Wednesday, May 1, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Google Scholar URL:

https://scholar.google.co.in/citations?hl=en&user=lhj_6AYAAAAJ

Submission Deadline: May 04, 2024

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html


Monday, April 29, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

Performance Analysis of the Neighbor Weight Trust Determination Algorithm in MANETs

Ali Abu Romman1 and Hussein Al-Bahadili2, 1Princess Sumaya University for Technology, Jordan and 2University of Petra, Jordan

Abstract

Mobile ad-hoc networks (MANETs) are susceptible to attacks by malicious nodes that could easily bring down the whole network. Therefore, it is important to have a reliable mechanism for detecting and isolating malicious nodes before they can do any harm to the network. One of the possible mechanisms is by using trust-based routing protocols. One of the main requirements of such protocols is to have a cost-effective trust determination algorithm. This paper presents the performance analysis of a recently developed trust determination algorithm, namely, the neighbor-weight trust determination (NWTD) algorithm. The performance of the algorithm is evaluated through simulation using the MANET simulator (MANSim). The simulation results demonstrated the reliability and effectiveness of the algorithm in identifying and isolating any maliciously behaving node(s) in a timely manner.

Keywords

NWTD, trust determination, trust-based routing protocols, malicious node, MANET, MANSim

Original Source URL: https://aircconline.com/ijnsa/V8N4/8416ijnsa03.pdf

Volume URL: https://airccse.org/journal/jnsa16_current.html

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

https://airccse.org/journal/ijnsa.html

Citations, h-index, i10-index

Citations 10674   h-index 49   i10-index 203

Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following

 

  • Artificial intelligence, Machine Learning for Security
  • Blockchain Technology, Cryptocurrencies and Cyber Security
  • Cloud, Fog, Edge & Cognitive Security
  • Cryptographic Protocols
  • Cyber Physical System (CPS) Security (autonomous vehicles, industrial control systems)
  • Data Center Network Control, Security and Optimization
  • Database and System Security
  • E-mail security, Spam, Phishing, E-mail fraud
  • Hardware-Based Attacks
  • Internet of Things (IoT) Security
  • Internet Security & Applications (Social networking, crowd sourcing and Web based applications, services security)
  • Intrusion Detection and Prevention
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Performance Evaluations of Protocols & Security Application
  • Security & Network Management
  • Security for emerging networks (SDN, Home Networks, Body-area Networks, VANETs)
  • Security of Virtual Machines
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Security, Trust and Privacy Challenges
  • Smart City, Grid, Electronic Voting Security
  • Network and Wireless Network Security
  • Ubiquitous Computing Security
  • Virus, worms, Trojan Protection
  • Web 2.0 Security

Paper Submission

Authors are invited to submit papers for this journal through Email: ijnsa@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline: May 04, 2024

·         Acceptance Notification: May 25, 2024

·         Final Manuscript Due: May 29, 2024

·         Publication Date: Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us: ijnsa@airccse.org (or) ijnsa@aircconline.com

For other details, please visit: https://airccse.org/journal/ijnsa.html

Paper Submission Link: https://airccse.com/submissioncs/home.html


Friday, April 26, 2024

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusion #detection #prevention #mobile #adhoc #sensor #p2p #networkmanagement #virtualmachines #vanet #socialnetwork #ddos #trust #privacy #wirelessnetwork #ubiquitouscomputing #virus #worms #trojan #hacking #ransomware #computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercrime #cyberattack #ethicalhacking #datasecurity #tech #itsecurity #internet #computerscience #server #dataprivacy


Submit Your Research Articles...!!!

Welcome To IJNSA

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL:

https://airccse.org/journal/ijnsa.html

Wikicfp URL: http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=179570

Submission Deadline: April 27, 2024

Contact us:

Here's where you can reach us: ijnsa@aircconline.com (or) ijnsa@airccse.org

Submission URL:

https://airccse.com/submissioncs/home.html

Wednesday, April 24, 2024

5th International conference on Advanced Natural Language Processing (AdNLP 2024)

#nlp #datamining #machinelearning #bigdata #analysis #knowledgeprocessing #ubiquitouscomputing #business #modeling #artificialintelligence #internetofthings #informationextraction #informationretrieval #ontology #socialmedia #textmining #computerscience #naturallanguageprocessing #cloud #engineering #informationtechnology #ai #ml #tech #education #data #datascience #deeplearning #iot #web #analytics #computing #it #mining #programming #information #webdeveloper #computer #security #developer #cybersecurity #internet #innovation #datascientist #dataprotection #businessintelligence #robotics #bigdataanalytics #cloudstorage #database #devops #datasecurity #hadoop #cloudcomputing #blockchain #datavisualization #datacenter



Submit Your Research Articles...!!!

Welcome To AdNLP 2024

5th International conference on Advanced Natural Language Processing (AdNLP 2024)
May 25 ~ 26, 2024, Vancouver, Canada

Webpage URL:

Submission Deadline: April 27, 2024

Contact us:
Here's where you can reach us: adnlp@icaita2024.org (or) adnlpconference@gmail.com

Submission URL:

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)

Webpage URL: https://airccse.org/journal/ijnsa.html

The Interest of Hybridizing Explainable AI with RNN to Resolve DDOS Attacks: A Comprehensive Practical Study

Ahmad Mater Aljohani and Ibrahim Elgendi, University of Canberra, Australia

Abstract

In this paper, we suggest a new method to address attack detection problems in IoT networks, by using a specific emphasis on the user’s and network’s requirements regarding the application provider and giving a defence against intruders and malicious users. The paper focuses on resolving the problem of detection of attacks in IoT networks using Recurrent Neural Networks and an explainable artificial intelligence technique (XAI) named SHAP. XAI refers to a collection of methods and procedures for explaining how AI models make decisions. Although XAI is useful for understanding the motivations underlying AI models, the information utilized in these discoveries may be a risk. Machine learning models are vulnerable to attacks such as model inversion, model extraction, and membership inference. Such attacks could concentrate on the learning model or on the data used to train and build the model, depending on the involved circumstances and parties. Hence, when the owner of an AI model wishes to grant only black-box access and does not expose the model's parameters and architecture to third parties, solutions like XAI can notably enhance the susceptibility to model extraction attacks.

To guarantee the users regarding possible violations, the proposed RNN-SHAP method is based on a decentralized topology relying on a set of cooperative independent parties including the users of IoT network. Another advantage of the suggested approach is the capitalization on the trust relationships that are part of IoT networks in real life to build trusted mechanisms in the network. Compared to other methods using different metrics, the suggested RNN-SHAP shows its efficiency in resolving the DDoS problem.

Keywords

deep learning (DL), Recurrent neural networks (RNN), SHapley Additive explanation (SHAP), Attack detection, explainable artificial intelligence (XAI), Distributed Denial of Service (DDoS)

Abstract URL: http://aircconline.com/abstract/ijnsa/v16n2/16224ijnsa05.html

Original Source URL: https://aircconline.com/ijnsa/V16N2/16224ijnsa05.pdf

Volume URL: https://airccse.org/journal/jnsa24_current.html

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...