被整合到一个新开发的工具中,该工具可以扫描网站并识别Web内容管理系统(WCMS)中的漏洞。利用统计方法对收集到的漏洞数据和数字技能进行分析,找出两者之间的相互依赖关系。更高水平的数字技能和更低的固定互联网接入成本有助于减少不安全网站的数量。并对不同经济领域网站的脆弱性进行了探讨。本文讨论了受用户知识和数字技能影响的欧洲国家在数字发展路径和政府政策方面的差异。这项研究带来了原创的结果和发现,因为没有类似的研究涉及一个国家的人口知识对世界人口管理体系中发现的不安全程度的影响,包括插件。
{"title":"Web-Service Security and The Digital Skills of Users: An Exploratory Study of Countries in Europe","authors":"B. Blažič, Primoz Cigoj, Andrej Jerman Blažič","doi":"10.58346/jisis.2023.i3.004","DOIUrl":"https://doi.org/10.58346/jisis.2023.i3.004","url":null,"abstract":"This study explores the impact of internet users’ and web owners’ knowledge, measured by the level of digital skills, on the number of insecure websites based on a survey of the internet. The influence of the affordability of internet access to the web space on the vulnerability of a particular European country is also considered. The study introduces a quantifiable index for assessing the insecurity of websites that is incorporated into a newly developed tool that scans websites and identifies the vulnerability in the Web Content Management System (WCMS). The collected vulnerability data and the digital skills are analyzed with statistical methods for finding the interdependences and relationships. Higher levels of digital skills and lower fixed-internet-access costs contribute to a smaller number of insecure websites. The vulnerability of the websites for different economic sectors is explored as well. The paper discusses the differences in the digital development pathways and governmental policies applied in European countries that have been affected by user knowledge and digital skills. The study brings original results and findings, as there are no similar studies addressing the impact of the knowledge of a country’s population on the level of insecurity found in the WCMS, including plug-ins.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45228900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-based Spam Detection Techniques for Online Social Networks: Challenges and Opportunities 基于人工智能的在线社交网络垃圾邮件检测技术:挑战与机遇
Q2 Computer Science Pub Date : 2023-08-31 DOI: 10.58346/jisis.2023.i3.006
A. A. Abdo, Khaznah Alhajri, Assail Alyami, Aljazi Alkhalaf, Bashayer Allail, Esra Alyami, Hind Baaqeel
In recent years, online social networks (OSNs) have become a huge used platform for sharing activities, opinions, and advertisements. Spam content is considered one of the biggest threats in social networks. Spammers exploit OSNs for falsifying content as part of phishing, such as sharing forged advertisements, selling forged products, or sharing sexual words. Therefore, machine learning (ML) and deep learning (DL) techniques are the best methods for detecting phishing attacks and minimize their risk. This paper provides an overview of prior studies of OSNs spam detection modeling based on ML and DL techniques. The research papers are classified into three categories: the features used for prediction, the dataset size corresponding language used, real-time based applications, and machine learning or deep learning techniques. Challenges and opportunities in phishing attacks prediction using ML and DL techniques are also concluded in our study.
近年来,在线社交网络(OSN)已成为一个巨大的共享活动、意见和广告的平台。垃圾邮件内容被认为是社交网络中最大的威胁之一。垃圾邮件发送者利用OSN伪造内容,作为网络钓鱼的一部分,例如分享伪造的广告、销售伪造的产品或分享性话语。因此,机器学习(ML)和深度学习(DL)技术是检测网络钓鱼攻击并将其风险降至最低的最佳方法。本文概述了基于ML和DL技术的OSNs垃圾邮件检测建模的研究进展。研究论文分为三类:用于预测的特征、使用的数据集大小对应的语言、基于实时的应用程序以及机器学习或深度学习技术。我们的研究还总结了使用ML和DL技术预测网络钓鱼攻击的挑战和机遇。
{"title":"AI-based Spam Detection Techniques for Online Social Networks: Challenges and Opportunities","authors":"A. A. Abdo, Khaznah Alhajri, Assail Alyami, Aljazi Alkhalaf, Bashayer Allail, Esra Alyami, Hind Baaqeel","doi":"10.58346/jisis.2023.i3.006","DOIUrl":"https://doi.org/10.58346/jisis.2023.i3.006","url":null,"abstract":"In recent years, online social networks (OSNs) have become a huge used platform for sharing activities, opinions, and advertisements. Spam content is considered one of the biggest threats in social networks. Spammers exploit OSNs for falsifying content as part of phishing, such as sharing forged advertisements, selling forged products, or sharing sexual words. Therefore, machine learning (ML) and deep learning (DL) techniques are the best methods for detecting phishing attacks and minimize their risk. This paper provides an overview of prior studies of OSNs spam detection modeling based on ML and DL techniques. The research papers are classified into three categories: the features used for prediction, the dataset size corresponding language used, real-time based applications, and machine learning or deep learning techniques. Challenges and opportunities in phishing attacks prediction using ML and DL techniques are also concluded in our study.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49537950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Hybrid Lexicon Ensemble Learning Model for Sentiment Classification of Consumer Reviews 一种新的用于消费者评论情感分类的混合词典集成学习模型
Q2 Computer Science Pub Date : 2023-08-31 DOI: 10.58346/jisis.2023.i3.002
Sourav Sinha, Dr. Revathi Sathiya Narayanan
In recent past during the era of consumerism with easy accessibility to social networking world, the consumers usually give comments and opinions on daily usable ingredients, electronic goods and services offered on payments. These comments or opinions are innumerable and huge on each item, hence need the special attention for sentimental value particularly on their text parts. The present study is an attempt to perform sentiment prediction on Amazon Electronic products, gift cards and Kindle dataset. In this paper, the HLESV (Hybrid Lexicon Ensemble based Soft Voting) model is proposed by combining lexicon and ensemble approaches using optimally weighted voting to predict the sentiment, subsequently to evaluate model using various performance metrics like precision, recall, F1-score. This paper computes an additional metric namely subjectivity score along with sentiment score and proposes non-interpretive sentiment class label to evaluate the polarity of the reviews using our proposed HLESV model for sentiment classification. The accuracy score of our proposed HLESV model is evaluated to assess its effectiveness on Amazon consumer product review datasets and observed an increase of 1-6% accuracy over existing state-of-the-art ensemble methodology.
在最近的消费主义时代,社交网络世界很容易进入,消费者通常会对日常可用的食材、电子产品和支付提供的服务发表评论和意见。这些评论或意见在每个项目上都是无数的和巨大的,因此需要特别注意情感价值,特别是在他们的文本部分。本研究试图对亚马逊电子产品、礼品卡和Kindle数据集进行情感预测。本文提出了基于软投票的HLESV (Hybrid Lexicon Ensemble based Soft Voting)模型,该模型将词典和集成方法相结合,使用最优加权投票来预测情感,然后使用精度、召回率、F1-score等各种性能指标来评估模型。本文计算了一个额外的度量,即主观得分和情感得分,并提出了非解释性的情感类别标签,使用我们提出的HLESV模型进行情感分类来评估评论的极性。我们对我们提出的HLESV模型的准确率评分进行了评估,以评估其在亚马逊消费者产品评论数据集上的有效性,并观察到比现有最先进的集成方法提高了1-6%的准确率。
{"title":"A Novel Hybrid Lexicon Ensemble Learning Model for Sentiment Classification of Consumer Reviews","authors":"Sourav Sinha, Dr. Revathi Sathiya Narayanan","doi":"10.58346/jisis.2023.i3.002","DOIUrl":"https://doi.org/10.58346/jisis.2023.i3.002","url":null,"abstract":"In recent past during the era of consumerism with easy accessibility to social networking world, the consumers usually give comments and opinions on daily usable ingredients, electronic goods and services offered on payments. These comments or opinions are innumerable and huge on each item, hence need the special attention for sentimental value particularly on their text parts. The present study is an attempt to perform sentiment prediction on Amazon Electronic products, gift cards and Kindle dataset. In this paper, the HLESV (Hybrid Lexicon Ensemble based Soft Voting) model is proposed by combining lexicon and ensemble approaches using optimally weighted voting to predict the sentiment, subsequently to evaluate model using various performance metrics like precision, recall, F1-score. This paper computes an additional metric namely subjectivity score along with sentiment score and proposes non-interpretive sentiment class label to evaluate the polarity of the reviews using our proposed HLESV model for sentiment classification. The accuracy score of our proposed HLESV model is evaluated to assess its effectiveness on Amazon consumer product review datasets and observed an increase of 1-6% accuracy over existing state-of-the-art ensemble methodology.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41972152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fake Face Detection Based on Colour Textual Analysis Using Deep Convolutional Neural Network 基于颜色文本分析的深度卷积神经网络假人脸检测
Q2 Computer Science Pub Date : 2023-08-31 DOI: 10.58346/jisis.2023.i3.009
Wasin AlKishri, Setyawan Widyarto, Jabar H. Yousif, M. Al-Bahri
Detecting fake faces has become a crucial endeavour within the realm of computer vision. The widespread availability of digital media has facilitated the creation and dissemination of deceptive and misleading content. A prominent strategy for identifying counterfeit faces employs advanced deep-learning methodologies that scrutinise both colour and textural attributes. This investigation is geared towards devising a method for discerning fake faces by leveraging the capabilities of convolutional neural networks (CNNs). These networks are trained to discriminate between authentic and forged images by discerning nuances in their colour characteristics. To achieve this, the MSU MFSD dataset will be harnessed, allowing for exploring colour textures and extracting facial traits across diverse colour channels, including RGB, HSV, and YCbCr.The proposed framework marks a notable stride in the realm of computer vision research, particularly given the prevalent employment of digital media, which has eased the generation and distribution of misleading or deceitful content. Developing dependable systems for identifying counterfeit faces holds immense potential in curtailing the proliferation of false information and upholding the integrity of digital media platforms.
检测假脸已经成为计算机视觉领域的一项重要工作。数字媒体的广泛使用促进了欺骗性和误导性内容的创造和传播。识别假脸的一个突出策略是采用先进的深度学习方法,仔细检查颜色和纹理属性。本研究旨在设计一种利用卷积神经网络(cnn)的能力来识别假脸的方法。这些网络经过训练,可以通过辨别颜色特征的细微差别来区分真实图像和伪造图像。为了实现这一目标,MSU MFSD数据集将被利用,允许探索颜色纹理和提取不同颜色通道的面部特征,包括RGB, HSV和YCbCr。拟议的框架标志着计算机视觉研究领域的一个显著进步,特别是考虑到数字媒体的普遍使用,这使得误导性或欺骗性内容的产生和传播变得容易。开发可靠的识别假脸系统在遏制虚假信息扩散和维护数字媒体平台的完整性方面具有巨大潜力。
{"title":"Fake Face Detection Based on Colour Textual Analysis Using Deep Convolutional Neural Network","authors":"Wasin AlKishri, Setyawan Widyarto, Jabar H. Yousif, M. Al-Bahri","doi":"10.58346/jisis.2023.i3.009","DOIUrl":"https://doi.org/10.58346/jisis.2023.i3.009","url":null,"abstract":"Detecting fake faces has become a crucial endeavour within the realm of computer vision. The widespread availability of digital media has facilitated the creation and dissemination of deceptive and misleading content. A prominent strategy for identifying counterfeit faces employs advanced deep-learning methodologies that scrutinise both colour and textural attributes. This investigation is geared towards devising a method for discerning fake faces by leveraging the capabilities of convolutional neural networks (CNNs). These networks are trained to discriminate between authentic and forged images by discerning nuances in their colour characteristics. To achieve this, the MSU MFSD dataset will be harnessed, allowing for exploring colour textures and extracting facial traits across diverse colour channels, including RGB, HSV, and YCbCr.The proposed framework marks a notable stride in the realm of computer vision research, particularly given the prevalent employment of digital media, which has eased the generation and distribution of misleading or deceitful content. Developing dependable systems for identifying counterfeit faces holds immense potential in curtailing the proliferation of false information and upholding the integrity of digital media platforms.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41793563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Internet Architecture and Protocol (HIAP): A Self-Evolving and Transformative Framework for Enabling Seamless Real-Time Applications and Secure Peer-to-Peer File Sharing in the Internet of Everything (IoE) 混合互联网架构和协议(HIAP):在万物互联(IoE)中实现无缝实时应用和安全点对点文件共享的自我演进和变革框架
Q2 Computer Science Pub Date : 2023-08-31 DOI: 10.58346/jisis.2023.i3.005
Walter Antonio Campos Ugaz, Maria del Rocío Hende Santolaya, Handry Martín Rodas Purizaga, Wesley Amado Salazar Bravo, Jorge Dávila, José Yudberto Vilca Ccolque, Doris Fúster Guillén
The Internet of Everything (IoE) is rapidly growing and utilized in various applications. However, the growing mobile traffic and services pose significant challenges in flexibility, movement, accessibility, and safety. The existing internet architecture and protocol must be improved to address the challenges. The article examines the attributes and prerequisites of forthcoming networking applications while emphasizing the constraints of conventional network architecture and protocols in fulfilling these needs. The research presents a new Hybrid Internet Architecture and Protocol (HIAP), the Self-Evolving and Transformative (SET) architecture. This architecture is designed to provide diverse control works and smart configuration options for different applications and networking conditions. This HIAP framework's primary emphasis lies in transport protocols and mechanisms for peer-to-peer file sharing. This study proposes implementing a deadline-aware multipath transport protocol within the framework of the Internet architecture with seamless support of real-time applications requiring strict adherence to latency demands. The HIAP framework incorporates evolvability, adaptable routing, and in-network cache mechanisms to enhance contentdelivery. To conduct a more comprehensive examination and conceptualize the peer-to-peer file-sharing system, the research created a pragmatic blueprint for setting the file transfer protocol on the HIAP. The study presented the groundwork for an Internet architecture better suited to the changing demands of the IoE and its various applications. This HIAP architecture aims to be more adaptable, efficient, and transformative. The present study involves a comparative analysis between the proposed research and current architecture. The findings provide evidence of the progress made by the suggested research in addressing the challenges related to multipath and safety in future architectural designs.
万物互联(Internet of Everything, IoE)正在迅速发展并被广泛应用。然而,不断增长的移动流量和服务在灵活性、移动性、可达性和安全性方面提出了重大挑战。必须改进现有的互联网架构和协议,以应对这些挑战。本文研究了即将到来的网络应用程序的属性和先决条件,同时强调了传统网络体系结构和协议在满足这些需求方面的限制。该研究提出了一种新的混合互联网体系结构和协议(HIAP),即自进化和转换(SET)体系结构。该架构旨在为不同的应用程序和网络条件提供不同的控制工作和智能配置选项。这个HIAP框架的主要重点在于传输协议和对等文件共享机制。本研究提出在互联网架构框架内实现一种截止日期感知的多路径传输协议,无缝支持需要严格遵守延迟要求的实时应用程序。HIAP框架结合了可演化性、自适应路由和网络内缓存机制来增强内容传递。为了对点对点文件共享系统进行更全面的考察和概念化,本研究为在HIAP上设置文件传输协议创建了一个实用的蓝图。该研究为更好地适应物联网及其各种应用不断变化的需求的互联网体系结构提供了基础。这种HIAP体系结构旨在提高适应性、效率和变革性。目前的研究包括对拟议研究和当前建筑之间的比较分析。研究结果表明,在解决未来建筑设计中与多路径和安全相关的挑战方面,建议的研究取得了进展。
{"title":"Hybrid Internet Architecture and Protocol (HIAP): A Self-Evolving and Transformative Framework for Enabling Seamless Real-Time Applications and Secure Peer-to-Peer File Sharing in the Internet of Everything (IoE)","authors":"Walter Antonio Campos Ugaz, Maria del Rocío Hende Santolaya, Handry Martín Rodas Purizaga, Wesley Amado Salazar Bravo, Jorge Dávila, José Yudberto Vilca Ccolque, Doris Fúster Guillén","doi":"10.58346/jisis.2023.i3.005","DOIUrl":"https://doi.org/10.58346/jisis.2023.i3.005","url":null,"abstract":"The Internet of Everything (IoE) is rapidly growing and utilized in various applications. However, the growing mobile traffic and services pose significant challenges in flexibility, movement, accessibility, and safety. The existing internet architecture and protocol must be improved to address the challenges. The article examines the attributes and prerequisites of forthcoming networking applications while emphasizing the constraints of conventional network architecture and protocols in fulfilling these needs. The research presents a new Hybrid Internet Architecture and Protocol (HIAP), the Self-Evolving and Transformative (SET) architecture. This architecture is designed to provide diverse control works and smart configuration options for different applications and networking conditions. This HIAP framework's primary emphasis lies in transport protocols and mechanisms for peer-to-peer file sharing. This study proposes implementing a deadline-aware multipath transport protocol within the framework of the Internet architecture with seamless support of real-time applications requiring strict adherence to latency demands. The HIAP framework incorporates evolvability, adaptable routing, and in-network cache mechanisms to enhance contentdelivery. To conduct a more comprehensive examination and conceptualize the peer-to-peer file-sharing system, the research created a pragmatic blueprint for setting the file transfer protocol on the HIAP. The study presented the groundwork for an Internet architecture better suited to the changing demands of the IoE and its various applications. This HIAP architecture aims to be more adaptable, efficient, and transformative. The present study involves a comparative analysis between the proposed research and current architecture. The findings provide evidence of the progress made by the suggested research in addressing the challenges related to multipath and safety in future architectural designs.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47100246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Influence of SAS Software on the Learning of Statistics at the University Level SAS软件对大学统计学学习的影响
Q2 Computer Science Pub Date : 2023-08-31 DOI: 10.58346/jisis.2023.i3.011
Lolo José Caballero Cifuentes, Luis Alberto Núñez Lira, Yrene Cecilia Uribe Hernández, C. Luy-Montejo, Yaneth Carol Larico Apaza, Jessica Elizabeth Acevedo Flores, Jacinto Joaquín Vértiz Osores
This article examines the use of the SAS tool in the learning of statistics. the type of research was applied with a quasi-experimental design and quantitative approach, the sample was determined by a non-probabilistic method comprising 28 students for both groups; for the collection of information, a pre-test and a post-test were applied, validated with expert judgment and V. Aiken, its reliability with the Spearman Brown coefficient. After the experiment, the results showed higher averages in favor of the experimental group to whom the SAS software was applied in its statistical learning dimensions at a descriptive and inferential level. In order to know the distribution of the data, the Shapiro Wilk numerical method was used, the result of the test gave the certainty to choose the T-Student test for two independent samples at 95% with a level of confidence and 0.05 significance. It is concluded that the SAS software improves the levels of learning of statistics, increases their creativity, they feel more motivated, and there is an interaction favoring more active learning.
本文探讨了SAS工具在统计学学习中的应用。研究类型采用准实验设计和定量方法,样本采用非概率方法确定,包括两组28名学生;对于信息的收集,应用了前测试和后测试,并通过专家判断和V.Aiken验证了其可靠性和Spearman-Brown系数。实验结束后,结果显示,在描述性和推断性水平上,SAS软件应用于实验组的统计学习维度的平均值更高。为了了解数据的分布,使用了Shapiro-Wilk数值方法,测试结果确定了在95%的置信水平和0.05的显著性下选择两个独立样本的T-Student测试。结果表明,SAS软件提高了统计学的学习水平,增加了他们的创造力,他们感到更有动力,并且存在有利于更积极学习的互动。
{"title":"Influence of SAS Software on the Learning of Statistics at the University Level","authors":"Lolo José Caballero Cifuentes, Luis Alberto Núñez Lira, Yrene Cecilia Uribe Hernández, C. Luy-Montejo, Yaneth Carol Larico Apaza, Jessica Elizabeth Acevedo Flores, Jacinto Joaquín Vértiz Osores","doi":"10.58346/jisis.2023.i3.011","DOIUrl":"https://doi.org/10.58346/jisis.2023.i3.011","url":null,"abstract":"This article examines the use of the SAS tool in the learning of statistics. the type of research was applied with a quasi-experimental design and quantitative approach, the sample was determined by a non-probabilistic method comprising 28 students for both groups; for the collection of information, a pre-test and a post-test were applied, validated with expert judgment and V. Aiken, its reliability with the Spearman Brown coefficient. After the experiment, the results showed higher averages in favor of the experimental group to whom the SAS software was applied in its statistical learning dimensions at a descriptive and inferential level. In order to know the distribution of the data, the Shapiro Wilk numerical method was used, the result of the test gave the certainty to choose the T-Student test for two independent samples at 95% with a level of confidence and 0.05 significance. It is concluded that the SAS software improves the levels of learning of statistics, increases their creativity, they feel more motivated, and there is an interaction favoring more active learning.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49135897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Examining the Widespread Dissemination of Fake News on Facebook: Political Instability and Health Panic 审视假新闻在脸书上的广泛传播:政治不稳定与健康恐慌
Q2 Computer Science Pub Date : 2023-08-31 DOI: 10.58346/jisis.2023.i3.001
Eliana Maritza Barturen Mondragón, María del Pilar Quezada Castro, María del Pilar Castro Arellano, C. Aguila, Guillermo Alexander Quezada Castro
The spread of fake news on Facebook is a reality. This behavior is aimed at affecting reputation and generating distrust towards a certain person or on a specific topic. A bibliometric study of the scientific production in Scopus on Fake News on Facebook in the period 2013-2023 was carried out. The results showed that fake news is promoted in political issues to generate instability and in health issues to generate confusion and panic in the population. It was concluded that citizens must develop critical thinking to question the validity of news sources. Similarly, anonymity and misinformation are a natural part of society.
假新闻在Facebook上的传播是一个现实。这种行为旨在影响声誉,并对某个人或某一特定话题产生不信任。本文对2013-2023年期间Scopus对Facebook假新闻的科学产出进行了文献计量学研究。结果表明,假新闻在政治问题上被宣传,以产生不稳定,在卫生问题上被宣传,以在人群中产生混乱和恐慌。结论是,公民必须培养批判性思维,质疑新闻来源的有效性。同样,匿名和虚假信息是社会的自然组成部分。
{"title":"Examining the Widespread Dissemination of Fake News on Facebook: Political Instability and Health Panic","authors":"Eliana Maritza Barturen Mondragón, María del Pilar Quezada Castro, María del Pilar Castro Arellano, C. Aguila, Guillermo Alexander Quezada Castro","doi":"10.58346/jisis.2023.i3.001","DOIUrl":"https://doi.org/10.58346/jisis.2023.i3.001","url":null,"abstract":"The spread of fake news on Facebook is a reality. This behavior is aimed at affecting reputation and generating distrust towards a certain person or on a specific topic. A bibliometric study of the scientific production in Scopus on Fake News on Facebook in the period 2013-2023 was carried out. The results showed that fake news is promoted in political issues to generate instability and in health issues to generate confusion and panic in the population. It was concluded that citizens must develop critical thinking to question the validity of news sources. Similarly, anonymity and misinformation are a natural part of society.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48757495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Issues in Internet Architecture and Protocols Based on Behavioural Biometric Block Chain-Enhanced Authentication Layer 基于行为生物识别区块链增强认证层的互联网架构和协议中的安全问题
Q2 Computer Science Pub Date : 2023-08-31 DOI: 10.58346/jisis.2023.i3.008
Jhimmy Alberth Quisocala Herrera, Fernando Antonio Flores Limo, Abel Alejandro Tasayco-Jala, Isabel Menacho Vargas, Wilfredo Barrientos Farias, Zoila Mercedes Collantes Inga, Eber L. Herrera Palacios
Internet security is of paramount importance due to the pervasive nature of the network in modern society. As the globe grows increasingly interconnected, issues like data breaches, unauthorized access, and service disruptions become more common. Safeguarding private data, ensuring uninterrupted communication, and protecting vital services are all essential to establishing confidence and stability in the online world. Internet security is a complex problem to solve due to the interconnected nature of the Internet's Architecture and Protocols (IAP). Due to the wide variety of devices and platforms that can access the Internet, cybercriminals can breach a complex ecosystem. Constant monitoring and flexibility are required due to the rapid development of new attack methods and vulnerabilities. The difficulty lies in balancing implementing new security measures and minimizing disruptions to the user experience, which calls for adaptive and novel approaches. In this paper, the Behavioural Biometric Block Chain-Enhanced Authentication layer (BBB-EAL) framework recommends a static authentication mechanism for end-users and edge servers. This authentication creates a secure and encrypted link between parties. Access tokens are produced via a smart contract, removing the requirement for a trusted third party. This work emphasizes the importance of architecture design and sequence diagrams in representing participant interactions and information sharing. Additionally, it examines the construction of the Machine Learning (ML) model used to recognize KMT dynamics. Simulations indicate that the recommended design improves user authentication in an IAP-enabled environment. The findings demonstrate the ability to evaluate confidence in real time, achieve minimal authentication time, and utilize resources efficiently.
由于网络在现代社会中的普遍性,互联网安全至关重要。随着全球互联互通程度的提高,数据泄露、未经授权的访问和服务中断等问题变得越来越普遍。保护私人数据、确保不间断的通信和保护重要服务对于在网络世界中建立信心和稳定至关重要。由于互联网体系结构和协议(IAP)的互连性质,互联网安全是一个需要解决的复杂问题。由于可以访问互联网的设备和平台种类繁多,网络犯罪分子可以破坏复杂的生态系统。由于新攻击方法和漏洞的快速发展,需要不断的监控和灵活性。困难在于平衡实施新的安全措施和最大限度地减少对用户体验的干扰,这需要自适应和新颖的方法。在本文中,行为生物识别区块链增强认证层(BBB-EAL)框架为最终用户和边缘服务器推荐了一种静态认证机制。这种身份验证在各方之间创建了一个安全且加密的链接。访问令牌通过智能合约生成,消除了对可信第三方的要求。这项工作强调了体系结构设计和序列图在表示参与者交互和信息共享方面的重要性。此外,还考察了用于识别国民党动态的机器学习(ML)模型的构建。仿真表明,推荐的设计改进了启用IAP的环境中的用户身份验证。研究结果证明了实时评估置信度、实现最小认证时间和有效利用资源的能力。
{"title":"Security Issues in Internet Architecture and Protocols Based on Behavioural Biometric Block Chain-Enhanced Authentication Layer","authors":"Jhimmy Alberth Quisocala Herrera, Fernando Antonio Flores Limo, Abel Alejandro Tasayco-Jala, Isabel Menacho Vargas, Wilfredo Barrientos Farias, Zoila Mercedes Collantes Inga, Eber L. Herrera Palacios","doi":"10.58346/jisis.2023.i3.008","DOIUrl":"https://doi.org/10.58346/jisis.2023.i3.008","url":null,"abstract":"Internet security is of paramount importance due to the pervasive nature of the network in modern society. As the globe grows increasingly interconnected, issues like data breaches, unauthorized access, and service disruptions become more common. Safeguarding private data, ensuring uninterrupted communication, and protecting vital services are all essential to establishing confidence and stability in the online world. Internet security is a complex problem to solve due to the interconnected nature of the Internet's Architecture and Protocols (IAP). Due to the wide variety of devices and platforms that can access the Internet, cybercriminals can breach a complex ecosystem. Constant monitoring and flexibility are required due to the rapid development of new attack methods and vulnerabilities. The difficulty lies in balancing implementing new security measures and minimizing disruptions to the user experience, which calls for adaptive and novel approaches. In this paper, the Behavioural Biometric Block Chain-Enhanced Authentication layer (BBB-EAL) framework recommends a static authentication mechanism for end-users and edge servers. This authentication creates a secure and encrypted link between parties. Access tokens are produced via a smart contract, removing the requirement for a trusted third party. This work emphasizes the importance of architecture design and sequence diagrams in representing participant interactions and information sharing. Additionally, it examines the construction of the Machine Learning (ML) model used to recognize KMT dynamics. Simulations indicate that the recommended design improves user authentication in an IAP-enabled environment. The findings demonstrate the ability to evaluate confidence in real time, achieve minimal authentication time, and utilize resources efficiently.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47216240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Internet Services and Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1