首页 > 最新文献

International Journal of Computers and Applications最新文献

英文 中文
Optimizing environmental monitoring in IoT: integrating DBSCAN with genetic algorithms for enhanced clustering 优化物联网中的环境监测:将DBSCAN与遗传算法集成以增强聚类
Q2 Computer Science Pub Date : 2023-11-10 DOI: 10.1080/1206212x.2023.2277966
S. Regilan, L.K. Hema
AbstractIn our study, we introduce an advanced clustering method designed for IoT-based environmental monitoring. We’ve combined two powerful techniques, Density-Based Spatial Clustering of Applications with Noise (DBSCAN) and Genetic Algorithms (GA), to create a specialized approach called EC-GAD (Enhanced-Clustering using Genetic Algorithms and DBSCAN). This integrated system model relies on DBSCAN, a robust clustering algorithm capable of handling irregular shapes and varying data densities, to group sensor nodes based on their physical proximity. To improve clustering performance, we’ve harnessed Genetic Algorithms to optimize the parameters of DBSCAN. Through a repetitive process involving selection, crossover, and mutation, GA refines parameter settings based on the quality of environmental clustering as assessed by fitness metrics. Our approach is tailored specifically for IoT deployments in environmental monitoring, which involve collecting data from sensor nodes and integrating DBSCAN and GA. We’ve paid special attention to choosing an appropriate distance metric and fine-tuning DBSCAN parameters such as epsilon (ε) and minPts to match the unique needs of environmental monitoring applications. Furthermore, we’ve taken energy efficiency into account by implementing energy-aware node selection and optimizing cluster formation to minimize energy consumption.KEYWORDS: Environmental monitoringIoTclusteringDBSCANgenetic algorithms Disclosure statementNo potential conflict of interest was reported by the author(s).Ethical approvalThis article does not contain any studies with human participants performed by any of the authors.Data availability statementData sharing does not apply to this article as no new data has been created or analyzed in this study.Additional informationNotes on contributorsS. RegilanMr. S. Regilan working as a Research Scholar in the Department of Electronics and Communication Engineering. He has a track record of successful teaching, education reform and has been teaching Students for decades. He Completed his B.E in Electronics and Communication Engineering Department, in Bharath Niketan Engineering College, Anna University on 2011; M.E in Electronics and Communication Engineering Department, in Aarupadai Veedu Institute of Technology, Vinayaka Missions Research Foundation, Chennai on 2015. Pursuing Ph.D in Department of Electronics and Communication Engineering, Aarupadai Veedu Institute of Technology, Vinayaka Missions Research Foundation, Chennai. He worked various recognized Institutions from 2011. He had 10+ years of academic experiences in the field of Electronics and Communication Engineering. He is member in various professional bodies like ISTE, IEEE societies. He participated and Presented many International & National Conferences/Workshop/Seminar/ Webinar in the field of Electronics and Communication Engineering. He published and indexed 5 papers in reputed journals under Scopus with good citations indexed. Ma
在我们的研究中,我们引入了一种先进的聚类方法,用于基于物联网的环境监测。我们结合了两种强大的技术,基于密度的噪声应用空间聚类(DBSCAN)和遗传算法(GA),创建了一种称为EC-GAD(使用遗传算法和DBSCAN的增强型聚类)的专门方法。该集成系统模型依赖于DBSCAN,这是一种强大的聚类算法,能够处理不规则形状和变化的数据密度,根据传感器节点的物理距离对其进行分组。为了提高聚类性能,我们利用遗传算法来优化DBSCAN的参数。通过包括选择、交叉和突变在内的重复过程,遗传算法根据适应度指标评估的环境聚类质量来优化参数设置。我们的方法是专门为环境监测中的物联网部署量身定制的,其中包括从传感器节点收集数据并集成DBSCAN和GA。我们特别注意选择合适的距离度量和微调DBSCAN参数,如ε (ε)和minPts,以满足环境监测应用的独特需求。此外,我们还考虑了能源效率,通过实现能量感知节点选择和优化集群形成来最小化能源消耗。关键词:环境监测;物联网;聚类;伦理批准:本文不包含任何作者进行的任何人类参与者的研究。数据可用性声明数据共享不适用于本文,因为本研究中没有创建或分析新的数据。附加信息:关于贡献者的说明。RegilanMr。S. Regilan是电子与通信工程系的研究学者。他有成功的教学记录,教育改革,并已教学生几十年。他于2011年在Anna University Bharath Niketan Engineering College获得电子与通信工程系学士学位;2015年毕业于印度金奈,印度理工学院,Vinayaka任务研究基金会,电子与通信工程系。就读于印度金奈印度理工学院电子与通信工程系博士学位,Vinayaka任务研究基金会。自2011年起,他在多个公认的机构工作。他在电子与通信工程领域有10多年的学术经验。他是ISTE, IEEE等多个专业团体的成员。他参加并发表了电子与通信工程领域的许多国际和国内会议/研讨会/研讨会/网络研讨会。他在Scopus的知名期刊上发表并收录了5篇论文,引文索引良好。邮件id: regilan.research@avit.ac.in.L.K。HemaDr。何立凯,电子与通信工程系教授、主任。她有成功的教学记录,教育改革,并已教学生几十年。他在电子与通信工程领域有25年以上的学术经验。她是ISTE, IEEE, IETE等多个专业团体的成员。她参加并发表了许多电子与通信工程领域的国际和国内会议/研讨会/研讨会/网络研讨会。她在Scopus知名期刊上发表并索引了40篇论文,并索引了良好的引文。
{"title":"Optimizing environmental monitoring in IoT: integrating DBSCAN with genetic algorithms for enhanced clustering","authors":"S. Regilan, L.K. Hema","doi":"10.1080/1206212x.2023.2277966","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2277966","url":null,"abstract":"AbstractIn our study, we introduce an advanced clustering method designed for IoT-based environmental monitoring. We’ve combined two powerful techniques, Density-Based Spatial Clustering of Applications with Noise (DBSCAN) and Genetic Algorithms (GA), to create a specialized approach called EC-GAD (Enhanced-Clustering using Genetic Algorithms and DBSCAN). This integrated system model relies on DBSCAN, a robust clustering algorithm capable of handling irregular shapes and varying data densities, to group sensor nodes based on their physical proximity. To improve clustering performance, we’ve harnessed Genetic Algorithms to optimize the parameters of DBSCAN. Through a repetitive process involving selection, crossover, and mutation, GA refines parameter settings based on the quality of environmental clustering as assessed by fitness metrics. Our approach is tailored specifically for IoT deployments in environmental monitoring, which involve collecting data from sensor nodes and integrating DBSCAN and GA. We’ve paid special attention to choosing an appropriate distance metric and fine-tuning DBSCAN parameters such as epsilon (ε) and minPts to match the unique needs of environmental monitoring applications. Furthermore, we’ve taken energy efficiency into account by implementing energy-aware node selection and optimizing cluster formation to minimize energy consumption.KEYWORDS: Environmental monitoringIoTclusteringDBSCANgenetic algorithms Disclosure statementNo potential conflict of interest was reported by the author(s).Ethical approvalThis article does not contain any studies with human participants performed by any of the authors.Data availability statementData sharing does not apply to this article as no new data has been created or analyzed in this study.Additional informationNotes on contributorsS. RegilanMr. S. Regilan working as a Research Scholar in the Department of Electronics and Communication Engineering. He has a track record of successful teaching, education reform and has been teaching Students for decades. He Completed his B.E in Electronics and Communication Engineering Department, in Bharath Niketan Engineering College, Anna University on 2011; M.E in Electronics and Communication Engineering Department, in Aarupadai Veedu Institute of Technology, Vinayaka Missions Research Foundation, Chennai on 2015. Pursuing Ph.D in Department of Electronics and Communication Engineering, Aarupadai Veedu Institute of Technology, Vinayaka Missions Research Foundation, Chennai. He worked various recognized Institutions from 2011. He had 10+ years of academic experiences in the field of Electronics and Communication Engineering. He is member in various professional bodies like ISTE, IEEE societies. He participated and Presented many International & National Conferences/Workshop/Seminar/ Webinar in the field of Electronics and Communication Engineering. He published and indexed 5 papers in reputed journals under Scopus with good citations indexed. Ma","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"75 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135092732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Routing approaches in named data network: a survey and emerging research challenges 命名数据网络中的路由方法:调查与新出现的研究挑战
Q2 Computer Science Pub Date : 2023-11-08 DOI: 10.1080/1206212x.2023.2279811
Sembati Yassine, Naja Najib, Jamali Abdellah
AbstractNamed Data Networking (NDN) has emerged as a promising information-centric networking paradigm that addresses the limitations of the traditional IP-based Internet architecture. The core principle of NDN relies on content naming instead of host addressing, to provide efficient, secure, and scalable content delivery. Routing is a critical component of NDN and is responsible for discovering and maintaining optimal paths to named content. This paper presents a comprehensive review of routing techniques in NDN, focusing on the design principles, algorithms, and performance metrics, especially in wired network architecture. We first summarize the NDN architecture and discuss its key components. We then delve into the fundamental routing concepts in NDN and categorize and examine various routing techniques, including link state, distance vector, and centralized approaches based on Software Defined Network. We also summarize the relevant research efforts proposed to address NDN routing challenges by focusing more on wired network architecture. Finally, we identify open research issues and future directions in NDN routing, emphasizing the need for scalable, efficient, and secure routing techniques that can fulfill the growing demands of the modern Internet. In conclusion, this review serves as a valuable reference for researchers and practitioners in NDN, offering a comprehensive understanding of the current state-of-the-art routing techniques, limitations, and potential future advancements.KEYWORDS: Software defined networkroutingnamed data networkscalabilittyoverheadwired network AcknowledgementsMy profound gratitude goes out to our mentors, Pr. Jamali Abdellah and Naja Najib, for their essential advice and assistance during the study process. I would especially like to thank my parents for their insightful advice. I appreciate the unwavering support and love of my family and friends. Finally, I would like to express my gratitude for the assistance and cooperation of the entire Department of Mathematics, Informatique, and Networks team.Disclosure statementNo potential conflict of interest was reported by the author(s).
摘要命名数据网络(NDN)作为一种有前景的以信息为中心的网络模式,解决了传统的基于ip的互联网架构的局限性。NDN的核心原理依赖于内容命名而不是主机寻址,以提供高效、安全和可扩展的内容交付。路由是NDN的关键组件,负责发现和维护到指定内容的最佳路径。本文对NDN中的路由技术进行了全面的回顾,重点介绍了设计原则、算法和性能指标,特别是在有线网络架构中。我们首先总结了NDN架构并讨论了其关键组件。然后,我们深入研究了NDN中的基本路由概念,并对各种路由技术进行了分类和检查,包括链路状态,距离矢量和基于软件定义网络的集中方法。我们还总结了通过更多地关注有线网络架构来解决NDN路由挑战的相关研究工作。最后,我们确定了NDN路由的开放研究问题和未来方向,强调需要可扩展、高效和安全的路由技术,以满足现代互联网日益增长的需求。总之,这篇综述为NDN的研究人员和实践者提供了有价值的参考,提供了对当前最先进的路由技术、局限性和潜在的未来发展的全面理解。关键词:软件定义网络路由命名数据网络可扩展性架桥有线网络感谢我们的导师Jamali Abdellah博士和Naja Najib博士,他们在研究过程中提供了重要的建议和帮助。我特别要感谢我的父母,他们给了我深刻的建议。我感谢家人和朋友对我坚定不移的支持和爱。最后,我要对整个数学系、信息系和网络系团队的协助与合作表示感谢。披露声明作者未报告潜在的利益冲突。
{"title":"Routing approaches in named data network: a survey and emerging research challenges","authors":"Sembati Yassine, Naja Najib, Jamali Abdellah","doi":"10.1080/1206212x.2023.2279811","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2279811","url":null,"abstract":"AbstractNamed Data Networking (NDN) has emerged as a promising information-centric networking paradigm that addresses the limitations of the traditional IP-based Internet architecture. The core principle of NDN relies on content naming instead of host addressing, to provide efficient, secure, and scalable content delivery. Routing is a critical component of NDN and is responsible for discovering and maintaining optimal paths to named content. This paper presents a comprehensive review of routing techniques in NDN, focusing on the design principles, algorithms, and performance metrics, especially in wired network architecture. We first summarize the NDN architecture and discuss its key components. We then delve into the fundamental routing concepts in NDN and categorize and examine various routing techniques, including link state, distance vector, and centralized approaches based on Software Defined Network. We also summarize the relevant research efforts proposed to address NDN routing challenges by focusing more on wired network architecture. Finally, we identify open research issues and future directions in NDN routing, emphasizing the need for scalable, efficient, and secure routing techniques that can fulfill the growing demands of the modern Internet. In conclusion, this review serves as a valuable reference for researchers and practitioners in NDN, offering a comprehensive understanding of the current state-of-the-art routing techniques, limitations, and potential future advancements.KEYWORDS: Software defined networkroutingnamed data networkscalabilittyoverheadwired network AcknowledgementsMy profound gratitude goes out to our mentors, Pr. Jamali Abdellah and Naja Najib, for their essential advice and assistance during the study process. I would especially like to thank my parents for their insightful advice. I appreciate the unwavering support and love of my family and friends. Finally, I would like to express my gratitude for the assistance and cooperation of the entire Department of Mathematics, Informatique, and Networks team.Disclosure statementNo potential conflict of interest was reported by the author(s).","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"27 31","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135391922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DFMCloudsim: an extension of cloudsim for modeling and simulation of data fragments migration over distributed data centers DFMCloudsim: cloudsim的扩展,用于在分布式数据中心上对数据片段迁移进行建模和仿真
Q2 Computer Science Pub Date : 2023-11-03 DOI: 10.1080/1206212x.2023.2277554
Laila Bouhouch, Mostapha Zbakh, Claude Tadonki
AbstractDue to the increasing volume of data for applications running on geographically distributed Cloud systems, the need for efficient data management has emerged as a crucial performance factor. Alongside basic task scheduling, the management of input data on distributed Cloud systems has become a genuine challenge, particularly with data-intensive applications. Ideally, each dataset should be stored in the same data center as its consumer tasks so as to lead to local data accesses only. However, when a given task does not need all items within one of its input datasets, sending that dataset entirely might lead to a severe time overhead. To address this concern, a data fragmentation strategy can be considered in order to partition the datasets and process them in that form. Such a strategy should be flexible enough to support any user-defined partitioning, and suitable enough to minimize the overhead of transferring the data in their fragmented form. To simulate and estimate the basic statistics of both fragmentation and migration mechanisms prior to an implementation in a real Cloud, we chose Cloudsim, with the goal of enhancing it with the corresponding extensions. Cloudsim is a popular simulator for Cloud Computing investigations. Our proposed extension is named DFMCloudsim, its goal is to provide an efficient module for implementing fragmentation and data migration strategies. We validate our extension using various simulated scenarios. The results indicate that our extension effectively achieves its main objectives and can reduce data transfer overhead by 74.75% compared to our previous work.Keywords: Cloud computingbig datacloudsimdata fragmentationdata migration AcknowledgmentsL. B.: prepared the manuscript, and performed analysis and experiments. M. Z., C. T.: helped in the initial solution design. All authors reviewed the paper and approved the final version of the manuscript.Availability of data and materialsAll of the material is owned by the authors and can be accessed by email request.Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsLaila BouhouchLaila Bouhouch received her engineer degree in Computer Science at ENSA (National School of Applied Sciences) at Ibn Zohr University, Agadir, Morocco, in 2017. She is currently a Ph.D. student in the Department of Computer Science, Laboratory CEDOC ST2I, ENSIAS, Rabat, Morocco. Her research interests include big data management in workflow systems, cloud computing and distributed systems.Mostapha ZbakhMostapha Zbakh received his Ph.D. in computer sciences from Polytechnic Faculty of Mons, Belgium, in 2001. He is currently a Professor at ENSIAS (National School of Computer Science and System Analysis) at Mohammed V University, Rabat, Morocco, since 2002. His research interests include load balancing, parallel and distributed systems, HPC, Big data and Cloud computing.Claude TadonkiClaude Tadonki currently holds
摘要由于运行在地理分布式云系统上的应用程序的数据量不断增加,对高效数据管理的需求已经成为一个关键的性能因素。除了基本的任务调度外,分布式云系统上输入数据的管理已经成为一个真正的挑战,特别是对于数据密集型应用程序。理想情况下,每个数据集应该与其使用者任务存储在相同的数据中心中,以便只能访问本地数据。但是,当给定任务不需要其中一个输入数据集中的所有项时,完全发送该数据集可能会导致严重的时间开销。为了解决这个问题,可以考虑一种数据碎片策略,以便对数据集进行分区并以这种形式处理它们。这种策略应该足够灵活,以支持任何用户定义的分区,并且足够合适,以最小化以碎片形式传输数据的开销。为了在真正的云中实现之前模拟和估计碎片化和迁移机制的基本统计数据,我们选择了Cloudsim,目的是通过相应的扩展对其进行增强。Cloudsim是一个流行的用于云计算调查的模拟器。我们提出的扩展名为DFMCloudsim,它的目标是为实现碎片化和数据迁移策略提供一个有效的模块。我们使用各种模拟场景验证我们的扩展。结果表明,我们的扩展有效地实现了其主要目标,与以前的工作相比,可以减少74.75%的数据传输开销。关键词:云计算;大数据;云数据;B:准备稿件,进行分析和实验。m.z, c.t.:在最初的解决方案设计中提供了帮助。所有作者都审阅了论文并批准了手稿的最终版本。数据和材料的可用性所有材料归作者所有,可以通过电子邮件请求访问。披露声明作者未报告潜在的利益冲突。作者简介:aila BouhouchLaila Bouhouch于2017年在摩洛哥阿加迪尔伊本·佐尔大学(Ibn Zohr University)国家应用科学学院获得计算机科学工程学位。她目前是摩洛哥拉巴特ENSIAS计算机科学系CEDOC ST2I实验室的博士生。主要研究方向为工作流系统中的大数据管理、云计算和分布式系统。Mostapha Zbakh于2001年获得比利时蒙斯理工学院计算机科学博士学位。2002年起担任摩洛哥拉巴特穆罕默德五世大学国家计算机科学与系统分析学院教授。他的研究兴趣包括负载平衡、并行和分布式系统、高性能计算、大数据和云计算。Claude Tadonki目前在Mines ParisTech/CRI担任研究职位,从事高性能计算主题和自动代码转换。他的背景是数学和计算机科学的结合。从博士学位开始,在不同的职位上,他一直从事高性能计算和运筹学的前沿研究,研究序列模型、方法和实现。他仍然对困难的真实问题的基本问题感兴趣,同时努力理解如何将优化、算法、编程和超级计算机的进步有效地结合起来,以提供最佳答案。
{"title":"DFMCloudsim: an extension of cloudsim for modeling and simulation of data fragments migration over distributed data centers","authors":"Laila Bouhouch, Mostapha Zbakh, Claude Tadonki","doi":"10.1080/1206212x.2023.2277554","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2277554","url":null,"abstract":"AbstractDue to the increasing volume of data for applications running on geographically distributed Cloud systems, the need for efficient data management has emerged as a crucial performance factor. Alongside basic task scheduling, the management of input data on distributed Cloud systems has become a genuine challenge, particularly with data-intensive applications. Ideally, each dataset should be stored in the same data center as its consumer tasks so as to lead to local data accesses only. However, when a given task does not need all items within one of its input datasets, sending that dataset entirely might lead to a severe time overhead. To address this concern, a data fragmentation strategy can be considered in order to partition the datasets and process them in that form. Such a strategy should be flexible enough to support any user-defined partitioning, and suitable enough to minimize the overhead of transferring the data in their fragmented form. To simulate and estimate the basic statistics of both fragmentation and migration mechanisms prior to an implementation in a real Cloud, we chose Cloudsim, with the goal of enhancing it with the corresponding extensions. Cloudsim is a popular simulator for Cloud Computing investigations. Our proposed extension is named DFMCloudsim, its goal is to provide an efficient module for implementing fragmentation and data migration strategies. We validate our extension using various simulated scenarios. The results indicate that our extension effectively achieves its main objectives and can reduce data transfer overhead by 74.75% compared to our previous work.Keywords: Cloud computingbig datacloudsimdata fragmentationdata migration AcknowledgmentsL. B.: prepared the manuscript, and performed analysis and experiments. M. Z., C. T.: helped in the initial solution design. All authors reviewed the paper and approved the final version of the manuscript.Availability of data and materialsAll of the material is owned by the authors and can be accessed by email request.Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsLaila BouhouchLaila Bouhouch received her engineer degree in Computer Science at ENSA (National School of Applied Sciences) at Ibn Zohr University, Agadir, Morocco, in 2017. She is currently a Ph.D. student in the Department of Computer Science, Laboratory CEDOC ST2I, ENSIAS, Rabat, Morocco. Her research interests include big data management in workflow systems, cloud computing and distributed systems.Mostapha ZbakhMostapha Zbakh received his Ph.D. in computer sciences from Polytechnic Faculty of Mons, Belgium, in 2001. He is currently a Professor at ENSIAS (National School of Computer Science and System Analysis) at Mohammed V University, Rabat, Morocco, since 2002. His research interests include load balancing, parallel and distributed systems, HPC, Big data and Cloud computing.Claude TadonkiClaude Tadonki currently holds ","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"13 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135818487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware image classification: comparative analysis of a fine-tuned CNN and pre-trained models 恶意软件图像分类:一个微调CNN和预训练模型的比较分析
Q2 Computer Science Pub Date : 2023-11-02 DOI: 10.1080/1206212x.2023.2270804
Santosh Kumar Majhi, Abhipsa Panda, Suresh Kumar Srichandan, Usha Desai, Biswaranjan Acharya
AbstractA crucial part is played by malware detection and classification in ensuring the safety and security of computer systems. In this work, a comprehensive study has been presented for the classification of harmful or malware images that uses a Convolutional Neural Network (CNN) which has been finely tuned and its performance has been compared with five pre-trained models: ResNet50, InceptionResNetV2, VGG16, Xception and InceptionV3. The suggested CNN framework has been trained using the dataset MalImg_9010, consisting of 9,376 grayscale images resized to 128 × 128 pixels. The models have been evaluated based on their F1 score, recall, precision, and accuracy. The experiments that were conducted demonstrate that the fine-tuned CNN model achieves an impressive 0.965 as the F1 score and a 95.57% accuracy. Furthermore, the comparison with pre-trained models reveals the dominance of the presented framework concerning the F1 score and accuracy. The output of the conducted simulation suggests that the fine-tuned CNN approach shows promise for accurate malware image classification. Additionally, the paper discusses potential improvements, such as increasing the number of training epochs and incorporating larger and more diverse malware datasets, including RGB images and a broader range of malware families. The current research article gives valuable observations on various models’ effectiveness for classifying malware images and highlights the future scopes for research incorporating this domain.KEYWORDS: Malware image classificationdata privacydata protectionartificial intelligencedeep learning Disclosure statementThe authors declare that they have no known competing financial or personal relationships that could be viewed as influencing the work reported in this paper. On behalf of all authors, the corresponding author states that there is no conflict of interest.
摘要恶意软件的检测与分类是保障计算机系统安全的重要环节。在这项工作中,使用卷积神经网络(CNN)对有害或恶意图像进行了全面的分类研究,该网络经过精细调整,并将其性能与五个预训练模型(ResNet50, InceptionResNetV2, VGG16, Xception和InceptionV3)进行了比较。建议的CNN框架使用数据集MalImg_9010进行训练,该数据集由9,376张灰度图像组成,大小调整为128 × 128像素。这些模型已经根据它们的F1分数、召回率、精度和准确性进行了评估。实验表明,微调后的CNN模型F1得分达到了惊人的0.965,准确率达到了95.57%。此外,与预训练模型的比较揭示了所提出的框架在F1分数和准确性方面的优势。模拟结果表明,经过微调的CNN方法有望实现准确的恶意软件图像分类。此外,本文还讨论了潜在的改进,例如增加训练时代的数量,并纳入更大、更多样化的恶意软件数据集,包括RGB图像和更广泛的恶意软件家族。目前的研究文章对各种模型对恶意软件图像分类的有效性进行了有价值的观察,并强调了纳入该领域的未来研究范围。关键词:恶意软件图像分类数据隐私数据保护人工智能深度学习披露声明作者声明他们没有已知的竞争财务或个人关系,这些关系可能被视为影响本文所报道的工作。通讯作者代表所有作者声明不存在利益冲突。
{"title":"Malware image classification: comparative analysis of a fine-tuned CNN and pre-trained models","authors":"Santosh Kumar Majhi, Abhipsa Panda, Suresh Kumar Srichandan, Usha Desai, Biswaranjan Acharya","doi":"10.1080/1206212x.2023.2270804","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2270804","url":null,"abstract":"AbstractA crucial part is played by malware detection and classification in ensuring the safety and security of computer systems. In this work, a comprehensive study has been presented for the classification of harmful or malware images that uses a Convolutional Neural Network (CNN) which has been finely tuned and its performance has been compared with five pre-trained models: ResNet50, InceptionResNetV2, VGG16, Xception and InceptionV3. The suggested CNN framework has been trained using the dataset MalImg_9010, consisting of 9,376 grayscale images resized to 128 × 128 pixels. The models have been evaluated based on their F1 score, recall, precision, and accuracy. The experiments that were conducted demonstrate that the fine-tuned CNN model achieves an impressive 0.965 as the F1 score and a 95.57% accuracy. Furthermore, the comparison with pre-trained models reveals the dominance of the presented framework concerning the F1 score and accuracy. The output of the conducted simulation suggests that the fine-tuned CNN approach shows promise for accurate malware image classification. Additionally, the paper discusses potential improvements, such as increasing the number of training epochs and incorporating larger and more diverse malware datasets, including RGB images and a broader range of malware families. The current research article gives valuable observations on various models’ effectiveness for classifying malware images and highlights the future scopes for research incorporating this domain.KEYWORDS: Malware image classificationdata privacydata protectionartificial intelligencedeep learning Disclosure statementThe authors declare that they have no known competing financial or personal relationships that could be viewed as influencing the work reported in this paper. On behalf of all authors, the corresponding author states that there is no conflict of interest.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"78 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135976060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MuDeLA: multi-level deep learning approach for intrusion detection systems MuDeLA:用于入侵检测系统的多级深度学习方法
Q2 Computer Science Pub Date : 2023-11-01 DOI: 10.1080/1206212x.2023.2275084
Wathiq Laftah Al-Yaseen, Ali Kadhum Idrees
AbstractIn recent years, deep learning techniques have achieved significant results in several fields, like computer vision, speech recognition, bioinformatics, medical image analysis, and natural language processing. On the other hand, deep learning for intrusion detection has been widely used, particularly the implementation of convolutional neural networks (CNN), multilayer perceptron (MLP), and autoencoders (AE) to classify normal and abnormal. In this article, we propose a multi-level deep learning approach (MuDeLA) for intrusion detection systems (IDS). The MuDeLA is based on CNN and MLP to enhance the performance of detecting attacks in the IDS. The MuDeLA is evaluated by using various well-known benchmark datasets like KDDCup'99, NSL-KDD, and UNSW-NB15 in order to expand the comparison with different related work results. The outcomes show that the proposed MuDeLA achieves high efficiency for multiclass classification compared with the other methods, where the accuracy reaches 95.55% for KDDCup'99, 88.12% for NSL-KDD, and 90.52% for UNSW-NB15.Keywords: Intrusion detection systemmultilevel learning modeldeep learningconvolution neural networkmultilayer perceptron Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsWathiq Laftah Al-YaseenWathiq Laftah Al-Yaseen is currently a Lecturer in the Department of Computer Systems Techniques at Kerbala Technical Institute in Al-Furat Al-Awsat Technical University, Kerbala, Iraq. He received his Master of Computer Science from the University of Babylon, Iraq. He received his PhD of Computer Science from FTSM/UKM, Malaysia. His research interests include artificial intelligence, network security, machine learning, data mining and bioinformatics.Ali Kadhum IdreesAli Kadhum Idrees received his BSc and MSc in Computer Science from the University of Babylon, Iraq in 2000 and 2003 respectively. He received his PhD in Computer Science (wireless networks) in 2015 from the University of Franche-Comte (UFC), France. He is currently an Assistant Professor in Computer Science at the University of Babylon, Iraq. He has several research papers in wireless sensor networks (WSNs) and computer networks. His research interests include wireless networks, WSNs, SDN, IoT, distributed computing, data mining and optimisation in communication networks.
近年来,深度学习技术在计算机视觉、语音识别、生物信息学、医学图像分析和自然语言处理等领域取得了显著成果。另一方面,深度学习在入侵检测中的应用已经非常广泛,特别是卷积神经网络(CNN)、多层感知器(MLP)和自动编码器(AE)的实现,可以对正常和异常进行分类。在本文中,我们提出了一种用于入侵检测系统(IDS)的多级深度学习方法(MuDeLA)。MuDeLA基于CNN和MLP,提高了IDS检测攻击的性能。利用KDDCup’99、NSL-KDD、UNSW-NB15等知名基准数据集对MuDeLA进行评价,扩大与不同相关工作结果的比较。结果表明,与其他方法相比,所提出的MuDeLA对多类分类的准确率达到95.55%,对NSL-KDD的准确率达到88.12%,对UNSW-NB15的准确率达到90.52%。关键词:入侵检测系统多层学习模型深度学习卷积神经网络多层感知器披露声明作者未报告潜在利益冲突。附加信息撰稿人说明wathiq Laftah Al-Yaseen wathiq Laftah Al-Yaseen目前是伊拉克Kerbala Al-Furat Al-Awsat技术大学Kerbala技术学院计算机系统技术系的讲师。他在伊拉克巴比伦大学获得计算机科学硕士学位。他在马来西亚FTSM/UKM获得计算机科学博士学位。他的研究兴趣包括人工智能、网络安全、机器学习、数据挖掘和生物信息学。Ali Kadhum Idrees分别于2000年和2003年在伊拉克巴比伦大学获得计算机科学学士和硕士学位。他于2015年获得法国弗朗什-孔特大学(UFC)计算机科学(无线网络)博士学位。他目前是伊拉克巴比伦大学计算机科学助理教授。他在无线传感器网络(WSNs)和计算机网络方面发表了多篇研究论文。他的研究兴趣包括无线网络、wsn、SDN、物联网、分布式计算、数据挖掘和通信网络优化。
{"title":"MuDeLA: multi-level deep learning approach for intrusion detection systems","authors":"Wathiq Laftah Al-Yaseen, Ali Kadhum Idrees","doi":"10.1080/1206212x.2023.2275084","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2275084","url":null,"abstract":"AbstractIn recent years, deep learning techniques have achieved significant results in several fields, like computer vision, speech recognition, bioinformatics, medical image analysis, and natural language processing. On the other hand, deep learning for intrusion detection has been widely used, particularly the implementation of convolutional neural networks (CNN), multilayer perceptron (MLP), and autoencoders (AE) to classify normal and abnormal. In this article, we propose a multi-level deep learning approach (MuDeLA) for intrusion detection systems (IDS). The MuDeLA is based on CNN and MLP to enhance the performance of detecting attacks in the IDS. The MuDeLA is evaluated by using various well-known benchmark datasets like KDDCup'99, NSL-KDD, and UNSW-NB15 in order to expand the comparison with different related work results. The outcomes show that the proposed MuDeLA achieves high efficiency for multiclass classification compared with the other methods, where the accuracy reaches 95.55% for KDDCup'99, 88.12% for NSL-KDD, and 90.52% for UNSW-NB15.Keywords: Intrusion detection systemmultilevel learning modeldeep learningconvolution neural networkmultilayer perceptron Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsWathiq Laftah Al-YaseenWathiq Laftah Al-Yaseen is currently a Lecturer in the Department of Computer Systems Techniques at Kerbala Technical Institute in Al-Furat Al-Awsat Technical University, Kerbala, Iraq. He received his Master of Computer Science from the University of Babylon, Iraq. He received his PhD of Computer Science from FTSM/UKM, Malaysia. His research interests include artificial intelligence, network security, machine learning, data mining and bioinformatics.Ali Kadhum IdreesAli Kadhum Idrees received his BSc and MSc in Computer Science from the University of Babylon, Iraq in 2000 and 2003 respectively. He received his PhD in Computer Science (wireless networks) in 2015 from the University of Franche-Comte (UFC), France. He is currently an Assistant Professor in Computer Science at the University of Babylon, Iraq. He has several research papers in wireless sensor networks (WSNs) and computer networks. His research interests include wireless networks, WSNs, SDN, IoT, distributed computing, data mining and optimisation in communication networks.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"116 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135325829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature selection in P2P lending based on hybrid genetic algorithm with machine learning 基于混合遗传算法和机器学习的P2P借贷特征选择
Q2 Computer Science Pub Date : 2023-10-31 DOI: 10.1080/1206212x.2023.2276553
Muhammad Sam'an, Muhammad Munsarif, None Safuan, Yahya Nur Ifriza
{"title":"Feature selection in P2P lending based on hybrid genetic algorithm with machine learning","authors":"Muhammad Sam'an, Muhammad Munsarif, None Safuan, Yahya Nur Ifriza","doi":"10.1080/1206212x.2023.2276553","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2276553","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"14 13","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135871582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prioritizing software regression testing using reinforcement learning and hidden Markov model 利用强化学习和隐马尔可夫模型确定软件回归测试的优先级
Q2 Computer Science Pub Date : 2023-10-30 DOI: 10.1080/1206212x.2023.2273585
Neelam Rawat, Vikas Somani, Arun Kr. Tripathi
AbstractSoftware regression testing is an essential testing practice that ensures that changes made to the source code of an application do not affect its functionality and quality. Within this research, we introduce a novel method for prioritizing software test cases using a fusion of reinforcement learning and hidden Markov model to enhance the efficiency of the testing process. The primary objective of this research paper is to maximize the likelihood of selecting test cases that have the highest priority of uncovering defects in new code changes introduced into the codebase. To assess the efficacy of our suggested methodology, we experimented on the test cases of five web applications. Our results demonstrate that our proposed approach can accurately identify critical test cases while minimizing false positives, as evidenced by an F1 score of 0.849. This outcome can help prioritize testing efforts, saving time, and resources while improving the overall efficiency of the testing process.Keywords: Regression testingtest case prioritization (TCP)hidden Markov model (HMM)reinforcement learning (RL) Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsNeelam RawatMs. Neelam Rawat is a dedicated research scholar in the field of Computer Science & Engineering at Sangam University. With an extensive portfolio that includes over 15 publications, 3 patents, and 2 authored books, she is actively engaged in pioneering research. Her primary areas of expertise lie in the domains of machine learning, deep learning, software testing, software engineering, quality assurance, and management.Vikas SomaniDr. Vikas Somani (PhD, M.Tech, MCA,BCA) has more than 16 years of Teaching and Industrial Experience. Currently he is Associate Professor and Assistant Dean, School of Engineering and Technology at the Sangam University, Bhilwara. He has diversified research interests in the areas of Cloud Computing, Artificial Intelligence, Machine Learning, Block chain and Internet of Things (IoT). He is a Member of IEEE, CSI, IAENG, ACM, IRED. He has published over 35 Research Paper in International, National Journal and Conferences and attended around 50 Workshops and STP. He has also Supervised/Guided more than 20 Research Work. Currently, under his 6 research scholars are working. He has Three Patent awarded and granted/design one from Government of India Patent Office and another from Germany Patent Office. He has also published Five Patents.Arun Kr. TripathiDr. Arun Kr. Tripathi has more than 21 years of Teaching experience and completed Ph.D. in Computer Applications with specialization in Wireless Networks. Presently he is appointed as Head of Computer Applications with and an additional responsibility of Head Cyber Security and Forensic Science Division. His major research interests are Computer Network, Network Security, IoT, Machine Learning etc. with over 70 published works in reputed Journal
摘要软件回归测试是一种重要的测试实践,它确保对应用程序源代码所做的更改不会影响其功能和质量。在本研究中,我们引入了一种新的方法,利用强化学习和隐马尔可夫模型的融合来确定软件测试用例的优先级,以提高测试过程的效率。这篇研究论文的主要目标是最大化选择测试用例的可能性,这些测试用例在发现引入代码库的新代码变更中的缺陷方面具有最高的优先级。为了评估我们建议的方法的有效性,我们在五个web应用程序的测试用例上进行了实验。我们的结果表明,我们提出的方法可以准确地识别关键测试用例,同时最大限度地减少误报,F1得分为0.849。这个结果可以帮助确定测试工作的优先级,节省时间和资源,同时提高测试过程的整体效率。关键词:回归测试测试用例优先级(TCP)隐马尔可夫模型(HMM)强化学习(RL)披露声明作者未报告潜在的利益冲突。关于贡献者的说明。Neelam Rawat是Sangam大学计算机科学与工程领域的专门研究学者。她拥有广泛的投资组合,包括超过15份出版物,3项专利和2本著作,她积极从事开创性的研究。她的主要专业领域是机器学习、深度学习、软件测试、软件工程、质量保证和管理。Vikas SomaniDr。Vikas Somani(博士,M.Tech, MCA,BCA)拥有超过16年的教学和工业经验。目前,他是印度比瓦拉Sangam大学工程与技术学院副教授兼院长助理。他在云计算、人工智能、机器学习、区块链和物联网(IoT)等领域有广泛的研究兴趣。他是IEEE, CSI, IAENG, ACM, IRED的成员。他在国际、国内期刊和会议上发表了超过35篇研究论文,并参加了大约50个研讨会和STP。指导和指导科研工作20余项。目前,他手下有6名研究人员在工作。他拥有三项专利,一项来自印度政府专利局,另一项来自德国专利局。他还发表了五项专利。Arun Kr. tripathr。Arun Kr. Tripathi拥有超过21年的教学经验,拥有计算机应用博士学位,专攻无线网络。目前,他被任命为计算机应用主管,并兼任网络安全和法医科学部主管。主要研究方向为计算机网络、网络安全、物联网、机器学习等,在国内外知名期刊和会议上发表论文70余篇。他审阅了超过35篇sci索引期刊文章。
{"title":"Prioritizing software regression testing using reinforcement learning and hidden Markov model","authors":"Neelam Rawat, Vikas Somani, Arun Kr. Tripathi","doi":"10.1080/1206212x.2023.2273585","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2273585","url":null,"abstract":"AbstractSoftware regression testing is an essential testing practice that ensures that changes made to the source code of an application do not affect its functionality and quality. Within this research, we introduce a novel method for prioritizing software test cases using a fusion of reinforcement learning and hidden Markov model to enhance the efficiency of the testing process. The primary objective of this research paper is to maximize the likelihood of selecting test cases that have the highest priority of uncovering defects in new code changes introduced into the codebase. To assess the efficacy of our suggested methodology, we experimented on the test cases of five web applications. Our results demonstrate that our proposed approach can accurately identify critical test cases while minimizing false positives, as evidenced by an F1 score of 0.849. This outcome can help prioritize testing efforts, saving time, and resources while improving the overall efficiency of the testing process.Keywords: Regression testingtest case prioritization (TCP)hidden Markov model (HMM)reinforcement learning (RL) Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsNeelam RawatMs. Neelam Rawat is a dedicated research scholar in the field of Computer Science & Engineering at Sangam University. With an extensive portfolio that includes over 15 publications, 3 patents, and 2 authored books, she is actively engaged in pioneering research. Her primary areas of expertise lie in the domains of machine learning, deep learning, software testing, software engineering, quality assurance, and management.Vikas SomaniDr. Vikas Somani (PhD, M.Tech, MCA,BCA) has more than 16 years of Teaching and Industrial Experience. Currently he is Associate Professor and Assistant Dean, School of Engineering and Technology at the Sangam University, Bhilwara. He has diversified research interests in the areas of Cloud Computing, Artificial Intelligence, Machine Learning, Block chain and Internet of Things (IoT). He is a Member of IEEE, CSI, IAENG, ACM, IRED. He has published over 35 Research Paper in International, National Journal and Conferences and attended around 50 Workshops and STP. He has also Supervised/Guided more than 20 Research Work. Currently, under his 6 research scholars are working. He has Three Patent awarded and granted/design one from Government of India Patent Office and another from Germany Patent Office. He has also published Five Patents.Arun Kr. TripathiDr. Arun Kr. Tripathi has more than 21 years of Teaching experience and completed Ph.D. in Computer Applications with specialization in Wireless Networks. Presently he is appointed as Head of Computer Applications with and an additional responsibility of Head Cyber Security and Forensic Science Division. His major research interests are Computer Network, Network Security, IoT, Machine Learning etc. with over 70 published works in reputed Journal","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"296 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136067877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beyond cocaine and heroin use: a stacking ensemble-based framework for predicting the likelihood of subsequent substance use disorder using demographics and personality traits 超越可卡因和海洛因的使用:使用人口统计学和人格特征预测后续物质使用障碍可能性的堆叠集成框架
Q2 Computer Science Pub Date : 2023-10-26 DOI: 10.1080/1206212x.2023.2273011
Amina Bouhadja, Abdelkrim Bouramoul
{"title":"Beyond cocaine and heroin use: a stacking ensemble-based framework for predicting the likelihood of subsequent substance use disorder using demographics and personality traits","authors":"Amina Bouhadja, Abdelkrim Bouramoul","doi":"10.1080/1206212x.2023.2273011","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2273011","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134907507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AT-densenet with salp swarm optimization for outlier prediction 基于salp群优化的at密度网络离群值预测
Q2 Computer Science Pub Date : 2023-10-26 DOI: 10.1080/1206212x.2023.2273015
Chigurupati Ravi Swaroop, K. Raja
{"title":"AT-densenet with salp swarm optimization for outlier prediction","authors":"Chigurupati Ravi Swaroop, K. Raja","doi":"10.1080/1206212x.2023.2273015","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2273015","url":null,"abstract":"","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134907681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security enhancement in a cloud environment using a hybrid chaotic algorithm with multifactor verification for user authentication 在云环境中使用混合混沌算法和多因素验证来增强用户身份验证的安全性
Q2 Computer Science Pub Date : 2023-10-18 DOI: 10.1080/1206212x.2023.2267839
Megha Gupta, Laxmi Ahuja, Ashish Seth
AbstractA hybrid chaotic-based DNA and multifactor authentication strategy are created to improve the protection of the cloud environment. Initially, multimodal data are collected from the data owner then the information is compressed by utilizing the deflate compression approach. The data is then encrypted using hybrid chaotic-based DNA cryptography to increase the security of data. In this hybrid algorithm DNA is used for the key generation and chaotic algorithm is utilized for the encryption process. On the other hand, a multifactor authentication method is created to access data from the cloud to block access by unauthorized users. In that technique, users are requested to enter the registered Password with the generated OTP from the mobile number. Then, the device serial number is another factor to verify the accessing device. Likewise, the user's fingerprint and iris recognition are also validated for accessing the data. The cloud-based data can be accessible following users' successful authentication. The simulation analysis shows that the encryption and decryption time reached for image, string and integer data is 24, 0.065, 37, 0.14, 28 and 0.14 s, respectively, for the cloud security algorithm. The proposed algorithm effectively mitigates space consumption and provides improved data security in a cloud environment.KEYWORDS: Cloud environmentsecuritycompressiondeflatehybrid chaotic-DNAmultifactor authentication AcknowledgementsAuthor express their deep sense of gratitude to the Founder President of Amity University, Dr. Ashok K. Chauhan for his keen interest in promoting research in the Amity University and have always been an inspiration for achieving great heights.Disclosure statementNo potential conflict of interest was reported by the author(s).Compliance with ethical standardsThis article is a completely original work of its authors; it has not been published before and will not be sent to other publications until the journal’s editorial board decides not to accept it for publication.Additional informationFundingThe authors declare that no funds, grants, or other support were received during the preparation of this manuscript.Notes on contributorsMegha GuptaMegha Gupta is research scholar pursuing Ph.D from AIIT, Amity University, and Noida under guidance of Prof. (Dr.) Laxmi Ahuja & Co-Guide Prof. (Dr.) Ashish Seth. She is Gold Medalist in M.tech from Jamia Hamdard, New Delhi. She received her B.TECH degree with HONOURS from B.M.I.E.T Sonipat. Her research areas include Cloud Computing, Security, Software Engineering, Software Testing, Computer Networks, Database Management systems and Big Data. She has published several research papers in reputed international and national journals and also participated and presented research papers in various international, national conferences.Laxmi AhujaProf. (Dr.) Laxmi Ahuja Ph.D(CSE) working as Professor in Amity Institute of Information Technology with the role ranging from Lecturer to Prof
摘要为了提高云环境的保护能力,提出了一种基于混沌DNA和多因素认证的混合策略。最初,从数据所有者处收集多模态数据,然后利用deflate压缩方法对信息进行压缩。然后使用基于混合混沌的DNA加密技术对数据进行加密,以增加数据的安全性。该混合算法采用DNA算法生成密钥,采用混沌算法进行加密。另一方面,创建了多因素身份验证方法来访问云中的数据,以阻止未经授权的用户访问。在该技术中,要求用户使用从移动号码生成的OTP输入注册密码。然后,设备序列号是验证访问设备的另一个因素。同样,用户的指纹和虹膜识别也要经过验证才能访问数据。用户身份验证成功后,可以访问基于云的数据。仿真分析表明,云安全算法对图像、字符串和整数数据的加解密时间分别为24、0.065、37、0.14、28和0.14 s。该算法有效降低了云环境下的空间消耗,提高了数据的安全性。关键词:云环境安全压缩压缩混合混沌-多因素认证致谢作者对Amity大学创始人校长Ashok K. Chauhan博士对推动Amity大学研究的浓厚兴趣表示深深的感谢,并一直激励着我们取得更大的成就。披露声明作者未报告潜在的利益冲突。本文完全是作者的原创作品;这篇文章之前没有发表过,在该杂志的编辑委员会决定不接受它发表之前,它不会被发送给其他出版物。作者声明在撰写本文期间没有收到任何资金、资助或其他支持。作者简介:tamegha Gupta是一名研究学者,在Laxmi Ahuja教授和共同指导教授Ashish Seth的指导下,在AIIT、Amity大学和Noida攻读博士学位。她是来自新德里贾米亚哈达德的理科硕士金牌得主。她以优异的成绩获得B.M.I.E.T Sonipat学士学位。她的研究领域包括云计算、安全、软件工程、软件测试、计算机网络、数据库管理系统和大数据。她在国际和国内知名期刊上发表了多篇研究论文,并参加了各种国际、国家会议并发表了研究论文。你的事迹AhujaProf。Laxmi Ahuja博士(CSE)在Amity信息技术研究所担任教授,在21年的时间里,从讲师到教授,再到系主任。在学者;她的研究领域包括搜索引擎、数据挖掘和软计算方法;在SCOPUS影响因子期刊(如施普林格,Elsevier,Inderscience等)的国际和国内会议和期刊上发表了100多篇研究论文。她以发明人的身份在信息技术领域成功申请了多项专利,这些专利已在印度政府专利部的“国际专利杂志”上发表。她出版了许多b施普林格书章节的讲义。组织各种国际会议并担任会议主席。她曾多次举办客座讲座、工作坊及教师发展计划。她是《可靠性、信息通信技术和优化(趋势和未来方向)国际会议论文集》的副主编。她积极参与研究活动。目前指导研究学者8人,指导博士研究生3人。出版了多部操作系统和信息技术相关书籍。她是IEEE的成员和印度计算机协会的终身会员,IETE - The Institute of Electronics and Telecommunications Engineers的前任副主席,IACSIT的高级成员,IEEE Society的成员。她积极参与这些社团的各种活动。她也是许多会议的技术主席成员。她在许多活动中被授予荣誉嘉宾。Ashish Seth,博士。SMIEEE, ACM杰出演讲者,现为韩国仁荷大学全球融合研究学院教授,2016年9月起派驻乌兹别克斯坦塔什干仁荷大学。
{"title":"Security enhancement in a cloud environment using a hybrid chaotic algorithm with multifactor verification for user authentication","authors":"Megha Gupta, Laxmi Ahuja, Ashish Seth","doi":"10.1080/1206212x.2023.2267839","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2267839","url":null,"abstract":"AbstractA hybrid chaotic-based DNA and multifactor authentication strategy are created to improve the protection of the cloud environment. Initially, multimodal data are collected from the data owner then the information is compressed by utilizing the deflate compression approach. The data is then encrypted using hybrid chaotic-based DNA cryptography to increase the security of data. In this hybrid algorithm DNA is used for the key generation and chaotic algorithm is utilized for the encryption process. On the other hand, a multifactor authentication method is created to access data from the cloud to block access by unauthorized users. In that technique, users are requested to enter the registered Password with the generated OTP from the mobile number. Then, the device serial number is another factor to verify the accessing device. Likewise, the user's fingerprint and iris recognition are also validated for accessing the data. The cloud-based data can be accessible following users' successful authentication. The simulation analysis shows that the encryption and decryption time reached for image, string and integer data is 24, 0.065, 37, 0.14, 28 and 0.14 s, respectively, for the cloud security algorithm. The proposed algorithm effectively mitigates space consumption and provides improved data security in a cloud environment.KEYWORDS: Cloud environmentsecuritycompressiondeflatehybrid chaotic-DNAmultifactor authentication AcknowledgementsAuthor express their deep sense of gratitude to the Founder President of Amity University, Dr. Ashok K. Chauhan for his keen interest in promoting research in the Amity University and have always been an inspiration for achieving great heights.Disclosure statementNo potential conflict of interest was reported by the author(s).Compliance with ethical standardsThis article is a completely original work of its authors; it has not been published before and will not be sent to other publications until the journal’s editorial board decides not to accept it for publication.Additional informationFundingThe authors declare that no funds, grants, or other support were received during the preparation of this manuscript.Notes on contributorsMegha GuptaMegha Gupta is research scholar pursuing Ph.D from AIIT, Amity University, and Noida under guidance of Prof. (Dr.) Laxmi Ahuja & Co-Guide Prof. (Dr.) Ashish Seth. She is Gold Medalist in M.tech from Jamia Hamdard, New Delhi. She received her B.TECH degree with HONOURS from B.M.I.E.T Sonipat. Her research areas include Cloud Computing, Security, Software Engineering, Software Testing, Computer Networks, Database Management systems and Big Data. She has published several research papers in reputed international and national journals and also participated and presented research papers in various international, national conferences.Laxmi AhujaProf. (Dr.) Laxmi Ahuja Ph.D(CSE) working as Professor in Amity Institute of Information Technology with the role ranging from Lecturer to Prof","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135882961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Computers and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1