Attacks are growing more complex and dangerous as network capabilities improve at a rapid pace.Network intrusion detection is usually regarded as an efficient means of dealing with security attacks.Many ways have been...Attacks are growing more complex and dangerous as network capabilities improve at a rapid pace.Network intrusion detection is usually regarded as an efficient means of dealing with security attacks.Many ways have been presented,utilizing various strategies and focusing on different types of visitors.Anomaly-based network intrusion monitoring is an essential area of intrusion detection investigation and development.Despite extensive research on anomaly-based network detection,there is still a lack of comprehensive literature reviews covering current methodologies and datasets.Despite the substantial research into anomaly-based network intrusion detection algorithms,there is a dearth of a research evaluation of new methodologies and datasets.We explore and evaluate 50 highest publications on anomaly-based intrusion detection using an in-depth review of related literature techniques.Our work thoroughly explores the technological environment of the subject in order to help future research in this sector.Our examination is carried out from the relevant angles:application areas,data preprocessing and threat detection approaches,assessment measures,and datasets.We select unresolved research difficulties and underexplored research areas from every viewpoint recommendation of the study.Finally,we outline five potentially increased research areas for the future.展开更多
One of the key challenges in ad-hoc networks is the resource discovery problem.How efciently&quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying que...One of the key challenges in ad-hoc networks is the resource discovery problem.How efciently&quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question?Broadcasting is a basic technique in the Mobile Ad-hoc Networks(MANETs),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive ooding technique oods the network with query messages,while the random walk scheme operates by contacting subsets of each node’s neighbors at every step,thereby restricting the search space.Many earlier works have mainly focused on the simulation-based analysis of ooding technique,and its variants,in a wired network scenario.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of mobile P2P networks.In this article,we mathematically model different widely used existing search techniques,and compare with the proposed improved random walk method,a simple lightweight approach suitable for the non-DHT architecture.We provide analytical expressions to measure the performance of the different ooding-based search techniques,and our proposed technique.We analytically derive 3 relevant key performance measures,i.e.,the avg.number of steps needed to nd a resource,the probability of locating a resource,and the avg.number of messages generated during the entire search process.展开更多
Broadcasting is a basic technique in Mobile ad-hoc network(MANET),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received pa...Broadcasting is a basic technique in Mobile ad-hoc network(MANET),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive flooding technique,floods the network with query messages,while the random walk technique operates by contacting the subsets of every node’s neighbors at each step,thereby restricting the search space.One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about locating the queried resource.Many earlier works have mainly focused on the simulation-based analysis of flooding,and its variants under a wired network.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of P2P systems running over MANET.In this paper,we describe how P2P resource discovery protocols perform badly over MANETs.To address the limitations,we propose a new protocol named ABRW(Address Broadcast Random Walk),which is a lightweight search approach,designed considering the underlay topology aimed to better suit the unstructured architecture.We provide the mathematical model,measuring the performance of our proposed search scheme with different widely popular benchmarked search techniques.Further,we also derive three relevant search performance metrics,i.e.,mean no.of steps needed to find a resource,the probability of finding a resource,and the mean no.of message overhead.We validated the analytical expressions through simulations.The simulation results closely matched with our analyticalmodel,justifying our findings.Our proposed search algorithm under such highly dynamic self-evolving networks performed better,as it reduced the search latency,decreased the overall message overhead,and still equally had a good success rate.展开更多
Audiovisual speech recognition is an emerging research topic.Lipreading is the recognition of what someone is saying using visual information,primarily lip movements.In this study,we created a custom dataset for India...Audiovisual speech recognition is an emerging research topic.Lipreading is the recognition of what someone is saying using visual information,primarily lip movements.In this study,we created a custom dataset for Indian English linguistics and categorized it into three main categories:(1)audio recognition,(2)visual feature extraction,and(3)combined audio and visual recognition.Audio features were extracted using the mel-frequency cepstral coefficient,and classification was performed using a one-dimension convolutional neural network.Visual feature extraction uses Dlib and then classifies visual speech using a long short-term memory type of recurrent neural networks.Finally,integration was performed using a deep convolutional network.The audio speech of Indian English was successfully recognized with accuracies of 93.67%and 91.53%,respectively,using testing data from 200 epochs.The training accuracy for visual speech recognition using the Indian English dataset was 77.48%and the test accuracy was 76.19%using 60 epochs.After integration,the accuracies of audiovisual speech recognition using the Indian English dataset for training and testing were 94.67%and 91.75%,respectively.展开更多
Despite the seemingly exponential growth of mobile and wireless communication,this same technology aims to offer uninterrupted access to different wireless systems like Radio Communication,Bluetooth,and Wi-Fi to achie...Despite the seemingly exponential growth of mobile and wireless communication,this same technology aims to offer uninterrupted access to different wireless systems like Radio Communication,Bluetooth,and Wi-Fi to achieve better network connection which in turn gives the best quality of service(QoS).Many analysts have established many handover decision systems(HDS)to enable assured continuous mobility between various radio access technologies.Unbrokenmobility is one of themost significant problems considered in wireless communication networks.Each application needs a distinct QoS,so the network choice may shift appropriately.To achieve this objective and to choose the finest networks,it is important to select a best decision making algorithm that chooses the most effective network for every application that the user requires,dependent on QoS measures.Therefore,the main goal of the proposed system is to provide an enhanced vertical handover(VHO)decision making programby using aMulti-CriteriaFuzzy-Based algorithm to choose the best network.Enhanced Multi-Criteria algorithms and a Fuzzy-Based algorithm is implemented successfully for optimal network selection and also to minimize the probability of false handover.Furthermore,a double packet buffer is utilized to decrease the packet loss by 1.5%and to reduce the number of handovers up to 50%compared to the existing systems.In addition,the network setup has an optimized mobilitymanagement system to supervise the movement of the mobile nodes.展开更多
The numerous volumes of data generated every day necessitate the deployment of new technologies capable of dealing with massive amounts of data efficiently.This is the case with Association Rules,a tool for unsupervis...The numerous volumes of data generated every day necessitate the deployment of new technologies capable of dealing with massive amounts of data efficiently.This is the case with Association Rules,a tool for unsupervised data mining that extracts information in the form of IF-THEN patterns.Although various approaches for extracting frequent itemset(prior step before mining association rules)in extremely large databases have been presented,the high computational cost and shortage of memory remain key issues to be addressed while processing enormous data.The objective of this research is to discover frequent itemset by using clustering for preprocessing and adopting the linear prefix tree algorithm for mining the maximal frequent itemset.The performance of the proposed CL-LP-MAX-tree was evaluated by comparing it with the existing FP-max algorithm.Experimentation was performed with the three different standard datasets to record evidence to prove that the proposed CL-LP-MAX-tree algorithm outperform the existing FP-max algorithm in terms of runtime and memory consumption.展开更多
In-vehicle communication has been optimized day to day to keep updated of the technologies.Control area network(CAN)is used as a standard communication method because of its efficient and reliable connection.However,C...In-vehicle communication has been optimized day to day to keep updated of the technologies.Control area network(CAN)is used as a standard communication method because of its efficient and reliable connection.However,CAN is prone to several network level attacks because of its lack in security mechanisms.Various methods have been introduced to incorporate this in CAN.We proposed an unsupervised method of intrusion detection for in-vehicle communication networks by combining the optimal feature extracting ability of autoencoders and more precise clustering using fuzzy C-means(FCM).The proposed method is light weight and requires less computation time.We performed an extensive experiment and achieved an accuracy of 75.51%with the ML35o in-vehicle intrusion dataset.By experimental result,the proposed method also works better for other intrusion detection problems like wireless intrusion detection datasets such as WNS-DS with accuracy of 84.05%and network intrusion detection datasets such as KDDCup with accuracy 60.63%,UNSW_NB15 with accuracy 73.62%and Information Security Center of Excellence(Iscx)with accuracy 74.83%.Overall,the proposed method outperforms the existing methods and avoids labeled datasets when training an in-vehicle intrusion detection model.The results of the experiment of our proposed method performed on various intru-sion detection datasets indicate that the proposed approach is generalized and robust in detecting intrusions and can be effectively deployed in real time to monitor CAN traffic in vehicles and proactively alert during attacks.展开更多
The exponential growth in communication networks,data technology,advanced libraries,and mainly World Wide Web services has played a pivotal role in facilitating the retrieval of various types of information as needed....The exponential growth in communication networks,data technology,advanced libraries,and mainly World Wide Web services has played a pivotal role in facilitating the retrieval of various types of information as needed.However,this progress has also led to security concerns related to the transmission of confidential data.Nevertheless,safeguarding these data during communication through insecure channels is crucial for obvious reasons.The emergence of steganography offers a robust approach to concealing confidential information,such as images,audio tracks,text files,and video files,in suitable media carriers.A novel technique is envisioned based on back-propagation learning.According to the proposed method,a hybrid fuzzy neural network(HFNN)is applied to the output obtained from the least significant bit substitution of secret data using pixel value dif-ferences and exploiting the modification direction.Through simulation and test results,it has been observed that the proposed methodology achieves secure steganography and superior visual quality.During the experiments,we observed that for the secret image of the cameraman,the PSNR&MSE values of the proposed technique are 61.963895 and 0.041361,respectively.展开更多
With the invention of Internet-enabled devices,cloud and blockchain-based technologies,an online voting system can smoothly carry out election processes.During pandemic situations,citizens tend to develop panic about ...With the invention of Internet-enabled devices,cloud and blockchain-based technologies,an online voting system can smoothly carry out election processes.During pandemic situations,citizens tend to develop panic about mass gatherings,which may influence the decrease in the number of votes.This urges a reliable,flexible,transparent,secure,and cost-effective voting system.The proposed online voting system using cloud-based hybrid blockchain technology eradicates the flaws that persist in the existing voting system,and it is carried out in three phases:the registration phase,vote casting phase and vote counting phase.A timestamp-based authentication protocol with digital signature validates voters and candidates during the registration and vote casting phases.Using smart contracts,third-party interventions are eliminated,and the transactions are secured in the blockchain network.Finally,to provide accurate voting results,the practical Byzantine fault tolerance(PBFT)consensus mechanism is adopted to ensure that the vote has not been modified or corrupted.Hence,the overall performance of the proposed system is significantly better than that of the existing system.Further performance was analyzed based on authentication delay,vote alteration,response time,and latency.展开更多
文摘Attacks are growing more complex and dangerous as network capabilities improve at a rapid pace.Network intrusion detection is usually regarded as an efficient means of dealing with security attacks.Many ways have been presented,utilizing various strategies and focusing on different types of visitors.Anomaly-based network intrusion monitoring is an essential area of intrusion detection investigation and development.Despite extensive research on anomaly-based network detection,there is still a lack of comprehensive literature reviews covering current methodologies and datasets.Despite the substantial research into anomaly-based network intrusion detection algorithms,there is a dearth of a research evaluation of new methodologies and datasets.We explore and evaluate 50 highest publications on anomaly-based intrusion detection using an in-depth review of related literature techniques.Our work thoroughly explores the technological environment of the subject in order to help future research in this sector.Our examination is carried out from the relevant angles:application areas,data preprocessing and threat detection approaches,assessment measures,and datasets.We select unresolved research difficulties and underexplored research areas from every viewpoint recommendation of the study.Finally,we outline five potentially increased research areas for the future.
文摘One of the key challenges in ad-hoc networks is the resource discovery problem.How efciently&quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question?Broadcasting is a basic technique in the Mobile Ad-hoc Networks(MANETs),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive ooding technique oods the network with query messages,while the random walk scheme operates by contacting subsets of each node’s neighbors at every step,thereby restricting the search space.Many earlier works have mainly focused on the simulation-based analysis of ooding technique,and its variants,in a wired network scenario.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of mobile P2P networks.In this article,we mathematically model different widely used existing search techniques,and compare with the proposed improved random walk method,a simple lightweight approach suitable for the non-DHT architecture.We provide analytical expressions to measure the performance of the different ooding-based search techniques,and our proposed technique.We analytically derive 3 relevant key performance measures,i.e.,the avg.number of steps needed to nd a resource,the probability of locating a resource,and the avg.number of messages generated during the entire search process.
文摘Broadcasting is a basic technique in Mobile ad-hoc network(MANET),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive flooding technique,floods the network with query messages,while the random walk technique operates by contacting the subsets of every node’s neighbors at each step,thereby restricting the search space.One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about locating the queried resource.Many earlier works have mainly focused on the simulation-based analysis of flooding,and its variants under a wired network.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of P2P systems running over MANET.In this paper,we describe how P2P resource discovery protocols perform badly over MANETs.To address the limitations,we propose a new protocol named ABRW(Address Broadcast Random Walk),which is a lightweight search approach,designed considering the underlay topology aimed to better suit the unstructured architecture.We provide the mathematical model,measuring the performance of our proposed search scheme with different widely popular benchmarked search techniques.Further,we also derive three relevant search performance metrics,i.e.,mean no.of steps needed to find a resource,the probability of finding a resource,and the mean no.of message overhead.We validated the analytical expressions through simulations.The simulation results closely matched with our analyticalmodel,justifying our findings.Our proposed search algorithm under such highly dynamic self-evolving networks performed better,as it reduced the search latency,decreased the overall message overhead,and still equally had a good success rate.
文摘Audiovisual speech recognition is an emerging research topic.Lipreading is the recognition of what someone is saying using visual information,primarily lip movements.In this study,we created a custom dataset for Indian English linguistics and categorized it into three main categories:(1)audio recognition,(2)visual feature extraction,and(3)combined audio and visual recognition.Audio features were extracted using the mel-frequency cepstral coefficient,and classification was performed using a one-dimension convolutional neural network.Visual feature extraction uses Dlib and then classifies visual speech using a long short-term memory type of recurrent neural networks.Finally,integration was performed using a deep convolutional network.The audio speech of Indian English was successfully recognized with accuracies of 93.67%and 91.53%,respectively,using testing data from 200 epochs.The training accuracy for visual speech recognition using the Indian English dataset was 77.48%and the test accuracy was 76.19%using 60 epochs.After integration,the accuracies of audiovisual speech recognition using the Indian English dataset for training and testing were 94.67%and 91.75%,respectively.
基金Taif University Researchers Supporting Project Number(TURSP-2020/36),Taif University,Taif,Saudi Arabia.
文摘Despite the seemingly exponential growth of mobile and wireless communication,this same technology aims to offer uninterrupted access to different wireless systems like Radio Communication,Bluetooth,and Wi-Fi to achieve better network connection which in turn gives the best quality of service(QoS).Many analysts have established many handover decision systems(HDS)to enable assured continuous mobility between various radio access technologies.Unbrokenmobility is one of themost significant problems considered in wireless communication networks.Each application needs a distinct QoS,so the network choice may shift appropriately.To achieve this objective and to choose the finest networks,it is important to select a best decision making algorithm that chooses the most effective network for every application that the user requires,dependent on QoS measures.Therefore,the main goal of the proposed system is to provide an enhanced vertical handover(VHO)decision making programby using aMulti-CriteriaFuzzy-Based algorithm to choose the best network.Enhanced Multi-Criteria algorithms and a Fuzzy-Based algorithm is implemented successfully for optimal network selection and also to minimize the probability of false handover.Furthermore,a double packet buffer is utilized to decrease the packet loss by 1.5%and to reduce the number of handovers up to 50%compared to the existing systems.In addition,the network setup has an optimized mobilitymanagement system to supervise the movement of the mobile nodes.
文摘The numerous volumes of data generated every day necessitate the deployment of new technologies capable of dealing with massive amounts of data efficiently.This is the case with Association Rules,a tool for unsupervised data mining that extracts information in the form of IF-THEN patterns.Although various approaches for extracting frequent itemset(prior step before mining association rules)in extremely large databases have been presented,the high computational cost and shortage of memory remain key issues to be addressed while processing enormous data.The objective of this research is to discover frequent itemset by using clustering for preprocessing and adopting the linear prefix tree algorithm for mining the maximal frequent itemset.The performance of the proposed CL-LP-MAX-tree was evaluated by comparing it with the existing FP-max algorithm.Experimentation was performed with the three different standard datasets to record evidence to prove that the proposed CL-LP-MAX-tree algorithm outperform the existing FP-max algorithm in terms of runtime and memory consumption.
文摘In-vehicle communication has been optimized day to day to keep updated of the technologies.Control area network(CAN)is used as a standard communication method because of its efficient and reliable connection.However,CAN is prone to several network level attacks because of its lack in security mechanisms.Various methods have been introduced to incorporate this in CAN.We proposed an unsupervised method of intrusion detection for in-vehicle communication networks by combining the optimal feature extracting ability of autoencoders and more precise clustering using fuzzy C-means(FCM).The proposed method is light weight and requires less computation time.We performed an extensive experiment and achieved an accuracy of 75.51%with the ML35o in-vehicle intrusion dataset.By experimental result,the proposed method also works better for other intrusion detection problems like wireless intrusion detection datasets such as WNS-DS with accuracy of 84.05%and network intrusion detection datasets such as KDDCup with accuracy 60.63%,UNSW_NB15 with accuracy 73.62%and Information Security Center of Excellence(Iscx)with accuracy 74.83%.Overall,the proposed method outperforms the existing methods and avoids labeled datasets when training an in-vehicle intrusion detection model.The results of the experiment of our proposed method performed on various intru-sion detection datasets indicate that the proposed approach is generalized and robust in detecting intrusions and can be effectively deployed in real time to monitor CAN traffic in vehicles and proactively alert during attacks.
文摘The exponential growth in communication networks,data technology,advanced libraries,and mainly World Wide Web services has played a pivotal role in facilitating the retrieval of various types of information as needed.However,this progress has also led to security concerns related to the transmission of confidential data.Nevertheless,safeguarding these data during communication through insecure channels is crucial for obvious reasons.The emergence of steganography offers a robust approach to concealing confidential information,such as images,audio tracks,text files,and video files,in suitable media carriers.A novel technique is envisioned based on back-propagation learning.According to the proposed method,a hybrid fuzzy neural network(HFNN)is applied to the output obtained from the least significant bit substitution of secret data using pixel value dif-ferences and exploiting the modification direction.Through simulation and test results,it has been observed that the proposed methodology achieves secure steganography and superior visual quality.During the experiments,we observed that for the secret image of the cameraman,the PSNR&MSE values of the proposed technique are 61.963895 and 0.041361,respectively.
文摘With the invention of Internet-enabled devices,cloud and blockchain-based technologies,an online voting system can smoothly carry out election processes.During pandemic situations,citizens tend to develop panic about mass gatherings,which may influence the decrease in the number of votes.This urges a reliable,flexible,transparent,secure,and cost-effective voting system.The proposed online voting system using cloud-based hybrid blockchain technology eradicates the flaws that persist in the existing voting system,and it is carried out in three phases:the registration phase,vote casting phase and vote counting phase.A timestamp-based authentication protocol with digital signature validates voters and candidates during the registration and vote casting phases.Using smart contracts,third-party interventions are eliminated,and the transactions are secured in the blockchain network.Finally,to provide accurate voting results,the practical Byzantine fault tolerance(PBFT)consensus mechanism is adopted to ensure that the vote has not been modified or corrupted.Hence,the overall performance of the proposed system is significantly better than that of the existing system.Further performance was analyzed based on authentication delay,vote alteration,response time,and latency.