首页 > 最新文献

Journal of Network and Systems Management最新文献

英文 中文
DT-ARO: Decision Tree-Based Artificial Rabbits Optimization to Mitigate IoT Botnet Exploitation DT-ARO:基于决策树的人工兔子优化技术缓解物联网僵尸网络攻击
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-07 DOI: 10.1007/s10922-023-09785-6
Mohammad Almseidin, Jamil Al-Sawwa, Mouhammd Alkasassbeh, Maen Alzubi, Khaled Alrfou

The rapid growth of Artificial Intelligence (AI) algorithms has created the opportunity to solve complex problems such as Internet of Things (IoT) botnet attacks. The severity of IoT botnet attacks is a critical challenge for improving the smart IoT environment. Therefore, there is an urgent need to design and implement an efficient detection model to deal with various IoT bot attacks and simultaneously handle issues related to the massive feature space. This paper introduces a wrapper feature selection technique by adapting the Artificial Rabbit Optimization (ARO) algorithm and the Decision Tree (DT) algorithm to detect various types of IoT botnet attacks. During the design of the suggested DT-ARO model, the N-BaIoT datasets were used as a testbed environment. The feature space optimization step was carried out using the ARO algorithm to select only the high-priority features for detecting the IoT botnet attacks. The binary vector technique was used to distinguish the optimal features. The detection engine was performed using the DT algorithm. The conducted experiments have demonstrated the ability of the suggested DT-ARO model to detect various types of IoT botnet attacks, where the accuracy rate was 99.89%. Meanwhile, effectively reducing the feature’s space. In addition, the accomplished results were compared with the latest typical approaches. The DT-ARO model was found to be competitive with these methods and even outperformed them in reducing the feature space.

人工智能(AI)算法的快速发展为解决物联网(IoT)僵尸网络攻击等复杂问题创造了机会。物联网僵尸网络攻击的严重性是改善智能物联网环境的关键挑战。因此,迫切需要设计和实现一种高效的检测模型,以应对各种物联网僵尸网络攻击,并同时处理与海量特征空间相关的问题。本文通过调整人工兔优化(ARO)算法和决策树(DT)算法,引入了一种包装特征选择技术,以检测各种类型的物联网僵尸网络攻击。在建议的 DT-ARO 模型设计过程中,使用了 N-BaIoT 数据集作为测试平台环境。使用 ARO 算法进行了特征空间优化步骤,只选择高优先级特征来检测物联网僵尸网络攻击。二进制向量技术用于区分最优特征。检测引擎采用 DT 算法。实验证明,建议的 DT-ARO 模型能够检测出各种类型的物联网僵尸网络攻击,准确率达到 99.89%。同时,有效减少了特征空间。此外,研究结果还与最新的典型方法进行了比较。结果发现,DT-ARO 模型与这些方法相比具有竞争力,甚至在缩小特征空间方面优于它们。
{"title":"DT-ARO: Decision Tree-Based Artificial Rabbits Optimization to Mitigate IoT Botnet Exploitation","authors":"Mohammad Almseidin, Jamil Al-Sawwa, Mouhammd Alkasassbeh, Maen Alzubi, Khaled Alrfou","doi":"10.1007/s10922-023-09785-6","DOIUrl":"https://doi.org/10.1007/s10922-023-09785-6","url":null,"abstract":"<p>The rapid growth of Artificial Intelligence (AI) algorithms has created the opportunity to solve complex problems such as Internet of Things (IoT) botnet attacks. The severity of IoT botnet attacks is a critical challenge for improving the smart IoT environment. Therefore, there is an urgent need to design and implement an efficient detection model to deal with various IoT bot attacks and simultaneously handle issues related to the massive feature space. This paper introduces a wrapper feature selection technique by adapting the Artificial Rabbit Optimization (ARO) algorithm and the Decision Tree (DT) algorithm to detect various types of IoT botnet attacks. During the design of the suggested DT-ARO model, the N-BaIoT datasets were used as a testbed environment. The feature space optimization step was carried out using the ARO algorithm to select only the high-priority features for detecting the IoT botnet attacks. The binary vector technique was used to distinguish the optimal features. The detection engine was performed using the DT algorithm. The conducted experiments have demonstrated the ability of the suggested DT-ARO model to detect various types of IoT botnet attacks, where the accuracy rate was 99.89%. Meanwhile, effectively reducing the feature’s space. In addition, the accomplished results were compared with the latest typical approaches. The DT-ARO model was found to be competitive with these methods and even outperformed them in reducing the feature space. </p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"268 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138565880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Path Towards Virtualized Wireless Communications: A Survey and Research Challenges 迈向虚拟化无线通信之路:调查与研究挑战
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-30 DOI: 10.1007/s10922-023-09788-3
Marco Silva, José Santos, Marília Curado

To keep up with the increasing number of connected devices in people’s daily lives, it is necessary to develop intelligent mechanisms that perform the entire network management, interconnecting Wi-Fi, and the emerging beyond Fifth-Generation (5G) communications. Hence, it is essential to consider multiple usage scenarios, while managing end devices’ limitations. As a result, developing a system that allows network operators to link Wi-Fi services on their main networks becomes a critical issue. These include a new paradigm that tackles optimal and dynamic resource allocation techniques. Thus, to consider in a combined way, the applications requirements, the resources available, and the different tiers involved, mechanisms such as virtualization and slicing have emerged to handle the heterogeneous context of the next-generation wireless communications. Moreover, the allocation of Radio Access Network (RAN) resources needs to be addressed. For this purpose, Open-RAN has in mind an open environment, which relies on virtualized functions and is mostly vendor agnostic. This technology will enable high data rates while maintaining adequate Quality of Service (QoS) in wireless communications. This paper advances current literature, which mainly discusses these themes individually, by providing a comprehensive survey in Next Generation Wireless Communications, highlighting their integration with beyond 5G Communications. First, we introduce the Wi-Fi evolution and explain the main standards developed over the years. Second, we present the most recent Wi-Fi standards, Wi-Fi 6 and 7, compared with 5G and beyond. Lastly, we explain the concepts related to slicing, virtualization, RAN, Open-RAN and the open research challenges.

为了跟上人们日常生活中越来越多的连接设备,有必要开发智能机制来进行全网管理,互联Wi-Fi以及新兴的第五代(5G)通信。因此,在管理终端设备的限制时,必须考虑多种使用场景。因此,开发一种允许网络运营商在其主要网络上连接Wi-Fi服务的系统成为一个关键问题。其中包括解决最优和动态资源分配技术的新范例。因此,为了综合考虑应用程序需求、可用资源和涉及的不同层,出现了诸如虚拟化和切片之类的机制来处理下一代无线通信的异构上下文。此外,还需要解决无线接入网(RAN)资源的分配问题。为此,open - ran考虑的是一个开放的环境,它依赖于虚拟化功能,并且大多数情况下与供应商无关。该技术将在无线通信中实现高数据速率,同时保持足够的服务质量(QoS)。本文通过对下一代无线通信的全面调查,突出了它们与超5G通信的集成,推进了目前的文献,这些文献主要是单独讨论这些主题。首先,我们介绍了Wi-Fi的发展,并解释了多年来制定的主要标准。其次,我们介绍了最新的Wi-Fi标准,Wi-Fi 6和Wi-Fi 7,与5G及更高版本进行了比较。最后,我们解释了与切片、虚拟化、RAN、open -RAN和开放研究挑战相关的概念。
{"title":"The Path Towards Virtualized Wireless Communications: A Survey and Research Challenges","authors":"Marco Silva, José Santos, Marília Curado","doi":"10.1007/s10922-023-09788-3","DOIUrl":"https://doi.org/10.1007/s10922-023-09788-3","url":null,"abstract":"<p>To keep up with the increasing number of connected devices in people’s daily lives, it is necessary to develop intelligent mechanisms that perform the entire network management, interconnecting Wi-Fi, and the emerging beyond Fifth-Generation (5G) communications. Hence, it is essential to consider multiple usage scenarios, while managing end devices’ limitations. As a result, developing a system that allows network operators to link Wi-Fi services on their main networks becomes a critical issue. These include a new paradigm that tackles optimal and dynamic resource allocation techniques. Thus, to consider in a combined way, the applications requirements, the resources available, and the different tiers involved, mechanisms such as virtualization and slicing have emerged to handle the heterogeneous context of the next-generation wireless communications. Moreover, the allocation of Radio Access Network (RAN) resources needs to be addressed. For this purpose, Open-RAN has in mind an open environment, which relies on virtualized functions and is mostly vendor agnostic. This technology will enable high data rates while maintaining adequate Quality of Service (QoS) in wireless communications. This paper advances current literature, which mainly discusses these themes individually, by providing a comprehensive survey in Next Generation Wireless Communications, highlighting their integration with beyond 5G Communications. First, we introduce the Wi-Fi evolution and explain the main standards developed over the years. Second, we present the most recent Wi-Fi standards, Wi-Fi 6 and 7, compared with 5G and beyond. Lastly, we explain the concepts related to slicing, virtualization, RAN, Open-RAN and the open research challenges.\u0000</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"43 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138543677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposal and Evaluation of GPU Offloading Parts Reconfiguration During Applications Operations for Environment Adaptation 环境适应应用运行中GPU卸载部件重构的建议与评价
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-28 DOI: 10.1007/s10922-023-09789-2
Yoji Yamato

In recent years, not only CPUs with few cores but also heterogeneous hardware such as GPUs, FPGAs, and multi-core CPUs are increasingly used in many applications. However, to fully utilize these, users need to have technical knowledge that covers hardware such as CUDA. To overcome this high technical barrier, we have proposed environment-adaptive software that enables high-performance operation by automatically converting application code written for normal CPUs by engineers in accordance with the deployed environment and by setting appropriate amounts of resources. So far, we have also verified the elemental technologies that automatically offload to GPU and FPGA before the start of operation. Until now, we only considered conversions and settings before the start of operation. In this paper, we verify that the logic is reconfigured in accordance with the usage characteristics during operation. Especially for GPU logic, there is no example of reconfiguration during operation, so the proposed method can be expected to have a great impact on clouds or similar businesses. We propose a GPU reconfiguration method during operation and find that the application running on the GPU is reconfigured to other offload loops or other offload applications in accordance with the current usage trends. Through a reconfiguration experiment, performance improvement and break time are measured, and the effectiveness of the method is demonstrated.

近年来,除了多核cpu外,gpu、fpga、多核cpu等异构硬件的应用也越来越广泛。然而,为了充分利用这些,用户需要具备涵盖硬件(如CUDA)的技术知识。为了克服这一高技术障碍,我们提出了环境自适应软件,通过根据部署环境自动转换工程师为普通cpu编写的应用程序代码,并通过设置适当数量的资源,实现高性能操作。到目前为止,我们还验证了在开始运行之前自动卸载到GPU和FPGA的基本技术。到目前为止,我们只考虑了操作开始前的转换和设置。在本文中,我们验证了逻辑在运行过程中是根据使用特性重新配置的。特别是对于GPU逻辑,在运行过程中没有重新配置的例子,因此所提出的方法可以预期对云或类似业务产生很大的影响。我们在运行过程中提出了一种GPU重新配置的方法,发现在GPU上运行的应用程序根据当前的使用趋势被重新配置到其他卸载循环或其他卸载应用程序。通过重构实验,测量了该方法的性能改进和中断时间,验证了该方法的有效性。
{"title":"Proposal and Evaluation of GPU Offloading Parts Reconfiguration During Applications Operations for Environment Adaptation","authors":"Yoji Yamato","doi":"10.1007/s10922-023-09789-2","DOIUrl":"https://doi.org/10.1007/s10922-023-09789-2","url":null,"abstract":"<p>In recent years, not only CPUs with few cores but also heterogeneous hardware such as GPUs, FPGAs, and multi-core CPUs are increasingly used in many applications. However, to fully utilize these, users need to have technical knowledge that covers hardware such as CUDA. To overcome this high technical barrier, we have proposed environment-adaptive software that enables high-performance operation by automatically converting application code written for normal CPUs by engineers in accordance with the deployed environment and by setting appropriate amounts of resources. So far, we have also verified the elemental technologies that automatically offload to GPU and FPGA before the start of operation. Until now, we only considered conversions and settings before the start of operation. In this paper, we verify that the logic is reconfigured in accordance with the usage characteristics during operation. Especially for GPU logic, there is no example of reconfiguration during operation, so the proposed method can be expected to have a great impact on clouds or similar businesses. We propose a GPU reconfiguration method during operation and find that the application running on the GPU is reconfigured to other offload loops or other offload applications in accordance with the current usage trends. Through a reconfiguration experiment, performance improvement and break time are measured, and the effectiveness of the method is demonstrated.\u0000</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"27 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138518567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Genetic Algorithm for Multi-hop VANET Clustering Based on Coalitional Game 基于联盟博弈的多跳VANET聚类遗传算法
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-23 DOI: 10.1007/s10922-023-09787-4
Siwapon Charoenchai, Peerapon Siripongwutikorn

Various applications of intelligent transport systems require road traffic data that can be collected from vehicles and sent over a vehicular ad hoc network (VANET). Due to rapid mobility and limited channel capacity in a VANET, where vehicles must compete to access the roadside units (RSUs) to report their data, clustering is used to create a group of vehicles to collect, aggregate, and transfer data to RSUs acting as sink nodes. Unlike prior works that mostly focus on cluster head selection for prolonging cluster lifetime or maximizing throughput, we applied the coalitional game model to create a multi-hop cluster with the largest possible coverage area for a given transmission delay time constraint to economize the number of RSUs. The coalitional game models the profit and cost of nodes as the utility, which is a weighted function of the coverage area, amount of cluster’s members, relative velocities, distances among nodes, and transmission delay toward the sink nodes. Due to the problem complexity, the genetic algorithm is developed to obtain the model solution. The simulation results reveal that the solution quickly converges within a few generations, where the most suitable structure attains the maximum summation utility from all nodes in the coalition. Additionally, the GA-based solution approach outperforms the brute-force approach in terms of the problem scale, and the coalitional game model yields higher coverage areas compared to those obtained from the non-cooperation model.

智能交通系统的各种应用需要道路交通数据,这些数据可以从车辆上收集并通过车辆特设网络(VANET)发送。由于VANET中的快速移动性和有限的通道容量,车辆必须竞争访问路边单元(rsu)以报告其数据,因此使用聚类来创建一组车辆来收集、聚合并将数据传输到充当汇聚节点的rsu。与以往的工作不同,我们主要关注于簇头选择以延长簇生命周期或最大化吞吐量,我们应用联合博弈模型来创建一个在给定传输延迟时间约束下具有最大可能覆盖区域的多跳簇,以节省rsu的数量。联盟博弈将节点的收益和成本作为效用模型,该效用是覆盖面积、集群成员数量、相对速度、节点间距离和向汇聚节点的传输延迟的加权函数。由于问题的复杂性,采用遗传算法求解模型。仿真结果表明,该算法能够在几代内快速收敛,其中最合适的结构使联盟中所有节点的总和效用最大。此外,基于遗传算法的解决方法在问题规模方面优于暴力破解方法,并且联合博弈模型比非合作模型获得更高的覆盖区域。
{"title":"Genetic Algorithm for Multi-hop VANET Clustering Based on Coalitional Game","authors":"Siwapon Charoenchai, Peerapon Siripongwutikorn","doi":"10.1007/s10922-023-09787-4","DOIUrl":"https://doi.org/10.1007/s10922-023-09787-4","url":null,"abstract":"<p>Various applications of intelligent transport systems require road traffic data that can be collected from vehicles and sent over a vehicular ad hoc network (VANET). Due to rapid mobility and limited channel capacity in a VANET, where vehicles must compete to access the roadside units (RSUs) to report their data, clustering is used to create a group of vehicles to collect, aggregate, and transfer data to RSUs acting as sink nodes. Unlike prior works that mostly focus on cluster head selection for prolonging cluster lifetime or maximizing throughput, we applied the coalitional game model to create a multi-hop cluster with the largest possible coverage area for a given transmission delay time constraint to economize the number of RSUs. The coalitional game models the profit and cost of nodes as the utility, which is a weighted function of the coverage area, amount of cluster’s members, relative velocities, distances among nodes, and transmission delay toward the sink nodes. Due to the problem complexity, the genetic algorithm is developed to obtain the model solution. The simulation results reveal that the solution quickly converges within a few generations, where the most suitable structure attains the maximum summation utility from all nodes in the coalition. Additionally, the GA-based solution approach outperforms the brute-force approach in terms of the problem scale, and the coalitional game model yields higher coverage areas compared to those obtained from the non-cooperation model.\u0000</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"3 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138518560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Link State Estimator for VANETs Using Neural Networks 基于神经网络的vanet链路状态估计
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-23 DOI: 10.1007/s10922-023-09786-5
Hamida Ikhlef, Soumia Bourebia, Ali Melit

In Vehicular Ad-hoc NETworks (VANETs), it is important to consider the quality of the path used to forward data packets. Because of the fluctuating conditions of VANETs, stringent requirements have been imposed on routing protocols and thus complicating the entire process of packet delivery. To determine which path is the best, a routing protocol relies on a path assessment mechanism. In this paper, the problem of link quality estimation in VANET networks is addressed. Based on the information gathered from the packet decoding errors at the physical layer, a novel link quality estimator is proposed. The proposed link quality estimator named LSENN for Link State estimation based on Neural Networks, has been tested under realistic physical layer and mobility models for reactivity, accuracy and stability evaluation.

在车辆自组织网络(vanet)中,考虑用于转发数据包的路径的质量是很重要的。由于vanet的条件波动,对路由协议提出了严格的要求,从而使整个分组传递过程复杂化。为了确定哪条路径是最好的,路由协议依赖于路径评估机制。本文研究了VANET网络中链路质量的估计问题。基于物理层的分组解码错误信息,提出了一种新的链路质量估计方法。提出的基于神经网络的链路状态估计方法LSENN,已在现实物理层和移动模型下进行了反应性、准确性和稳定性评估。
{"title":"Link State Estimator for VANETs Using Neural Networks","authors":"Hamida Ikhlef, Soumia Bourebia, Ali Melit","doi":"10.1007/s10922-023-09786-5","DOIUrl":"https://doi.org/10.1007/s10922-023-09786-5","url":null,"abstract":"<p>In Vehicular Ad-hoc NETworks (VANETs), it is important to consider the quality of the path used to forward data packets. Because of the fluctuating conditions of VANETs, stringent requirements have been imposed on routing protocols and thus complicating the entire process of packet delivery. To determine which path is the best, a routing protocol relies on a path assessment mechanism. In this paper, the problem of link quality estimation in VANET networks is addressed. Based on the information gathered from the packet decoding errors at the physical layer, a novel link quality estimator is proposed. The proposed link quality estimator named LSENN for Link State estimation based on Neural Networks, has been tested under realistic physical layer and mobility models for reactivity, accuracy and stability evaluation.\u0000</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"181 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138518566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites 基于cnn的SIA截图方法视觉识别钓鱼网站
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-21 DOI: 10.1007/s10922-023-09784-7
Dong-Jie Liu, Jong-Hyouk Lee

Phishing evolves rapidly nowadays, causing much damage to finance, brand reputation, and privacy. Various phishing detection methods have been proposed along with the rise of phishing, but there are still research issues. Phishing websites mainly steal users’ information through visual deception and deep learning methods have been proved very effective in computer vision applications but there is a lack in the research on visual analysis using deep learning algorithms. Moreover, most research use balanced datasets, which is not the case in a real Web environment. Therefore, this paper proposes a security indicator area (SIA) which contains most security indicators that are designed to help users identify phishing sites. The proposed method then takes screenshots of SIA and uses a convolutional neural network (CNN) as a classifier. To prove the efficiency of the proposed method, this paper carries out several comparative experiments on an unbalanced dataset with much fewer phishing sites, which increases detection difficulty but also makes the detection closer to reality. The results show that the proposed method achieves the highest F1-score among the compared methods, while providing advantages on detection efficiency and data expansibility in phishing detection.

如今,网络钓鱼发展迅速,对财务、品牌声誉和隐私造成了很大的损害。随着网络钓鱼的兴起,各种网络钓鱼检测方法被提出,但仍存在研究问题。网络钓鱼网站主要通过视觉欺骗窃取用户信息,深度学习方法在计算机视觉应用中已经被证明是非常有效的,但在使用深度学习算法进行视觉分析方面的研究还很缺乏。此外,大多数研究使用平衡数据集,而在真实的Web环境中并非如此。因此,本文提出了一个包含大多数安全指标的安全指标区(SIA),旨在帮助用户识别网络钓鱼网站。然后,提出的方法截取SIA的屏幕截图,并使用卷积神经网络(CNN)作为分类器。为了证明所提方法的有效性,本文在一个钓鱼站点较少的非平衡数据集上进行了多次对比实验,增加了检测难度,但也使检测更接近现实。结果表明,该方法在检测效率和数据可扩展性方面具有优势,在比较方法中f1得分最高。
{"title":"A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites","authors":"Dong-Jie Liu, Jong-Hyouk Lee","doi":"10.1007/s10922-023-09784-7","DOIUrl":"https://doi.org/10.1007/s10922-023-09784-7","url":null,"abstract":"<p>Phishing evolves rapidly nowadays, causing much damage to finance, brand reputation, and privacy. Various phishing detection methods have been proposed along with the rise of phishing, but there are still research issues. Phishing websites mainly steal users’ information through visual deception and deep learning methods have been proved very effective in computer vision applications but there is a lack in the research on visual analysis using deep learning algorithms. Moreover, most research use balanced datasets, which is not the case in a real Web environment. Therefore, this paper proposes a security indicator area (SIA) which contains most security indicators that are designed to help users identify phishing sites. The proposed method then takes screenshots of SIA and uses a convolutional neural network (CNN) as a classifier. To prove the efficiency of the proposed method, this paper carries out several comparative experiments on an unbalanced dataset with much fewer phishing sites, which increases detection difficulty but also makes the detection closer to reality. The results show that the proposed method achieves the highest F1-score among the compared methods, while providing advantages on detection efficiency and data expansibility in phishing detection.\u0000</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"3 ","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138518568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Light Reflection-Random Walk for Smart Sensors Relocation 一种用于智能传感器重新定位的光反射随机漫步方法
3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-08 DOI: 10.1007/s10922-023-09780-x
Nadia Belguerche, Samir Brahim Belhaouari, Noureddine Lasla, Mahfoud Benchaïba
{"title":"A Novel Light Reflection-Random Walk for Smart Sensors Relocation","authors":"Nadia Belguerche, Samir Brahim Belhaouari, Noureddine Lasla, Mahfoud Benchaïba","doi":"10.1007/s10922-023-09780-x","DOIUrl":"https://doi.org/10.1007/s10922-023-09780-x","url":null,"abstract":"","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"101 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135342232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices 基于p4的数据平面设备机器学习模型对抗性攻击缓解
3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-01 DOI: 10.1007/s10922-023-09777-6
Sankepally Sainath Reddy, Kosaraju Nishoak, J. L. Shreya, Yennam Vishwambhar Reddy, U. Venkanna
{"title":"A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices","authors":"Sankepally Sainath Reddy, Kosaraju Nishoak, J. L. Shreya, Yennam Vishwambhar Reddy, U. Venkanna","doi":"10.1007/s10922-023-09777-6","DOIUrl":"https://doi.org/10.1007/s10922-023-09777-6","url":null,"abstract":"","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"194 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135321619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BoostSec: Adaptive Attack Detection for Vehicular Networks BoostSec:车辆网络自适应攻击检测
3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-01 DOI: 10.1007/s10922-023-09781-w
Marwa A. Elsayed, Nur Zincir-Heywood
{"title":"BoostSec: Adaptive Attack Detection for Vehicular Networks","authors":"Marwa A. Elsayed, Nur Zincir-Heywood","doi":"10.1007/s10922-023-09781-w","DOIUrl":"https://doi.org/10.1007/s10922-023-09781-w","url":null,"abstract":"","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"253 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135320565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Group Teaching Optimization-Based Approach for Energy and QoS-Aware Internet of Things Services Composition 基于群组教学优化的能源与qos感知物联网服务组合方法
3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-28 DOI: 10.1007/s10922-023-09779-4
Salma Hameche, Mohamed Essaid Khanouche, Abdelghani Chibani, Abdelkamel Tari
{"title":"A Group Teaching Optimization-Based Approach for Energy and QoS-Aware Internet of Things Services Composition","authors":"Salma Hameche, Mohamed Essaid Khanouche, Abdelghani Chibani, Abdelkamel Tari","doi":"10.1007/s10922-023-09779-4","DOIUrl":"https://doi.org/10.1007/s10922-023-09779-4","url":null,"abstract":"","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"4 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136160011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Network and Systems Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1