12 research outputs found

    Enhanced fully homomorphic encryption scheme using modified key generation for cloud environment

    Get PDF
    Fully homomorphic encryption (FHE) is a special class of encryption that allows performing unlimited mathematical operations on encrypted data without decrypting it. There are symmetric and asymmetric FHE schemes. The symmetric schemes suffer from the semantically security property and need more performance improvements. While asymmetric schemes are semantically secure however, they pose two implicit problems. The first problem is related to the size of key and ciphertext and the second problem is the efficiency of the schemes. This study aims to reduce the execution time of the symmetric FHE scheme by enhancing the key generation algorithm using the Pick-Test method. As such, the Binary Learning with Error lattice is used to solve the key and ciphertext size problems of the asymmetric FHE scheme. The combination of enhanced symmetric and asymmetric algorithms is used to construct a multi-party protocol that allows many users to access and manipulate the data in the cloud environment. The Pick-Test method of the Sym-Key algorithm calculates the matrix inverse and determinant in one instance requires only n-1 extra multiplication for the calculation of determinant which takes 0(N3) as a total cost, while the Random method in the standard scheme takes 0(N3) to find matrix inverse and 0(N!) to calculate the determinant which results in 0(N4) as a total cost. Furthermore, the implementation results show that the proposed key generation algorithm based on the pick-test method could be used as an alternative to improve the performance of the standard FHE scheme. The secret key in the Binary-LWE FHE scheme is selected from {0,1}n to obtain a minimal key and ciphertext size, while the public key is based on learning with error problem. As a result, the secret key, public key and tensored ciphertext is enhanced from logq , 0(n2log2q) and ((n+1)n2log2q)2log q to n, (n+1)2log q and (n+1)2log q respectively. The Binary-LWE FHE scheme is a secured but noise-based scheme. Hence, the modulus switching technique is used as a noise management technique to scale down the noise from e and c to e/B and c/B respectively thus, the total cost for noise management is enhanced from 0(n3log2q) to 0(n2log q) . The Multi-party protocol is constructed to support the cloud computing on Sym-Key FHE scheme. The asymmetric Binary-LWE FHE scheme is used as a small part of the protocol to verify the access of users to any resource. Hence, the protocol combines both symmetric and asymmetric FHE schemes which have the advantages of efficiency and security. FHE is a new approach with a bright future in cloud computing

    Addressing Behavioral Drift in Ransomware Early Detection Through Weighted Generative Adversarial Networks

    Get PDF
    Crypto-ransomware attacks pose a significant cyber threat due to the irreversible effect of encryption employed to deny access to the data on the victim’s device. Existing state-of-the-art solutions are developed based on two assumptions: the availability of sufficient data to perform detection during the pre-encryption phase, and that ransomware behavior is static and does not change over time. However, such assumptions do not hold as data collected during the pre-encryption phase of the ransomware attack are limited and does not contain sufficient patterns needed to identify the attack. Additionally, the evasion techniques like polymorphism and metamorphism used by ransomware lead to behavioral drift that could defeat those solutions. Therefore, this paper addresses these two issues by proposing a weighted Generative Adversarial Networks (wGANs) technique. Firstly, the proposed wGAN was used to generate synthetic data that imitate the behavior of ransomware and simulate the evolution of the attacks. Then, the mutual information was used to estimate the significance of features for different timeframes, thereby helping the detection model to handle the behavioral drift in emerging ransomware variants. Experimental evaluation demonstrates that the proposed wGAN is more robust against behavioral drift compared to the state-of-the-art solutions. The wGAN achieved higher accuracy and lower false alarm rates of 97% and 0.0088 respectively

    Machine learning-based anomaly detection in NFV: a comprehensive survey

    Get PDF
    Network function virtualization (NFV) is a rapidly growing technology that enables the virtualization of traditional network hardware components, offering benefits such as cost reduction, increased flexibility, and efficient resource utilization. Moreover, NFV plays a crucial role in sensor and IoT networks by ensuring optimal resource usage and effective network management. However, adopting NFV in these networks also brings security challenges that must promptly and effectively address. This survey paper focuses on exploring the security challenges associated with NFV. It proposes the utilization of anomaly detection techniques as a means to mitigate the potential risks of cyber attacks. The research evaluates the strengths and weaknesses of various machine learningbased algorithms for detecting network-based anomalies in NFV networks. By providing insights into the most efficient algorithm for timely and effective anomaly detection in NFV networks, this study aims to assist network administrators and security professionals in enhancing the security of NFV deployments, thus safeguarding the integrity and performance of sensors and IoT systems

    A Novel Explainable CNN Model for Screening COVID-19 on X-ray Images

    Get PDF
    Due to the rapid propagation characteristic of the Coronavirus (COVID-19) disease, manual diagnostic methods cannot handle the large number of infected individuals to prevent the spread of infection. Despite, new automated diagnostic methods have been brought on board, particularly methods based on artificial intelligence using different medical data such as X-ray imaging. Thoracic imaging, for example, produces several image types that can be processed and analyzed by machine and deep learning methods. X-ray imaging materials widely exist in most hospitals and health institutes since they are affordable compared to other imaging machines. Through this paper, we propose a novel Convolutional Neural Network (CNN) model (COV2Net) that can detect COVID-19 virus by analyzing the X-ray images of suspected patients. This model is trained on a dataset containing thousands of X-ray images collected from different sources. The model was tested and evaluated on an independent dataset. In order to approve the performance of the proposed model, three CNN models namely Mobile-Net, Residential Energy Services Network (Res-Net), and Visual Geometry Group 16 (VGG-16) have been implemented using transfer learning technique. This experiment consists of a multi-label classification task based on X-ray images for normal patients, patients infected by COVID-19 virus and other patients infected with pneumonia. This proposed model is empowered with Gradient-weighted Class Activation Mapping (Grad-CAM) and Grad-Cam++ techniques for a visual explanation and methodology debugging goal. The finding results show that the proposed model COV2Net outperforms the state-of-the-art methods

    Framework to perform taint analysis and security assessment of IoT devices in smart cities

    No full text
    The Internet of Things has a bootloader and applications responsible for initializing the device’s hardware and loading the operating system or firmware. Ensuring the security of the bootloader is crucial to protect against malicious firmware or software being loaded onto the device. One way to increase the security of the bootloader is to use digital signature verification to ensure that only authorized firmware can be loaded onto the device. Additionally, implementing secure boot processes, such as a chain of trust, can prevent unauthorized access to the device’s firmware and protect against tampering during the boot process. This research is based on the firmware bootloader and application dataflow taint analysis and security assessment of IoT devices as the most critical step in ensuring the security and integrity of these devices. This process helps identify vulnerabilities and potential attack vectors that attackers could exploit and provides a foundation for developing effective remediation strategies

    Blockchain Federated Learning for In-Home Health Monitoring

    Get PDF
    This research combines two emerging technologies, the IoT and blockchain, and investigates their potential and use in the healthcare sector. In healthcare, IoT technology can be utilized for purposes such as remotely monitoring patients’ health. This paper details ongoing research towards individualized health monitoring using wearable gadgets. The goal of improving healthcare facilities and improvement of the quality of life of citizens naturally brings up Internet of Things (IoT) technologies for consideration. Health observation is exceptionally critical in terms of avoidance, especially since the early determination of illnesses can minimize trouble and treatment costs. The cornerstones of intelligent, integrated, and individualized healthcare are continuous monitoring of physical signs and evaluation of medical data. To build a more reliable and robust IoMT model, the study will monitor the application of blockchain technology in federated learning (FL). A viable way to address the heterogeneity problem in federated learning is to design the system, data, and model tiers to lessen heterogeneity and produce a high-quality, tailored model for each endpoint. Blockchain-based federated learning allows for smarter simulations, lower latency, and lower power consumption while maintaining privacy at the same time. This solution provides another immediate benefit: in addition to having a shared model upgrade, the updated model on phones will now be used automatically, giving personalized knowledge about the phone is used

    Intelligent Deep Machine Learning Cyber Phishing URL Detection Based on BERT Features Extraction

    No full text
    Recently, phishing attacks have been a crucial threat to cyberspace security. Phishing is a form of fraud that attracts people and businesses to access malicious uniform resource locators (URLs) and submit their sensitive information such as passwords, credit card ids, and personal information. Enormous intelligent attacks are launched dynamically with the aim of tricking users into thinking they are accessing a reliable website or online application to acquire account information. Researchers in cyberspace are motivated to create intelligent models and offer secure services on the web as phishing grows more intelligent and malicious every day. In this paper, a novel URL phishing detection technique based on BERT feature extraction and a deep learning method is introduced. BERT was used to extract the URLs’ text from the Phishing Site Predict dataset. Then, the natural language processing (NLP) algorithm was applied to the unique data column and extracted a huge number of useful data features in terms of meaningful text information. Next, a deep convolutional neural network method was utilised to detect phishing URLs. It was used to constitute words or n-grams in order to extract higher-level features. Then, the data were classified into legitimate and phishing URLs. To evaluate the proposed method, a famous public phishing website URLs dataset was used, with a total of 549,346 entries. However, three scenarios were developed to compare the outcomes of the proposed method by using similar datasets. The feature extraction process depends on natural language processing techniques. The experiments showed that the proposed method had achieved 96.66% accuracy in the results, and then the obtained results were compared to other literature review works. The results showed that the proposed method was efficient and valid in detecting phishing websites’ URLs

    Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map

    Get PDF
    The goal of this study was to develop a robust image cryptographic scheme based on Latin Square Matrix and Logistics Map, capable of effectively securing sensitive data. Logistics mapping is a comparatively strong chaos system which enciphers with an unpredictability that significantly reduces the chance of deciphering. Additionally, the Latin square matrix stands out for its uniform histogram distribution, thereby bolstering its encryption's potency. The consequent integration of these algorithms in this study was therefore grounded in the scientific rationale of establishing a strong and resilient cypher technique. The study provides a new chaos-based method and extends the application of the probabilistic approach to the domain of symmetric key image encryption. Permutation and substitution approaches of image encryption were deployed to address the issue of images volume and differing sizes. The issue of misplaced pixel positions in the image was also adequately addressed, making it an effective method for image encryption. The hybrid technique was simulated on image data and evaluated to gauge its performance. Results showed that the algorithm was able to securely protect image data and the private information associated with them, while also making it very difficult for unauthorized users to decrypt the information. The average encryption time of 184(ÎĽs) on seven (7) images showed that it could to be deployed for real-time systems. The proposed method obtained an average entropy of 7.9398 with key space of 1.17x1077 and an average avalanche effect (%) of 49.9823 confirming the security and resilience of the developed method

    Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction

    Get PDF
    Recently, phishing attacks have been a crucial threat to cyberspace security. Phishing is a form of fraud that attracts people and businesses to access malicious uniform resource locators (URLs) and submit their sensitive information such as passwords, credit card ids, and personal information. Enormous intelligent attacks are launched dynamically with the aim of tricking users into thinking they are accessing a reliable website or online application to acquire account information. Researchers in cyberspace are motivated to create intelligent models and offer secure services on the web as phishing grows more intelligent and malicious every day. In this paper, a novel URL phishing detection technique based on BERT feature extraction and a deep learning method is introduced. BERT was used to extract the URLs’ text from the Phishing Site Predict dataset. Then, the natural language processing (NLP) algorithm was applied to the unique data column and extracted a huge number of useful data features in terms of meaningful text information. Next, a deep convolutional neural network method was utilised to detect phishing URLs. It was used to constitute words or n-grams in order to extract higher-level features. Then, the data were classified into legitimate and phishing URLs. To evaluate the proposed method, a famous public phishing website URLs dataset was used, with a total of 549,346 entries. However, three scenarios were developed to compare the outcomes of the proposed method by using similar datasets. The feature extraction process depends on natural language processing techniques. The experiments showed that the proposed method had achieved 96.66% accuracy in the results, and then the obtained results were compared to other literature review works. The results showed that the proposed method was efficient and valid in detecting phishing websites’ URLs

    Decision-based routing for unmanned aerial vehicles and internet of things networks

    Get PDF
    New technologies and communication standards have changed traditional network processes. Internet of Things (IoT) is one of the emerging technologies where devices are connected to facilitate the users. When the networks are more congested due to a large number of users then the existing routing protocol and communication channels suffer from congestion, disconnection, overhead, and packet drop issues. Unmanned Aerial Vehicles (UAVs) are adopted to support the ground networks for more feasible data communication. These networks provide coverage facilities to IoT networks and provide smooth data dissemination services. Through the use of relay and cooperative communication technologies, UAVs could enlarge the communication space for IoT networks. Traditional network routing protocols have been adopted for data communication in these networks. However, the adopted protocols are not able to handle mobility and uncertain network conditions. This paper proposes a Decision-based Routing for Unmanned Aerial Vehicles and Internet of Things (DR-UAVIoT) network. The proposed protocol is useful for UAV-to-IoT and UAV-to?UAV data communication. The performance of the proposed solution is evaluated with the existing protocols in terms of data delivery, delay, and network overhead. The experimental results indicate the better performance of the proposed protocol in terms of less delay, less overhead, and better data delivery ratio as compared with existing routing protocols.</p
    corecore