首页 > 最新文献

Journal of Internet Services and Information Security最新文献

英文 中文
A Proposed Technical Debt Management Approach Applied on Software Projects in Egypt 一种拟议的技术债务管理方法在埃及软件项目中的应用
Q2 Computer Science Pub Date : 2023-08-31 DOI: 10.58346/jisis.2023.i3.010
Abeer Salah Eldeen Hamed, H. Elbakry, Alaa Eldin Riad, R. Moawad
Technical Debt (TD) is a metaphor that can be described as the technical issues that are hidden from end users and customers, but in fact hinder the development efforts during system evolution and future enhancements. Due to tight budgets and timelines, TD is frequently incurred, which may lead to technical, financial, and quality issues that make future maintenance more costly or impossible. While business professionals concentrate on external issues related to customer satisfaction, in fact they rarely pay attention to internal software quality defects and maintenance, which would rather cause future interest payments. In this research study, we propose a TD management (TDM) approach with best practices developed using Design Science Research (DSR) and conducted with multiple case studies for the software development team in Small and Medium Enterprises (SMEs). The study demonstrates that the proposed approach for measuring the impact of internal / external software quality leads to increased awareness of TD’s occurrence and thereby provides processes for preventing, identifying, prioritizing, monitoring, and repaying TD to satisfy both customer value and technical requirements, along with halting project failures and cost overruns. In actuality, applying our proposed TDM approach leads to a deeper comprehension of TD contraction in selected software companies, improved team morale and motivation, as well as an enhancement in its maintainability.
技术债务(Technical Debt, TD)是一个隐喻,可以描述为对最终用户和客户隐藏的技术问题,但实际上在系统演进和未来增强期间阻碍了开发工作。由于预算和时间的紧张,TD经常发生,这可能导致技术、财务和质量问题,使未来的维护更加昂贵或不可能。当业务专业人员专注于与客户满意度相关的外部问题时,实际上他们很少关注内部软件质量缺陷和维护,这更可能导致未来的利息支付。在本研究中,我们提出了一种TD管理(TDM)方法,该方法采用设计科学研究(DSR)开发的最佳实践,并针对中小型企业(SMEs)的软件开发团队进行了多个案例研究。该研究表明,测量内部/外部软件质量影响的建议方法导致对TD发生的认识增加,从而提供了预防、识别、确定优先级、监视和偿还TD的过程,以满足客户价值和技术需求,同时阻止项目失败和成本超支。实际上,应用我们提出的TDM方法可以在选定的软件公司中更深入地理解TD收缩,提高团队士气和动机,并增强其可维护性。
{"title":"A Proposed Technical Debt Management Approach Applied on Software Projects in Egypt","authors":"Abeer Salah Eldeen Hamed, H. Elbakry, Alaa Eldin Riad, R. Moawad","doi":"10.58346/jisis.2023.i3.010","DOIUrl":"https://doi.org/10.58346/jisis.2023.i3.010","url":null,"abstract":"Technical Debt (TD) is a metaphor that can be described as the technical issues that are hidden from end users and customers, but in fact hinder the development efforts during system evolution and future enhancements. Due to tight budgets and timelines, TD is frequently incurred, which may lead to technical, financial, and quality issues that make future maintenance more costly or impossible. While business professionals concentrate on external issues related to customer satisfaction, in fact they rarely pay attention to internal software quality defects and maintenance, which would rather cause future interest payments. In this research study, we propose a TD management (TDM) approach with best practices developed using Design Science Research (DSR) and conducted with multiple case studies for the software development team in Small and Medium Enterprises (SMEs). The study demonstrates that the proposed approach for measuring the impact of internal / external software quality leads to increased awareness of TD’s occurrence and thereby provides processes for preventing, identifying, prioritizing, monitoring, and repaying TD to satisfy both customer value and technical requirements, along with halting project failures and cost overruns. In actuality, applying our proposed TDM approach leads to a deeper comprehension of TD contraction in selected software companies, improved team morale and motivation, as well as an enhancement in its maintainability.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47438902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deception-based Method for Ransomware Detection 基于欺骗的勒索软件检测方法
Q2 Computer Science Pub Date : 2023-08-30 DOI: 10.58346/jisis.2023.i3.012
TaeGuen Kim
Ransomware is a rapidly growing malware threat that encrypts a user's files and demands a ransom for the decryption key. It has caused significant financial harm worldwide and is difficult to detect, especially when it's a new, unknown zero-day ransomware. Most commercial antivirus software relies on signature-based detection, which can be slow and inadequate for swiftly identifying suspicious programs. To tackle these challenges, this paper presents a ransomware protection method utilizing decoy files. Our deception-based protection method enhances ransomware detection with a fair decoy deployment strategy. Our method offers the advantage of robustly detecting ransomware compared to existing deception-based methods. Furthermore, it can effectively address ransomware that employs random access attacks, thereby bypassing deception-based detection techniques. In the evaluation, we provide a comprehensive analysis of our experimental results to vividly demonstrate the efficacy of our proposed method. Specifically, we introduce a random-access attack scenario that could potentially circumvent deception-based protection mechanisms. Furthermore, we assess the resilience of our method against such random-access attacks.
勒索软件是一种快速增长的恶意软件威胁,它对用户的文件进行加密,并要求支付赎金以获得解密密钥。它在全球范围内造成了重大的经济损失,而且很难被发现,尤其是当它是一种新的、未知的零日勒索软件时。大多数商业杀毒软件依赖于基于签名的检测,这种检测速度很慢,无法快速识别可疑程序。为了解决这些问题,本文提出了一种利用诱骗文件的勒索软件保护方法。我们的基于欺骗的保护方法通过公平的诱饵部署策略增强了勒索软件的检测。与现有的基于欺骗的方法相比,我们的方法具有鲁棒性检测勒索软件的优势。此外,它可以有效地解决使用随机访问攻击的勒索软件,从而绕过基于欺骗的检测技术。在评估中,我们对我们的实验结果进行了全面的分析,生动地展示了我们提出的方法的有效性。具体来说,我们引入了一个随机访问攻击场景,可以潜在地绕过基于欺骗的保护机制。此外,我们评估了我们的方法对这种随机访问攻击的弹性。
{"title":"Deception-based Method for Ransomware Detection","authors":"TaeGuen Kim","doi":"10.58346/jisis.2023.i3.012","DOIUrl":"https://doi.org/10.58346/jisis.2023.i3.012","url":null,"abstract":"Ransomware is a rapidly growing malware threat that encrypts a user's files and demands a ransom for the decryption key. It has caused significant financial harm worldwide and is difficult to detect, especially when it's a new, unknown zero-day ransomware. Most commercial antivirus software relies on signature-based detection, which can be slow and inadequate for swiftly identifying suspicious programs. To tackle these challenges, this paper presents a ransomware protection method utilizing decoy files. Our deception-based protection method enhances ransomware detection with a fair decoy deployment strategy. Our method offers the advantage of robustly detecting ransomware compared to existing deception-based methods. Furthermore, it can effectively address ransomware that employs random access attacks, thereby bypassing deception-based detection techniques. In the evaluation, we provide a comprehensive analysis of our experimental results to vividly demonstrate the efficacy of our proposed method. Specifically, we introduce a random-access attack scenario that could potentially circumvent deception-based protection mechanisms. Furthermore, we assess the resilience of our method against such random-access attacks.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136242464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IOT-Based Generic Health Monitoring with Cardiac Classification Using Edge Computing 基于物联网的基于边缘计算的心脏分类通用健康监测
Q2 Computer Science Pub Date : 2023-05-30 DOI: 10.58346/jisis.2023.i2.008
Dr.K. Vimal Kumar Stephen, Mathivanan Dr.V., Antonio Rutaf Manalang, Prajith Udinookkaran, Rudiardo Percival Niñalga De Vera, Mohammed Tariq Shaikh, Faiza Rashid Ammar Al-Harthy
Background: The current environment of modern computation can offer a smart healthcare monitoring for the early prediction of disease detection. For the domain of healthcare services, the Internet of Things (IoT) has a vital role, and also aids in the enhancement of the data’s processing as well as predictions. The transfer of data or reports from one location to another will consume a lot of energy as well as time, and also does result in issues of high energy as well as latency. With edge computing, the disadvantages can be easily resolved. Objectives: This work presents a Convolutional Neural Network (CNN)-based model of prediction which employs edge computing as well as IoT paradigms. The term edge computing will refer to a distributed environment framework that facilitates swift resource accessibility and response times by means of the local edge servers for processing at the end of the IoT devices. With this model, there can be an analysis of the health data which has been gathered by the IoT devices. Additionally, the edge devices will employ the edge servers for offering the patients as well as the doctors health-prediction reports in a timely manner. Methods: This work has proposals of an optimized CNN with Tabu Search (TS), Artificial Bee Colony (ABC) as well as the hybrid TS-ABC algorithms. Results: Analysis of these proposed algorithms is done with the parameters of performance such as the rate of error and the accuracy. Also, these algorithms’ simulated outcomes have been able to demonstrate their superior performance in comparison to the other technologically advanced approaches.
背景:当前的现代计算环境可以为疾病检测的早期预测提供智能的医疗保健监测。对于医疗保健服务领域,物联网(IoT)发挥着至关重要的作用,也有助于增强数据的处理和预测。从一个位置到另一个位置的数据或报告传输将消耗大量的能量和时间,还会导致高能量和延迟问题。使用边缘计算,缺点可以很容易地解决。目标:这项工作提出了一个基于卷积神经网络(CNN)的预测模型,该模型采用了边缘计算和物联网范式。术语边缘计算是指分布式环境框架,通过本地边缘服务器在物联网设备末端进行处理,有助于快速访问资源和响应时间。有了这个模型,就可以对物联网设备收集的健康数据进行分析。此外,边缘设备将采用边缘服务器,以便及时向患者和医生提供健康预测报告。方法:本文提出了一种基于禁忌搜索(TS)、人工蜂群(ABC)以及混合TS-ABC算法的优化CNN。结果:对这些算法进行了性能参数分析,如误差率和精度。此外,与其他技术先进的方法相比,这些算法的模拟结果已经能够证明其优越的性能。
{"title":"IOT-Based Generic Health Monitoring with Cardiac Classification Using Edge Computing","authors":"Dr.K. Vimal Kumar Stephen, Mathivanan Dr.V., Antonio Rutaf Manalang, Prajith Udinookkaran, Rudiardo Percival Niñalga De Vera, Mohammed Tariq Shaikh, Faiza Rashid Ammar Al-Harthy","doi":"10.58346/jisis.2023.i2.008","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.008","url":null,"abstract":"Background: The current environment of modern computation can offer a smart healthcare monitoring for the early prediction of disease detection. For the domain of healthcare services, the Internet of Things (IoT) has a vital role, and also aids in the enhancement of the data’s processing as well as predictions. The transfer of data or reports from one location to another will consume a lot of energy as well as time, and also does result in issues of high energy as well as latency. With edge computing, the disadvantages can be easily resolved. Objectives: This work presents a Convolutional Neural Network (CNN)-based model of prediction which employs edge computing as well as IoT paradigms. The term edge computing will refer to a distributed environment framework that facilitates swift resource accessibility and response times by means of the local edge servers for processing at the end of the IoT devices. With this model, there can be an analysis of the health data which has been gathered by the IoT devices. Additionally, the edge devices will employ the edge servers for offering the patients as well as the doctors health-prediction reports in a timely manner. Methods: This work has proposals of an optimized CNN with Tabu Search (TS), Artificial Bee Colony (ABC) as well as the hybrid TS-ABC algorithms. Results: Analysis of these proposed algorithms is done with the parameters of performance such as the rate of error and the accuracy. Also, these algorithms’ simulated outcomes have been able to demonstrate their superior performance in comparison to the other technologically advanced approaches.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45533513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Inertia Weight Particle Swarm Optimization for Anomaly Detection: A Case of Precision Irrigation 用于异常检测的动态惯性权重粒子群优化——以精确灌溉为例
Q2 Computer Science Pub Date : 2023-05-30 DOI: 10.58346/jisis.2023.i2.010
Mohamed El Bekri
Anomaly-based Intrusion Detection System (IDS) is a type of IDS that detects abnormal behaviors by analyzing system activity and network traffic. Anomaly-based IDS works by establishing a baseline of normal behavior for a system or a network. However, these types of systems are less used compared to signature-based IDS for one primary challenge: How to define this normal behavior baseline? The answer to this question is complicated, since it involves not only analyzing or learning from historical data, but requires and understanding of the business domain the system is implemented in. The present study proposes a novel approach to constructing an unsupervised data classifier that combines both Particle Swarm Optimization (PSO) and clustering techniques for anomaly detection. The primary objective of this methodology is to surmount the limitations that conventional clustering algorithms suffer from, such as their inability to identify non-linear patterns within the data, susceptibility to initial conditions, and difficulty in overcoming the problem of local optima. The concept of particle systems is discussed by examining their origins, search strategies, and convergence mechanisms. We use a variant of the Particle Swarm Optimization called Dynamic Inertia Weight-Particle Swarm optimization (DIW-PSO) for our clustering process, and we elaborate on the reasoning behind this decision. Subsequently, we describe the labeling algorithm used for the resulting clusters and we explain the process for identifying anomalous clusters. We have demonstrated the effectiveness of our method by applying it to an intelligent irrigation control system for cotton plants. The results show that our classifier was able to accurately detect abnormal patterns that deviated from the optimal water requirements and growth conditions of the plants.
基于异常的入侵检测系统(IDS)是一种通过分析系统活动和网络流量来检测异常行为的IDS。基于异常的IDS通过为系统或网络建立正常行为的基线来工作。然而,与基于签名的IDS相比,这些类型的系统使用较少,因为一个主要挑战是:如何定义这种正常行为基线?这个问题的答案很复杂,因为它不仅涉及分析或学习历史数据,还需要了解系统的业务领域。本研究提出了一种构建无监督数据分类器的新方法,该方法将粒子群优化(PSO)和聚类技术相结合,用于异常检测。该方法的主要目标是克服传统聚类算法所受到的限制,例如它们无法识别数据中的非线性模式、对初始条件的敏感性以及难以克服局部最优问题。通过考察粒子系统的起源、搜索策略和收敛机制,讨论了粒子系统的概念。我们在聚类过程中使用了一种称为动态惯性权重粒子群优化(DIW-PSO)的粒子群优化变体,并详细阐述了该决策背后的推理。随后,我们描述了用于生成聚类的标记算法,并解释了识别异常聚类的过程。通过将该方法应用于棉花智能灌溉控制系统,我们已经证明了该方法的有效性。结果表明,我们的分类器能够准确地检测出偏离植物最佳需水量和生长条件的异常模式。
{"title":"Dynamic Inertia Weight Particle Swarm Optimization for Anomaly Detection: A Case of Precision Irrigation","authors":"Mohamed El Bekri","doi":"10.58346/jisis.2023.i2.010","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.010","url":null,"abstract":"Anomaly-based Intrusion Detection System (IDS) is a type of IDS that detects abnormal behaviors by analyzing system activity and network traffic. Anomaly-based IDS works by establishing a baseline of normal behavior for a system or a network. However, these types of systems are less used compared to signature-based IDS for one primary challenge: How to define this normal behavior baseline? The answer to this question is complicated, since it involves not only analyzing or learning from historical data, but requires and understanding of the business domain the system is implemented in. The present study proposes a novel approach to constructing an unsupervised data classifier that combines both Particle Swarm Optimization (PSO) and clustering techniques for anomaly detection. The primary objective of this methodology is to surmount the limitations that conventional clustering algorithms suffer from, such as their inability to identify non-linear patterns within the data, susceptibility to initial conditions, and difficulty in overcoming the problem of local optima. The concept of particle systems is discussed by examining their origins, search strategies, and convergence mechanisms. We use a variant of the Particle Swarm Optimization called Dynamic Inertia Weight-Particle Swarm optimization (DIW-PSO) for our clustering process, and we elaborate on the reasoning behind this decision. Subsequently, we describe the labeling algorithm used for the resulting clusters and we explain the process for identifying anomalous clusters. We have demonstrated the effectiveness of our method by applying it to an intelligent irrigation control system for cotton plants. The results show that our classifier was able to accurately detect abnormal patterns that deviated from the optimal water requirements and growth conditions of the plants.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48313690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Cloud System Based Dual Axis Solar Tracker Using Arduino 基于物联网云系统的双轴太阳能跟踪器
Q2 Computer Science Pub Date : 2023-05-30 DOI: 10.58346/jisis.2023.i2.012
Laith Abdul Raheem Al anzy, Ahmed A. Abdullah, Ali Kahtan Lilo Aquraishi
Because of the urgent need for electricity and the shortage of it, humanity has searched for the most environmentally friendly and well-available types of energy. From the different types of energy that comes from the sun, wind, tides, hydro and thermal energy that emanates from the earth and is spontaneously replenished naturally, the focus has been on solar energy. Which represents the best source of energy as it is naturally available in life and does not cause any damage or pollution in particular to nature and life. Not to mention after-math effects. This project led to the development of a two-axis solar tracker with the Internet of Things (IoT) or cloud platform. The solar system improves the performance of the solar panels due to following and the sun's mobility. Four light-dependent resistors (LDRs) were used to detect sunlight and the maximum intensity of the light, two servo motors have been utilized to rotate the panels based on sunlight detection by the LDR, after that, we use the WiFi as an intermediary between the Arduino device and the cloud platform. The cloud represents the final destination for the data to be stored, manipulated and processed.
由于电力的迫切需要和短缺,人类一直在寻找最环保和最容易获得的能源类型。从太阳、风能、潮汐能、水能和热能等不同类型的能源中,地球发出并自然地补充,重点是太阳能。它代表了最好的能源,因为它是生命中自然可用的,不会造成任何损害或污染,特别是对自然和生命。更不用说事后效应了。该项目导致了具有物联网(IoT)或云平台的两轴太阳能跟踪器的开发。太阳能系统提高了太阳能电池板的性能,由于跟随和太阳的流动性。使用四个光依赖电阻(LDR)来检测阳光和最大光强,利用两个伺服电机根据LDR检测到的阳光来旋转面板,之后我们使用WiFi作为Arduino设备和云平台之间的中介。云代表存储、操作和处理数据的最终目的地。
{"title":"IoT Cloud System Based Dual Axis Solar Tracker Using Arduino","authors":"Laith Abdul Raheem Al anzy, Ahmed A. Abdullah, Ali Kahtan Lilo Aquraishi","doi":"10.58346/jisis.2023.i2.012","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.012","url":null,"abstract":"Because of the urgent need for electricity and the shortage of it, humanity has searched for the most environmentally friendly and well-available types of energy. From the different types of energy that comes from the sun, wind, tides, hydro and thermal energy that emanates from the earth and is spontaneously replenished naturally, the focus has been on solar energy. Which represents the best source of energy as it is naturally available in life and does not cause any damage or pollution in particular to nature and life. Not to mention after-math effects. This project led to the development of a two-axis solar tracker with the Internet of Things (IoT) or cloud platform. The solar system improves the performance of the solar panels due to following and the sun's mobility. Four light-dependent resistors (LDRs) were used to detect sunlight and the maximum intensity of the light, two servo motors have been utilized to rotate the panels based on sunlight detection by the LDR, after that, we use the WiFi as an intermediary between the Arduino device and the cloud platform. The cloud represents the final destination for the data to be stored, manipulated and processed.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44304116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RSA Prime Factorization on IBM Qiskit IBM Qiskit上的RSA素数分解
Q2 Computer Science Pub Date : 2023-05-30 DOI: 10.58346/jisis.2023.i2.013
Matthew Evans Audric Rengkung, Arya Wicaksana
The advancement of quantum computing in recent years poses severe threats to the RSA public-key cryptosystem. The RSA cryptosystem fundamentally relies its security on the computational hardness of number theory problems: prime factorization (integer factoring). Shor’s quantum factoring algorithm could theoretically answer the computational problem in polynomial time. This paper contributes to the experiment and demonstration of Shor’s quantum factoring algorithm for RSA prime factorization using IBM Qiskit. The performance of the quantum program is evaluated based on user time and the success probability. The results show that a more significant public modulus N in the RSA public key improves factorization’s computational hardness, requiring more quantum bits to solve. A further enhancement on implementing Shor’s oracle function is essential in increasing success probability and reducing the number of shots required.
近年来量子计算的发展对RSA公钥密码系统构成了严重威胁。RSA密码系统的安全性从根本上依赖于数论问题的计算硬度:素数因子分解(整数因子分解)。Shor的量子因子分解算法在理论上可以解决多项式时间内的计算问题。本文利用IBM Qiskit对Shor的RSA素数因子分解量子因子分解算法进行了实验和演示。量子程序的性能是根据用户时间和成功概率来评估的。结果表明,RSA公钥中更显著的公模N提高了因子分解的计算硬度,需要更多的量子比特来求解。进一步增强Shor的预言功能对于提高成功概率和减少所需的注射次数至关重要。
{"title":"RSA Prime Factorization on IBM Qiskit","authors":"Matthew Evans Audric Rengkung, Arya Wicaksana","doi":"10.58346/jisis.2023.i2.013","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.013","url":null,"abstract":"The advancement of quantum computing in recent years poses severe threats to the RSA public-key cryptosystem. The RSA cryptosystem fundamentally relies its security on the computational hardness of number theory problems: prime factorization (integer factoring). Shor’s quantum factoring algorithm could theoretically answer the computational problem in polynomial time. This paper contributes to the experiment and demonstration of Shor’s quantum factoring algorithm for RSA prime factorization using IBM Qiskit. The performance of the quantum program is evaluated based on user time and the success probability. The results show that a more significant public modulus N in the RSA public key improves factorization’s computational hardness, requiring more quantum bits to solve. A further enhancement on implementing Shor’s oracle function is essential in increasing success probability and reducing the number of shots required.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43393081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fine Grained Analysis of Intention for Social Media Reviews Using Distance Measure and Deep Learning Technique 基于距离测量和深度学习技术的社交媒体评论意向精细分析
Q2 Computer Science Pub Date : 2023-05-30 DOI: 10.58346/jisis.2023.i2.003
Akila R, R. S
Intent analysis and classification are performed to identify the expressions of intent in the given text. In this paper, the dataset is classified into emotion classifications by utilizing machine learning model SVM, Bipolar classification, Fine Grained Analysis, and Sarcasm detection, with Naïve Bayes and Random Forest techniques of deep learning, including Long Short-Term Memory to perform intention analysis on social media data. Then Fine-grained or Multi-Class Sentiment analysis is used for further classification of the five classes, viz. negative, strong negative, neutral, positive, and strong positive, which detects the sarcastic reviews in the movie dataset. The emotional intention behind the review comments is classified as happiness, rage, sadness, joy, anger, and disgust by using SVM. The reviews are analyzed and calculated based on their subjectivity and context level similarity using Related Relaxed Word Mover Distance (RRWMD) semantic similarity measure. With the advantage of the RRWMD algorithm, the reviews from the context containing deviated or irrelevant contents were removed before being applied to the classification algorithms, thereby reducing the execution time, which obtains a 3% improvement in accuracy. The disadvantage of the RRWMD algorithm is only one deep learning algorithm is compared. From the observed accuracy scores and classification reports, the LSTM has provided higher accuracy, despite the long execution time. The Naïve Bayes model has produced lower accuracy than the neural network model but was efficient, taking less time to fit and classify. The results from various experiments have proven that the semantic similarity measure provides more accurate results than the state-of-the-art model.
意图分析和分类是为了识别给定文本中的意图表达。在本文中,通过利用机器学习模型SVM、双极分类、细粒度分析和Sarcasm检测,以及深度学习的Naïve Bayes和随机森林技术(包括长短期记忆),将数据集分类为情绪分类,以对社交媒体数据进行意向分析。然后使用细粒度或多类情感分析对五类进行进一步分类,即负面、强负面、中性、正面和强正面,检测电影数据集中的讽刺评论。使用支持向量机将评论背后的情感意图分为快乐、愤怒、悲伤、喜悦、愤怒和厌恶。基于评论的主观性和上下文水平的相似性,使用相关放松词移动距离(RRWMD)语义相似性度量对评论进行分析和计算。利用RRWMD算法的优势,在将包含偏离或无关内容的上下文中的评论应用于分类算法之前,将其删除,从而减少了执行时间,准确率提高了3%。RRWMD算法的缺点是只比较了一种深度学习算法。从观察到的准确性得分和分类报告来看,尽管执行时间很长,但LSTM提供了更高的准确性。Naïve Bayes模型的精度低于神经网络模型,但效率很高,拟合和分类时间更短。各种实验的结果已经证明,语义相似性度量比现有技术的模型提供了更准确的结果。
{"title":"Fine Grained Analysis of Intention for Social Media Reviews Using Distance Measure and Deep Learning Technique","authors":"Akila R, R. S","doi":"10.58346/jisis.2023.i2.003","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.003","url":null,"abstract":"Intent analysis and classification are performed to identify the expressions of intent in the given text. In this paper, the dataset is classified into emotion classifications by utilizing machine learning model SVM, Bipolar classification, Fine Grained Analysis, and Sarcasm detection, with Naïve Bayes and Random Forest techniques of deep learning, including Long Short-Term Memory to perform intention analysis on social media data. Then Fine-grained or Multi-Class Sentiment analysis is used for further classification of the five classes, viz. negative, strong negative, neutral, positive, and strong positive, which detects the sarcastic reviews in the movie dataset. The emotional intention behind the review comments is classified as happiness, rage, sadness, joy, anger, and disgust by using SVM. The reviews are analyzed and calculated based on their subjectivity and context level similarity using Related Relaxed Word Mover Distance (RRWMD) semantic similarity measure. With the advantage of the RRWMD algorithm, the reviews from the context containing deviated or irrelevant contents were removed before being applied to the classification algorithms, thereby reducing the execution time, which obtains a 3% improvement in accuracy. The disadvantage of the RRWMD algorithm is only one deep learning algorithm is compared. From the observed accuracy scores and classification reports, the LSTM has provided higher accuracy, despite the long execution time. The Naïve Bayes model has produced lower accuracy than the neural network model but was efficient, taking less time to fit and classify. The results from various experiments have proven that the semantic similarity measure provides more accurate results than the state-of-the-art model.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42274759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic Annotation Based Effective and Quality Oriented Web Service Discovery 基于语义注释的高效、面向质量的Web服务发现
Q2 Computer Science Pub Date : 2023-05-30 DOI: 10.58346/jisis.2023.i2.006
J. B. Merin, Dr.W. Aisha Banu, K. F. S. Shalin
The main objective of this work is to design an effective web service discovery engine that retrieves the best matching results based on the measure of syntactic cum semantic similarity between the user query and the web service to be fetched. The idea is to draw bridges across the broad spectrum of lexical entities based on their relativeness. The essence of this work could be extended to support a wide range of applications from ‘being inculcated in search engines to fetch user-relevant data’ to ‘being used for training robots and AI based devices to respond/adhere appropriately to the different phrases of human commands’.With the accelerated revolution of internet, enterprises and organizations highly rely on Service oriented computing. Web services support inter-operation of distributed applications. Humongous amount of web services present on the internet the user is searching for. The paper focuses ondesigninga practical means of fast and relevant retrieval of web services.The phrase used for searching any given web service differs from one person to another. This work deals with the syntactic cum semantic mechanism proposed for retrieving web services based on the measure of similarity between the name of the web service and the search query entered by the user to discover that service. A list of the Web Service Description Language (WSDL) files is taken as the dataset. Protégé is the tool used for semantic annotation of WSDL files for converting them to Semantically Annotated Web Service Description Language (SAWSDL) files. ‘Wordnet’ is used as the lexical dictionary and Java language has been used to build the rest of the package for implementing the search discovery mechanism.Netbeans is used as IDE.Wamp server with PHPMyAdmin was used for managing the database of SAWSDL files. The degree of similarity is measured by evaluating performance of the engine using metrics such as ‘Precision’, ‘Recall’, ‘Accuracy’ and ‘F-measure’.While the syntactic approach is easier to implement, it suffers from keyword polysemy issues. The proposed search discovery mechanism is based on semantically annotating WSDL files and retrieving the files based on a novel syntactic cum semantic discovery algorithm which usesLeocockChordorow function for computing the similarity. The effectiveness of the proposed algorithm is tested experimentally by building a desktop application using Java.The WSDL files from various domains were semantically annotated by tagging related concepts using ontology. Themachine learning algorithm that best classifies the web services on the basis of their performance metrics is identified. The related services are retrieved by the application of the proposed LCH based Syntactic cum Semantic discovery algorithm (LCH based SSDA).A ranking system is proposed to rank the results by evaluating various QoS attributes. The results of the experiment showed that the proposed system yielded high precision and recall value.The solution has been fo
这项工作的主要目标是设计一个有效的web服务发现引擎,该引擎基于用户查询和要获取的web服务之间的语法和语义相似性度量来检索最佳匹配结果。这个想法是根据词汇实体的关系在广泛的词汇实体之间架起桥梁。这项工作的本质可以扩展到支持广泛的应用,从“被灌输到搜索引擎中以获取用户相关数据”到“被用于训练机器人和基于人工智能的设备以适当地响应/遵守人类命令的不同短语”。随着互联网革命的加速,企业和组织高度依赖于面向服务的计算。Web服务支持分布式应用程序的交互操作。用户正在互联网上搜索大量的网络服务。本文着重于设计一种实用的快速、相关的web服务检索方法。用于搜索任何给定web服务的短语因个人而异。这项工作处理了基于web服务名称和用户为发现该服务而输入的搜索查询之间的相似性度量来检索web服务的句法和语义机制。将Web服务描述语言(WSDL)文件的列表作为数据集。Protégé是用于WSDL文件语义注释的工具,用于将其转换为语义注释Web服务描述语言(SAWSDL)文件。”Wordnet被用作词典,Java语言被用于构建包的其余部分,以实现搜索发现机制。Netbeans被用作IDE。带有PHPMyAdmin的Wamp服务器被用于管理SAWSDL文件的数据库。相似度是通过使用“Precision”、“Recall”、“Accuracy”和“F-measure”等指标评估引擎的性能来衡量的。虽然句法方法更容易实现,但它存在关键字多义问题。所提出的搜索发现机制基于对WSDL文件进行语义注释,并基于一种新的句法和语义发现算法检索文件,该算法使用LeocockChordoro函数来计算相似度。通过使用Java构建桌面应用程序,对所提出算法的有效性进行了实验测试。通过使用本体标记相关概念,对来自各个领域的WSDL文件进行了语义注释。确定了一种机器学习算法,该算法可以根据web服务的性能指标对其进行最佳分类。通过应用所提出的基于LCH的句法和语义发现算法(LCH-based SSDA)来检索相关服务。提出了一个排名系统,通过评估各种QoS属性来对结果进行排名。实验结果表明,该系统具有较高的查全率和查全率。已经发现该解决方案在最小化执行时间和提高关联度方面是有效的。随着构建基于语义上下文的安全结构的需求迫在眉睫,所提出的解决方案将有助于改进搜索结果,并最大限度地减少用户在搜索制定和执行过程中的认知负荷。
{"title":"Semantic Annotation Based Effective and Quality Oriented Web Service Discovery","authors":"J. B. Merin, Dr.W. Aisha Banu, K. F. S. Shalin","doi":"10.58346/jisis.2023.i2.006","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.006","url":null,"abstract":"The main objective of this work is to design an effective web service discovery engine that retrieves the best matching results based on the measure of syntactic cum semantic similarity between the user query and the web service to be fetched. The idea is to draw bridges across the broad spectrum of lexical entities based on their relativeness. The essence of this work could be extended to support a wide range of applications from ‘being inculcated in search engines to fetch user-relevant data’ to ‘being used for training robots and AI based devices to respond/adhere appropriately to the different phrases of human commands’.With the accelerated revolution of internet, enterprises and organizations highly rely on Service oriented computing. Web services support inter-operation of distributed applications. Humongous amount of web services present on the internet the user is searching for. The paper focuses ondesigninga practical means of fast and relevant retrieval of web services.The phrase used for searching any given web service differs from one person to another. This work deals with the syntactic cum semantic mechanism proposed for retrieving web services based on the measure of similarity between the name of the web service and the search query entered by the user to discover that service. A list of the Web Service Description Language (WSDL) files is taken as the dataset. Protégé is the tool used for semantic annotation of WSDL files for converting them to Semantically Annotated Web Service Description Language (SAWSDL) files. ‘Wordnet’ is used as the lexical dictionary and Java language has been used to build the rest of the package for implementing the search discovery mechanism.Netbeans is used as IDE.Wamp server with PHPMyAdmin was used for managing the database of SAWSDL files. The degree of similarity is measured by evaluating performance of the engine using metrics such as ‘Precision’, ‘Recall’, ‘Accuracy’ and ‘F-measure’.While the syntactic approach is easier to implement, it suffers from keyword polysemy issues. The proposed search discovery mechanism is based on semantically annotating WSDL files and retrieving the files based on a novel syntactic cum semantic discovery algorithm which usesLeocockChordorow function for computing the similarity. The effectiveness of the proposed algorithm is tested experimentally by building a desktop application using Java.The WSDL files from various domains were semantically annotated by tagging related concepts using ontology. Themachine learning algorithm that best classifies the web services on the basis of their performance metrics is identified. The related services are retrieved by the application of the proposed LCH based Syntactic cum Semantic discovery algorithm (LCH based SSDA).A ranking system is proposed to rank the results by evaluating various QoS attributes. The results of the experiment showed that the proposed system yielded high precision and recall value.The solution has been fo","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46607716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Threat Hunting Case Study using MISP 使用MISP的网络威胁搜索案例研究
Q2 Computer Science Pub Date : 2023-05-30 DOI: 10.58346/jisis.2023.i2.001
M. Ammi
{"title":"Cyber Threat Hunting Case Study using MISP","authors":"M. Ammi","doi":"10.58346/jisis.2023.i2.001","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.001","url":null,"abstract":"","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48096049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Variant of Digital Signature Algorithm for Constant Message 常数消息数字签名算法的一种变体
Q2 Computer Science Pub Date : 2023-05-30 DOI: 10.58346/jisis.2023.i2.005
Kritsanapong Somsuk, Sarutte Atsawaraungsuk, Chanwit Suwannapong, Suchart Khummanee, Chalida Sanemueang
This study aims to present a modified technique for signing constant messages. In general, intruders may often steal the digital signature of a constant message with relative ease. Assuming there is a constant message that must always be signed by the signer, the digital signature must equally have a constant value. If it is communicated through an insecure channel to the recipient or verifier and is intercepted along the way by attackers, they can assume the identity of the signer and use this signature for authentication. In fact, the proposed method, Digital Signature Algorithm for Constant Message (DSACM) and DSACMV2, are the result of the combination between RSA and OTP. In addition, OTP is selected for signing and validating procedures in which the secret key must be regenerated for each process. Thus, the ciphertext is constantly changing, but the message remains fixed. Moreover, RSA is chosen to protect the transmission of the secret key across an insecure channel. The experimental findings indicate that DSACM and DSACMV2 are suitable for signing a message with a constant value because the signature is an undetermined value. Although it takes two encryption procedures and two decryption processes, the time required to generate the secret key and perform the exclusive or operation increases little. In addition, the proposed methods have the benefit that the constant message is not modified. In fact, it must be combined with an integer such as a timestamp and a random number for the other techniques for changing the ciphertext, and it cannot be signed a single time if its length exceeds the private key.
本研究旨在提出一种改进的对常量消息进行签名的技术。一般来说,入侵者通常可以相对轻松地窃取恒定消息的数字签名。假设有一个常量消息必须始终由签名者签名,那么数字签名也必须具有一个常量值。如果通过不安全的通道将其传递给接收方或验证器,并在过程中被攻击者截获,则攻击者可以假定签名者的身份,并使用此签名进行身份验证。事实上,所提出的方法,恒定消息数字签名算法(DSACM)和DSACMV2,是RSA和OTP相结合的结果。此外,OTP被选择用于签名和验证过程,其中必须为每个过程重新生成密钥。因此,密文不断变化,但消息保持不变。此外,选择RSA是为了保护密钥在不安全通道上的传输。实验结果表明,DSACM和DSACMV2适合于对具有常数值的消息进行签名,因为签名是一个不确定的值。尽管需要两个加密过程和两个解密过程,但生成密钥和执行异或操作所需的时间几乎没有增加。此外,所提出的方法具有不修改常量消息的优点。事实上,对于更改密文的其他技术,它必须与一个整数(如时间戳和随机数)相结合,并且如果它的长度超过私钥,就不能对它进行一次签名。
{"title":"The Variant of Digital Signature Algorithm for Constant Message","authors":"Kritsanapong Somsuk, Sarutte Atsawaraungsuk, Chanwit Suwannapong, Suchart Khummanee, Chalida Sanemueang","doi":"10.58346/jisis.2023.i2.005","DOIUrl":"https://doi.org/10.58346/jisis.2023.i2.005","url":null,"abstract":"This study aims to present a modified technique for signing constant messages. In general, intruders may often steal the digital signature of a constant message with relative ease. Assuming there is a constant message that must always be signed by the signer, the digital signature must equally have a constant value. If it is communicated through an insecure channel to the recipient or verifier and is intercepted along the way by attackers, they can assume the identity of the signer and use this signature for authentication. In fact, the proposed method, Digital Signature Algorithm for Constant Message (DSACM) and DSACMV2, are the result of the combination between RSA and OTP. In addition, OTP is selected for signing and validating procedures in which the secret key must be regenerated for each process. Thus, the ciphertext is constantly changing, but the message remains fixed. Moreover, RSA is chosen to protect the transmission of the secret key across an insecure channel. The experimental findings indicate that DSACM and DSACMV2 are suitable for signing a message with a constant value because the signature is an undetermined value. Although it takes two encryption procedures and two decryption processes, the time required to generate the secret key and perform the exclusive or operation increases little. In addition, the proposed methods have the benefit that the constant message is not modified. In fact, it must be combined with an integer such as a timestamp and a random number for the other techniques for changing the ciphertext, and it cannot be signed a single time if its length exceeds the private key.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47642732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Internet Services and Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1