Pub Date : 2023-12-07DOI: 10.1007/s10922-023-09785-6
Mohammad Almseidin, Jamil Al-Sawwa, Mouhammd Alkasassbeh, Maen Alzubi, Khaled Alrfou
The rapid growth of Artificial Intelligence (AI) algorithms has created the opportunity to solve complex problems such as Internet of Things (IoT) botnet attacks. The severity of IoT botnet attacks is a critical challenge for improving the smart IoT environment. Therefore, there is an urgent need to design and implement an efficient detection model to deal with various IoT bot attacks and simultaneously handle issues related to the massive feature space. This paper introduces a wrapper feature selection technique by adapting the Artificial Rabbit Optimization (ARO) algorithm and the Decision Tree (DT) algorithm to detect various types of IoT botnet attacks. During the design of the suggested DT-ARO model, the N-BaIoT datasets were used as a testbed environment. The feature space optimization step was carried out using the ARO algorithm to select only the high-priority features for detecting the IoT botnet attacks. The binary vector technique was used to distinguish the optimal features. The detection engine was performed using the DT algorithm. The conducted experiments have demonstrated the ability of the suggested DT-ARO model to detect various types of IoT botnet attacks, where the accuracy rate was 99.89%. Meanwhile, effectively reducing the feature’s space. In addition, the accomplished results were compared with the latest typical approaches. The DT-ARO model was found to be competitive with these methods and even outperformed them in reducing the feature space.
{"title":"DT-ARO: Decision Tree-Based Artificial Rabbits Optimization to Mitigate IoT Botnet Exploitation","authors":"Mohammad Almseidin, Jamil Al-Sawwa, Mouhammd Alkasassbeh, Maen Alzubi, Khaled Alrfou","doi":"10.1007/s10922-023-09785-6","DOIUrl":"https://doi.org/10.1007/s10922-023-09785-6","url":null,"abstract":"<p>The rapid growth of Artificial Intelligence (AI) algorithms has created the opportunity to solve complex problems such as Internet of Things (IoT) botnet attacks. The severity of IoT botnet attacks is a critical challenge for improving the smart IoT environment. Therefore, there is an urgent need to design and implement an efficient detection model to deal with various IoT bot attacks and simultaneously handle issues related to the massive feature space. This paper introduces a wrapper feature selection technique by adapting the Artificial Rabbit Optimization (ARO) algorithm and the Decision Tree (DT) algorithm to detect various types of IoT botnet attacks. During the design of the suggested DT-ARO model, the N-BaIoT datasets were used as a testbed environment. The feature space optimization step was carried out using the ARO algorithm to select only the high-priority features for detecting the IoT botnet attacks. The binary vector technique was used to distinguish the optimal features. The detection engine was performed using the DT algorithm. The conducted experiments have demonstrated the ability of the suggested DT-ARO model to detect various types of IoT botnet attacks, where the accuracy rate was 99.89%. Meanwhile, effectively reducing the feature’s space. In addition, the accomplished results were compared with the latest typical approaches. The DT-ARO model was found to be competitive with these methods and even outperformed them in reducing the feature space. </p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"268 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138565880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-30DOI: 10.1007/s10922-023-09788-3
Marco Silva, José Santos, Marília Curado
To keep up with the increasing number of connected devices in people’s daily lives, it is necessary to develop intelligent mechanisms that perform the entire network management, interconnecting Wi-Fi, and the emerging beyond Fifth-Generation (5G) communications. Hence, it is essential to consider multiple usage scenarios, while managing end devices’ limitations. As a result, developing a system that allows network operators to link Wi-Fi services on their main networks becomes a critical issue. These include a new paradigm that tackles optimal and dynamic resource allocation techniques. Thus, to consider in a combined way, the applications requirements, the resources available, and the different tiers involved, mechanisms such as virtualization and slicing have emerged to handle the heterogeneous context of the next-generation wireless communications. Moreover, the allocation of Radio Access Network (RAN) resources needs to be addressed. For this purpose, Open-RAN has in mind an open environment, which relies on virtualized functions and is mostly vendor agnostic. This technology will enable high data rates while maintaining adequate Quality of Service (QoS) in wireless communications. This paper advances current literature, which mainly discusses these themes individually, by providing a comprehensive survey in Next Generation Wireless Communications, highlighting their integration with beyond 5G Communications. First, we introduce the Wi-Fi evolution and explain the main standards developed over the years. Second, we present the most recent Wi-Fi standards, Wi-Fi 6 and 7, compared with 5G and beyond. Lastly, we explain the concepts related to slicing, virtualization, RAN, Open-RAN and the open research challenges.
{"title":"The Path Towards Virtualized Wireless Communications: A Survey and Research Challenges","authors":"Marco Silva, José Santos, Marília Curado","doi":"10.1007/s10922-023-09788-3","DOIUrl":"https://doi.org/10.1007/s10922-023-09788-3","url":null,"abstract":"<p>To keep up with the increasing number of connected devices in people’s daily lives, it is necessary to develop intelligent mechanisms that perform the entire network management, interconnecting Wi-Fi, and the emerging beyond Fifth-Generation (5G) communications. Hence, it is essential to consider multiple usage scenarios, while managing end devices’ limitations. As a result, developing a system that allows network operators to link Wi-Fi services on their main networks becomes a critical issue. These include a new paradigm that tackles optimal and dynamic resource allocation techniques. Thus, to consider in a combined way, the applications requirements, the resources available, and the different tiers involved, mechanisms such as virtualization and slicing have emerged to handle the heterogeneous context of the next-generation wireless communications. Moreover, the allocation of Radio Access Network (RAN) resources needs to be addressed. For this purpose, Open-RAN has in mind an open environment, which relies on virtualized functions and is mostly vendor agnostic. This technology will enable high data rates while maintaining adequate Quality of Service (QoS) in wireless communications. This paper advances current literature, which mainly discusses these themes individually, by providing a comprehensive survey in Next Generation Wireless Communications, highlighting their integration with beyond 5G Communications. First, we introduce the Wi-Fi evolution and explain the main standards developed over the years. Second, we present the most recent Wi-Fi standards, Wi-Fi 6 and 7, compared with 5G and beyond. Lastly, we explain the concepts related to slicing, virtualization, RAN, Open-RAN and the open research challenges.\u0000</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"43 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138543677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-28DOI: 10.1007/s10922-023-09789-2
Yoji Yamato
In recent years, not only CPUs with few cores but also heterogeneous hardware such as GPUs, FPGAs, and multi-core CPUs are increasingly used in many applications. However, to fully utilize these, users need to have technical knowledge that covers hardware such as CUDA. To overcome this high technical barrier, we have proposed environment-adaptive software that enables high-performance operation by automatically converting application code written for normal CPUs by engineers in accordance with the deployed environment and by setting appropriate amounts of resources. So far, we have also verified the elemental technologies that automatically offload to GPU and FPGA before the start of operation. Until now, we only considered conversions and settings before the start of operation. In this paper, we verify that the logic is reconfigured in accordance with the usage characteristics during operation. Especially for GPU logic, there is no example of reconfiguration during operation, so the proposed method can be expected to have a great impact on clouds or similar businesses. We propose a GPU reconfiguration method during operation and find that the application running on the GPU is reconfigured to other offload loops or other offload applications in accordance with the current usage trends. Through a reconfiguration experiment, performance improvement and break time are measured, and the effectiveness of the method is demonstrated.
{"title":"Proposal and Evaluation of GPU Offloading Parts Reconfiguration During Applications Operations for Environment Adaptation","authors":"Yoji Yamato","doi":"10.1007/s10922-023-09789-2","DOIUrl":"https://doi.org/10.1007/s10922-023-09789-2","url":null,"abstract":"<p>In recent years, not only CPUs with few cores but also heterogeneous hardware such as GPUs, FPGAs, and multi-core CPUs are increasingly used in many applications. However, to fully utilize these, users need to have technical knowledge that covers hardware such as CUDA. To overcome this high technical barrier, we have proposed environment-adaptive software that enables high-performance operation by automatically converting application code written for normal CPUs by engineers in accordance with the deployed environment and by setting appropriate amounts of resources. So far, we have also verified the elemental technologies that automatically offload to GPU and FPGA before the start of operation. Until now, we only considered conversions and settings before the start of operation. In this paper, we verify that the logic is reconfigured in accordance with the usage characteristics during operation. Especially for GPU logic, there is no example of reconfiguration during operation, so the proposed method can be expected to have a great impact on clouds or similar businesses. We propose a GPU reconfiguration method during operation and find that the application running on the GPU is reconfigured to other offload loops or other offload applications in accordance with the current usage trends. Through a reconfiguration experiment, performance improvement and break time are measured, and the effectiveness of the method is demonstrated.\u0000</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"27 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138518567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-23DOI: 10.1007/s10922-023-09787-4
Siwapon Charoenchai, Peerapon Siripongwutikorn
Various applications of intelligent transport systems require road traffic data that can be collected from vehicles and sent over a vehicular ad hoc network (VANET). Due to rapid mobility and limited channel capacity in a VANET, where vehicles must compete to access the roadside units (RSUs) to report their data, clustering is used to create a group of vehicles to collect, aggregate, and transfer data to RSUs acting as sink nodes. Unlike prior works that mostly focus on cluster head selection for prolonging cluster lifetime or maximizing throughput, we applied the coalitional game model to create a multi-hop cluster with the largest possible coverage area for a given transmission delay time constraint to economize the number of RSUs. The coalitional game models the profit and cost of nodes as the utility, which is a weighted function of the coverage area, amount of cluster’s members, relative velocities, distances among nodes, and transmission delay toward the sink nodes. Due to the problem complexity, the genetic algorithm is developed to obtain the model solution. The simulation results reveal that the solution quickly converges within a few generations, where the most suitable structure attains the maximum summation utility from all nodes in the coalition. Additionally, the GA-based solution approach outperforms the brute-force approach in terms of the problem scale, and the coalitional game model yields higher coverage areas compared to those obtained from the non-cooperation model.
{"title":"Genetic Algorithm for Multi-hop VANET Clustering Based on Coalitional Game","authors":"Siwapon Charoenchai, Peerapon Siripongwutikorn","doi":"10.1007/s10922-023-09787-4","DOIUrl":"https://doi.org/10.1007/s10922-023-09787-4","url":null,"abstract":"<p>Various applications of intelligent transport systems require road traffic data that can be collected from vehicles and sent over a vehicular ad hoc network (VANET). Due to rapid mobility and limited channel capacity in a VANET, where vehicles must compete to access the roadside units (RSUs) to report their data, clustering is used to create a group of vehicles to collect, aggregate, and transfer data to RSUs acting as sink nodes. Unlike prior works that mostly focus on cluster head selection for prolonging cluster lifetime or maximizing throughput, we applied the coalitional game model to create a multi-hop cluster with the largest possible coverage area for a given transmission delay time constraint to economize the number of RSUs. The coalitional game models the profit and cost of nodes as the utility, which is a weighted function of the coverage area, amount of cluster’s members, relative velocities, distances among nodes, and transmission delay toward the sink nodes. Due to the problem complexity, the genetic algorithm is developed to obtain the model solution. The simulation results reveal that the solution quickly converges within a few generations, where the most suitable structure attains the maximum summation utility from all nodes in the coalition. Additionally, the GA-based solution approach outperforms the brute-force approach in terms of the problem scale, and the coalitional game model yields higher coverage areas compared to those obtained from the non-cooperation model.\u0000</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"3 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138518560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-23DOI: 10.1007/s10922-023-09786-5
Hamida Ikhlef, Soumia Bourebia, Ali Melit
In Vehicular Ad-hoc NETworks (VANETs), it is important to consider the quality of the path used to forward data packets. Because of the fluctuating conditions of VANETs, stringent requirements have been imposed on routing protocols and thus complicating the entire process of packet delivery. To determine which path is the best, a routing protocol relies on a path assessment mechanism. In this paper, the problem of link quality estimation in VANET networks is addressed. Based on the information gathered from the packet decoding errors at the physical layer, a novel link quality estimator is proposed. The proposed link quality estimator named LSENN for Link State estimation based on Neural Networks, has been tested under realistic physical layer and mobility models for reactivity, accuracy and stability evaluation.
{"title":"Link State Estimator for VANETs Using Neural Networks","authors":"Hamida Ikhlef, Soumia Bourebia, Ali Melit","doi":"10.1007/s10922-023-09786-5","DOIUrl":"https://doi.org/10.1007/s10922-023-09786-5","url":null,"abstract":"<p>In Vehicular Ad-hoc NETworks (VANETs), it is important to consider the quality of the path used to forward data packets. Because of the fluctuating conditions of VANETs, stringent requirements have been imposed on routing protocols and thus complicating the entire process of packet delivery. To determine which path is the best, a routing protocol relies on a path assessment mechanism. In this paper, the problem of link quality estimation in VANET networks is addressed. Based on the information gathered from the packet decoding errors at the physical layer, a novel link quality estimator is proposed. The proposed link quality estimator named LSENN for Link State estimation based on Neural Networks, has been tested under realistic physical layer and mobility models for reactivity, accuracy and stability evaluation.\u0000</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"181 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138518566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-21DOI: 10.1007/s10922-023-09784-7
Dong-Jie Liu, Jong-Hyouk Lee
Phishing evolves rapidly nowadays, causing much damage to finance, brand reputation, and privacy. Various phishing detection methods have been proposed along with the rise of phishing, but there are still research issues. Phishing websites mainly steal users’ information through visual deception and deep learning methods have been proved very effective in computer vision applications but there is a lack in the research on visual analysis using deep learning algorithms. Moreover, most research use balanced datasets, which is not the case in a real Web environment. Therefore, this paper proposes a security indicator area (SIA) which contains most security indicators that are designed to help users identify phishing sites. The proposed method then takes screenshots of SIA and uses a convolutional neural network (CNN) as a classifier. To prove the efficiency of the proposed method, this paper carries out several comparative experiments on an unbalanced dataset with much fewer phishing sites, which increases detection difficulty but also makes the detection closer to reality. The results show that the proposed method achieves the highest F1-score among the compared methods, while providing advantages on detection efficiency and data expansibility in phishing detection.
{"title":"A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites","authors":"Dong-Jie Liu, Jong-Hyouk Lee","doi":"10.1007/s10922-023-09784-7","DOIUrl":"https://doi.org/10.1007/s10922-023-09784-7","url":null,"abstract":"<p>Phishing evolves rapidly nowadays, causing much damage to finance, brand reputation, and privacy. Various phishing detection methods have been proposed along with the rise of phishing, but there are still research issues. Phishing websites mainly steal users’ information through visual deception and deep learning methods have been proved very effective in computer vision applications but there is a lack in the research on visual analysis using deep learning algorithms. Moreover, most research use balanced datasets, which is not the case in a real Web environment. Therefore, this paper proposes a security indicator area (SIA) which contains most security indicators that are designed to help users identify phishing sites. The proposed method then takes screenshots of SIA and uses a convolutional neural network (CNN) as a classifier. To prove the efficiency of the proposed method, this paper carries out several comparative experiments on an unbalanced dataset with much fewer phishing sites, which increases detection difficulty but also makes the detection closer to reality. The results show that the proposed method achieves the highest F1-score among the compared methods, while providing advantages on detection efficiency and data expansibility in phishing detection.\u0000</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"3 ","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138518568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Light Reflection-Random Walk for Smart Sensors Relocation","authors":"Nadia Belguerche, Samir Brahim Belhaouari, Noureddine Lasla, Mahfoud Benchaïba","doi":"10.1007/s10922-023-09780-x","DOIUrl":"https://doi.org/10.1007/s10922-023-09780-x","url":null,"abstract":"","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"101 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135342232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-01DOI: 10.1007/s10922-023-09777-6
Sankepally Sainath Reddy, Kosaraju Nishoak, J. L. Shreya, Yennam Vishwambhar Reddy, U. Venkanna
{"title":"A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices","authors":"Sankepally Sainath Reddy, Kosaraju Nishoak, J. L. Shreya, Yennam Vishwambhar Reddy, U. Venkanna","doi":"10.1007/s10922-023-09777-6","DOIUrl":"https://doi.org/10.1007/s10922-023-09777-6","url":null,"abstract":"","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"194 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135321619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-01DOI: 10.1007/s10922-023-09781-w
Marwa A. Elsayed, Nur Zincir-Heywood
{"title":"BoostSec: Adaptive Attack Detection for Vehicular Networks","authors":"Marwa A. Elsayed, Nur Zincir-Heywood","doi":"10.1007/s10922-023-09781-w","DOIUrl":"https://doi.org/10.1007/s10922-023-09781-w","url":null,"abstract":"","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"253 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135320565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Group Teaching Optimization-Based Approach for Energy and QoS-Aware Internet of Things Services Composition","authors":"Salma Hameche, Mohamed Essaid Khanouche, Abdelghani Chibani, Abdelkamel Tari","doi":"10.1007/s10922-023-09779-4","DOIUrl":"https://doi.org/10.1007/s10922-023-09779-4","url":null,"abstract":"","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"4 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136160011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}