Volume-12 , Issue-4 , Aug 2024, ISSN 2320-7639 (Online) Go Back
-
Open Access Article
Generative Adversarial Networks Using Name Entity Recognition Model Using Clinical Health Records
Yojitha Chilukuri, Ulligaddala Srinivasarao
Research Paper | Journal-Paper (IJSRCSE)
Vol.12 , Issue.4 , pp.1-7, Aug-2024
Abstract
Recently, there has been increased attention in the Clinical Named Entity Recognition research area within Medical Records (MR). As much clinical-related information exists in structured and unstructured textual data, Named Entity Recognition technology helps extract different types of patient data. The widespread use of MR has sparked interest in utilizing technology, especially in Biomedical Named Entity Recognition, which faces challenges due to various entities such as medications, genes, diseases, and proteins. Recently, advanced NLP technology has shown outstanding performance through pre-training textual encoders. The encoding of input data is pivotal to the effectiveness of neural sequence labeling models, as they are essential for generating the morphological data. This paper focuses on a variant of the deep neural network model to improve the proposed method. This analysis tackles the challenge of Biomedical Named Entity Recognition by employing Generative adversarial networks that integrate biological data analysis. Numerical sequences are converted into word embedding models. The creation of embeddings based on input is facilitated by pre-trained word embeddings such as GloVe. The model efficiency achieves an improved accuracy of 97.74%.Key-Words / Index Term
Generative adversarial networks, Deep neural network, word embedding, Name entity recognition.References
[1] L.J. Gong, Y. Yuan, Y.B. Wei, &X. Sun, “A hybrid approach for biomedical entity name recognition,” In 2009 2nd International Conference on Biomedical Engineering and Informatics, IEEE, pp. 1-5, 2009.
[2] A. Dash, S. Darshana, D.K. Yadav, & V. Gupta, “A clinical named entity recognition model using pretrained word embedding and deep neural networks,” Decision Analytics Journal, Vol. 10, 100426, 2024.
[3] X. Qu, Y. Gu, Q. Xia, Z. Li, Z. Wang, & B. Huai, “A survey on arabic named entity recognition: Past, recent advances, and future trends. IEEE Transactions on Knowledge and Data Engineering, 2023.
[4] Manjunatha Guru V.G., Kamalesh V.N., Apoorva K.B., "An Ensemble Learning Based Approach for Real-Time Face Mask Detection," International Journal of Scientific Research in Computer Science and Engineering, Vol.12, Issue.3, pp.8-13, 2024.
[5] Y. Wu, J. Guo, X. Tan, C. Zhang, B. Li, R. Song R, “Videodubber: Machine translation with speech-aware length control for video dubbing,” Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 37, Issue. 11, 2023.
[6] D. Bahdanau, K. Cho, Y. Bengio, “Neural machine translation by jointly learning to align and translate,” arXiv preprint arXiv:14090473, 2014.
[7] J. M. Giorgi, & G. D. Bader, “Transfer learning for biomedical named entity recognition with neural networks,” Bioinformatics, VOL. 34, Issue.23, pp.4087-4094, 2018.
[8] J. Lee, W. Yoon, S. Kim, D. Kim, S. Kim, & J. Kang, “BioBERT: a pre-trained biomedical language representation model for biomedical text mining,” Bioinformatics, Vol. 36, Issue. (4), 1234-1240, 2020.
[9] Z. He, Z. Wang, W. Wei, S. Feng, X. Mao, & S. Jiang, “A survey on recent advances in sequence labeling from deep learning models,” arXiv preprint arXiv:2011.06727, 2020.
[10] B. Vasavi, P. Dileep, & U. Srinivasarao, “Optimized aspect and self-attention aware LSTM for target-based semantic analysis (OAS-LSTM-TSA),” Data Technologies and Applications, Vol. 58 No. 3, pp. 447-471, 2023.
[11] U. Srinivasarao, & A. Sharaff, “SMS sentiment classification using an evolutionary optimization based fuzzy recurrent neural network,” Multimedia Tools and Applications, Vol. 82, Issue. 27, pp. 42207-42238, 2023.
[12] H. Zhang, X. Wang, J. Liu, L. Zhang, & L. Ji, “Chinese named entity recognition method for the finance domain based on enhanced features and pretrained language models,” Information Sciences, Volume. 625, pp. 385-400, 2023.
[13] S. Fan, H. Yu, X. Cai, Y. Geng, G. Li, W. Xu, & Y. Yang, “Multi-attention deep neural network fusing character and word embedding for clinical and biomedical concept extraction,” Information Sciences, Volume. 608, pp. 778-793, 2022.
[14] C. Sun, & Z. Yang, “Transfer learning in biomedical named entity recognition: an evaluation of BERT in the PharmaCoNER task,” In Proceedings of The 5th Workshop on BioNLP Open Shared Tasks, pp. 100-104, 2019.
[15] K. Hakala, & S. Pyysalo, “Biomedical named entity recognition with multilingual BERT,” In Proceedings of the 5th workshop on BioNLP open shared tasks, pp. 56-61, 2019.
[16] A. Dash, S. Darshana, D. K. Yadav, &V. Gupta, “A clinical named entity recognition model using pretrained word embedding and deep neural networks,” Decision Analytics Journal, Volume.10, pp.100-426, 2024.
[17] A. Garcia-Barragán, Á. Gonzalez Calatayud, O. Solarte-Pabon, M. Provencio, E. Menasalvas, & V. Robles, “GPT for medical entity recognition in Spanish,” Multimedia Tools and Applications, pp.1-20, 2024. https://doi.org/10.1007/s11042-024-19209-5.
[18] U. Srinivasarao, A. Sharaff, “SMS sentiment classification using an evolutionary optimization based fuzzy recurrent neural network,” Multimed Tools Applications, Volume. 82, pp. 42207–42238, 2023. https://doi.org/10.1007/s11042-023-15206-2.
[19] M. Y. Landolsi, L. Ben Romdhane, & L. Hlaoua, “Hybrid medical named entity recognition using document structure and surrounding context,” The Journal of Supercomputing, Volume. 80, Issue. (4), pp. 5011-5041, 2024.
[20] P. N. Ahmad, A. M. Shah, & K. Lee, “A review on electronic health record text-mining for biomedical name entity recognition in healthcare domain,” In Healthcare, Vol. 11, No. 9, p.12-68, 2023.
[21] M. Bhattacharya, S. Bhat, S. Tripathy, A. Bansal, & M. Choudhary, “Improving biomedical named entity recognition through transfer learning and asymmetric tri-training,” Procedia Computer Science, Volume. 218, pp. 2723-2733, 2023.
[22] Z. Hu, & X. Ma, “A novel neural network model fusion approach for improving medical named entity recognition in online health expert question-answering services,” Expert Systems with Applications, Volume. 223, pp. 119-880, 2023.
[23] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, & Y. Bengio, “Generative adversarial networks,” Communications of the ACM, Volume. 63, Issue. 11, pp. 139-144, 2020.
[24] Gatete Marcel, Harubwira Flaubert, "Performance Evaluation of Proactive, Reactive, and Hybrid Routing Protocols for Low- and High-Density MANETs," International Journal of Scientific Research in Computer Science and Engineering, Vol.12, Issue.3, pp.29-35, 2024.Citation
Yojitha Chilukuri, Ulligaddala Srinivasarao, "Generative Adversarial Networks Using Name Entity Recognition Model Using Clinical Health Records," International Journal of Scientific Research in Computer Science and Engineering, Vol.12, Issue.4, pp.1-7, 2024 -
Open Access Article
Examining Cryptographic Primitives and Introducing the Periodic-Shift Cipher
Padma Sree Uma Nandini Kadavakollu, Sony Kumari, Srinivasa Rao Gundu
Research Paper | Journal-Paper (IJSRCSE)
Vol.12 , Issue.4 , pp.8-17, Aug-2024
Abstract
Cryptography is an essential element of modern digital security. It consists of techniques for translating plaintext into ciphertext and back to allow safe communication. It also serves as a foundation for critical applications such as secure internet interactions, electronic business, and data integrity authentication. This work investigates five types of cryptographic primitives: symmetric encryption, asymmetric cryptography, hash functions, and digital signatures, while examining their impact on the CIA Triangle—confidentiality, integrity, and availability. Both classical and modern advances in cryptography are discussed, tracing their evolution from classical ciphers to modern algorithms like RSA, along with the emerging threat of quantum computing. Additionally, a unique encryption technique, the Periodic-Shift Cipher B/I law, is introduced. Designed for educational purposes, it emphasizes simplicity and security, using only odd-numbered shifts and the new “a=z” rule. This article reviews some of the positives and negatives of this architecture and suggests areas for further investigation to enhance pro-cryptography education and better prepare forensic specialists for future security challenges.Key-Words / Index Term
Cryptography, Digital security, Secure communication, Symmetric encryption, Asymmetric cryptography, Hash functions, Digital signatures, RSA algorithmReferences
[1] R.I. Masya, R.F. Aji, and S. Yazid, "Comparison of Vigienere Cipher and Affene Cipher in Three-pass Protocol for Securing Image," International Conference in Science and Technology, Vol., pp. 1-5, 2020.
[2] A. Carlson, S.R. Mikkilineni, M.W. Totaro, R.B. Wiells, and R.E. Hiromoto, "Equivalence of Product Ciphers to Substitution Ciphers and their Security Implications," International Symposium on Networks, Computers and Communications, Vol., pp. 1-6, 2022.
[3] S. Vatsayan, R.A. Hydri, and J.K. Verma, "Design of Hybrid Cryptography System based on Vigenère Cipher and Polybius Cipher," International Conference on Computational Performance Evaluation, Vol., pp. 848-852, 2020.
[4] D. Gautam, C. Agrawal, P. Sharma, M. Mehta, and P. Saini, "An Enhanced Cipher Technique Using Vigienere and Modified Caesar Cipher," International Conference on Trends in Electronics and Informatics, Vol., pp. 1-9, 2018.
[5] N. Jain and S.S. Chauhan, "Novel Approach Transforming Stream Cipher to Block Cipher," International Conference on Technological Advancements and Innovations, Vol., pp. 182-187, 2021.
[6] K. Singh, R. Johari, K. Singh, and H. Tyagi, "Mercurial Cipher: A New Cipher Technique and Comparative Analysis with Classical Cipher Techniques," International Conference on Computing, Communication, and Intelligent Systems, Vol., pp. 223-228, 2019.
[7] A. Al-Sabaawi, "Cryptanalysis of Vigenère Cipher: Method Implementation," IEEE Asia-Pacific Conference on Computer Science and Data Engineering, Vol., pp. 1-4, 2020.
[8] R. Dodmane, R. K R, S. Shetty, K.R. N S, B. K, and S.M.N. Islam, "Implementation of NonLinear Feed Back Stream Cipher System through Hybrid block Cipher Mode to Enhance the Resistivity and Computation Speed of AES," IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering, Vol., pp. 1-6, 2022.
[9] T.M. Aung and N.N. Hla, "A Complex Polyalphabetic Cipher Technique Myanmar Polyalphabetic Cipher," International Conference on Computer Communication and Informatics, Vol., pp. 1-9, 2019.
[10] S. Souror, N. El-Fishawy, and M. Badawy, "SCKHA: A New Stream Cipher Algorithm Based on Key Hashing and Splitting Technique," International Conference on Electronic Engineering, Vol., pp. 1-7, 2021.
[11] T. Ichiki and A. Tsuneda, "Study on Security Enhancement of 64-Bit NFSR-based Block Cipher Systems with Ring Structure," International Conference on Information and Communication Technology Convergence, Vol., pp. 842-844, 2018.
[12] B. Triandi, E. Ekadiansyah, R. Puspasari, L. T. Iwan, and F. Rahmad, "Improve Security Algorithm Cryptography Vigenere Cipher Using Chaos Functions," International Conference on Cyber and IT Service Management, Vol., pp. 1-5, 2018.
[13] A. Sahi, D. Lai, and Y. Li, "An Efficient Hash Based Parallel Block Cipher Mode of Operation," International Conference on Computer and Communication Systems, Vol., pp. 33-40, 2018.
[14] D. Sehrawat, N. S. Gill, and M. Devi, "Comparative Analysis of Lightweight Block Ciphers in IoT-Enabled Smart Environment," International Conference on Signal Processing and Integrated Networks, Vol., pp. 915-920, 2019.
[15] A. Serdano, M. Zarlis, and E. B. Nababan, "Performance of Combining Hill Cipher Algorithm and Caesar Cipher Algorithm in Text Security," International Conference on Artificial Intelligence and Mechatronics Systems, Vol., pp. 1-5, 2021.
[16] A. Al-Sabaawi, "Cryptanalysis of Stream Cipher: Method Implementation," IEEE Asia-Pacific Conference on Computer Science and Data Engineering, Vol., pp. 1-4, 2021.
[17] Joydeep Dey, Sunil Karforma, “A Recent Study on Security Techniques of Information Communication Systems,” International Journal of Scientific Research in Multidisciplinary Studies, Vol.10, Issue.4, pp.77-83, 2024.
[18] Auparajita Krishnaa, Dharmendra Kumar Gurjar, “The Concept of Basic Cipher Text for Enhancing Security in the Algorithms of Cryptography Applications Using Labelled Graphs,” International Journal of Scientific Research in Mathematical and Statistical Sciences, Vol.10, Issue.3, pp.9-13, 2023.
[19] S. Dubey, R. Jhaggar, R. Verma, D. Gaur, “Encryption and Decryption of Data by Genetic Algorithm,” International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.47-52, 2017.
[20] M. Rodinko and R. Oliynykov, "Comparing Performances of Cypress Block Cipher and Modern Lightweight Block Ciphers on Different Platforms," IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology, Vol., pp. 113-116, 2019.
[21] C. Bharathi, K. Y. Annapurna, D. Koppad, and K. Sudeendra Kumar, "An Analysis of Stream and Block Ciphers for Scan Encryption," International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control, Vol., pp. 1-5, 2022.
[22] Srinivasa Rao Gundu, T. Anuradha, “Digital Data Growth and the Philosophy of Digital Universe in View of Emerging Technologies,” International Journal of Scientific Research in Computer Science and Engineering, Vol.8, Issue.2, pp.59-64, 2020.
[23] S. A. Thileeban, "Encryption of images using XOR Cipher," IEEE International Conference on Computational Intelligence and Computing Research, Vol., pp. 1-3, 2016.
[24] Dr. G. S. Rao, Dr. P. Charanarur, and Mr. P. Patel, Eds., Cloud Computing and its Service Oriented Mechanism, AkiNik Publications, 2022.
[25] B. P. R. V. Datta and S. K. N, "FPGA Implementation of Different Layers of Present Cipher," International Conference on Intelligent Technologies, Vol., pp. 1-4, 2023.
[26] P. Charanarur, H. Jain, G. S. Rao, D. Samanta, S. S. Sengar, and C. T. Hewage, “Machine-Learning-Based Spam Mail Detector,” SN Computer Science, Vol. 4, No. 6, 2023.
[27] C. Panem, S. R. Gundu, and J. Vijaylaxmi, “The Role of Machine Learning and Artificial Intelligence in Detecting the Malicious Use of Cyber Space,” Robotic Process Automation, Wiley, Vol., pp. 19–32, Aug. 25, 2023.
[28] J. Ge, Y. Xu, R. Liu, E. Si, N. Shang, and A. Wang, "Power Attack and Protected Implementation on Lightweight Block Cipher SKINNY," Asia Joint Conference on Information Security, Vol., pp. 69-74, 2018.
[29] P. Charanarur, S. R. Gundu, and J. Vijaylaxmi, “Decision Making Using Fuzzy Logic Using Multicriteria,” Fuzzy Logic Applications in Computer Science and Mathematics, Wiley, Vol., pp. 1–12, Sep. 15, 2023.
[30] S. G. Garba, A. A. Obiniyi, M. A. Ibrahim, and B. I. Ahmad, "Towards Finding An Optimal S-box For Lightweight Block Cipher," Information Technology for Education and Development, Vol., pp. 1-8, 2022.
[31] J. Cheng, S. Guo, and J. He, "ALLPC: A Lightweight Block Cipher Based on Generalized Feistel Networks for IoT," IEEE International Performance, Computing, and Communications Conference, Vol., pp. 1-8, 2021.
[32] A. Vambol, "The prospects for group-based knapsack ciphers in the post-quantum era," IEEE 9th International Conference on Dependable Systems, Services and Technologies, Vol., pp. 271-275, 2018.
[33] W. -C. Yang and J. -X. Lee, "Implementation of stream cipher service in JCA," International Symposium on Next-Generation Electronics, Vol., pp. 557-561, 2013.
[34] S. R. Gundu, C. Panem, and J. Vijaylaxmi, “A Comprehensive Study on Cloud Computing and its Security Protocols and Performance Enhancement Using Artificial Intelligence,” Robotic Process Automation, Wiley, Vol., pp. 1–17, Aug. 25, 2023.
[35] A. Singh, N. Chawla, M. Kar, and S. Mukhopadhyay, "Energy efficient and side-channel secure hardware architecture for lightweight cipher SIMON," IEEE International Symposium on Hardware Oriented Security and Trust, Vol., pp. 159-162, 2018.
[36] H. Shi, T. Pu, W. Mou, and Y. Chen, "NIST Randomness Tests on the Extended Key of Quantum Noise Random Stream Cipher," International Conference on Optical Communications and Networks, Vol., pp. 1-3, 2019.
[37] C. Oikonomou, C. S. Kouzinopoulos, D. Ioannidis, and D. Tzovaras, "An Encryption Scheme using Dynamic Keys and Stream Ciphers for Embedded Devices," Mediterranean Conference on Embedded Computing, Vol., pp. 1-4, 2022.
[38] K. -M. Ma, T. -B. -T. Cao, and D. -H. Le, "Design of an SoC Based on 32-bit RISC-V CPU and Lightweight Block Cipher PRINCE on FPGA," 9th NAFOSTED Conference on Information and Computer Science, Vol., pp. 25-29, 2022.
[39] I. Aouissaoui, T. Bakir, and A. Sakly, "FPGA Hardware Co-Simulation of a Stream Cipher Image Cryptosystem based on Fixed-Point Chaotic Map," 19th International Multi-Conference on Systems, Signals & Devices, Vol., pp. 1764-1769, 2022.
[40] A. Heuser, S. Picek, S. Guilley, and N. Mentens, "Lightweight Ciphers and Their Side-Channel Resilience," IEEE Transactions on Computers, Vol. 69, No. 10, pp. 1434-1448, 2020.
[41] S. Taha and H. Mostafa, "Accelerated Software Implementation of Authenticated Encryption Stream Ciphers for High Speed Applications," 31st International Conference on Microelectronics, Vol., pp. 27-31, 2019.
[42] J. Gao, L. Gu, and B. Sun, "Power Attack and Protected Implementation on Block Cipher BIG," 5th International Conference on Information Science, Computer Technology and Transportation, Vol., pp. 1-6, 2020.
[43] S. -W. Eum, H. -J. Kim, H. -D. Kwon, K. -B. Jang, H. -J. Kim, and H. -J. Seo, "Implementation of SM4 block cipher on CUDA GPU and its analysis," International Conference on Platform Technology and Service, Vol., pp. 71-74, 2022.
[44] S. Wang, R. Zhao, Z. Yu, and L. Wang, "Optimized implementations of stream cipher ZUC-256 algorithm," 4th International Academic Exchange Conference on Science and Technology Innovation, Vol., pp. 952-956, 2022.
[45] R. S. Mohammed, "Simon Chaotic: An enhancement of SIMON block cipher by using Arnold and Henon chaotic maps," 8th International Conference on Contemporary Information Technology and Mathematics, Vol., pp. 237-242, 2022.
[46] P. Shivapriya and K. N. Meera, "Application for Digraph Substitution Cipher using Graph Labeling Techniques," IEEE 5th PhD Colloquium on Emerging Domain Innovation and Technology for Society, Vol., pp. 1-2, 2023.
[47] G. S. Manoj, B. Sravanthi, G. Thirumal, and S. R. Venishetty, "VLSI Implementation of SMS4 Cipher for Optimized Utilization of FPGA," Second International Conference on Inventive Communication and Computational Technologies, Vol., pp. 1225-1231, 2018.
[48] A. Al-Sabaawi, "Cryptanalysis of Classic Ciphers: Methods Implementation Survey," International Conference on Intelligent Technologies, Vol., pp. 1-6, 2021.
[49] Y. Wang, "A Classical Cipher-Playfair Cipher and Its Improved Versions," International Conference on Electronic Information Engineering and Computer Science, Vol., pp. 123-126, 2021.
[50] K. Singh, R. Johari, K. Singh, and H. Tyagi, "Mercurial Cipher: A New Cipher Technique and Comparative Analysis with Classical Cipher Techniques," International Conference on Computing, Communication, and Intelligent Systems, Vol., pp. 223-228, 2019.
[51] D. Gautam, C. Agrawal, P. Sharma, M. Mehta, and P. Saini, "An Enhanced Cipher Technique Using Vigenere and Modified Caesar Cipher," 2nd International Conference on Trends in Electronics and Informatics, Vol., pp. 1-9, 2018.
[52] S. Gupta, R. Johari, P. Garg, and K. Gupta, "C3T: Cloud based Cyclic Cryptographic Technique and it’s comparative analysis with classical cipher techniques," 5th International Conference on Signal Processing and Integrated Networks, Vol., pp. 332-337, 2018.
[53] T. M. Aung and N. N. Hla, "A Complex Polyalphabetic Cipher Technique Myanmar Polyalphabetic Cipher," International Conference on Computer Communication and Informatics, Vol., pp. 1-9, 2019.
[54] T. Ichiki and A. Tsuneda, "Study on Security Enhancement of 64-Bit NFSR-based Block Cipher Systems with Ring Structure," International Conference on Information and Communication Technology Convergence, Vol., pp. 842-844, 2018.
[55] A. Serdano, M. Zarlis, and E. B. Nababan, "Performance of Combining Hill Cipher Algorithm and Caesar Cipher Algorithm in Text Security," International Conference on Artificial Intelligence and Mechatronics Systems, Vol., pp. 1-5, 2021.
[56] C. Bharathi, K. Y. Annapurna, D. Koppad, and K. Sudeendra Kumar, "An Analysis of Stream and Block Ciphers for Scan Encryption," International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control, Vol., pp. 1-5, 2022.
[57] J. R. Paragas, A. M. Sison, and R. P. Medina, "An Improved Hill Cipher Algorithm using CBC and Hexadecimal S-Box," IEEE Eurasia Conference on IOT, Communication and Engineering, Vol., pp. 77-81, 2019.
[58] N. Jain and S. S. Chauhan, "Novel Approach Transforming Stream Cipher to Block Cipher," International Conference on Technological Advancements and Innovations, Vol., pp. 182-187, 2021.
[59] R. Majumder, S. Datta, and M. Roy, "An Enhanced Cryptosystem Based on Modified Classical Ciphers," International Conference on Advanced Computing and Communication Systems, Vol., pp. 692-696, 2022.
[60] E. B. Kavun, "A Power Reduction Technique Based on Linear Transformations for Block Ciphers," IFIP/IEEE 30th International Conference on Very Large Scale Integration, Vol., pp. 1-6, 2022.
[61] M. R and N. K. V, "Optimized Implementation of S-box and Inverse S-box for PRESENT Lightweight Block Cipher," International Conference on Visions Towards Emerging Trends in Communication and Networking Technologies, Vol., pp. 1-5, 2023.
[62] A. Al-Sabaawi, "Cryptanalysis of Vigenère Cipher: Method Implementation," IEEE Asia-Pacific Conference on Computer Science and Data Engineering, Vol., pp. 1-4, 2020.
[63] E. Jintcharadze, T. Sarajishvili, A. Surmanidze, and D. Khojava, "Implementation and Comparative Analysis of Symmetric Encryption Model Based on Substitution Cipher Techniques," IEEE East-West Design & Test Symposium, Vol., pp. 1-6, 2021.
[64] O. S. Sitompul, Handrizal, N. H. Pasaribu, and E. B. Nababan, "Hybrid RC4 and Affine Ciphers to Secure Short Message Service on Android," International Conference on Informatics and Computing, Vol., pp. 1-6, 2018.
[65] R. R. K. Chaudhary and K. Chatterjee, "An Efficient Lightweight Cryptographic Technique for IoT based E-healthcare System," International Conference on Signals Processing and Integrated Networks, Vol., pp. 991-995, 2020.
[66] S. Iyer, G. V. Bansod, P. N. V, and S. Garg, "Implementation and Evaluation of Lightweight Ciphers in MQTT Environment," International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques, Vol., pp. 276-281, 2018.
[67] O. Jallouli, M. Chetto, and S. E. Assad, "Lightweight Stream Ciphers based on Chaos for Time and Energy Constrained IoT Applications," Mediterranean Conference on Embedded Computing, Vol., pp. 1-5, 2022.
[68] Ali.M., Nazish.M., Ashaq.S., I. Sultan, and M. T. Banday, "Design of Hybrid Glitch-Reduction Techniques for Loop Unrolled SIMON Block Cypher," Smart Technologies, Communication and Robotics, Vol., pp. 1-6, 2022.
[69] Kumar.P., Mishra.Z, and Acharya.B., "High frequency architecture of SLIM lightweight block cipher for resource-constrained IoT applications," International Conference on Microwave, Optical, and Communication Engineering, Vol., pp. 1-4, 2023.
[70] D. G. Brosas, A. M. Sison, and R. P. Medina, "Modified OTP Based Vernam Cipher Algorithm using Multilevel Encryption Method," IEEE Eurasia Conference on IOT, Communication and Engineering, Vol., pp. 201-204, 2019.
[71] E. Maro and V. Girichev, "Power Analysis of Symmetric Block Cipher Kuznyechik," International Conference on Computer Communication and the Internet, Vol., pp. 106-109, 2020.
[72] R. Dodmane, R. K R, S. Shetty, K. R. N S, B. K, and S. M. N. Islam, "Implementation of Non-Linear Feedback Stream Cipher System through Hybrid block Cipher Mode to Enhance the Resistivity and Computation Speed of AES," IEEE 9th Utthar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering, Vol., pp. 1-6, 2022.
[73] F. Dridi, S. El Assad, C. Atamech, W. E. Youssef, and M. Machhout, "Design and Implementation on FPGA Board of a Chaos-based Stream Cipher," International Conference for Internet Technology and Secured Transactions, Vol., pp. 1-5, 2020.Citation
Padma Sree Uma Nandini Kadavakollu, Sony Kumari, Srinivasa Rao Gundu, "Examining Cryptographic Primitives and Introducing the Periodic-Shift Cipher," International Journal of Scientific Research in Computer Science and Engineering, Vol.12, Issue.4, pp.8-17, 2024 -
Open Access Article
Rôlin Gabriel RASOANAIVO, Joseph Alphonse TATA
Research Paper | Journal-Paper (IJSRCSE)
Vol.12 , Issue.4 , pp.18-31, Aug-2024
Abstract
The ranking of national universities provides an additional means of gauging the performance of universities that have not yet been included in global rankings. In the case of Madagascar, we proposed the implementation of a multi-criteria decision support system, designated as MadUrank, for the purpose of ranking the six public universities in the country. The system employs two distinct methodologies. Firstly, the method based on the removal effects of criteria (MEREC), is used to establish the relative importance of the criteria. Secondly, the combined compromise for ideal solution (CoCoFISo) method, is employed to determine the ranking of universities. The selection of criteria was based on the availability of data, with five criteria ultimately chosen. These were the number of students registered (STUREG), the ratio of students to administrative and technical staff (ATS), the ratio of students to permanent teachers (PTEACH), the success rate in examinations (SUCCES), and the percentage of students receiving scholarships (STUSCHO). The data set comprises observations from 2016 to 2020. In consideration of the data set, the MEREC method afforded priority to the STUREG criterion for the years 2016, 2017, and 2020, and to the STUSCHO criterion for the years 2018 and 2019. In accordance with the aforementioned priority criteria and the data set, the CoCoFISo method designated the Université d’Antananarivo as the top-ranked institution in 2016 and the Université de Fianarantsoa as the top-ranked institution from 2017 to 2020.Key-Words / Index Term
Universities rankings, Madagascar’s Universities, Performance criteria, MEREC, CoCoFISo, MadUrankReferences
[1] MESUPRES, "MESUPRES en chiffres, décembre 2023", Institut National de la Statistique de Madagascar, pp.31, 2024.
[2] Jean Baptiste Rakotoarivelo, "Aide à la décision multi-critère pour la gestion des risques dans le domaine financier", Université de Toulouse, Université Toulouse III - Paul Sabatier, pp.1-7, 2018.
[3] Apurwa Bharti, Babita Mishra, "Determination of Priority Structure through Fuzzy AHP-TOPSIS Approach in Agricultural Sector: A Comparative Study", Int. J. Sci. Res. Math. Stat. Sci., vol.10, Issue.1, pp.20?26, 2023.
[4] Rôlin Gabriel Rasoanaivo, "Système d’aide à la décision multicritère pour l’allocation de logements étudiants", Université Toulouse Capitole, pp.215, 2023.
[5] Mohammed Alqatqat, Ma Tie Feng, et Chandan Solanki, "A Fuzzy Topsis Multiple-Attribute Decision Making for Production Electric upon Future Data", Int. J. Sci. Res. Math. Stat. Sci., vol.8, Issue.3, pp.12?23, 2021.
[6] Aaron S. Horn, Darwin D. Hendel, et Gerald W. Fry, "Ranking the International Dimension of Top Research Universities in the United States", J. Stud. Int. Educ., vol.11, Issue.3?4, pp.330?358, 2007.
[7] Vladimir Ivan?evi?, Ivan Lukovi?, "National university rankings based on open data: A case study from Serbia", Procedia Comput. Sci., vol.126, pp.1516?1525, 2018.
[8] K. S. Sivakumaren, T. Rajkumar, "Publications of Indian Universities in National Institutional Ranking FrameWork (NIRF) System: A Study", pp.1-11, 2019.
[9] A?k?n Ozdagoglu, Alptekin Ulutas, et Murat Kemal Keles, "The ranking of Turkish universities with CoCoSo and MARCOS", Econ. Bus. Organ. Res., pp. 374?392, 2020.
[10] Antonio Prado, "Performances of the Brazilian universities in the “U-MULTIRANK” in the period 2017-2020", SciELO Preprints, pp.1-22, 2021.
[11] Nayme Farah, Zohri Abdelaziz, et Fahmi Sanaa, "National University performance: towards a new ranking system for Moroccan universities", Int. J. Strateg. Manag. Econ. Stud. IJSMES, vol.2, Issue.1, pp.18, 2023.
[12] Duc Trung Do, "Assessing the Impact of Criterion Weights on the Ranking of the Top Ten Universities in Vietnam", Eng. Technol. Appl. Sci. Res., vol.14, Issue.4, pp.5, 2024.
[13] Bernard Roy, "Specific Difficulties in Choice, Sorting, and Ranking Problematics", in Multicriteria Methodology for Decision Aiding, B. Roy, Éd., in Nonconvex Optimization and Its Applications, Boston, MA: Springer US, pp.269?276, 1996.
[14] Martin Aruldoss, T. Miranda Lakshmi, V. Prasanna. Venkatesan, "A survey on multi criteria decision making methods and its applications", Am. J. Inf. Syst., vol.1, Issue.1, pp.31?43, 2013.
[15] Edmundas Kazimieras Zavadskas, Jurgita Antucheviciene, Hojjat Adeli, et Zenonas Turskis, "Hybrid multiple criteria decision-making methods: A review of applications in engineering", Sci. Iran., vol.23, Issue.1, pp.1?20, 2016.
[16] Mahendra Prasad Nath, Sachi Nandan Mohanty, Sushree Bibhuprada Priyadarshini, "A Review of Decision Making Using Multiple Criteria", Decis. Mak. Probl. Solving, pp.27, 2021.
[17] Mehdi Keshavarz-Ghorabaee, Maghsoud Amiri, Edmundas Kazimieras Zavadskas, Zenonas Turskis, Jurgita Antucheviciene, "Determination of Objective Weights Using a New Method Based on the Removal Effects of Criteria (MEREC)", Symmetry, vol.13, Issue.4, 2021.
[18] Rôlin Gabriel Rasoanaivo, Morteza Yazdani, Pascale Zaraté, Amirhossein Fateh, "Combined compromise for ideal solution (CoCoFISo): A multi-criteria decision-making based on the CoCoSo method algorithm", Expert Syst. Appl., vol.251, pp.124079, 2024.
[19] Rôlin Gabriel Rasoanaivo, Pascale Zaraté, "SAGeLogE: A Decision Support System for Students’ Accommodation Management", J. Comput. Commun., vol.12, Issue.3, 2024.
[20] MESUPRES, "MESUPRES?: Annuaire statistique 2021-2022". Institut National de la Statistique de Madagascar, pp.153, 2024.
[21] MESUPRES, "MESUPRES?: Les indicateurs statistiques de l’enseignement supérieur", Institut National de la Statistique de Madagascar, pp.4, 2024.Citation
Rôlin Gabriel RASOANAIVO, Joseph Alphonse TATA, "A New Technique of Ranking Madagascar’s Universities Using CoCoFISo Method in a Multi-Criteria Decision Support System: MadUrank," International Journal of Scientific Research in Computer Science and Engineering, Vol.12, Issue.4, pp.18-31, 2024 -
Open Access Article
Internet of Things (IoT) and their Intrusion: Solution and Potential Challenges
Danial Haider, Tehreem Saboor, Aqsa Rais
Research Paper | Journal-Paper (IJSRCSE)
Vol.12 , Issue.4 , pp.32-47, Aug-2024
Abstract
As we know, the cyber-attacks are merging day by day. Everything that relates to the internet has compromised with the attacks. Internet connection and their connectivity with other devices make them more vulnerable to attacks. Numerous industries, including aerial observation, wireless communication, healthcare, construction, precision farming, search and rescue, and the military, heavily rely on their usage. Moreover, these systems or networks are still exposed and have loopholes that make it welcomed to attackers to invade the system or network easily. Intrusion detection system is the system that is used to sense and also protect the network from cyber-attacks that are possible due to internet connections. This paper highlights the threat and issues that are link with the intrusion detection system in IoT domain. Also, paper emphasis on the significance or importance of the IDS in IoT. Also highlights the various IDS like signature-based IDS, anomaly-based IDS etc. Furthermore, describes and elaborates the problems that are faced with respect to each type of IDS. Finally, suggest remediation against each problem of each type of IDS to safeguard the IoT domain.Key-Words / Index Term
IoT, IDS, Attacks, ChallengesReferences
[1] Spadaccino, P., & Cuomo, F. Intrusion Detection Systems for IoT: opportunities and challenges offered by Edge Computing and Machine Learning. arXiv preprint arXiv:2012.01174,2020
[2] Sanju, P. Enhancing Intrusion Detection in IoT Systems: A Hybrid Metaheuristics-Deep Learning Approach with Ensemble of Recurrent Neural Networks. Journal of Engineering Research, 100122, 2023
[3] Sicato, J. C. S., Singh, S. K., Rathore, S., & Park, J. H. A comprehensive analyses of intrusion detection system for IoT environment. Journal of Information Processing Systems, 16(4), 975-990, 2020
[4] R. Nicole, “Title of paper with only first word capitalized,” J. Name Khan, A. R., Kashif, M., Jhaveri, R. H., Raut, R., Saba, T., & Bahaj, S. A. Deep learning for intrusion detection and security of Internet of things (IoT): current analysis, challenges, and possible solutions. Security and Communication Networks, 2022.Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp. 740–741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982],2022
[5] Benkhelifa, E., Welsh, T., & Hamouda, W. A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems. IEEE communications surveys & tutorials, 20(4), 3496-3509.2018
[6] Hassija, V.; Saxena, V.; Chamola, V. Scheduling drone charging for multi-drone network based on consensus time-stamp and game theory. Comput. Commun. 2019, 149, 51–61. [Google Scholar] [CrossRef]
[7] Khraisat, A., & Alazab, A. A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity, 4, 1-27, 2021
[8] Awajan, A. A novel deep learning-based intrusion detection system for IOT networks. Computers, 12(2), 34,2023
[9] Santhosh Kumar, S. V. N., Selvi, M., & Kannan, A. A comprehensive survey on machine learning-based intrusion detection systems for secure communication in internet of things. Computational Intelligence and Neuroscience, 2023.
[10] Mohy-eddine, M., Guezzaz, A., Benkirane, S., & Azrour, M. An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection. Multimedia Tools and Applications, 1-19,2023
[11] Shah, H., Shah, D., Jadav, N. K., Gupta, R., Tanwar, S., Alfarraj, O., ... & Marina, V. Deep learning-based malicious smart contract and intrusion detection system for IoT environment. Mathematics, 11(2), 418.,2023
[12] Othman, T. S., Koy, K. R., & Abdullah, S. M. Intrusion Detection Systems for IoT Attack Detection and Identification Using Intelligent Techniques. networks, 5(6),2023
[13] Savanovi?, N., Toskovic, A., Petrovic, A., Zivkovic, M., Damaševi?ius, R., Jovanovic, L., ... & Nikolic, B. Intrusion detection in healthcare 4.0 internet of things systems via metaheuristics optimized machine learning. Sustainability, 15(16), 12563 ,2023
[14] Bhavsar, M., Roy, K., Kelly, J., & Olusola, O. Anomaly-based intrusion detection system for IoT application. Discover Internet of Things, 3(1), 5 ,2023
[15] Mahadik, S., Pawar, P. M., & Muthalagu, R. Efficient Intelligent Intrusion Detection System for Heterogeneous Internet of Things (HetIoT). Journal of Network and Systems Management, 31(1), 2,2023
[16] Heidari, A., & Jabraeil Jamali, M. A. Internet of Things intrusion detection systems: A comprehensive review and future directions. Cluster Computing, 26(6), 3753-3780 ,2023
[17] Jeyaselvi, M., Dhanaraj, R. K., Sathya, M., Memon, F. H., Krishnasamy, L., Dev, K., ... & Qureshi, N. M. F. A highly secured intrusion detection system for IoT using EXPSO-STFA feature selection for LAANN to detect attacks. Cluster Computing, 26(1), 559-574 ,2023
[18] Musleh, D., Alotaibi, M., Alhaidari, F., Rahman, A., & Mohammad, R. M. Intrusion Detection System Using Feature Extraction with Machine Learning Algorithms in IoT. Journal of Sensor and Actuator Networks, 12(2), 29,2023
[19] Al Sawafi, Y., Touzene, A., & Hedjam, R.Hybrid Deep Learning-Based Intrusion Detection System for RPL IoT Networks. Journal of Sensor and Actuator Networks, 12(2), 21,2023
[20] Otoum, Y., Liu, D., & Nayak, A. DL?IDS: a deep learning–based intrusion detection framework for securing IoT. Transactions on Emerging Telecommunications Technologies, 33(3), e3803,2022
[21] Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1), e4150,2021
[22] Visoottiviseth, V., Sakarin, P., Thongwilai, J., & Choobanjong, T. Signature-based and behavior-based attack detection with machine learning for home IoT devices. In 2020 IEEE REGION 10 CONFERENCE (TENCON) (pp. 829-834). IEEE,2020
[23] Khattak, H. A., Shah, M. A., Khan, S., Ali, I., & Imran, M. Perception layer security in Internet of Things. Future Generation Computer Systems, 100, 144-164. 2019
[24] OS, J. N., & Bhanu, S. M. S. A survey on code injection attacks in mobile cloud computing environment. In 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (pp. 1-6). IEEE.2018, January
[25] M. Devi and A. Majumder, ‘‘Side-channel attack in Internet of Things: A survey,’’ in Applications of Internet of Things (Lecture Notes in Networks and Systems), J. K. Mandal, S. Mukhopadhyay, and A. Roy, Eds. Singapore: Springer, 2021, pp. 213–222.
[26] K. O. A. Alimi, K. Ouahada, A. M. Abu-Mahfouz, and S. Rimer, ‘‘A survey on the security of low power wide area networks: Threats, challenges, and potential solutions,’’ Sensors, vol. 20, no. 20, pp. 1–19, 2020
[27] H. Mrabet, S. Belguith, A. Alhomoud, and A. Jemai, ‘‘A survey of IoT security based on a layered architecture of sensing and data analysis,’’ K. Nirmal, B. Janet, and R. Kumar, ‘‘Analyzing and eliminating phishing
[28] R. Vishwakarma and A. K. Jain, ‘‘A survey of DDoS attacking techniques and defence mechanisms in the IoT network,’’ Telecommun. Syst., vol. 73, no. 1, pp. 3–25, Jan. 2020
[29] Raoof, A. Matrawy, and C.-H. Lung, ‘‘Enhancing routing security in IoT: Performance evaluation of RPL’s secure mode under attacks,’’ IEEE Internet Things J., vol. 7, no. 12, pp. 11536–11546, Dec. 2020.
[30] D. Dinculean? and X. Cheng, ‘‘Vulnerabilities and limitations of MQTT protocol used between IoT devices,’’ Appl. Sci., vol. 9, no. 5, p. 848, Feb. 2019.
[31] Tewari and B. B. Gupta, ‘‘Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework,’’ Future Gener. Comput. Syst., vol. 108, pp. 909–920, Jul. 2020.
[32] Ahlawat, A. Sangwan, and V. Sindhu, ‘‘IoT system model, challenges and threats,’’ Int. J. Sci. Technol. Res., vol. 9, no. 3, pp. 6771–6776, 2020.
[33] Prabadevi and N. Jeyanthi, ‘‘A review on various sniffing attacks and its mitigation techniques,’’ Indonesian J. Elect. Eng. Comput. Sci., vol. 12, no. 3, pp. 1117–1125, 2018
[34] Tariq, N., Saboor, T., Ashraf, M., Butt, R., Anwar, M., & Humayun, M. IoT Security, Future Challenges, and Open Issues. In Cybersecurity Measures for Logistics Industry Framework (pp. 116-140). IGI Global. 2024
[35] Butt, M. H. F., Li, J. P., Saboor, T., Arslan, M., & Butt, M. A. F. Intelligent Phishing Url Detection: A Solution Based On Deep Learning Framework. In 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) (pp. 434-439). IEEE. 2021, December.
[36] Butt, M. H. F., Li, J. P., & Saboor, T. A tunable and explainable attributes (TEA) for recommendation system. In 2020 17th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) (pp. 39-43). IEEE. 2020, December
[37] Mortada M. Abdulwahab, Hadeel A.Mohamed, Mutseuim A. Alameen, Mohamed A. Mosalam, Faris M.Elsadig, "Wireless Sensor Network of Monitoring Water Distribution Network Service using IoT," International Journal of Scientific Research in Computer Science and Engineering, Vol.11, Issue.1, pp.51-55, 2023
[38] Prabhat Bisht, Manmohan Singh Rauthan, "Machine Learning and Natural Language Processing Based Web Application Firewall for Mitigating Cyber Attacks in Cloud," International Journal of Scientific Research in Computer Science and Engineering, Vol.11, Issue.3, pp.1-15, 2023Citation
Danial Haider, Tehreem Saboor, Aqsa Rais, "Internet of Things (IoT) and their Intrusion: Solution and Potential Challenges," International Journal of Scientific Research in Computer Science and Engineering, Vol.12, Issue.4, pp.32-47, 2024 -
Open Access Article
Cyber-Physical Systems with Anti-smog Guns for Busy City Areas to Suppress Air Pollution Efficiently
Shivam Kumar Sah
Research Paper | Journal-Paper (IJSRCSE)
Vol.12 , Issue.4 , pp.48-53, Aug-2024
Abstract
Living in once the world’s most polluted city i.e. Kathmandu, it is obvious to question ourselves what adverse effect we could have by just inhalation of the toxic air every day, especially, when inhaling the air for a single day equals the fumes produced by nearly 10 cigarettes. Meanwhile, the long-term plans–planting trees, strict traffic regulations, and awareness–seemed to be implausible for the locals and city hustles. Similarly, instant solutions like Anti-smog vehicles invite more problems like traffic congestion and management efforts, and solutions like air scrubber technology are yet to be implemented that require prior data of polluted areas to place the scrubber efficiently. Therefore, a concept to tackle these issues, a system that automatically implements instant solutions to suppress air pollution for adverse effects, is to be introduced. This paper explores the concept of Technology, IoT, Data Science, and Cloud computing concepts to build a Cyber-Physical System and uses water mist with suitable eco-friendly surfactants to suppress air pollution in busy city areas efficiently. Our proposed solution uses a chain of Nephelometers throughout the city at specific distances that send data to the cloud that is further processed to operate the nearby automatic immobile Anti-smog gun to suppress the particulate matter without any traffic congestion or mass wastage of resources. The collected data collected in the cloud could be further evaluated to place additional Air Scrubber Systems in specific required areas.Key-Words / Index Term
Cyber-Physical System, Air Pollution Suppression, Transdisciplinary approach, Anti-smog guns, Air Scrubber, Nephelometer, IoT, Cloud computing, etc.References
[1] World Health Organization. “Air Pollution and Child Health: Prescribing Clean Air,” WHO, 2018. Accessed: July 12, 2024.
[2] S. Zheng, J. Cao, & Y. Song, “Urban Air Quality and Health: Empirical Evidence from China,” China Economic Review, Vol. 30, pp. 514-528, 2014.
[3] P. Kumar, & S. Gulia, “Tackling Air Pollution in Urban Areas: Some Case Studies,” Aerosol and Air Quality Research, Vol. 17, Issue. 4, pp. 1072-1084, 2017.
[4] S. Roy, & P. Goswami, “The Role of Urban Planning in Air Pollution Reduction: Evidence from India,” Environment, Development and Sustainability, Vol. 22, pp. 1337-1354, 2020.
[5] L. Tang, & J. Lang, “Evaluating the Effectiveness of Urban Green Spaces for Mitigating Air Pollution: A Review,” Urban Forestry & Urban Greening, Vol. 31, pp. 192-204, 2018.
[6] R. Singh, & V. Sinha, “Air Pollution in Mega Cities: An Overview of Human Health Effects and the Role of Non-Governmental Organizations,” International Journal of Environmental Research and Public Health, Vol. 16, No. 22, pp. 4265, 2019.
[7] H. Chen, & H. Kan, “Air Pollution and Health Effects in China: A Review of Current Evidence,” Journal of Environmental Sciences, Vol. 94, pp. 103-115, 2020.
[8] C. He, & L. Morawska, “Characterization of Emissions from Diesel Vehicles Equipped with Different Types of Particulate Control Technologies,” Atmospheric Environment, Vol. 221, Article 117065, 2019.
[9] S. Joshi, & P. Mishra, “Monitoring Urban Air Pollution Using Low-Cost Sensors: Case Study of Kathmandu Valley,” Environmental Monitoring and Assessment, Vol. 194, Issue. 2, Article 103, 2022.
[10] S. Ryu, & S. Chung, “Smart Water Management for Sustainable Urban Development,” Water Resources Management, Vol. 32, pp. 3331-3345, 2018.
[11] J. Gao, & S. Li, “Real-Time Air Quality Monitoring and Forecasting System for Urban Areas Using CPS Technology,” Journal of Cleaner Production, Vol. 209, pp. 865-876, 2019.
[12] X. Zhang, & Y. Wang, “Optimizing Locations of Air Scrubbers in Urban Environments Using GIS and Remote Sensing,” Environmental Pollution, Vol. 223, pp. 79-87, 2017.
[13] C. Chen, B. Zhao, L. B. Weschler, & H. Wang, “Indoor Air Quality and Thermal Comfort in Residential Buildings,” Energy and Buildings, Vol. 103, pp. 115-124, 2015.
[14] S. Gulia, M. Khare, & I. Khanna, “Assessment of Effectiveness of Air Quality Interventions During the 2010 Commonwealth Games at Delhi, India,” Environmental Science and Pollution Research, Vol. 22, No. 17, pp. 13279-13288, 2015.
[15] P. Gupta, S. A. Christopher, J. Wang, R. Gehrig, Y. C. Lee, & N. Kumar, “Satellite Remote Sensing of Particulate Matter and Air Quality Assessment Over Global Cities,” Atmospheric Environment, Vol. 40, No. 30, pp. 5880-5892, 2018.
[16] P. Kumar, A. P. Patton, J. L. Durant, & H. C. Frey, “A Review of Factors Impacting Exposure to PM2.5, Ultrafine Particles, and Black Carbon in Asian Transport Microenvironments,” Atmospheric Environment, Vol. 178, pp. 79-93, 2020.
[17] E. G. McPherson, D. J. Nowak, & R. A. Rowntree, “Chicago`s Urban Forest Ecosystem: Results of the Chicago Urban Forest Climate Project,” USDA Forest Service General Technical Report, NE-186, 1997.
[18] D. J. Nowak, D. E. Crane, & J. C. Stevens, “Air Pollution Removal by Urban Trees and Shrubs in the United States,” Urban Forestry & Urban Greening, Vol. 4, Nos. 3-4, pp. 115-123, 2006.
[19] P. Zhao, H. Yu, Y. Yin, & D. He, “Performance of Outdoor Air Cleaners: A Review,” Building and Environment, Vol. 137, pp. 132-145, 2018.
[20] S. Mewada, U. K. Singh, and P. Sharma, "Title of the Paper," International Journal of Scientific Research in Computer Science and Engineering, Vol. 1, Issue. 1, 2013.
[21]V. Mangotra and R. Dogra, "Cloud reliability enhancement mechanisms: A Survey," International Journal of Scientific Research in Computer Science and Engineering, Vol. 6, Issue. 3, pp. 31-34, 2018.
[22] Partnership For Advanced Computing in Europe. AmpliSIM: Air Quality Simulation for Industry. Accessed: July 28, 2024.Citation
Shivam Kumar Sah, "Cyber-Physical Systems with Anti-smog Guns for Busy City Areas to Suppress Air Pollution Efficiently," International Journal of Scientific Research in Computer Science and Engineering, Vol.12, Issue.4, pp.48-53, 2024 -
Open Access Article
Association Rule Mining on Likert’s Scale Data using a Novel Attributes Pruning Technique
Ogedengbe M.T., Junaidu S.B., Kana A.F.D.
Research Paper | Journal-Paper (IJSRCSE)
Vol.12 , Issue.4 , pp.54-65, Aug-2024
Abstract
In recent decades, the Apriori algorithm has emerged as a powerful tool for generating meaningful insights and supporting effective decision-making in data science. Traditionally a binary mining tool, Apriori is highly efficient in analysing transaction datasets in market basket analysis to uncover customer purchasing patterns. When applied to Likert scale datasets, however, it requires discretizing item attributes into binary values, which can result in significant information loss. This study proposes a novel mining technique called Common Question Attribute Pruning (CQAP), which enhances the standard Apriori algorithm by extending its capabilities to process 5-point Likert scale datasets without the need for attribute discretization, thereby preserving the ordinal nature of the respondents` opinions. The key innovation of this technique lies in its ability to represent all five points of the Likert scale within the Apriori framework, without converting them to Boolean transaction data (0s and 1s). The modified Apriori algorithm, termed the Extended Apriori Algorithm (Ext-AA), generates candidate sets by treating question-value (q,v) pairs as data points. During the candidate joining phase, any combinations with common question attributes are pruned. This approach introduces a new perspective on defining support count, minimum support threshold metric, and minimum confidence threshold metric, which helps in filtering out infrequent candidate sets and the determination of the strength of the association rules derived from the sample dataset. In experimental evaluations on sample datasets, the Ext-AA produced 8 strong rules, whereas the standard Apriori algorithm generated 135 rules which is 89.63% rule reduction after pruning. These results demonstrate the superior performance potential of CQAP technique against the state of art Apriori algorithm on the evaluated sample datasets.Key-Words / Index Term
Apriori; Pruning; Likert scale; Questionnaire; Candidate-set; Itemset; Support; ConfidenceReferences
[1] K. Baffour, C. Osei-Bonsu, A. Adekoya, “A Modified Apriori Algorithm for Fast and Accurate Generation of Frequent Item Sets”. International Journal of Scientific & Technology Research (IJSTR), Vol.6, pp.169-173, 2017.
[2] R. Z. Niu, G. Fang, D. Zeng, H. Yuan, “An improved Apriori algorithm based on influence weight”. In?Third International Conference on Computer Vision and Pattern Analysis (ICCPA 2023), Vol.12754, pp.673 679, 2023.SPIE.
[3] X. Wu, Y. Xiao, A. Liu, “Application of improved Apriori Algorithm in Innovation and Entrepreneurship Engineering Education Platform”.?Scalable Computing: Practice and Experience,?Vol.24, No.3, pp.609-620, 2023.
[4] E.S. Harpe, D. Pharm, “How to analyze Likert and other rating scale data”. Curr. Pharm. Teach. Learn. Vol.7, pp.836-850, 2015.
[5] U. Sivarajah, M. Kamal, Z. Irani, V. Weerakkody, “Critical Analysis of Big Data challenges and Analytical Methods”. Journal of Business Research (JBR), Published by Elsevier Inc. Vol.70, pp.263-286, 2017, DOI: https://doi.org/10.1016/j.jbusres.2016.08.001.
[6] S. Rana, M.N.I. Mondal, “A Seasonal and Multilevel Association Based Approach for Market Basket Analysis in Retail Supermarket”.?European Journal of Information Technologies and Computer Science,?Vol.1, No.4, pp.9-15, 2021.
[7] R. Agrawal, G. Johannes, G. Dimitrios, R. Prabhakar, “Automatic Subspace Clustering of High Dimensional Data for Data Mining Applications”. In SIGMOD ’98: Proceedings of the 1998 ACM SIGMOD. International Conference on Management of data. New York, NY, USA. ACM Press, pp.94-105, 1998.
[8] A. Joshi, S. Kale, S. Chandel, D.K. Pal, “Likert scale: Evaluating the Interdependent Effect for Likert Scale Items”, Appl. Sci. Technol, Vol.7, pp.396-403, 2015.
[9] K. Teymoornejad, “Improving Apriori Algorithm with Various Techniques”,2018. https://www.researchgate.net/publication/329736159_Improving_Apriori_Algorithm_with_various _techniques.
[10] R. Agrawal, T. Imieli?ski, A. Swami, “Mining association rules between sets of items in large databases”. Paper presented at the Proceedings of the 1993 ACM SIGMOD. International Conference on Management of data. 1993.
[11] B.P. Subedi, “Using Likert type data in social science research: confusion, issues and challenges”. Int.J. Contemp. Appl. Sci. Vol.3, pp.36-49, 2016.
[12] K. Singh, J. Maiti, “Mining Frequent Patterns with Temporal Effect: A Case of Accident Path Analysis”. Proceedings of ICETIT. Springer, pp.596-603, 2020.
[13] Z. Abdullah, A. Gusman, T. Herawan, M. Deris, “MILAR: Mining Indirect Least Association Rule Algorithm”. International Conference on Advanced Data and Information Engineering (ADIE), pp.159-166, 2016.
[14] C.H. Chee, J. Jaafar, I.A. Aziz, M.H. Hasan, W. Yeoh, “Algorithms for frequent itemset mining: a literature review”. Artificial Intelligence Review, Vol.4, pp.2603-2621, 2019.
[15] A.R. Riszky, M. Sadikin, “Data Mining using Apriori Algorithm for Product Recommendation for Customers”, Journal of computer system technology (JCST), Vol.7, pp.103-108, 2019. https://doi.org/ jtsiskom.7.3.2019.103-108.
[16] D. Patill, R. Deshmukh, D. Kirange, “Adaptive Apriori Algorithm for Frequent Itemset Mining”. Proceedings of the SMART, IEEE Conference ID: 39669 5th, International Conference on System Modeling & Advancement in Research Trends, College of Computing Sciences & Information Technology, Teerthanker Mahaveer University, Moradabad, India, pp.7-13, 2016.
[17] B. Yu, C.F. Wen, H.L. Lo, H.H. Liao, P.C. Wang, “Improvements in patient safety culture: a national Taiwanese survey”, International Journal for Quality in Health Care (IJQHC). Vol.16, 2020.
[18] D. Ginting, H. Mawengkang, S. Efendi, “Modification of Apriori Algorithm focused on Confidence Value to Association Rules”. Nommensen International Conference on Technology and Engineering. IOP Publishing IOP Conf. Series: Materials Science and Engineering, doi:10.1088/1757-899X/420/1/012125, 2018.
[19] A. Hodijah, U.T. Setijohatmo, G. Munawar, G.S. Ramadhanty, “Multi-threaded approach in generating frequent itemset of Apriori algorithm based on trie data structure”.?TELKOMNIKA (Telecommunication Computing Electronics and Control),?Vol.20, No.5, pp.1034-1045, 2022.
[20] R. Likert, “A technique for the measurement of attitudes”, Arch. Psychol, Vol.22, pp.55, 1932.
[21] A. Pandey, A. Jain, “Comparative analysis of KNN algorithm using various normalization techniques”, Int.J.Comp. Netw. Inf. Secur, Vol.11, pp.36-42, 2017. DOI:10.5815/ijcnis.2017.11.04.
[22] E. Hikmawati, N.U. Maulidevi, K. Surendro, “Pruning Strategy on Adaptive Rule Model by Sorting Utility Items”.?IEEE Access,?Vol.10, pp.91650-91662, 2022.
[23] M.T. Ogedengbe, S.B. Junaidu F.D.A. Kana, “Itemset Fusion: A New Technique for Itemsets Generation”. ATBU Journal of Science, Technology and Education, Vol.12, No.1, pp.216-230, 2024.
[24] D. Kriksciuniene, V. Sakalauskas, “AHP Model for Quality Evaluation of Healthcare System”. In: Damaevi?ius, R., Mikayt, V. (eds.) ICIST, Vol.756, pp.129-141. Springer, Cham. 2017. DOI:https://doi.org/10.1007/978-3-319-67642-511.
[25] R. Lewandowski, “Evaluating the Interdependent Effect for Likert Scale Items”. Paper presented at the Business Information Systems Workshops: BIS 2019 International Workshops, Seville, Spain, pp.26–28, 2020.
[26] P. Jalpa, D. Rustom, “A Novel Hybrid Method for Generating Association Rules for Stock Market Data”, 2017.
[27] Z. Kohzadi, A.M. Nickfarjam, L.S. Arani, M. Mahdia, “Extraction frequent patterns in trauma dataset based on automatic generation of minimum support and feature weighting”. BMC medical research methodology, Vol.24, No.1, pp.40, 2024.
[28] G.M. Sullivan, A.R. Artino Jr, “Analyzing and interpreting data from Likert-type scales”. Journal of graduate medical education (JGME), Vol.5, No.4, pp.541-542, 2013.
[29] K. Sumiran, “An Overview of Data Mining Techniques and their Application in Industrial Engineering”. Asian Journal. Appl. Sci. Technol, Vol.2, pp.947-953.
[30] R. Yadav, K Garg, “An Improved Multiple-level Association Rule Mining Algorithm with Boolean Transposed Database”. International Journal of Computer Science and Information Security (IJCSIS), Vol.13, pp.9, 2015.
[31] F. Li, C. Meng, C. Wang, S. Fan, “Equipment Quality Information Mining Method Based on Improved Apriori Algorithm”.?Journal of Sensors, 2023.
[32] M. Hosseini, O. Akbari, A. Rahmani, A. Shakeri, “Predicting Students’ Score in the English Section of the Ba Entrance Exam by Apriori Algorithm”. Research Journal of English Language and Literature (RJELAL), Vol.3, pp.306-313, 2015.
[33] N. Mahajan, J. Namdeo, “Analysis of Student Result Data Using Association Rule Mining”. Research Journal of Science and IT Management, (RJSITM), Vol.4, No.6, pp.32-37, 2015.
[34] C.L. Mao, S.L. Zou, J.H. Yin, “Educational Evaluation Based on Apriori-Gen Algorithm”. EURASIA Journal of Mathematics Science and Technology Education, Vol.13, No.10, pp.6555-6564, 2017. DOI: 10.12973/ejmste /78097.
[35] M.E. Saad, S.N.S. Abdullah M.Z. Murah, “Cyber Romance Scam Victimization Analysis using Routine Activity Theory Versus Apriori Algorithm”, International Journal of Advanced Computer Science and Applications (IJACSA), Vol.9, No.12, pp.479 – 485, 2018.
[36] K. Kakde, P. Gupta, “Performance Evaluation of Student Based on Attendance Using Data Mining Technique”, International Research Journal of Engineering and Technology (IRJET), Vol.5, No.5, pp.465-467, 2018.
[37] N.H. Hanafi, D.J. Juanis, M.H. Samian, S. Mohmad, S.A.M. Shafie, S.N. Shamsuddin, “An Application of Association Rule Mining in Analyzing Courses Affecting the Results of Financial Mathematics Case: UITM Seremban Campus”. Social Sciences, vol.9, pp.123-133, 2019.
[38] F. Asur, D. Sevimli, K. Yazici, “Visual Preferences Assessment of Landscape Character Types Using Data Mining Methods (Apriori Algorithm): The Case of Alt?nsaç and Inkoy (Van/Turkey)”. Journal of Agricultural Science and Technology (JAST), Vol.22, pp.247-260, 2020.
[39] D. Bertram, “Likert Scales”. http://my.ilstu.edu/~eostewa/497/Likert%20topic-dane-likert.pdf. 2016.
[40] A.P.U. Siahaan, A. Ikhwan, S. Aryza, “A Novelty of Data Mining for Promoting Education based on FP-Growth Algorithm”, 2018.
[41] S. Jain, S. Shukla, R. Wadhvani, “Dynamic selection of Normalization Techniques using Data Complexity Measures”, Expert System Application, Vol.106, pp.252-262, 2018.
[42] V.G. Manjunatha Guru, V. N. Kamalesh, K. B. Apoorva. "An Ensemble Learning Based Approach for Real-Time Face Mask Detection." Int. J. Sci. Res. in Computer Science and Engineering (IJSRCE), Vol.12, No.3, 2024.
[43] S. Pawan Wasnik, S.D. Khamitkar, Parag Bhalchandra, S.N. Lokhande, S. Ajit Adte, "An Observation of Different Algorithmic Technique of Association Rule and Clustering", International Journal of Scientific Research in Computer Science and Engineering (IJSRCSE), Vol.6, Issue.1, pp.28-30, 2018.
[44] M.T. Ogedengbe, S.B. Junaidu, A.F.D. Kana, "Adaptive Minimum Support Threshold for Association Rule Mining." Indonesian Journal of Data and Science (IJDS), Vol.5, No.2, 2024.
[45] S.A. Olaleye, D.C. Ukpabi, O. Olawumi, D.D. Atsa`am, R.O. Agjei, S.S. Oyelere, E.A. Kolog, Association rule mining for job seekers` profiles based on personality traits and Facebook usage International Journal of Business Information Systems (IJBIS), Vol.40, No.3, pp.299-326, 2022.
[46] L.M. Mohammed, M.T. Ogedengbe, “FP-Growth Algorithm: Mining Association Rules without Candidate Sets Generation.”, Kasu Journal of Computer Science, (KJCS), Vol.1, No.2, pp. 392-411.Citation
Ogedengbe M.T., Junaidu S.B., Kana A.F.D., "Association Rule Mining on Likert’s Scale Data using a Novel Attributes Pruning Technique," International Journal of Scientific Research in Computer Science and Engineering, Vol.12, Issue.4, pp.54-65, 2024 -
Open Access Article
Internet Protocol with Internet Programming (IP with IP): Architecture and Design
Arun Kumar Singh, Alak Kumar Patra
Research Paper | Journal-Paper (IJSRCSE)
Vol.12 , Issue.4 , pp.66-76, Aug-2024
Abstract
The Internet Protocol (IP) is a communication protocol utilized for inter-device communication on the Internet. It is a protocol at the network layer that furnishes an addressing system for uniquely identifying devices on the network and facilitating the routing of data packets between them. Conversely, Internet Programming pertains to the creation of applications and services that operate on the Internet. This encompasses activities such as web development, mobile app development, and other types of networked application development. IP is a crucial element of Internet programming because it establishes the underlying infrastructure for inter-device communication on the Internet. Internet programmers must possess a comprehensive understanding of IP and its associated protocols, like TCP (Transmission Control Protocol) and UDP (User Datagram Protocol), to construct applications that can communicate over the Internet. Additionally, internet programmers employ a variety of programming languages, frameworks, and tools to build applications that function on the Internet. This can incorporate languages such as JavaScript, Python, Ruby, and PHP, as well as web development frameworks like React, Angular, and Vue. In summary, IP and Internet programming are closely connected, as IP forms the basis for inter-device communication on the Internet, while Internet programming utilizes this foundation to develop a wide range of networked applications and services. In this article, we will elucidate the significance of both IP and internet programming as indispensable constituents of the Internet, demonstrating their close interconnection. IP establishes the groundwork for data transmission, while internet programming furnishes the means for creating and delivering web-based applications and services.Key-Words / Index Term
Internet Protocol (IP); Internet Programming; IPv4; IPv6; Type of Service; ProtocolReferences
[1] Sobin, “A survey on architecture, protocols and challenges in IoT”, Wireless Personal Communication, 1(12), pp 1383–1429, 2020
[2] Seyed Mostafa Bozorgi, Mehdi Golaorkhtabaramiri Samaneh Yazdanid, “A Smart Optimizer Approach for Clustering Protocol in UAV-assisted IoT Wireless Networks”, Journal of Internet of Things; 2023
[3] J. Chen, C. Touati, Q. Zhu, “Optimal Secure Two-layer IoT Network Design”, IEEE Transaction Control Networking Systems, 7(1), pp 398–409, 2020.
[4] Andrew L. Russell, “Open standards and the digital age: history, ideology, and networks”, New York: Cambridge Univ Press. pp. 196, 2014.
[5] Janet Abbate, “Inventing the Internet”, MIT Press, ISBN 978-0-262-51115-5, pp. 123–4, 2000.
[6] Lin, Yi-Bing, Min-Zheng Shieh, "To Learn Programming through Internet of Things." IEEE Internet of Things Magazine 5, no. 4 (December 2022): pp.168–72, 2022
[7] N. M. Garcia, P. P. Monteiro, M. M. Freire, “Burst assembly with real IPv4 data–performance assessment of three assembly algorithms,” in International Conference on Next Generation Wired/Wireless Networking, 2006, pp. 223–234, 2006.
[8] Q. Wang et al., “Multimedia IoT systems and applications,” in 2017 Global Internetof Things Summit (GIoTS), 2017, pp. 1–6, 2017
[9] S. Bj, “Can OTN be replaced by Ethernet? A network level comparison of OTN and Ethernet with a 5G perspective,” in 2018 International Conference on Optical Network Design and Modeling (ONDM), pp. 220–225, 2018
[10] S. Zaman S., F. Karray. Fuzzy ESVDF approach for Intrusion Detection System. The IEEE 23rd International Conference on Advanced Information Networking and Applications (AINA-09). May 26-29, 2009.
[11] I. Onut, A. Ghorbani. “A Feature Classification Scheme for Network Intrusion Detection”, International Journal of Network Security, pp.1-15,2007.
[12] A. Tamilarasan, S. Mukkamala, A. Sung, K. Yendrapalli, “Feature Ranking and Selection for Intrusion Detection Using Artificial Neural Networks and Statistical Methods”, 2006 International Joint Conference on Neural Networks (IJCNN`06), pp.4754-4761, 2006.
[13] A. Sung, S. Mukkamala, “Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks”, Symposium on Application and Internet (SAINT`03), pp.209-216, 2003.
[14] Amit Shukla, H.K. Application of robotics in offshore oil and gas industry—A review part II. Robot. Auton. Syst. 2015, 75, pp.508–524, 2015.
[15] E. Brucherseifer, H. Winter, A. Mentges, M. Muehlhauser, M. Hellmann, “Digital Twin conceptual framework for improving critical infrastructure resilience”, pp.1062–1080, 2021.
[16] P. Laplante, B. Amaba, “Artificial Intelligence in Critical Infrastructure Systems”, Computer 2021, 54, pp.14–24, 2021
[17] Y. Wu, H.N. Dai, H. Wang, “Convergence of Blockchain and Edge Computing for Secure and Scalable IIoT Critical Infrastructures in Industry 4.0”, IEEE Internet Things J. 2020, 8, 2300–2317, 2020.
[18] S. Park, S. Kwon, Y. Park, D. Kim, I. You, “Session Management for Security Systems in 5G Standalone Network”, IEEE Access 2022, 10, pp.73421–73436, 2022.Citation
Arun Kumar Singh, Alak Kumar Patra, "Internet Protocol with Internet Programming (IP with IP): Architecture and Design," International Journal of Scientific Research in Computer Science and Engineering, Vol.12, Issue.4, pp.66-76, 2024 -
Open Access Article
Identifying Botnets within the Traffic Generated By a Network in Two Different Datasets
Grace Bunmi Akintola
Research Paper | Journal-Paper (IJSRCSE)
Vol.12 , Issue.4 , pp.77-93, Aug-2024
Abstract
The impact of cyber-attacks on organizational and private networks has been significant, causing extensive damage and posing serious threats to cybersecurity. This is largely due to the increasing sophistication of malicious hackers, making the detection and mitigation of these attacks more challenging. One such attack is the botnet attack, which involves using compromised systems to launch attacks, including Denial of Service (DoS) attacks, against victim systems. As a result, comprehensive literature reviews have been conducted to examine existing botnet defense and detection techniques, with a particular focus on machine learning due to its effectiveness in identifying and classifying botnet attacks within networks. This paper presents the development of an Artificial Neural Network (ANN) model, a supervised machine learning technique, using MATLAB software for creating, training, and simulating networks. Two datasets, KDD CUP’99 and UNSW-NB15, were used to demonstrate the effectiveness of the proposed model by extracting the same set of features from both. The model achieved classification accuracies of 99.88% and 96% for the respective datasets. A confusion matrix plot was used to illustrate these accuracy values in detail, further validating the model`s effectiveness by showing very low false negative and false positive rates in identifying and grouping botnet attacks.Key-Words / Index Term
Botnets, Networks, Machine Learning, MATLAB, DoS attacks, detection techniques, and datasetsReferences
[1] Forti and S. Héroux, “Limited usefulness of firm-provided cybersecurity information in institutional investors’ investment analysis,” Information and Computer Security, vol. 31, Issue 3, pp. 108-123, 2023.
[2] M. R. Kadri, A. Abdelli, J. B. Othman and L. Mokdad, “Survey and classification of Dos and DDos attack detection and validation approaches for IoT environments,” Internet of Things, vol. 25, Issue101021, pp. 1-44, 2024.
[3] H. P. S and J. R, “A Survey on the Applications of Machine Learning in Identifying Predominant Network Attacks,” International Journal of Scientific Research in Computer Science and Engineering, vol. 11, Issue 5, pp. 16-22, 2023.
[4] G. Onuh and P. Owa, “Implementation of Slowloris Distributed Denial of Service (DDOS) Attack on Web Servers,” International Journal of Scientific Research in Computer Science and Engineering, vol. 10, Issue 2, pp. 11-15, 2022.
[5] S. Srinivasan and P. Deepalakshmi, “ENetRM: ElasticNet Regression Model based malicious cyber-attacks prediction in real-time server,” Measurement: Sensors, vol. 25, Issue 100654, pp. 1-10, 2023.
[6] P. Bisht and M. S. Rauthan, “Machine Learning and Natural Language Processing Based Web Application Firewall for Mitigating Cyber Attacks in Cloud,” International Journal of Scientific Research in Computer Science and Engineering, vol. 11, Issue 3, pp. 01-15, 2023.
[7] L. D’hooge, M. V. Wauters, F. D. Turck and B. Volckaert, “Investigating Generalized Performance of Data-Constrained Supervised Machine Learning Models on Novel, Related Samples in Intrusion Detection,” Sensors, vol. 23, Issue 4, pp. 1-39, 2023.
[8] D. Pecioski, V. Gavriloski, S. Domazetovska, and A. Ignjatovska, “An overview of reinforcement learning techniques,” in 2023 12th Mediterranean Conference on Embedded Computing (MECO), Budva, Montenegro, 2023.
[9] K. A. Okewale, I. R. Idowu, B. S. Alobalorun and F. A. Alabi, “Effective Machine Learning Classifiers for Intrusion Detection in Computer Network,” International Journal of Scientific Research in Computer Science and Engineering, vol. 11, Issue 2, pp. 14-22, 2023.
[10] D. Gibert, J. Planes, C. Mateu and Q. Le, “Fusing feature engineering and deep learning: A case study for malware,” Expert Systems With Applications, vol. 207, Issue 117957, pp. 1-18, 2022.
[11] S. Kayikci and T. M. Khoshgoftaar, “Blockchain meets machine learning: a survey,” Journal of Big Data, vol. 11, Issue 9, pp. 1-29, 2024.
[12] M. H. Thwaini, “Anomaly Detection in Network Traffic using Machine Learning for Early Threat,” Data & Metadata, vol. 1, Issue 34, pp. 1-16, 2022.
[13] S. Sheng and X. Wang, “Network traffic anomaly detection method based on chaotic neural network,” Alexandria Engineering Journal, vol. 77, pp. 567-579, 2023.
[14] H. Liu and H. Wang, “Real-Time Anomaly Detection of Network Traffic Based on CNN,” Symmetry, vol. 15, Issue 6, pp. 1-21, 2023.
[15] F. Hu, S. Zhang, X. Lin, L. Wu, N. Liao and Y. Song, “Network traffic classification model based on attention mechanism and spatiotemporal features,” EURASIP Journal on Information Security, vol. 1, Issue 6, pp. 1-25, 2023
[16] I. H. Ji, J. H. Lee, M. J. Kang, W. J. Park, S. H. Jeon and J. T. Seo, “Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review,” Sensors, vol. 24, Issue 3, pp. 1-30, 2024.
[17] W. Hu, L. Cao, Q. Ruan, and Q. Wu, “Research on Anomaly Network Detection Based on Self-Attention Mechanism,” Sensors, vol. 23, Issue 11, pp. 1-17, 2023.
[18] K. Lu, “Network Anomaly Traffic Analysis,” Academic Journal of Science and Technology, vol. 10, Issue 3, pp. 65-68, 2024.
[19] Z. Dang, Y. Zheng, X. Lin, C. P. Q. Chen and X. Gao, “Semi-Supervised Learning for Anomaly Traffic Detection via Bidirectional Normalizing Flows,” arXiv, vol. 1, pp. 1-14, 2024.
[20] S. Zehra, U. Faseeha, H. J. Syed, F. Samad, A. O. Ibrahim, A. W. Abulfaraj and W. Nagmeldin, “Machine Learning-Based Anomaly Detection in NFV: A Comprehensive Survey,” Sensors, vol. 23, Issue 11, pp. 1-26, 2023.
[21] S. Padhiar and R. Patel, “Performance evaluation of botnet detection using machine learning techniques,” International Journal of Electrical and Computer Engineering (IJECE), vol. 13, Issue 6, pp. 6827-6835, 2023.
[22] M. Al-farttoosi and H. Abdulkader, “Botnet Mobile Detection Using Machine & Deep Learning Techniques,” in 2022 Iraqi International Conference on Communication and Information Technologies (IICCIT), Basrah, Iraq, 2022.
[23] M. Swami, A. Yadnik, A. Jagtap, K. Bhilare and M. Wagh, “BOTNET DETECTION USING VARIOUS MACHINE LEARNING ALGORITHMS: A REVIEW,” International Research Journal of Engineering and Technology (IRJET), vol. 09, Issue 12, pp. 125-132, 2022.
[24] C. Joshi, V. Bharti and R. K. Ranjan, “Botnet Detection Using Machine Learning Algorithms,” in Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences, Singapore, 2021.
[25] J. Forough, “Anomaly Detection and Resolution for Edge Clouds,” in Machine Learning for Anomaly Detection, Sweden, IEEE, 2024, pp. 11-25.
[26] S. A. Hussein and S. R. Répás, “Enhancing Network Security through Machine Learning-Based Anomaly Detection Systems,” International Journal of Intelligent Systems and Applications in Engineering, vol. 12, Issue 215, pp. 1929-1935, 2024.
[27] M. Landauer, S. Onder, F. Skopik and M. Wurzenberger, “Deep learning for anomaly detection in log data: A survey,” Machine Learning with Applications, vol. 12, Issue 100470, pp. 1-19, 2023.
[28] M. ALI, M. S. M. F. MUSHTAQ, SULTAN, M. S., and I. ASHRAF, “Hybrid Machine Learning Model for Efficient Botnet Attack Detection in IoT Environment,” IEEE ACCESS, vol. 1, Issue 1, pp. 1-19, 2024.
[29] J. Ashraf, M. Keshk, N. Moustafa, M. Abdel-Basset, H. Khurshid, A. D. Bakhshi and R. R. Mostafa, “IoTBoT-IDS: A novel statistical learning-enabled botnet detection framework for protecting networks of smart cities,” Sustainable Cities and Society, vol. 72, Issue 103041, 2021.
[30] C. G. Cordero, E. Vasilomanolakis, A. Wainakh, M. Mühlhäuser, and S. N. Tehrani, “On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection,” ACM Transactions on Privacy and Security, vol. 24, Issue 2, pp. 1-39, 2021.
[31] E. P. VALENTINI, G. P. R. FILHO, R. E. D. GRANDE, C. M. RANIERI, L. A. P. JÚNIOR and R. I. MENEGUETTE, “A Novel Mechanism for Misbehavior Detection in Vehicular Networks,” IEEE, vol. 11, pp. 68113-68126, 2023.
[32] A. Z. Umar and Y. Galadima, “Detecting Anomalies In Network Traffic Using a Hybrid of Linear-based and Tree-based Feature Selection Approaches,” in International Conference on Computing and Advances in Information Technology (ICCAIT 2023), Ahmadu Bello University, Zaria, Nigeria, 2023.
[33] S. Choudharya and N. Kesswani, “Analysis of KDD-Cup’99, NSL-KDD, and UNSW-NB15 Datasets using Deep Learning in IoT,” in International Conference on Computational Intelligence and Data Science (ICCIDS 2019), Rajasthan, India, 2020.
[34] S. More, M. Idrissi, H. Mahmoud and A. T. Asyhar, “Enhanced Intrusion Detection Systems Performance with UNSW-NB15 Data Analysis,” aligorithms, vol. 17, Issue 64, pp. 1-16, 2024.
[35] T. A. S. Srinvias, A. D. Donald, M. Sameena, K. Rekha and I. D. Srihith, “Unlocking the Power of Matlab: A Comprehensive Survey,” International Journal of Advanced Research in Science, Communication and Technology (IJARSCT), vol. 3, Issue 1, pp. 20-31, 2023.
[36] Y. SAHLI, “A comparison of the NSL-KDD dataset and its predecessor the KDD Cup’99 dataset,” International Journal of Scientific Research and Management (IJSRM), vol. 10, Issue 4, pp. 832-839, 2022.
[37] I. Dutt, S. Borah and I. K. Maitra, “Pre-Processing of KDD’99 & UNSW-NB Network Intrusion Datasets,” Turkish Journal of Computer and Mathematics Education, vol. 12, Issue 11, pp. 1762- 1776, 2021.
[38] M. Gelgi, Y. Guan, S. Arunachala, M. S. S. Rao, and N. Dragoni, “Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques,” Sensors, vol. 24, Issue 11, pp. 1-37, 2024.
[39] O. Valenzuela, A. Catala, D. Anguita and I. Rojas, “New Advances in Artificial Neural Networks and Machine Learning Techniques,” Neural Process Letters, vol. 55, Issue 1, pp. 5269-5272, 2023.
[40] S. Hartanto, “The Impact of Smurf Attack on Web Server in Communication Network and its Preventions,” International Journal of Sustainable Applied Sciences (IJSAS), vol. 1, Issue 1, pp. 35-46, 2023.
[41] M. B. Anley, A. Genovese, D. Agostinello and V. Piuri, “Robust DDoS attack detection with adaptive transfer learning,” Computers & Security, vol. 144, Issue 103962, pp. 1-10, 2024.
[42] M. M. Abualhaj, A. A. Abu-Shareha, M. O. Hiari, Y. Alrabanah, M. Al-Zyoud and M. A. Alsharaiah, “A Paradigm for DoS Attack Disclosure using Machine Learning Techniques,” (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 13, Issue 3, pp. 192-200, 2022.
[43] J. H. Yousif and H. A. Kazem, “Prediction and evaluation of photovoltaic-thermal energy systems production using artificial neural network and experimental dataset,” Case Studies in Thermal Engineering, vol. 27, Issue 101297, pp. 1-13, 2021.
[44] W. Ahmed, A. Chaudhary, and G. Naqvi, “Role of Artificial Neural Networks in AI,” Neuro Quantology, vol. 20,. Issue 13, pp. 3365-3373, 2022.
[45] Y. D. Jian Liu, Y. Liu, L. Chen, Z. Hu, P. Wei and Z. Li, “A logistic-tent chaotic mapping Levenberg Marquardt algorithm for improving positioning accuracy of grinding robot,” Scientific Reports, vol. 14, Issue 9649, pp. 1-15, 2024.
[46] M. K. Hasan, A. A. Habib, S. Islam, N. Safie and B. Pandey, “DDoS: Distributed denial of service attack in communication standard vulnerabilities in smart grid applications and cyber security with recent developments,” Energy Reports, vol. 9, Issue 10, pp. 1318-1326, 2023.
[47] C. G. Udomboso and O. O. Ilori, “A DERIVED HETEROGENEOUS TRANSFER FUNCTION FROM CONVOLUTION OF SYMMETRIC HARDLIMIT AND HYPERBOLIC TANGENT SIGMOID TRANSFER FUNCTIONS,” Journal of Science and Technology, vol. 40, Issue 1, pp. 27-37, 2022.
[48] T. Y. Li, H. Xiang, Y. Yang, J. Wang and G. Yildiz, “Prediction of char production from slow pyrolysis of lignocellulosic biomass using multiple nonlinear regression and artificial neural network,” Journal of Analytical and Applied Pyrolysis, vol. 159, no. Issue 105286, 2021.
[49] I. Dubdub, “Pyrolysis Study of Mixed Polymers for Non-Isothermal TGA: Artificial Neural Networks Application,” Polymers, vol. 14, Issue 2638, pp. 1-10, 2022.
[50] A. A. R. A.-c. Omar, B. Soudan and A. Altaweel, “A comprehensive survey on detection of sinkhole attack in routing over low power and Lossy network for internet of things,” Internet of things, vol. 22, Issue 100750, 2023.
[51] E.-M. Nikolados, A. Wongprommoon, O. M. Aodha, G. Cambray and D. A. Oyarzún, “Accuracy and data efficiency in deep learning models of protein expression,” Nature communications, vol. 13, Issue 7755, pp. 1-12, 2023.
[52] T. F. Monaghan, S. N. Rahman, C. W. Agudelo, A. J. Wein, J. M. Lazar, K. Everaert and R. R. Dmochowski, “Foundational Statistical Principles in Medical Research: Sensitivity, Specificity, Positive Predictive Value, and Negative Predictive Value,” Medicina, vol. 57, Issue 503, pp. 1-7, 2021.
[53] L.-E. Pommé, R. Bourqui, R. Giot and D. Auber, “Relative Confusion Matrix: Efficient Comparison of Decision Models,” in 2022 26th International Conference Information Visualisation (IV), Vienna, Austria, 2022.
[54] E. U. H. Qazi, M. H. Faheem and T. Zia, “HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System,” Applied Sciences, vol. 13, Issue 4921, pp. 1-16, 2023.
[55] M. Bhavsar, K. Roy, J. Kelly and O. Olusola, “Anomaly based intrusion detection system for IoT application,” Discover Internet of Things, vol. 3, Issue 5, pp. 1-23, 2023.
[56] A. Ayantayo, A. Kaur, A. Kour, X. Schmoor, F. Shah, I. Vickers, P. K. and M. M. Abdelsamea, “Network intrusion detection using feature fusion with deep learning,” Journal of Big Data, vol. 10, Issue 67, pp. 1-24, 2023.
[57] S. Srinivasan and D. P, “Enhancing the security in cyber-world by detecting the botnets using ensemble classification based machine learning,” Measurement: Sensors, vol. 25, Issue 100624, pp. 1-7, 2023.Citation
Grace Bunmi Akintola, "Identifying Botnets within the Traffic Generated By a Network in Two Different Datasets," International Journal of Scientific Research in Computer Science and Engineering, Vol.12, Issue.4, pp.77-93, 2024
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.