首页 > 最新文献

Journal of Network and Computer Applications最新文献

英文 中文
PHIGrader: Evaluating the effectiveness of Manifest file components in Android malware detection using Multi Criteria Decision Making techniques PHIGrader:使用多标准决策技术评估 Manifest 文件组件在安卓恶意软件检测中的有效性
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-06 DOI: 10.1016/j.jnca.2024.104021
Yash Sharma , Anshul Arora

The popularity of the Android operating system has itself become a reason for privacy concerns. To deal with such malware threats, researchers have proposed various detection approaches using static and dynamic features. Static analysis approaches are the most convenient for practical detection. However, several patterns of feature usage were found to be similar in the normal and malware datasets. Such high similarity in both datasets’ feature patterns motivates us to rank and select only the distinguishing set of features. Hence, in this study, we present a novel Android malware detection system, termed as PHIGrader for ranking and evaluating the efficiency of the three most commonly used static features, namely permissions, intents, and hardware components, when used for Android malware detection. To meet our goals, we individually rank the three feature types using frequency-based Multi-Criteria Decision Making (MCDM) techniques, namely TOPSIS and EDAS. Then, the system applies a novel detection algorithm to the rankings involving machine learning and deep learning classifiers to present the best set of features and feature type with higher detection accuracy as an output. The experimental results highlight that our proposed approach can effectively detect Android malware with 99.10% detection accuracy, achieved with the top 46 intents when ranked using TOPSIS, which is better than permissions, hardware components, or even the case where other popular MCDM techniques are used. Furthermore, our experiments demonstrate that the proposed system with frequency-based MCDM rankings is better than other statistical tests such as mutual information, Pearson correlation coefficient, and t-test. In addition, our proposed model outperforms various popularly used feature ranking methods such as Chi-square, Principal Component Analysis (PCA), Entropy-based Category Coverage Difference (ECCD), and other state-of-the-art Android malware detection techniques in terms of detection accuracy.

安卓操作系统的普及本身就成为隐私问题的一个原因。为应对此类恶意软件威胁,研究人员提出了各种使用静态和动态特征的检测方法。静态分析方法最便于实际检测。然而,在正常数据集和恶意软件数据集中,有几种特征使用模式被发现是相似的。这两个数据集的特征模式相似度如此之高,促使我们只对有区别的特征集进行排序和选择。因此,在本研究中,我们提出了一种新颖的安卓恶意软件检测系统,称为 PHIGrader,用于排序和评估安卓恶意软件检测中最常用的三种静态特征(即权限、意图和硬件组件)的效率。为实现目标,我们使用基于频率的多标准决策(MCDM)技术(即 TOPSIS 和 EDAS)对这三种特征类型进行单独排序。然后,系统将一种新颖的检测算法应用到涉及机器学习和深度学习分类器的排序中,从而以更高的检测准确率作为输出,呈现出最佳的特征集和特征类型。实验结果表明,我们提出的方法可以有效检测安卓恶意软件,检测准确率达到 99.10%,在使用 TOPSIS 对前 46 个意图进行排序时,检测准确率达到了 99.10%,优于权限、硬件组件,甚至优于使用其他流行的 MCDM 技术的情况。此外,我们的实验证明,采用基于频率的 MCDM 排名的拟议系统优于互信息、皮尔逊相关系数和 t 检验等其他统计检验方法。此外,就检测准确率而言,我们提出的模型优于各种常用的特征排序方法,如 Chi-square、主成分分析(PCA)、基于熵的类别覆盖率差异(ECCD)以及其他最先进的安卓恶意软件检测技术。
{"title":"PHIGrader: Evaluating the effectiveness of Manifest file components in Android malware detection using Multi Criteria Decision Making techniques","authors":"Yash Sharma ,&nbsp;Anshul Arora","doi":"10.1016/j.jnca.2024.104021","DOIUrl":"10.1016/j.jnca.2024.104021","url":null,"abstract":"<div><p>The popularity of the Android operating system has itself become a reason for privacy concerns. To deal with such malware threats, researchers have proposed various detection approaches using static and dynamic features. Static analysis approaches are the most convenient for practical detection. However, several patterns of feature usage were found to be similar in the normal and malware datasets. Such high similarity in both datasets’ feature patterns motivates us to rank and select only the distinguishing set of features. Hence, in this study, we present a novel Android malware detection system, termed as <em>PHIGrader</em> for ranking and evaluating the efficiency of the three most commonly used static features, namely permissions, intents, and hardware components, when used for Android malware detection. To meet our goals, we individually rank the three feature types using frequency-based Multi-Criteria Decision Making (MCDM) techniques, namely TOPSIS and EDAS. Then, the system applies a novel detection algorithm to the rankings involving machine learning and deep learning classifiers to present the best set of features and feature type with higher detection accuracy as an output. The experimental results highlight that our proposed approach can effectively detect Android malware with 99.10% detection accuracy, achieved with the top 46 intents when ranked using TOPSIS, which is better than permissions, hardware components, or even the case where other popular MCDM techniques are used. Furthermore, our experiments demonstrate that the proposed system with frequency-based MCDM rankings is better than other statistical tests such as mutual information, Pearson correlation coefficient, and t-test. In addition, our proposed model outperforms various popularly used feature ranking methods such as Chi-square, Principal Component Analysis (PCA), Entropy-based Category Coverage Difference (ECCD), and other state-of-the-art Android malware detection techniques in terms of detection accuracy.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104021"},"PeriodicalIF":7.7,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142230792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Clone node detection in static wireless sensor networks: A hybrid approach 静态无线传感器网络中的克隆节点检测:一种混合方法
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-05 DOI: 10.1016/j.jnca.2024.104018
Muhammad Numan , Fazli Subhan , Mohd Nor Akmal Khalid , Wazir Zada Khan , Hiroyuki Iida

Wireless Sensor Networks (WSNs) security is a serious concern due to the lack of hardware protection on sensor nodes. One common attack on WSNs is the cloning attack, where an adversary captures legitimate nodes, creates multiple replicas, and reprograms them for malicious activities. Therefore, creating an efficient defense to mitigate this challenge is essential. Several witness node-based techniques have been developed to solve this issue, but they often suffer from higher communication and memory overheads or low detection accuracy, making them less effective. In response to the limitations of existing techniques, we propose a novel approach called Hybrid Random Walk assisted Zone-based (HRWZ) for clone node detection in static WSNs. The HRWZ method relies on the random selection of Zone-Leader (ZL) in WSNs to detect clones effectively while maintaining network lifespan. We compared HRWZ to known witness node-based techniques, namely Randomized Multicast (RM), Line Selected Multicast (LSM), Random Walk (RAWL) and Table-assisted RAndom WaLk (TRAWL), under different simulation settings. The simulation results confirmed the improved performance and reliability of the proposed HRWZ technique. Our approach reduces communication costs and provides an effective way of selecting ZL for high-probability clone node detection.

由于传感器节点缺乏硬件保护,无线传感器网络(WSN)的安全性成为一个严重问题。克隆攻击是对 WSN 的一种常见攻击,即敌方捕获合法节点,创建多个复制节点,并对其重新编程以进行恶意活动。因此,创建有效的防御措施来缓解这一挑战至关重要。为了解决这个问题,已经开发出了几种基于见证节点的技术,但这些技术往往存在通信和内存开销较大或检测精度较低的问题,因此效果不佳。针对现有技术的局限性,我们提出了一种在静态 WSN 中检测克隆节点的新方法,称为基于区域的混合随机漫步辅助法(HRWZ)。HRWZ 方法依赖于在 WSN 中随机选择 Zone-Leader (ZL),从而在保持网络寿命的同时有效检测克隆节点。在不同的仿真设置下,我们将 HRWZ 与已知的基于见证节点的技术(即随机多播(RM)、线路选择多播(LSM)、随机漫步(RAWL)和表辅助见证节点检测(TRAWL))进行了比较。仿真结果证实,拟议的 HRWZ 技术提高了性能和可靠性。我们的方法降低了通信成本,为高概率克隆节点检测提供了选择 ZL 的有效方法。
{"title":"Clone node detection in static wireless sensor networks: A hybrid approach","authors":"Muhammad Numan ,&nbsp;Fazli Subhan ,&nbsp;Mohd Nor Akmal Khalid ,&nbsp;Wazir Zada Khan ,&nbsp;Hiroyuki Iida","doi":"10.1016/j.jnca.2024.104018","DOIUrl":"10.1016/j.jnca.2024.104018","url":null,"abstract":"<div><p>Wireless Sensor Networks (WSNs) security is a serious concern due to the lack of hardware protection on sensor nodes. One common attack on WSNs is the cloning attack, where an adversary captures legitimate nodes, creates multiple replicas, and reprograms them for malicious activities. Therefore, creating an efficient defense to mitigate this challenge is essential. Several witness node-based techniques have been developed to solve this issue, but they often suffer from higher communication and memory overheads or low detection accuracy, making them less effective. In response to the limitations of existing techniques, we propose a novel approach called Hybrid Random Walk assisted Zone-based (HRWZ) for clone node detection in static WSNs. The HRWZ method relies on the random selection of Zone-Leader (<span><math><msub><mrow><mi>Z</mi></mrow><mrow><mi>L</mi></mrow></msub></math></span>) in WSNs to detect clones effectively while maintaining network lifespan. We compared HRWZ to known witness node-based techniques, namely Randomized Multicast (RM), Line Selected Multicast (LSM), Random Walk (RAWL) and Table-assisted RAndom WaLk (TRAWL), under different simulation settings. The simulation results confirmed the improved performance and reliability of the proposed HRWZ technique. Our approach reduces communication costs and provides an effective way of selecting <span><math><msub><mrow><mi>Z</mi></mrow><mrow><mi>L</mi></mrow></msub></math></span> for high-probability clone node detection.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104018"},"PeriodicalIF":7.7,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1084804524001954/pdfft?md5=a1d53d6c117165e079b5f3dfe62294f6&pid=1-s2.0-S1084804524001954-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142162850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient certificateless blockchain-enabled authentication scheme to secure producer mobility in named data networks 一种高效的无证书区块链认证方案,可确保命名数据网络中生产者的移动性
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-30 DOI: 10.1016/j.jnca.2024.104007
Cong Wang , Tong Zhou , Maode Ma , Yuwen Xiong , Xiankun Zhang , Chao Liu

Named Data Networking (NDN) aims to establish an efficient content delivery architecture. In NDN, secure and effective identity authentication schemes ensure secure communication between producers and routers. Currently, there is no feasible solution to perform identity authentication of mobile producers in NDNs. Identity authentication schemes in other networks are either weak in security or performance, such as privacy leakage, difficulty to establish cross-domain trust, and long handover delays, and are not fully adaptable to the security requirements of NDNs. Additionally, the mobility of producers was not fully considered in the initial design of NDNs. This paper first revises the structure of packets and routers to support the identity authentication and mobility of producers. On this basis, this paper proposes a secure and efficient certificateless ECC-based producer identity authentication scheme (CL-BPA), which includes initial authentication and re-authentication, aimed at achieving rapid switch authentication and integrating blockchain to solve single-point failure issues. Using the Canetti and Krawczyk (CK) adversarial model and informal security analysis, the proposed CL-BPA scheme is demonstrated to be resistant to anonymity attacks, identity forgery attacks, and man-in-the-middle attacks. The performance analysis demonstrates that the proposed CL-BPA scheme exhibits excellent capabilities in terms of computation delay, communication cost, smart contract execution time, average response delay, and throughput.

命名数据网络(NDN)旨在建立一个高效的内容传输架构。在 NDN 中,安全有效的身份验证方案可确保生产者与路由器之间的安全通信。目前,还没有可行的解决方案来对 NDN 中的移动生产者进行身份验证。其他网络中的身份验证方案要么在安全性方面比较薄弱,要么在性能方面比较薄弱,如隐私泄露、难以建立跨域信任、切换延迟长等,不能完全适应 NDN 的安全要求。此外,在最初设计 NDN 时,并没有充分考虑到生产者的移动性。本文首先修改了数据包和路由器的结构,以支持生产者的身份验证和移动性。在此基础上,本文提出了一种安全高效的基于 ECC 的生产者身份认证方案(CL-BPA),包括初始认证和再认证,旨在实现快速切换认证,并结合区块链解决单点故障问题。利用 Canetti 和 Krawczyk(CK)对抗模型和非正式安全分析,证明了所提出的 CL-BPA 方案能够抵御匿名攻击、身份伪造攻击和中间人攻击。性能分析表明,拟议的 CL-BPA 方案在计算延迟、通信成本、智能合约执行时间、平均响应延迟和吞吐量方面都表现出了卓越的能力。
{"title":"An efficient certificateless blockchain-enabled authentication scheme to secure producer mobility in named data networks","authors":"Cong Wang ,&nbsp;Tong Zhou ,&nbsp;Maode Ma ,&nbsp;Yuwen Xiong ,&nbsp;Xiankun Zhang ,&nbsp;Chao Liu","doi":"10.1016/j.jnca.2024.104007","DOIUrl":"10.1016/j.jnca.2024.104007","url":null,"abstract":"<div><p>Named Data Networking (NDN) aims to establish an efficient content delivery architecture. In NDN, secure and effective identity authentication schemes ensure secure communication between producers and routers. Currently, there is no feasible solution to perform identity authentication of mobile producers in NDNs. Identity authentication schemes in other networks are either weak in security or performance, such as privacy leakage, difficulty to establish cross-domain trust, and long handover delays, and are not fully adaptable to the security requirements of NDNs. Additionally, the mobility of producers was not fully considered in the initial design of NDNs. This paper first revises the structure of packets and routers to support the identity authentication and mobility of producers. On this basis, this paper proposes a secure and efficient certificateless ECC-based producer identity authentication scheme (CL-BPA), which includes initial authentication and re-authentication, aimed at achieving rapid switch authentication and integrating blockchain to solve single-point failure issues. Using the Canetti and Krawczyk (CK) adversarial model and informal security analysis, the proposed CL-BPA scheme is demonstrated to be resistant to anonymity attacks, identity forgery attacks, and man-in-the-middle attacks. The performance analysis demonstrates that the proposed CL-BPA scheme exhibits excellent capabilities in terms of computation delay, communication cost, smart contract execution time, average response delay, and throughput.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104007"},"PeriodicalIF":7.7,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142151248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An online cost optimization approach for edge resource provisioning in cloud gaming 云游戏中边缘资源调配的在线成本优化方法
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-30 DOI: 10.1016/j.jnca.2024.104008
Guoqing Tian, Li Pan, Shijun Liu

Cloud gaming (CG), as an emergent computing paradigm, is revolutionizing the gaming industry. Currently, cloud gaming service providers (CGSPs) begin to integrate edge computing with cloud to provide services, with the aim of maximizing gaming service revenue while considering the costs incurred and the benefits generated. However, it is non-trivial to maximize gaming service revenue, as future requests are not known beforehand, and poor resource provisioning may result in exorbitant costs. In addition, the edge resource provisioning (ERP) problem in CG necessitates a trade-off between cost and inevitable queuing issues in CG systems. To address this issue, we propose ERPOL (ERP Online), a convenient and efficient approach to formulate ERP strategies for CGSPs, without requiring any future information. The performance of ERPOL has been theoretically validated and experimentally evaluated. Experiments driven by real-world traces show that it can achieve significant cost savings. The proposed approach has the potential to transform how CGSPs manage their infrastructure.

云游戏(CG)作为一种新兴的计算模式,正在给游戏产业带来一场革命。目前,云游戏服务提供商(CGSP)开始将边缘计算与云计算结合起来提供服务,目的是在考虑成本和收益的同时实现游戏服务收益最大化。然而,要实现游戏服务收益最大化并非易事,因为未来的请求是事先不可知的,资源配置不当可能导致成本过高。此外,计算机网络中的边缘资源配置(ERP)问题需要在成本和计算机网络系统中不可避免的排队问题之间进行权衡。为了解决这个问题,我们提出了ERPOL(ERP Online),这是一种方便、高效的方法,可以在不需要任何未来信息的情况下为 CGSP 制定ERP 策略。ERPOL的性能已经过理论验证和实验评估。由现实世界跟踪驱动的实验表明,该方法可显著节约成本。所提出的方法有可能改变 CGSP 管理其基础设施的方式。
{"title":"An online cost optimization approach for edge resource provisioning in cloud gaming","authors":"Guoqing Tian,&nbsp;Li Pan,&nbsp;Shijun Liu","doi":"10.1016/j.jnca.2024.104008","DOIUrl":"10.1016/j.jnca.2024.104008","url":null,"abstract":"<div><p>Cloud gaming (CG), as an emergent computing paradigm, is revolutionizing the gaming industry. Currently, cloud gaming service providers (CGSPs) begin to integrate edge computing with cloud to provide services, with the aim of maximizing gaming service revenue while considering the costs incurred and the benefits generated. However, it is non-trivial to maximize gaming service revenue, as future requests are not known beforehand, and poor resource provisioning may result in exorbitant costs. In addition, the edge resource provisioning (ERP) problem in CG necessitates a trade-off between cost and inevitable queuing issues in CG systems. To address this issue, we propose ERPOL (ERP Online), a convenient and efficient approach to formulate ERP strategies for CGSPs, without requiring any future information. The performance of ERPOL has been theoretically validated and experimentally evaluated. Experiments driven by real-world traces show that it can achieve significant cost savings. The proposed approach has the potential to transform how CGSPs manage their infrastructure.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104008"},"PeriodicalIF":7.7,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142094756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Credit risk prediction for small and micro enterprises based on federated transfer learning frozen network parameters 基于联合转移学习冻结网络参数的小微企业信贷风险预测
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-30 DOI: 10.1016/j.jnca.2024.104009
Xiaolei Yang, Zhixin Xia, Junhui Song, Yongshan Liu

To accelerate the convergence speed and improve the accuracy of the federated shared model, this paper proposes a Federated Transfer Learning method based on frozen network parameters. The article sets up frozen two, three, and four layers network parameters, 8 sets of experimental tasks, and two target users for comparative experiments on frozen network parameters, and uses homomorphic encryption based Federated Transfer Learning to achieve secret transfer of parameters, and the accuracy, convergence speed, and loss function values of the experiment were compared and analyzed. The experiment proved that the frozen three-layer network parameter model has the highest accuracy, with the average values of the two target users being 0.9165 and 0.9164; The convergence speed is also the most ideal, with fast convergence completed after 25 iterations. The training time for the two users is also the shortest, with 1732.0s and 1787.3s, respectively; The loss function value shows that the lowest value for User-II is 0.181, while User-III is 0.2061. Finally, the unlabeled and non-empty enterprise credit data is predicted, with 61.08% of users being low-risk users. This article achieves rapid convergence of the target network model by freezing source domain network parameters in a shared network, saving computational resources.

为了加快联盟共享模型的收敛速度,提高其准确性,本文提出了一种基于冻结网络参数的联盟转移学习方法。文章设置了冻结的二层、三层和四层网络参数、8组实验任务和两个目标用户,对冻结的网络参数进行对比实验,并利用基于同态加密的联邦传输学习实现参数的秘密传输,对实验的准确度、收敛速度和损失函数值进行了对比分析。实验证明,冻结三层网络参数模型的准确率最高,两个目标用户的平均值分别为 0.9165 和 0.9164;收敛速度也最为理想,迭代 25 次后即可完成快速收敛。两个用户的训练时间也是最短的,分别为 1732.0s 和 1787.3s;损失函数值显示,User-II 的最小值为 0.181,User-III 为 0.2061。最后,对未标记的非空企业信用数据进行预测,61.08%的用户为低风险用户。本文通过在共享网络中冻结源域网络参数,实现了目标网络模型的快速收敛,节省了计算资源。
{"title":"Credit risk prediction for small and micro enterprises based on federated transfer learning frozen network parameters","authors":"Xiaolei Yang,&nbsp;Zhixin Xia,&nbsp;Junhui Song,&nbsp;Yongshan Liu","doi":"10.1016/j.jnca.2024.104009","DOIUrl":"10.1016/j.jnca.2024.104009","url":null,"abstract":"<div><p>To accelerate the convergence speed and improve the accuracy of the federated shared model, this paper proposes a Federated Transfer Learning method based on frozen network parameters. The article sets up frozen two, three, and four layers network parameters, 8 sets of experimental tasks, and two target users for comparative experiments on frozen network parameters, and uses homomorphic encryption based Federated Transfer Learning to achieve secret transfer of parameters, and the accuracy, convergence speed, and loss function values of the experiment were compared and analyzed. The experiment proved that the frozen three-layer network parameter model has the highest accuracy, with the average values of the two target users being 0.9165 and 0.9164; The convergence speed is also the most ideal, with fast convergence completed after 25 iterations. The training time for the two users is also the shortest, with 1732.0s and 1787.3s, respectively; The loss function value shows that the lowest value for User-II is 0.181, while User-III is 0.2061. Finally, the unlabeled and non-empty enterprise credit data is predicted, with 61.08% of users being low-risk users. This article achieves rapid convergence of the target network model by freezing source domain network parameters in a shared network, saving computational resources.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104009"},"PeriodicalIF":7.7,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142129176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Striking the perfect balance: Multi-objective optimization for minimizing deployment cost and maximizing coverage with Harmony Search 实现完美平衡:利用和谐搜索实现部署成本最小化和覆盖范围最大化的多目标优化
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-29 DOI: 10.1016/j.jnca.2024.104006
Quang Truong Vu , Phuc Tan Nguyen , Thi Hanh Nguyen , Thi Thanh Binh Huynh , Van Chien Trinh , Mikael Gidlund

In the Internet of Things (IoT) era, wireless sensor networks play a critical role in communication systems. One of the most crucial problems in wireless sensor networks is the sensor deployment problem, which attempts to provide a strategy to place the sensors within the surveillance area so that two fundamental criteria of wireless sensor networks, coverage and connectivity, are guaranteed. In this paper, we look to solve the multi-objective deployment problem so that area coverage is maximized and the number of nodes used is minimized. Since Harmony Search is a simple yet suitable algorithm for our work, we propose Harmony Search algorithm along with various enhancement proposals, including heuristic initialization, random sampling of sensor types, weighted fitness evaluation, and using different components in the fitness function, to provide a solution to the problem of sensor deployment in a heterogeneous wireless sensor network where sensors have different sensing ranges. On top of that, the probabilistic sensing model is used to reflect how the sensors work realistically. We also provide the extension of our solution to 3D areas and propose a realistic 3D dataset to evaluate it. The simulation results show that the proposed algorithms solve the area coverage problem more efficiently than previous algorithms. Our best proposal demonstrates significant improvements in coverage ratio by 10.20% and cost saving by 27.65% compared to the best baseline in a large-scale evaluation.

在物联网(IoT)时代,无线传感器网络在通信系统中发挥着至关重要的作用。无线传感器网络中最关键的问题之一是传感器部署问题,它试图提供一种在监控区域内放置传感器的策略,从而保证无线传感器网络的两个基本标准--覆盖率和连接性。在本文中,我们希望解决多目标部署问题,使区域覆盖最大化,使用的节点数量最少化。由于和谐搜索(Harmony Search)是一种简单而又适合我们工作的算法,因此我们提出了和谐搜索算法以及各种改进建议,包括启发式初始化、传感器类型的随机抽样、加权适配性评估以及在适配函数中使用不同的组件,从而为异构无线传感器网络(传感器具有不同的感应范围)中的传感器部署问题提供一种解决方案。此外,我们还使用了概率传感模型来反映传感器的实际工作情况。我们还将解决方案扩展到了三维区域,并提出了一个现实的三维数据集来对其进行评估。仿真结果表明,与之前的算法相比,我们提出的算法能更有效地解决区域覆盖问题。在大规模评估中,与最佳基线相比,我们的最佳方案在覆盖率方面显著提高了 10.20%,在成本方面节省了 27.65%。
{"title":"Striking the perfect balance: Multi-objective optimization for minimizing deployment cost and maximizing coverage with Harmony Search","authors":"Quang Truong Vu ,&nbsp;Phuc Tan Nguyen ,&nbsp;Thi Hanh Nguyen ,&nbsp;Thi Thanh Binh Huynh ,&nbsp;Van Chien Trinh ,&nbsp;Mikael Gidlund","doi":"10.1016/j.jnca.2024.104006","DOIUrl":"10.1016/j.jnca.2024.104006","url":null,"abstract":"<div><p>In the Internet of Things (IoT) era, wireless sensor networks play a critical role in communication systems. One of the most crucial problems in wireless sensor networks is the sensor deployment problem, which attempts to provide a strategy to place the sensors within the surveillance area so that two fundamental criteria of wireless sensor networks, coverage and connectivity, are guaranteed. In this paper, we look to solve the multi-objective deployment problem so that area coverage is maximized and the number of nodes used is minimized. Since Harmony Search is a simple yet suitable algorithm for our work, we propose Harmony Search algorithm along with various enhancement proposals, including heuristic initialization, random sampling of sensor types, weighted fitness evaluation, and using different components in the fitness function, to provide a solution to the problem of sensor deployment in a heterogeneous wireless sensor network where sensors have different sensing ranges. On top of that, the probabilistic sensing model is used to reflect how the sensors work realistically. We also provide the extension of our solution to 3D areas and propose a realistic 3D dataset to evaluate it. The simulation results show that the proposed algorithms solve the area coverage problem more efficiently than previous algorithms. Our best proposal demonstrates significant improvements in coverage ratio by 10.20% and cost saving by 27.65% compared to the best baseline in a large-scale evaluation.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104006"},"PeriodicalIF":7.7,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142137011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolving techniques in cyber threat hunting: A systematic review 不断发展的网络威胁猎杀技术:系统回顾
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-23 DOI: 10.1016/j.jnca.2024.104004
Arash Mahboubi , Khanh Luong , Hamed Aboutorab , Hang Thanh Bui , Geoff Jarrad , Mohammed Bahutair , Seyit Camtepe , Ganna Pogrebna , Ejaz Ahmed , Bazara Barry , Hannah Gately

In the rapidly changing cybersecurity landscape, threat hunting has become a critical proactive defense against sophisticated cyber threats. While traditional security measures are essential, their reactive nature often falls short in countering malicious actors’ increasingly advanced tactics. This paper explores the crucial role of threat hunting, a systematic, analyst-driven process aimed at uncovering hidden threats lurking within an organization’s digital infrastructure before they escalate into major incidents. Despite its importance, the cybersecurity community grapples with several challenges, including the lack of standardized methodologies, the need for specialized expertise, and the integration of cutting-edge technologies like artificial intelligence (AI) for predictive threat identification. To tackle these challenges, this survey paper offers a comprehensive overview of current threat hunting practices, emphasizing the integration of AI-driven models for proactive threat prediction. Our research explores critical questions regarding the effectiveness of various threat hunting processes and the incorporation of advanced techniques such as augmented methodologies and machine learning. Our approach involves a systematic review of existing practices, including frameworks from industry leaders like IBM and CrowdStrike. We also explore resources for intelligence ontologies and automation tools. The background section clarifies the distinction between threat hunting and anomaly detection, emphasizing systematic processes crucial for effective threat hunting. We formulate hypotheses based on hidden states and observations, examine the interplay between anomaly detection and threat hunting, and introduce iterative detection methodologies and playbooks for enhanced threat detection. Our review encompasses supervised and unsupervised machine learning approaches, reasoning techniques, graph-based and rule-based methods, as well as other innovative strategies. We identify key challenges in the field, including the scarcity of labeled data, imbalanced datasets, the need for integrating multiple data sources, the rapid evolution of adversarial techniques, and the limited availability of human expertise and data intelligence. The discussion highlights the transformative impact of artificial intelligence on both threat hunting and cybercrime, reinforcing the importance of robust hypothesis development. This paper contributes a detailed analysis of the current state and future directions of threat hunting, offering actionable insights for researchers and practitioners to enhance threat detection and mitigation strategies in the ever-evolving cybersecurity landscape.

在瞬息万变的网络安全环境中,威胁猎取已成为应对复杂网络威胁的重要主动防御手段。虽然传统的安全措施必不可少,但它们的被动性往往无法应对恶意行为者日益先进的战术。本文探讨了威胁猎取的关键作用,威胁猎取是一个系统化的、由分析师驱动的过程,旨在发现潜伏在组织数字基础设施中的隐蔽威胁,避免其升级为重大事件。尽管其重要性不言而喻,但网络安全界仍在努力应对一些挑战,包括缺乏标准化方法、对专业知识的需求,以及整合人工智能(AI)等尖端技术以进行预测性威胁识别。为了应对这些挑战,本调查报告全面概述了当前的威胁猎捕实践,强调了人工智能驱动模型在主动威胁预测中的整合。我们的研究探讨了与各种威胁猎取流程的有效性以及增强方法和机器学习等先进技术的整合有关的关键问题。我们的方法涉及对现有实践的系统回顾,包括来自 IBM 和 CrowdStrike 等行业领导者的框架。我们还探索了情报本体和自动化工具方面的资源。背景部分阐明了威胁猎取和异常检测之间的区别,强调了对有效猎取威胁至关重要的系统流程。我们根据隐藏状态和观察结果提出假设,研究异常检测和威胁猎捕之间的相互作用,并介绍用于增强威胁检测的迭代检测方法和流程。我们的综述涵盖了有监督和无监督机器学习方法、推理技术、基于图形和规则的方法以及其他创新策略。我们指出了该领域面临的主要挑战,包括标注数据稀缺、数据集不平衡、需要整合多种数据源、对抗技术的快速发展以及人类专业知识和数据智能的有限性。讨论强调了人工智能对威胁猎捕和网络犯罪的变革性影响,强化了稳健假设开发的重要性。本文详细分析了威胁猎取的现状和未来方向,为研究人员和从业人员在不断变化的网络安全环境中加强威胁检测和缓解策略提供了可行的见解。
{"title":"Evolving techniques in cyber threat hunting: A systematic review","authors":"Arash Mahboubi ,&nbsp;Khanh Luong ,&nbsp;Hamed Aboutorab ,&nbsp;Hang Thanh Bui ,&nbsp;Geoff Jarrad ,&nbsp;Mohammed Bahutair ,&nbsp;Seyit Camtepe ,&nbsp;Ganna Pogrebna ,&nbsp;Ejaz Ahmed ,&nbsp;Bazara Barry ,&nbsp;Hannah Gately","doi":"10.1016/j.jnca.2024.104004","DOIUrl":"10.1016/j.jnca.2024.104004","url":null,"abstract":"<div><p>In the rapidly changing cybersecurity landscape, threat hunting has become a critical proactive defense against sophisticated cyber threats. While traditional security measures are essential, their reactive nature often falls short in countering malicious actors’ increasingly advanced tactics. This paper explores the crucial role of threat hunting, a systematic, analyst-driven process aimed at uncovering hidden threats lurking within an organization’s digital infrastructure before they escalate into major incidents. Despite its importance, the cybersecurity community grapples with several challenges, including the lack of standardized methodologies, the need for specialized expertise, and the integration of cutting-edge technologies like artificial intelligence (AI) for predictive threat identification. To tackle these challenges, this survey paper offers a comprehensive overview of current threat hunting practices, emphasizing the integration of AI-driven models for proactive threat prediction. Our research explores critical questions regarding the effectiveness of various threat hunting processes and the incorporation of advanced techniques such as augmented methodologies and machine learning. Our approach involves a systematic review of existing practices, including frameworks from industry leaders like IBM and CrowdStrike. We also explore resources for intelligence ontologies and automation tools. The background section clarifies the distinction between threat hunting and anomaly detection, emphasizing systematic processes crucial for effective threat hunting. We formulate hypotheses based on hidden states and observations, examine the interplay between anomaly detection and threat hunting, and introduce iterative detection methodologies and playbooks for enhanced threat detection. Our review encompasses supervised and unsupervised machine learning approaches, reasoning techniques, graph-based and rule-based methods, as well as other innovative strategies. We identify key challenges in the field, including the scarcity of labeled data, imbalanced datasets, the need for integrating multiple data sources, the rapid evolution of adversarial techniques, and the limited availability of human expertise and data intelligence. The discussion highlights the transformative impact of artificial intelligence on both threat hunting and cybercrime, reinforcing the importance of robust hypothesis development. This paper contributes a detailed analysis of the current state and future directions of threat hunting, offering actionable insights for researchers and practitioners to enhance threat detection and mitigation strategies in the ever-evolving cybersecurity landscape.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104004"},"PeriodicalIF":7.7,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1084804524001814/pdfft?md5=7fb543744ca72ceac22267ab8ec36898&pid=1-s2.0-S1084804524001814-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142048632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy efficient multi-user task offloading through active RIS with hybrid TDMA-NOMA transmission 通过混合 TDMA-NOMA 传输的主动 RIS 实现高能效多用户任务卸载
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-22 DOI: 10.1016/j.jnca.2024.104005
Baoshan Lu , Junli Fang , Junxiu Liu , Xuemin Hong

In this paper, we address the challenge of minimizing system energy consumption for task offloading within non-line-of-sight (NLoS) mobile edge computing (MEC) environments. Our approach integrates an active reconfigurable intelligent surface (RIS) and employs a hybrid transmission scheme combining time division multiple access (TDMA) and non-orthogonal multiple access (NOMA) to enhance the quality of service (QoS) for user task offloading. The formulation of this problem as a non-convex optimization issue presents significant challenges due to its inherent complexity. To overcome this, we introduce an innovative method termed element refinement-based differential evolution (ERBDE). Initially, through rigorous theoretical analysis, we optimally determine the allocation of local computation resources, computation resources at the base station (BS), and transmit power of users, while maintaining fixed values for the offloading ratio, amplification factor, phase of the reflecting element, and the transmission period. Subsequently, we employ the differential evolution (DE) algorithm to iteratively fine-tune the offloading ratio, amplification factor, phase of the reflecting element, and transmission period towards near-optimal configurations. Our simulation results demonstrate that the implementation of active RIS-supported task offloading utilizing the hybrid TDMA-NOMA scheme results in an average system energy consumption reduction of 80.3%.

在本文中,我们探讨了在非视距(NLoS)移动边缘计算(MEC)环境中如何最大限度地降低任务卸载的系统能耗这一难题。我们的方法集成了有源可重构智能表面(RIS),并采用了结合时分多址(TDMA)和非正交多址(NOMA)的混合传输方案,以提高用户任务卸载的服务质量(QoS)。由于其固有的复杂性,将这一问题表述为非凸优化问题带来了巨大挑战。为了克服这一难题,我们引入了一种创新方法,即基于元素细化的微分演化(ERBDE)。首先,通过严格的理论分析,我们优化了本地计算资源、基站(BS)计算资源和用户发射功率的分配,同时保持了卸载率、放大系数、反射元件相位和传输周期的固定值。随后,我们采用微分演化(DE)算法对卸载率、放大系数、反射元件相位和传输周期进行迭代微调,以接近最佳配置。我们的仿真结果表明,利用混合 TDMA-NOMA 方案实施主动 RIS 支持的任务卸载可使系统能耗平均降低 80.3%。
{"title":"Energy efficient multi-user task offloading through active RIS with hybrid TDMA-NOMA transmission","authors":"Baoshan Lu ,&nbsp;Junli Fang ,&nbsp;Junxiu Liu ,&nbsp;Xuemin Hong","doi":"10.1016/j.jnca.2024.104005","DOIUrl":"10.1016/j.jnca.2024.104005","url":null,"abstract":"<div><p>In this paper, we address the challenge of minimizing system energy consumption for task offloading within non-line-of-sight (NLoS) mobile edge computing (MEC) environments. Our approach integrates an active reconfigurable intelligent surface (RIS) and employs a hybrid transmission scheme combining time division multiple access (TDMA) and non-orthogonal multiple access (NOMA) to enhance the quality of service (QoS) for user task offloading. The formulation of this problem as a non-convex optimization issue presents significant challenges due to its inherent complexity. To overcome this, we introduce an innovative method termed element refinement-based differential evolution (ERBDE). Initially, through rigorous theoretical analysis, we optimally determine the allocation of local computation resources, computation resources at the base station (BS), and transmit power of users, while maintaining fixed values for the offloading ratio, amplification factor, phase of the reflecting element, and the transmission period. Subsequently, we employ the differential evolution (DE) algorithm to iteratively fine-tune the offloading ratio, amplification factor, phase of the reflecting element, and transmission period towards near-optimal configurations. Our simulation results demonstrate that the implementation of active RIS-supported task offloading utilizing the hybrid TDMA-NOMA scheme results in an average system energy consumption reduction of 80.3%.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104005"},"PeriodicalIF":7.7,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142048631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An expandable and cost-effective data center network 可扩展且经济高效的数据中心网络
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-22 DOI: 10.1016/j.jnca.2024.104001
Mengjie Lv, Xuanli Liu, Hui Dong, Weibei Fan

With the rapid growth of data volume, the escalating complexity of data businesses, and the increasing reliance on the Internet for daily life and production, the scale of data centers is constantly expanding. The data center network (DCN) is a bridge connecting large-scale servers in data centers for large-scale distributed computing. How to build a DCN structure that is flexible and cost-effective, while maintaining its topological properties unchanged during network expansion has become a challenging issue. In this paper, we propose an expandable and cost-effective DCN, namely HHCube, which is based on the half hypercube structure. Further, we analyze some characteristics of HHCube, including connectivity, diameter, and bisection bandwidth of the HHCube. We also design an efficient algorithm to find the shortest path between any two distinct nodes and present a fault-tolerant routing scheme to obtain a fault-tolerant path between any two distinct fault-free nodes in HHCube. Meanwhile, we present two local diagnosis algorithms to determine the status of nodes in HHCube under the PMC model and MM* model, respectively. Our results demonstrate that despite the presence of up to 25% faulty nodes in HHCube, both algorithms achieve a correct diagnosis rate exceeding 90%. Finally, we compare HHCube with state-of-the-art DCNs including Fat-Tree, DCell, BCube, Ficonn, and HSDC, and the experimental results indicate that the HHCube is an excellent candidate for constructing expandable and cost-effective DCNs.

随着数据量的快速增长、数据业务复杂性的不断升级,以及人们日常生活和生产对互联网的依赖程度不断提高,数据中心的规模也在不断扩大。数据中心网络(DCN)是连接数据中心大型服务器的桥梁,可实现大规模分布式计算。如何构建灵活、经济高效的 DCN 结构,同时在网络扩展过程中保持拓扑特性不变,成为一个具有挑战性的问题。本文提出了一种可扩展且经济高效的 DCN,即基于半超立方结构的 HHCube。此外,我们还分析了 HHCube 的一些特性,包括 HHCube 的连通性、直径和分段带宽。我们还设计了一种高效算法来寻找任意两个不同节点之间的最短路径,并提出了一种容错路由方案来获取 HHCube 中任意两个不同无故障节点之间的容错路径。同时,我们提出了两种局部诊断算法,分别用于确定 PMC 模型和 MM* 模型下 HHCube 中节点的状态。结果表明,尽管 HHCube 中存在多达 25% 的故障节点,两种算法的诊断正确率都超过了 90%。最后,我们将HHCube与最先进的DCN(包括Fat-Tree、DCell、BCube、Ficonn和HSDC)进行了比较,实验结果表明,HHCube是构建可扩展且经济高效的DCN的最佳候选方案。
{"title":"An expandable and cost-effective data center network","authors":"Mengjie Lv,&nbsp;Xuanli Liu,&nbsp;Hui Dong,&nbsp;Weibei Fan","doi":"10.1016/j.jnca.2024.104001","DOIUrl":"10.1016/j.jnca.2024.104001","url":null,"abstract":"<div><p>With the rapid growth of data volume, the escalating complexity of data businesses, and the increasing reliance on the Internet for daily life and production, the scale of data centers is constantly expanding. The data center network (DCN) is a bridge connecting large-scale servers in data centers for large-scale distributed computing. How to build a DCN structure that is flexible and cost-effective, while maintaining its topological properties unchanged during network expansion has become a challenging issue. In this paper, we propose an expandable and cost-effective DCN, namely HHCube, which is based on the half hypercube structure. Further, we analyze some characteristics of HHCube, including connectivity, diameter, and bisection bandwidth of the HHCube. We also design an efficient algorithm to find the shortest path between any two distinct nodes and present a fault-tolerant routing scheme to obtain a fault-tolerant path between any two distinct fault-free nodes in HHCube. Meanwhile, we present two local diagnosis algorithms to determine the status of nodes in HHCube under the PMC model and MM* model, respectively. Our results demonstrate that despite the presence of up to 25% faulty nodes in HHCube, both algorithms achieve a correct diagnosis rate exceeding 90%. Finally, we compare HHCube with state-of-the-art DCNs including Fat-Tree, DCell, BCube, Ficonn, and HSDC, and the experimental results indicate that the HHCube is an excellent candidate for constructing expandable and cost-effective DCNs.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104001"},"PeriodicalIF":7.7,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142089137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zebra: A cluster-aware blockchain consensus algorithm 斑马:集群感知区块链共识算法
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-20 DOI: 10.1016/j.jnca.2024.104003
Ji Wan , Kai Hu , Jie Li , Yichen Guo , Hao Su , Shenzhang Li , Yafei Ye

The Consensus algorithm is the core of the permissioned blockchain, it directly affects the performance and scalability of the system. Performance is limited by the computing power and network bandwidth of a single leader node. Most existing blockchain systems adopt mesh or star topology. Blockchain performance decreases rapidly as the number of nodes increases. To solve this problem, we first design the n-k cluster tree and corresponding generation algorithm, which supports rapid reconfiguration of nodes. Then we propose the Zebra consensus algorithm, which is a cluster tree-based consensus algorithm. Compared to the PBFT, it has higher throughput and supports more nodes under the same hardware conditions. However, the tree network topology enhances scalability while also increasing latency among nodes. To reduce transaction latency, we designed the Pipeline-Zebra consensus algorithm that further improves the performance of blockchain systems in a tree network topology through parallel message propagation and block validation. The message complexity of the algorithm is O(n). Experimental results show that the performance of the algorithm proposed in this paper can reach 2.25 times that of the PBFT algorithm, and it supports four times the number of nodes under the same hardware.

共识算法是许可区块链的核心,它直接影响系统的性能和可扩展性。性能受限于单个领导节点的计算能力和网络带宽。现有的区块链系统大多采用网状或星形拓扑结构。随着节点数量的增加,区块链的性能会迅速降低。为了解决这个问题,我们首先设计了 n-k 集群树和相应的生成算法,支持节点的快速重新配置。然后,我们提出了斑马共识算法,这是一种基于聚类树的共识算法。与 PBFT 相比,它具有更高的吞吐量,并能在相同硬件条件下支持更多节点。然而,树状网络拓扑结构在增强可扩展性的同时,也增加了节点间的延迟。为了减少交易延迟,我们设计了流水线-斑马共识算法,通过并行消息传播和区块验证,进一步提高了树状网络拓扑中区块链系统的性能。该算法的消息复杂度为 O(n)。实验结果表明,本文提出的算法性能可达 PBFT 算法的 2.25 倍,在相同硬件条件下支持四倍节点数。
{"title":"Zebra: A cluster-aware blockchain consensus algorithm","authors":"Ji Wan ,&nbsp;Kai Hu ,&nbsp;Jie Li ,&nbsp;Yichen Guo ,&nbsp;Hao Su ,&nbsp;Shenzhang Li ,&nbsp;Yafei Ye","doi":"10.1016/j.jnca.2024.104003","DOIUrl":"10.1016/j.jnca.2024.104003","url":null,"abstract":"<div><p>The Consensus algorithm is the core of the permissioned blockchain, it directly affects the performance and scalability of the system. Performance is limited by the computing power and network bandwidth of a single leader node. Most existing blockchain systems adopt mesh or star topology. Blockchain performance decreases rapidly as the number of nodes increases. To solve this problem, we first design the <em>n-k</em> cluster tree and corresponding generation algorithm, which supports rapid reconfiguration of nodes. Then we propose the <em>Zebra</em> consensus algorithm, which is a cluster tree-based consensus algorithm. Compared to the PBFT, it has higher throughput and supports more nodes under the same hardware conditions. However, the tree network topology enhances scalability while also increasing latency among nodes. To reduce transaction latency, we designed the <em>Pipeline-Zebra</em> consensus algorithm that further improves the performance of blockchain systems in a tree network topology through parallel message propagation and block validation. The message complexity of the algorithm is <em>O(n)</em>. Experimental results show that the performance of the algorithm proposed in this paper can reach 2.25 times that of the PBFT algorithm, and it supports four times the number of nodes under the same hardware.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104003"},"PeriodicalIF":7.7,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142048629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Network and Computer Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1