116 research outputs found

    ENSEMBLE MACHINE LEARNING APPROACH FOR IOT INTRUSION DETECTION SYSTEMS

    Get PDF
    The rapid growth and development of the Internet of Things (IoT) have had an important impact on various industries, including smart cities, the medical profession, autos, and logistics tracking. However, with the benefits of the IoT come security concerns that are becoming increasingly prevalent. This issue is being addressed by developing intelligent network intrusion detection systems (NIDS) using machine learning (ML) techniques to detect constantly changing network threats and patterns. Ensemble ML represents the recent direction in the ML field. This research proposes a new anomaly-based solution for IoT networks utilizing ensemble ML algorithms, including logistic regression, naive Bayes, decision trees, extra trees, random forests, and gradient boosting. The algorithms were tested on three different intrusion detection datasets. The ensemble ML method achieved an accuracy of 98.52% when applied to the UNSW-NB15 dataset, 88.41% on the IoTID20 dataset, and 91.03% on the BoTNeTIoT-L01-v2 dataset

    Modern and Lightweight Component-based Symmetric Cipher Algorithms: A Review

    Get PDF
    Information security, being one of the corner stones of network and communication technology, has been evolving tremendously to cope with the parallel evolution of network security threats. Hence, cipher algorithms in the core of the information security process have more crucial role to play here, with continuous need for new and unorthodox designs to meet the increasing complexity of the applications environment that keep offering challenges to the current existing cipher algorithms. The aim of this review is to present symmetric cipher main components, the modern and lightweight symmetric cipher algorithms design based on the components that utilized in cipher design, highlighting the effect of each component and the essential component among them, how the modern cipher has modified to lightweight cipher by reducing the number and size of these components, clarify how these components give the strength for symmetric cipher versus asymmetric of cipher. Moreover, a new classification of cryptography algorithms to four categories based on four factors is presented. Finally, some modern and lightweight symmetric cipher algorithms are selected, presented with a comparison between them according to their components by taking into considerations the components impact on security, performance, and resource requirements

    Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm

    Get PDF
    إن كلمات العسل (Honeywords) هي كلمات مرور مزيفة مرافقة لكلمة المرور الحقيقية والتي تدعى كلمة السكر. يعد نظام كلمات مرور العسل نظامًا فعالاً لاكتشاف اختراق كلمات المرور مصمم لاكتشاف اختراق كلمة المرور بسهولة من أجل تحسين أمان كلمات المرور المشفرة. لكل مستخدم ، سيكون لملف كلمة المرور الخاص بنظام الكلمات العسلية كلمة مرور واحدة حقيقية مشفرة مصحوبة بالعديد من كلمات المرور المزيفة المشفرة. إذا قام شخص دخيل بسرقة ملف كلمات المرور من النظام ونجح في اختراق كلمات المرور محاولا تسجيل الدخول إلى حسابات المستخدمين ، فسيكتشف نظام كلمات المرور هذه المحاولة من خلال مدقق العسل. (Honeychecker) مدقق العسل هو خادمًا إضافيًا يميز كلمة المرور الحقيقية عن كلمات المرور المزيفة ويطلق إنذارًا إذا قام شخص دخيل بتسجيل الدخول باستخدام كلمة مرور العسل. تم اقتراح العديد من طرق توليد كلمات العسل خلال البحوث السابقة، مع وجود قيود على عمليات إنشاء كلمات العسل الخاصة بهم ، ونجاح محدود في توفير جميع ميزات كلمات العسل المطلوبة ، والتعرض للعديد من مشكلات كلمات العسل. سيقدم هذا العمل طريقة جديدة لتوليد كلمات العسل تستخدم خوارزمية سرب عنب البحر المتقطعة. خوارزمية سرب عنب البحر هي خوارزمية تحسين مستوحاة من الأحياء تحاكي سلوك سرب عنب البحر في بيئتها الطبيعية. تم استخدام  خوارزمية سرب عنب البحر لحل مجموعة متنوعة من مشاكل التحسين. ستعمل طريقة توليد الكلمات العسلية المقترحة على تحسين عملية توليد كلمات العسل وتحسين ميزات كلمات العسل والتغلب على عيوب التقنيات السابقة. ستوضح هذه الدراسة العديد من الاستراتيجيات السابقة لتوليد الكلمات العسلية، ووصف الطريقة المقترحة، وفحص النتائج التجريبية، ومقارنة طريقة إنتاج كلمات العسل الجديدة بالطرق السابقة.Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and triggers an alarm if intruder signs in using a honeyword. Many honeyword generation approaches have been proposed by previous research, all with limitations to their honeyword generation processes, limited success in providing all required honeyword features, and susceptibility to many honeyword issues. This work will present a novel honeyword generation method that uses a proposed discrete salp swarm algorithm. The salp swarm algorithm (SSA) is a bio-inspired metaheuristic optimization algorithm that imitates the swarming behavior of salps in their natural environment. SSA has been used to solve a variety of optimization problems. The presented honeyword generation method will improve the generation process, improve honeyword features, and overcome the issues of previous techniques. This study will demonstrate numerous previous honeyword generating strategies, describe the proposed methodology, examine the experimental results, and compare the new honeyword production method to those proposed in previous research

    Gaming argumentation framework (GAF): Pfizer or AstraZeneca Vaccine of The COVID-19 as a case study

    Get PDF
    Dung’s argumentation frameworks (AF) were introduced in the last century it works with the justification of the argument. This framework analyzes attacks of arguments, it works away on the characteristics of arguments structures and words was used in the attack between each other, etc. These properties make this model attractive as it decreases most of the complexities included when applying the argumentation system. This system can be applied to different states such as to evaluate the arguments or with the supported argument to be defense and attacked arguments. In addition, the group of experts may be making argumentation about some cases. In the latter scenario, agents with potentially dissimilar arguments and/or opinions are used to evaluate the arguments, allowing for the consideration of several sets of arguments and attack relations. This framework is extended to propose a new system called gaming argumentation framework (GAF). It helps to make a decision about the current problem by making claims and attack determination to the arguments, then putting the result of these claims and attack determination to the game theory with two players to achieve the final results that help the decision-maker to decide about the current problem. Finally, compare this framework with other frameworks, and provide an example to explain how the proposed framework performs its intended purpose, where decision making is very important in the medical field therefore this paper taking the confusion on the COVID-19 vaccines as a case study to solve Pfizer or AstraZeneca problem and make the decision about this case

    Human Body Posture Recognition Approaches: A Review

    Get PDF
    Human body posture recognition has become the focus of many researchers in recent years. Recognition of body posture is used in various applications, including surveillance, security, and health monitoring. However, these systems that determine the body’s posture through video clips, images, or data from sensors have many challenges when used in the real world. This paper provides an important review of how most essential ‎ hardware technologies are ‎used in posture recognition systems‎. These systems capture and collect datasets through ‎accelerometer sensors or computer vision. In addition, this paper presents a comparison ‎study with state-of-the-art in terms of accuracy. We also present the advantages and ‎limitations of each system and suggest promising future ideas that can increase the ‎efficiency of the existing posture recognition system. Finally, the most common datasets ‎applied in these systems are described in detail. It aims to be a resource to help choose one of the methods in recognizing the posture of the human body and the techniques that suit each method. It analyzes more than 80 papers between 2015 and 202

    Graphical User Authentication Algorithms Based on Recognition: A survey

    Get PDF
    In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical user authentication and possible attacks on nineteen recognition-based authentication systems were discussed. In this study, differentiation table of attack patterns for all recognition-based techniques is shown. Finally, the positive and negative aspects of nineteen methods were explained in the form of a detailed table

    PAAD: POLITICAL ARABIC ARTICLES DATASET FOR AUTOMATIC TEXT CATEGORIZATION

    Get PDF
    Now day’s text Classification and Sentiment analysis is considered as one of the popular Natural Language Processing (NLP) tasks. This kind of technique plays significant role in human activities and has impact on the daily behaviours. Each article in different fields such as politics and business represent different opinions according to the writer tendency. A huge amount of data will be acquired through that differentiation. The capability to manage the political orientation of an online article automatically. Therefore, there is no corpus for political categorization was directed towards this task in Arabic, due to the lack of rich representative resources for training an Arabic text classifier. However, we introduce political Arabic articles dataset (PAAD) of textual data collected from newspapers, social network, general forum and ideology website. The dataset is 206 articles distributed into three categories as (Reform, Conservative and Revolutionary) that we offer to the research community on Arabic computational linguistics. We anticipate that this dataset would make a great aid for a variety of NLP tasks on Modern Standard Arabic, political text classification purposes. We present the data in raw form and excel file. Excel file will be in four types such as V1 raw data, V2 preprocessing, V3 root stemming and V4 light stemming

    Tourism Companies Assessment via Social Media Using Sentiment Analysis

    Get PDF
    ازدادت وسائل التواصل الاجتماعي بشكل كبير وواضح لانها وسيلة إعلام للمستخدمين للتعبير عن مشاعرهم من خلال آلاف المنشورات والتعليقات حول شركات السياحة. وبالتالي ، يصعب على السائح قراءة جميع التعليقات لتحديد ما إذا كانت تلك الآراء إيجابية أم سلبية لتقييم نجاح الشركة. في هذه البحث,تم استخدام التنقيب عن النص لتصنيف المشاعر من خلال جمع مراجعات اللهجة العراقية حول شركات السياحة من الفيس بوك لتحليلها باستخدام تحليل المشاعر لتتبع المشاعر الموجوده في المنشورات والتعليقات. ثم تم تصنيفها إلى تعليق إيجابي أو سلبي أو محايد باستخدام Naïve Bayes, Rough Set Theory , K-Nearest Neighbor. من بين 71 شركة سياحة عراقية وجدت أن 28٪ من هذه الشركات لديها تقييم جيد جدا ، و 26٪ من هذه الشركات لديها تقييم جيد ، و 31٪ من هذه الشركات لديها تقييم متوسط ​​، و 4٪ من هذه الشركات لديها تقييم مقبول و 11٪ من هذه الشركات لديها تقييم سيء. ساعدت النتائج التجريبية الشركات على تحسين عملها وبرامجها واستجابة كافية وسريعة لمتطلبات العملاءIn recent years, social media has been increasing widely and obviously as a media for users expressing their emotions and feelings through thousands of posts and comments related to tourism companies. As a consequence, it became difficult for tourists to read all the comments to determine whether these opinions are positive or negative to assess the success of a tourism company. In this paper, a modest model is proposed to assess e-tourism companies using Iraqi dialect reviews collected from Facebook. The reviews are analyzed using text mining techniques for sentiment classification. The generated sentiment words are classified into positive, negative and neutral comments by utilizing Rough Set Theory, Naïve Bayes and K-Nearest Neighbor methods. After experimental results, it was determined that out of 71 tested Iraqi tourism companies, 28% from these companies have very good assessment, 26% from these companies have good assessment, 31% from these companies have medium assessment, 4% from these companies have acceptance assessment and 11% from these companies have bad assessment. These results helped the companies to improve their work and programs responding sufficiently and quickly to customer demands

    Arabic fake news detection for Covid-19 using deep learning and machine learning

    Get PDF
    When newspapers were the dominant form of conventional media, fake news was widespread. Due to the vast influence of such false news and the growing user reach of technical media sources (TV, Internet, social media, blogs). Humans have become more dependent on the news as they make daily decisions for ensuring the safety of their loved ones and themselves in the wake of COVID-19 becoming a pandemic which has impacted humans all over the world. Fake news, on the other hand, is on the verge of becoming a "second pandemic" or "infodemic," endangering the health of individuals all over the world. Previous research hasn't used fake news detection to coronavirus in Arabic due to the fact that fake news connected to coronavirus is such a recent occurrence. A total of 4 versions of the datasets used in this study have been produced (D0, D1, D2, and D3). To understand the effects of deep learning (DL) and machine learning (ML) techniques on any dataset, a total of 4 datasets were created. Also, the research analyzes them with regard to ML and DL to determine the efficacy of preprocessing (D1), raw dataset (D0), light stemming (D3), and root stemming (D2). Dataset version zero (D0) is finished when creating an excel file. From the first version (D0), three more versions (D2, D1, and D3) were created. This study examines the detection of fake news articles concerning COVID-19 on Facebook with the use of DL approaches, like the Bidirectional Long Short-Term Memory Networks (Bi-LSTM), Bidirectional Encoder Representations from Transformers (BERT) and AraBert of Arabic text and ML techniques Linear Support Vector Machines (SVM) and Random Forest (RF). On testing data-set (D0), BERT yields the greatest accuracy of 97.32

    Flexible Job Shop Scheduling Problem-Solving Using Apiary Organizational-Based Optimization Algorithm

    Get PDF
    Flexible job shop scheduling problem (FJSSP) is a complex and challenging problem that plays a crucial role in industrial and manufacturing production. FJSSP is an expansion of the standard job shop scheduling problem (JSSP). One of FJSSP’s objectives that the manufacturing system competing for is minimizing the makespan. This paper uses a new nature-inspired metaheuristic optimization algorithm called the Apiary Organizational-Based Optimization algorithm (AOOA) to solve the FJSSP. This Algorithm simulates the organizational behavior of honeybees inside the apiary and translates their activities and vital processes during their lifecycle into phases that can solve such NP-hard problems. Two benchmark datasets, Brandimarte and Hurink, with 10 MK instances and 24 (edata, rdata, and vdata) instances respectively, were used to demonstrate the ability of AOOA to solve FJSSP. Moreover, the results of AOOA were compared with a set of state-of-the-art algorithms and statistically measured using the paired samples t-test and p-value, RPD, and group-based superiority statistical analysis to test its performance. AOOA outperformed Elitism GA, Enhanced GA, Improved GA, and MOGWO in solving all 10 MK instances and HICSA in solving 9 MK instances out of 10. Moreover, AOOA overcame CS, CS-BNG, CS-ILF, CHA, and MCA in solving 24, 12, 12, 23, and 24 instances of edata, rdata, and vdata, respectively. AOOA proved its robustness, showing promising outcomes
    corecore