This document presents an ontology for exploring knowledge in computer networks that was developed using OWL format. Over 500 concepts related to various aspects of computer networks like scope, scale, topology, etc. were identified and classified. Relationships between concepts were analyzed and over 550 relationships between 33 types of relationships were identified. The ontology was implemented using the Protege tool and can help users search for concepts in the computer networks domain on semantic web applications.
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIJNSA Journal
The increase of smart devices has accelerated sensitive data exchange on the Internet using most of the time unsecured channels. Since a massive use of RFID (Radio-frequency Identification) tags in the transportation and construction industries from 1980 to 1990, with the expanded use of the Internet with 2G/3G or 4G since 2000, we are witnessing a new era of connected objects. A huge number of heterogeneous sensors may collect and dispatch sensitive data from an endpoint to worldwide network on the Internet. Privacy concerns in IOT remain important issues in the research. In this paper, we aim to evaluate current research state related to privacy and security in IOT by identifying existing approaches and publications trends. Therefore, we have conducted a systematic mapping study using automated searches from selected relevant academics databases. The result of this mapping highlights research type and contribution in different facets and research activities trends in the topic of “security and privacy” in IoT edge, cloud and fog environment.
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIJNSA Journal
The increase of smart devices has accelerated sensitive data exchange on the Internet using most of the time unsecured channels. Since a massive use of RFID (Radio-frequency Identification) tags in the transportation and construction industries from 1980 to 1990, with the expanded use of the Internet with 2G/3G or 4G since 2000, we are witnessing a new era of connected objects. A huge number of heterogeneous sensors may collect and dispatch sensitive data from an endpoint to worldwide network on the Internet. Privacy concerns in IOT remain important issues in the research. In this paper, we aim to evaluate current research state related to privacy and security in IOT by identifying existing approaches and publications trends. Therefore, we have conducted a systematic mapping study using automated searches from selected relevant academics databases. The result of this mapping highlights research type and contribution in different facets and research activities trends in the topic of “security and privacy” in IoT edge, cloud and fog environment.
A novel secure e contents system for multi-media interchange workflows in e-l...IJCNCJournal
The goal of e-learning is to benefit from the capabilities offered by new information technology (such as
remote digital communications, multimedia, internet, cell phones, teleconferences, etc.) and to enhance the
security of several government organizations so as to take into considerations almost all the contents of elearning
such as: information content, covering most of citizens or state firms or corporations queries.
Content provides a service to provide most if not all basic and business services; content of communicative
link provides the citizen and the state agencies together all the time and provides content security for all
workers on this network to work in securely environment. Access to information as well is safeguarded. The
main objective of this research is to build a novel multi-media security system (encrypting / decrypting
system) that will enable E-learning to exchange more secured multi-media data/information.
Mining knowledge graphs to map heterogeneous relations between the internet o...IJECEIAES
Patterns for the internet of things (IoT) which represent proven solutions used to solve design problems in the IoT are numerous. Similar to objectoriented design patterns, these IoT patterns contain multiple mutual heterogeneous relationships. However, these pattern relationships are hidden and virtually unidentified in most documents. In this paper, we use machine learning techniques to automatically mine knowledge graphs to map these relationships between several IoT patterns. The end result is a semantic knowledge graph database which outlines patterns as vertices and their relations as edges. We have identified four main relationships between the IoT patterns-a pattern is similar to another pattern if it addresses the same use case problem, a large-scale pattern uses a small- scale pattern in a lower level layer, a large pattern is composed of multiple smaller scale patterns underneath it, and patterns complement and combine with each other to resolve a given use case problem. Our results show some promising prospects towards the use of machine learning techniques to generate an automated repository to organise the IoT patterns, which are usually extracted at various levels of abstraction and granularity.
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...IJECEIAES
Compression and encryption of speech signals are essential multimedia technologies. In the field of speech, these technologies are needed to meet the security and confidentiality of information requirements for transferring huge speech signals via a network, and for decreasing storage space for rapid retrieval. In this paper, we propose an algorithm that includes hybrid transformation in order to analyses the speech signal frequencies. The speech signal is then compressed, after removing low and less intense frequencies, to produce a well compressed speech signal and ensure the quality of the speech. The resulting compressed speech is then used as an input in a scrambling algorithm that was proposed on two levels. One of these is an external scramble that works on mixing up the segments of speech that were divided using Fuzzy C-Means and changing their locations. The internal scramble scatters the values of each block internally based on the pattern of a Sudoku puzzle and quadratic map so that the resulting speech is an input to a proposed encryption algorithm using the threefish algorithm. The proposed algorithm proved to be highly efficient in the compression and encryption of the speech signal based on approved statistical measures.
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIJNSA Journal
The increase of smart devices has accelerated sensitive data exchange on the Internet using most of the time unsecured channels. Since a massive use of RFID (Radio-frequency Identification) tags in the transportation and construction industries from 1980 to 1990, with the expanded use of the Internet with 2G/3G or 4G since 2000, we are witnessing a new era of connected objects. A huge number of heterogeneous sensors may collect and dispatch sensitive data from an endpoint to worldwide network on the Internet. Privacy concerns in IOT remain important issues in the research. In this paper, we aim to evaluate current research state related to privacy and security in IOT by identifying existing approaches and publications trends. Therefore, we have conducted a systematic mapping study using automated searches from selected relevant academics databases. The result of this mapping highlights research type and contribution in different facets and research activities trends in the topic of “security and privacy” in IoT edge, cloud and fog environment.
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIJNSA Journal
The increase of smart devices has accelerated sensitive data exchange on the Internet using most of the time unsecured channels. Since a massive use of RFID (Radio-frequency Identification) tags in the transportation and construction industries from 1980 to 1990, with the expanded use of the Internet with 2G/3G or 4G since 2000, we are witnessing a new era of connected objects. A huge number of heterogeneous sensors may collect and dispatch sensitive data from an endpoint to worldwide network on the Internet. Privacy concerns in IOT remain important issues in the research. In this paper, we aim to evaluate current research state related to privacy and security in IOT by identifying existing approaches and publications trends. Therefore, we have conducted a systematic mapping study using automated searches from selected relevant academics databases. The result of this mapping highlights research type and contribution in different facets and research activities trends in the topic of “security and privacy” in IoT edge, cloud and fog environment.
A novel secure e contents system for multi-media interchange workflows in e-l...IJCNCJournal
The goal of e-learning is to benefit from the capabilities offered by new information technology (such as
remote digital communications, multimedia, internet, cell phones, teleconferences, etc.) and to enhance the
security of several government organizations so as to take into considerations almost all the contents of elearning
such as: information content, covering most of citizens or state firms or corporations queries.
Content provides a service to provide most if not all basic and business services; content of communicative
link provides the citizen and the state agencies together all the time and provides content security for all
workers on this network to work in securely environment. Access to information as well is safeguarded. The
main objective of this research is to build a novel multi-media security system (encrypting / decrypting
system) that will enable E-learning to exchange more secured multi-media data/information.
Mining knowledge graphs to map heterogeneous relations between the internet o...IJECEIAES
Patterns for the internet of things (IoT) which represent proven solutions used to solve design problems in the IoT are numerous. Similar to objectoriented design patterns, these IoT patterns contain multiple mutual heterogeneous relationships. However, these pattern relationships are hidden and virtually unidentified in most documents. In this paper, we use machine learning techniques to automatically mine knowledge graphs to map these relationships between several IoT patterns. The end result is a semantic knowledge graph database which outlines patterns as vertices and their relations as edges. We have identified four main relationships between the IoT patterns-a pattern is similar to another pattern if it addresses the same use case problem, a large-scale pattern uses a small- scale pattern in a lower level layer, a large pattern is composed of multiple smaller scale patterns underneath it, and patterns complement and combine with each other to resolve a given use case problem. Our results show some promising prospects towards the use of machine learning techniques to generate an automated repository to organise the IoT patterns, which are usually extracted at various levels of abstraction and granularity.
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...IJECEIAES
Compression and encryption of speech signals are essential multimedia technologies. In the field of speech, these technologies are needed to meet the security and confidentiality of information requirements for transferring huge speech signals via a network, and for decreasing storage space for rapid retrieval. In this paper, we propose an algorithm that includes hybrid transformation in order to analyses the speech signal frequencies. The speech signal is then compressed, after removing low and less intense frequencies, to produce a well compressed speech signal and ensure the quality of the speech. The resulting compressed speech is then used as an input in a scrambling algorithm that was proposed on two levels. One of these is an external scramble that works on mixing up the segments of speech that were divided using Fuzzy C-Means and changing their locations. The internal scramble scatters the values of each block internally based on the pattern of a Sudoku puzzle and quadratic map so that the resulting speech is an input to a proposed encryption algorithm using the threefish algorithm. The proposed algorithm proved to be highly efficient in the compression and encryption of the speech signal based on approved statistical measures.
This paper discusses the several research methodologies that can
be used in Computer Science (CS) and Information Systems
(IS). The research methods vary according to the science
domain and project field. However a little of research
methodologies can be reasonable for Computer Science and
Information System.
Novel framework using dynamic passphrase towards secure and energy-efficient ...IJECEIAES
At Mobile Adhoc Network (MANET) has been long-researched topic in adhoc network owing to the associated advantages in its cost-effective application as well as consistent loophopes owing to its inherent charecteristics. This manuscript draws a relationship between the energy factor and security factor which has not been emphasized in any existing studies much. Review of existing security approaches shows that they are highly attack specific, uses complex encryption, and overlooks the involvement of energy factor in it. Therefore, the proposed system introduces a novel mechanism where security tokens and passphrases are utilized in order to offer better security. The proposed system also introduces the usage of an agent node which communications with mobile nodes using group-based communication system thereby ensuring reduced computational effort of mobile nodes towards establishing secured communication. The outcome shows proposed system offers better outcome in contrast to existing system.
DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...IAEME Publication
The paper describes the conceptual model of adaptive control of cyber protection
of the informatization object (IO). Petri's Networks were used as a mathematical
device to solve the problem of adaptive control of user access rights. The simulation
model is proposed and the simulation in PIPE v4.3.0 package is performed. The
possibility of automating the procedures for adjusting the user profile to minimize or
neutralize cyber threats in the objects of informatization is shown. The model of
distribution of user tasks in computer networks of IO is proposed. The model, unlike
the existing, is based on the mathematical apparatus of Petri's Networks and contains
variables that allow reducing the power of the state space. Access control method
(ACM) is added. The addenda touched upon aspects of reconciliation of access rights
that are requested by the task and requirements of the security policy and the degree
of consistency of tasks and access to the IO nodes. Adjustment of rules and security
metrics for new tasks or redistributable tasks is described in the notation of Petri nets
Trends of machine learning in 2020 - International Journal of Artificial Inte...gerogepatton
The International Journal of Artificial Intelligence & Applications (IJAIA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Artificial Intelligence & Applications (IJAIA). It is an international journal intended for professionals and researchers in all fields of AI for researchers, programmers, and software and hardware manufacturers. The journal also aims to publish new attempts in the form of special issues on emerging areas in Artificial Intelligence and applications.
The internet of things is an emerging technology that is currently present in most processes and devices, allowing to improve the quality of life of people and facilitating the access to specific information and services. The main purpose of the present article is to offer a general overview of internet of things, based on the analysis of recently published work. The added value of this article lies in the analysis of the main recent publications and the diversity of applications of internet of things technology. As a result of the analysis of the current literature, internet of things technology stands out as a facilitator in business and industrial performance but above all in improving the quality of life. As a conclusion to this document, the internet of things is a technology that can overcome the challenges in terms of security, processing capacity and data mobility, as long as the development related to other technologies follows its expected course.
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONIJITE
There is a gap between the network security graduate and the professional life. In this paper we discussed the different types of network intrusion dataset and then we highlighted the fact that any student can easily create a network intrusion dataset that is representative of the network they are in. Intrusions can be in form of anomaly or network signature; the students cannot grasp all types but they have to have the ability to detect malicious packets within his network.
Improved method for image security based on chaotic-shuffle and chaotic-diffu...IJECEIAES
In this paper, we propose to enhance the security performance of the color image encryption algorithm which depends on multi-chaotic systems. The current cryptosystem utilized a pixel-chaotic-shuffle system to encode images, in which the time of shuffling is autonomous to the plain-image. Thus, it neglects to the picked plaintext and known-plaintext attacks. Also, the statistical features of the cryptosystem are not up to the standard. Along these lines, the security changes are encircled to make the above attacks infeasible and upgrade the statistical features also. It is accomplished by altering the pixel-chaotic-shuffle component and including another pixel-chaotic-diffusion system to it. The keys for diffusion of pixels are extracted from the same chaotic arrangements created in the past stage. The renovation investigations and studies are performed to exhibit that the refreshed version of cryptosystem has better statistical features and invulnerable to the picked plaintext and known plaintext attacks than the current algorithm.
The Internet of Things (IoT) concept has recently been presented as the next revolution and a part of the internet of the future. IoT consists of billions of uniquely identified smart objects ‘things’ with communication ability over the internet
Rule-based Information Extraction from Disease Outbreak ReportsWaqas Tariq
Information extraction (IE) systems serve as the front end and core stage in different natural language programming tasks. As IE has proved its efficiency in domain-specific tasks, this project focused on one domain: disease outbreak reports. Several reports from the World Health Organization were carefully examined to formulate the extraction tasks: named-entities, such as disease name, date and location; the location of the reporting authority; and the outbreak incident. Extraction rules were then designed, based on a study of the textual expressions and elements found in the text that appeared before and after the target text.
The experiment resulted in very high performance scores for all the tasks in general. The training corpora and the testing corpora were tested separately. The system performed with higher accuracy with entities and events extraction than with relationship extraction.
It can be concluded that the rule-based approach has been proven capable of delivering reliable IE, with extremely high accuracy and coverage results. However, this approach requires an extensive, time-consuming, manual study of word classes and phrases.
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...IJECEIAES
Security problems in Wireless Sensor Network (WSN) have been researched from more than a decade. There are various security approaches being evolving towards resisting various forms of attack using different methodologies. After reviewing the existing security approaches, it can be concluded that such security approaches are highly attack-specific and doesnt address various associated issues in WSN. It is essential for security approach to be computationally lightweight. Therefore, this paper presents a novel analytical modelling that is based on n-tier approach with a target to generate an optimized secret key that could ensure higher degree of security during the process of data aggregation in WSN. The study outcome shows that proposed system is computationally lightweight with good performance on reduced delay and reduced energy consumption. It also exhibits enhanced response time and good data delivery performance to balance the need of security and data forwarding performance in WSN.
State regulation of the IoT in the Russian Federation: Fundamentals and chall...IJECEIAES
The purpose of this section is to study the problems with implementing technical and legal regulations for the development of public administration functions in the Russian Federation when using the internet of things (IoT). The introduction is based on an analysis of regulatory legal acts and presents the main strategic directions for the development of public administration functions in the Russian federation when using IoT. State reports, scientific literature, a system of technical and legal regulation are analyzed, and the main problems of implementing the IoT that impede the achievement of effective public administration are studied. The Russian practice of using IoT in various economic areas is investigated. Based on an analysis of the mechanisms for ensuring data safety of information technology users in the Russian federation, problems were investigated, such as the collecting data through IoT, including publicly available personal data in order to profile human activities, and creating of a digital twin of a person. The social constraints for introducing distributed registry technologies are users' distrust in the field of data privacy protection and mathematical algorithms that are used to establish trust in a digital environment instead of trusted centralized intermediaries; these problems were also analyzed. The Russian approach was analyzed in comparison to European experience in this field. To ensure information security and the possibility of its distribution, the IoT is revealed.
International Journal on Cybernetics & Informatics ( IJCI) is an open access peer- reviewed journal that focuses on the areas related to cybernetics which is information, control and system theory, understands the design and function of any system and the relationship among these applications. This journal aims to provide a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals.
A Deep Learning Model For Crime Surveillance In Phone Calls.vivatechijri
Public surveillance Systems are creating ground-breaking impact to secure lives, ensuring public safety with the interventions that will curb crime and improve well-being of communities, law enforcement agencies are employing and deploying tools like CCTV for video surveillance in banks, residential societies shopping malls,markets,roads almost everywhere to detect where and who was responsible for events like robbery, rough driving, insolence, murder etc. Other surveillance system tools like phone tapping is used to plot an event to catch a suspected person who is threatening an innocent or conspiring a violent activity over a phone call which is being done voluntarily by authorities . Now analyzing both the scenarios in the case of CCTV the crime(robbery,murder) has already occured and in the case of phone tapping there must be information in advance about the suspected person who is going to commit a crime, Now to overcome this issue a system is proposed to know in advance who is suspected and what conspiracy is being done over phone calls as well to detect it automatically and report it to law enforcemet authorities.
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
Community detection is becoming a highly demanded topic in social networking-based applications. It involves finding the maximum intraconnected and minimum inter-connected sub-graphs in given social networks. Many approaches have been developed for community’s detection and less of them have focused on the dynamical aspect of the social network. The decision of the community has to consider the pattern of changes in the social network and to be smooth enough. This is to enable smooth operation for other community detection dependent application. Unlike dynamical community detection Algorithms, this article presents a non-dominated aware searching Algorithm designated as non-dominated sorting based community detection with dynamical awareness (NDS-CD-DA). The Algorithm uses a non-dominated sorting genetic algorithm NSGA-II with two objectives: modularity and normalized mutual information (NMI). Experimental results on synthetic networks and real-world social network datasets have been compared with classical genetic with a single objective and has been shown to provide superiority in terms of the domination as well as the convergence. NDS-CD-DA has accomplished a domination percentage of 100% over dynamic evolutionary community searching DECS for almost all iterations.
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...IJECEIAES
Offering a secure communication in wireless adhoc network is yet an openend problem irrespective of archives of existing literatures towards securityenhancement. Inclination towards solving specific forms of attack in adhocnetwork is majorly seen as an existing trend which lowers the applicability ofexisting security solution while application environment or attack scenario ischanged. Therefore, the proposed system implements an analytical securerouting modeling which performs consistent monitoring of the maliciousbehaviour of its neighboring node and formulates decision towards securerouting by the source nodes. Harnessing the potential ofconceptualprobabilistic modeling, the proposed system is capable as well as applicablefor resisting maximum number / types of threats in wireless network.The study outcome show proposed scheme offer better performance in contrast to existing secure routing scheme.
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docxtodd521
Running Head: THE SEVEN LAYER MODEL OF OSIKao 1
THE SEVEN LAYER MODEL OF OSIKao 2
The Seven Layer Model of OSI
Kao Badi Prudence
CMIT 265
Professor: Ryan Thomas
Date: 06/25/2020
The Seven Layer Model of OSIComment by Prof Thomas: Paper format changes between sections. Review format
The Open System Interconnect (OSI) is a very important concept in networking when considering the creation of a a networking system for the university. “It was created by the international organization of standards 1978 and its main purpose is to help describe the architecture of a network so as make it possible for computers to send and receive data from other computers”. Although the model is conceptual, appreciating its purpose and function will help the university in understanding how the protocol suits and network architecture work on an application basis. The OSI model is usually built from bottom to top in this order; physical, data link, network, transport, session, presentation and lastly application. Every layer of the OSI model has its own special function. The following sections describe the function of each layer.
The layers of the OSI model
Physical Layer (Layer 1)
The OSI model layer identifies the networks’ physical characteristics and specifications. This is the type of media used on the network for example type of connector, cables, and pinout format cables.
Topology
The topography is defined by the physical layer. This layer shows the type of topology to be applied in the network. Additional characteristics in this layer define voltage used on a given frequency and medium at which the signals that carrying the data operates. They dictate speed and bandwidth of a given medium and the maximum distance over which a specific media type can be applied
Data link Layer (Layer 2)
The layer is a designed protocol that operates in a program involved in data movement into and out of a physical link in a network. Layer 2 of the OSI model is responsible for receiving data for layer 1. It is then sent to layer 3 and the data from layer 3 is sent to layer 1. This layer also detects and corrects errors. The word ‘frame’ is usually used to refer to the logical data grouping at this layer. It has two distinctive sub-layers:
· Access control (MAC) - MAC address is the physical/hardware address burnt into each network interface card (NIC). It accesses specific areas that are found within the interior of buildings. Provides access that is faster to the people authorized and restricts access of people not authorized.
· Link control (LLC) – “this controls the error and flows control mechanism of the data link layer [2].” It plays the role of managing the transmissions of data to ensure that there is integrity. For NLC, it has a role of providing data link layers.
· Network Layer (Layer 3).
The primary faction of layer 3 is to giving access to the ways by which information can disseminate to and from different network systems. It does not specify.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn significant attention during the past few years, the pace at which new devices are being integrated into the system will profoundly impact the world in a good way but also poses some severe queries about security and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most significant concerns of IoT is to provide security assurance for the data exchange because data is vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where each layer provides a service. The security needs vary from layer to layer as each layer serves a different purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks have been discussed along with some existing and proposed countermeasures.
This paper discusses the several research methodologies that can
be used in Computer Science (CS) and Information Systems
(IS). The research methods vary according to the science
domain and project field. However a little of research
methodologies can be reasonable for Computer Science and
Information System.
Novel framework using dynamic passphrase towards secure and energy-efficient ...IJECEIAES
At Mobile Adhoc Network (MANET) has been long-researched topic in adhoc network owing to the associated advantages in its cost-effective application as well as consistent loophopes owing to its inherent charecteristics. This manuscript draws a relationship between the energy factor and security factor which has not been emphasized in any existing studies much. Review of existing security approaches shows that they are highly attack specific, uses complex encryption, and overlooks the involvement of energy factor in it. Therefore, the proposed system introduces a novel mechanism where security tokens and passphrases are utilized in order to offer better security. The proposed system also introduces the usage of an agent node which communications with mobile nodes using group-based communication system thereby ensuring reduced computational effort of mobile nodes towards establishing secured communication. The outcome shows proposed system offers better outcome in contrast to existing system.
DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...IAEME Publication
The paper describes the conceptual model of adaptive control of cyber protection
of the informatization object (IO). Petri's Networks were used as a mathematical
device to solve the problem of adaptive control of user access rights. The simulation
model is proposed and the simulation in PIPE v4.3.0 package is performed. The
possibility of automating the procedures for adjusting the user profile to minimize or
neutralize cyber threats in the objects of informatization is shown. The model of
distribution of user tasks in computer networks of IO is proposed. The model, unlike
the existing, is based on the mathematical apparatus of Petri's Networks and contains
variables that allow reducing the power of the state space. Access control method
(ACM) is added. The addenda touched upon aspects of reconciliation of access rights
that are requested by the task and requirements of the security policy and the degree
of consistency of tasks and access to the IO nodes. Adjustment of rules and security
metrics for new tasks or redistributable tasks is described in the notation of Petri nets
Trends of machine learning in 2020 - International Journal of Artificial Inte...gerogepatton
The International Journal of Artificial Intelligence & Applications (IJAIA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Artificial Intelligence & Applications (IJAIA). It is an international journal intended for professionals and researchers in all fields of AI for researchers, programmers, and software and hardware manufacturers. The journal also aims to publish new attempts in the form of special issues on emerging areas in Artificial Intelligence and applications.
The internet of things is an emerging technology that is currently present in most processes and devices, allowing to improve the quality of life of people and facilitating the access to specific information and services. The main purpose of the present article is to offer a general overview of internet of things, based on the analysis of recently published work. The added value of this article lies in the analysis of the main recent publications and the diversity of applications of internet of things technology. As a result of the analysis of the current literature, internet of things technology stands out as a facilitator in business and industrial performance but above all in improving the quality of life. As a conclusion to this document, the internet of things is a technology that can overcome the challenges in terms of security, processing capacity and data mobility, as long as the development related to other technologies follows its expected course.
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONIJITE
There is a gap between the network security graduate and the professional life. In this paper we discussed the different types of network intrusion dataset and then we highlighted the fact that any student can easily create a network intrusion dataset that is representative of the network they are in. Intrusions can be in form of anomaly or network signature; the students cannot grasp all types but they have to have the ability to detect malicious packets within his network.
Improved method for image security based on chaotic-shuffle and chaotic-diffu...IJECEIAES
In this paper, we propose to enhance the security performance of the color image encryption algorithm which depends on multi-chaotic systems. The current cryptosystem utilized a pixel-chaotic-shuffle system to encode images, in which the time of shuffling is autonomous to the plain-image. Thus, it neglects to the picked plaintext and known-plaintext attacks. Also, the statistical features of the cryptosystem are not up to the standard. Along these lines, the security changes are encircled to make the above attacks infeasible and upgrade the statistical features also. It is accomplished by altering the pixel-chaotic-shuffle component and including another pixel-chaotic-diffusion system to it. The keys for diffusion of pixels are extracted from the same chaotic arrangements created in the past stage. The renovation investigations and studies are performed to exhibit that the refreshed version of cryptosystem has better statistical features and invulnerable to the picked plaintext and known plaintext attacks than the current algorithm.
The Internet of Things (IoT) concept has recently been presented as the next revolution and a part of the internet of the future. IoT consists of billions of uniquely identified smart objects ‘things’ with communication ability over the internet
Rule-based Information Extraction from Disease Outbreak ReportsWaqas Tariq
Information extraction (IE) systems serve as the front end and core stage in different natural language programming tasks. As IE has proved its efficiency in domain-specific tasks, this project focused on one domain: disease outbreak reports. Several reports from the World Health Organization were carefully examined to formulate the extraction tasks: named-entities, such as disease name, date and location; the location of the reporting authority; and the outbreak incident. Extraction rules were then designed, based on a study of the textual expressions and elements found in the text that appeared before and after the target text.
The experiment resulted in very high performance scores for all the tasks in general. The training corpora and the testing corpora were tested separately. The system performed with higher accuracy with entities and events extraction than with relationship extraction.
It can be concluded that the rule-based approach has been proven capable of delivering reliable IE, with extremely high accuracy and coverage results. However, this approach requires an extensive, time-consuming, manual study of word classes and phrases.
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...IJECEIAES
Security problems in Wireless Sensor Network (WSN) have been researched from more than a decade. There are various security approaches being evolving towards resisting various forms of attack using different methodologies. After reviewing the existing security approaches, it can be concluded that such security approaches are highly attack-specific and doesnt address various associated issues in WSN. It is essential for security approach to be computationally lightweight. Therefore, this paper presents a novel analytical modelling that is based on n-tier approach with a target to generate an optimized secret key that could ensure higher degree of security during the process of data aggregation in WSN. The study outcome shows that proposed system is computationally lightweight with good performance on reduced delay and reduced energy consumption. It also exhibits enhanced response time and good data delivery performance to balance the need of security and data forwarding performance in WSN.
State regulation of the IoT in the Russian Federation: Fundamentals and chall...IJECEIAES
The purpose of this section is to study the problems with implementing technical and legal regulations for the development of public administration functions in the Russian Federation when using the internet of things (IoT). The introduction is based on an analysis of regulatory legal acts and presents the main strategic directions for the development of public administration functions in the Russian federation when using IoT. State reports, scientific literature, a system of technical and legal regulation are analyzed, and the main problems of implementing the IoT that impede the achievement of effective public administration are studied. The Russian practice of using IoT in various economic areas is investigated. Based on an analysis of the mechanisms for ensuring data safety of information technology users in the Russian federation, problems were investigated, such as the collecting data through IoT, including publicly available personal data in order to profile human activities, and creating of a digital twin of a person. The social constraints for introducing distributed registry technologies are users' distrust in the field of data privacy protection and mathematical algorithms that are used to establish trust in a digital environment instead of trusted centralized intermediaries; these problems were also analyzed. The Russian approach was analyzed in comparison to European experience in this field. To ensure information security and the possibility of its distribution, the IoT is revealed.
International Journal on Cybernetics & Informatics ( IJCI) is an open access peer- reviewed journal that focuses on the areas related to cybernetics which is information, control and system theory, understands the design and function of any system and the relationship among these applications. This journal aims to provide a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals.
A Deep Learning Model For Crime Surveillance In Phone Calls.vivatechijri
Public surveillance Systems are creating ground-breaking impact to secure lives, ensuring public safety with the interventions that will curb crime and improve well-being of communities, law enforcement agencies are employing and deploying tools like CCTV for video surveillance in banks, residential societies shopping malls,markets,roads almost everywhere to detect where and who was responsible for events like robbery, rough driving, insolence, murder etc. Other surveillance system tools like phone tapping is used to plot an event to catch a suspected person who is threatening an innocent or conspiring a violent activity over a phone call which is being done voluntarily by authorities . Now analyzing both the scenarios in the case of CCTV the crime(robbery,murder) has already occured and in the case of phone tapping there must be information in advance about the suspected person who is going to commit a crime, Now to overcome this issue a system is proposed to know in advance who is suspected and what conspiracy is being done over phone calls as well to detect it automatically and report it to law enforcemet authorities.
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
Community detection is becoming a highly demanded topic in social networking-based applications. It involves finding the maximum intraconnected and minimum inter-connected sub-graphs in given social networks. Many approaches have been developed for community’s detection and less of them have focused on the dynamical aspect of the social network. The decision of the community has to consider the pattern of changes in the social network and to be smooth enough. This is to enable smooth operation for other community detection dependent application. Unlike dynamical community detection Algorithms, this article presents a non-dominated aware searching Algorithm designated as non-dominated sorting based community detection with dynamical awareness (NDS-CD-DA). The Algorithm uses a non-dominated sorting genetic algorithm NSGA-II with two objectives: modularity and normalized mutual information (NMI). Experimental results on synthetic networks and real-world social network datasets have been compared with classical genetic with a single objective and has been shown to provide superiority in terms of the domination as well as the convergence. NDS-CD-DA has accomplished a domination percentage of 100% over dynamic evolutionary community searching DECS for almost all iterations.
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...IJECEIAES
Offering a secure communication in wireless adhoc network is yet an openend problem irrespective of archives of existing literatures towards securityenhancement. Inclination towards solving specific forms of attack in adhocnetwork is majorly seen as an existing trend which lowers the applicability ofexisting security solution while application environment or attack scenario ischanged. Therefore, the proposed system implements an analytical securerouting modeling which performs consistent monitoring of the maliciousbehaviour of its neighboring node and formulates decision towards securerouting by the source nodes. Harnessing the potential ofconceptualprobabilistic modeling, the proposed system is capable as well as applicablefor resisting maximum number / types of threats in wireless network.The study outcome show proposed scheme offer better performance in contrast to existing secure routing scheme.
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docxtodd521
Running Head: THE SEVEN LAYER MODEL OF OSIKao 1
THE SEVEN LAYER MODEL OF OSIKao 2
The Seven Layer Model of OSI
Kao Badi Prudence
CMIT 265
Professor: Ryan Thomas
Date: 06/25/2020
The Seven Layer Model of OSIComment by Prof Thomas: Paper format changes between sections. Review format
The Open System Interconnect (OSI) is a very important concept in networking when considering the creation of a a networking system for the university. “It was created by the international organization of standards 1978 and its main purpose is to help describe the architecture of a network so as make it possible for computers to send and receive data from other computers”. Although the model is conceptual, appreciating its purpose and function will help the university in understanding how the protocol suits and network architecture work on an application basis. The OSI model is usually built from bottom to top in this order; physical, data link, network, transport, session, presentation and lastly application. Every layer of the OSI model has its own special function. The following sections describe the function of each layer.
The layers of the OSI model
Physical Layer (Layer 1)
The OSI model layer identifies the networks’ physical characteristics and specifications. This is the type of media used on the network for example type of connector, cables, and pinout format cables.
Topology
The topography is defined by the physical layer. This layer shows the type of topology to be applied in the network. Additional characteristics in this layer define voltage used on a given frequency and medium at which the signals that carrying the data operates. They dictate speed and bandwidth of a given medium and the maximum distance over which a specific media type can be applied
Data link Layer (Layer 2)
The layer is a designed protocol that operates in a program involved in data movement into and out of a physical link in a network. Layer 2 of the OSI model is responsible for receiving data for layer 1. It is then sent to layer 3 and the data from layer 3 is sent to layer 1. This layer also detects and corrects errors. The word ‘frame’ is usually used to refer to the logical data grouping at this layer. It has two distinctive sub-layers:
· Access control (MAC) - MAC address is the physical/hardware address burnt into each network interface card (NIC). It accesses specific areas that are found within the interior of buildings. Provides access that is faster to the people authorized and restricts access of people not authorized.
· Link control (LLC) – “this controls the error and flows control mechanism of the data link layer [2].” It plays the role of managing the transmissions of data to ensure that there is integrity. For NLC, it has a role of providing data link layers.
· Network Layer (Layer 3).
The primary faction of layer 3 is to giving access to the ways by which information can disseminate to and from different network systems. It does not specify.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn significant attention during the past few years, the pace at which new devices are being integrated into the system will profoundly impact the world in a good way but also poses some severe queries about security and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most significant concerns of IoT is to provide security assurance for the data exchange because data is vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where each layer provides a service. The security needs vary from layer to layer as each layer serves a different purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks have been discussed along with some existing and proposed countermeasures.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of
the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating
interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn
significant attention during the past few years, the pace at which new devices are being integrated into the
system will profoundly impact the world in a good way but also poses some severe queries about security
and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most
significant concerns of IoT is to provide security assurance for the data exchange because data is
vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where
each layer provides a service. The security needs vary from layer to layer as each layer serves a different
purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks
have been discussed along with some existing and proposed countermeasures.
Ubiquitous devices are rising in popularity and sophistication. Internet of Things (IoT) avails opportunities for devices with powerful sensing, computing and interaction capabilities ranging from smartphones, wearable devices, home appliances, transport sensors and health products to share information through the internet. Due to vast data shared and increased interaction; they have attracted the interest of malware writers. Internet of Things environments poses unique challenges such as device latency, scalability, lack of antimalware tools and heterogeneity of device architectures that makes malware synthesis complex. In this paper we review literature on internet of things malware categories, support technologies, propagation and tools
Network security is one of the foremost anxieties of the modern time. Over
the previous years, numerous studies have been accompanied on the
intrusion detection system. However, network security is one of the foremost
apprehensions of the modern era this is due to the speedy development and
substantial usage of altered technologies over the past period. The
vulnerabilities of these technologies security have become a main dispute
intrusion detection system is used to classify unapproved access and unusual
attacks over the secured networks. For the implementation of intrusion
detection system different approaches are used machine learning technique
is one of them. In order to comprehend the present station of application of
machine learning techniques for solving the intrusion discovery anomalies in
internet of thing (IoT) based big data this review paper conducted. Total 55
papers are summarized from 2010 and 2021 which were centering on the
manner of the single, hybrid and collaborative classifier design. This review
paper also includes some of the basic information like IoT, big data, and
machine learning approaches are discussed.
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Similar to AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS (20)
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Communications Mining Series - Zero to Hero - Session 1
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
1. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013
DOI:10.5121/ijcsa.2013.3402 13
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN
COMPUTER NETWORKS
SAKTHI MURUGAN. R1
, P. SHANTHI BALA
2
AND DR. G. AGHILA
3
Department of Computer Science, Pondicherry University, Puducherry, India
1
sakthimuruga@gmail.com
2
shanthibala.cs@gmail.com
ABSTRACT
Ontology is applied to impart knowledge in various fields of Information Technology made it more
intelligent in the past few decades. Many Ontologies was built on various domains like biology, medicine,
physics, chemistry, and mathematics. The Ontology in computer science domain are limited and even the
Ontology is not explored in detail. The knowledge in the field of computer networks is very large, which
makes it more difficult for a human to expertise in. This paper proposes the Ontology in computer network
domain on various perspectives like scope, scale, topology, communication media, OSI model, TCP/ IP
model, protocol, security, network operating system, network hardware and performance. The Ontology is
developed in OWL format, which can be easily integrated with any other semantic based applications. The
network Ontology can be employed in Semantic Web applications to help the users to search for concepts
computer networks domain.
KEYWORDS
Computer Networks, Ontology, OWL, Semantic Web
1. INTRODUCTION
The Semantic Web is an extension of the current web in which information provides well-defined
meaning that enables system and people for better understanding and can enable to work
effectively [1]. The abundance knowledge available in web is made organized with the help of
semantic web. Ontology is called as the core of Semantic Web since it is needed to develop
semantic web applications.
Ontology is a, "formal and explicit specification of a shared conceptualization" [2]. These
Ontologies can be represented as Web Ontology Language (OWL) [15], RDFS, DAML+OIL
[24]. W3C [16] recommends OWL definition of Ontology on web than other available like OIL
[14], SHOE [25] and XOL [26]. The main advantage of Ontology is once developed it can be
integrated and reused in all the applications, it allows to share more data, uses simple tags to
provide semantic information.
The development of Ontology in various domains has proved its efficiency in various ways.
Though Ontology is the transformation of philosophy to Information Systems, little effort has
been made to develop in domain of Information Systems compared to other growing research
domains.The way computer communicates having evolved in the past few decades. This
evolution leads to the introduction of new concepts and technologies being introduced frequently
to improve the speed, efficiency, security and various aspects in domain of computer networks.
2. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013
14
This introduction of large concepts makes it hard to expertise in its entire sub domain. We have
developed the Ontology for computer networks, which consists of 500+ concepts. These concepts
are built with W3C standard whereby integrating these Ontologies can alleviate the difficulty of
user. This paper is organized as follows: Section 2 describes the related work being carried out in
various domain Ontology. Section 3 explores the various concepts, relations and properties of
computer networks domain. Section 4 describes the implementation of Ontology and finally
Section 5 concludes the paper.
2. RELATED WORK
Many well published Ontology are publicly available like Gene Ontology (GO) [18] which
consists of gene and gene products of various species, Plant Ontology (PO) [19] which consists of
concepts about anatomy, morphology and stages of plants, Semantic Web for Earth and
Environmental Terminology (SWEET) [20] contains 6000 unique concepts and 200 distinct
Ontology in SWEET 2.2, Foundational Model of Anatomy Ontology (FMA) [21] contains
120000 terms with 75000 distinct concepts with 168 types of relationships.
Various domain Ontologies has been developed like Yip et al. [4] developed Ontology for
healthcare domain. Mei-Ying Jia et al. [5] developed Domain Ontology in Military Intelligence.
Song Jun-Feng et al. [6] worked for Network Centric Warfare on Construction and Integration of
Ontology for military domain, situation and military rule. Maojun Huang [7] developed
Geographic Ontology from the viewpoints of Philosophy Ontology, Information Ontology and
Spatial Ontology. Gang Liu et al. [8] developed Ontology for geological hazard information.
Fragiskos et al. [9] created Ontology for biosensor domain to support R&D in the science-based
sector.
Ontology developed to support reasoning for a model is more common in case of Computer
Network than those developed to provide domain knowledge. Hui Xu and Debao Xiao [10][11]
developed Information Specification Ontology to manage Computer Network based on Formal
Concept Analysis and configure IP based network based on Ontology than that of normal SNMP.
A.K.Y. Wong et al. [12] have developed Ontology to map the protocols of different networking
device providers. M.J. Taylor et al. [13] have developed knowledge for network support based on
case studies of organizational approach to troubleshoot network problems.
Ontology developed to provide domain knowledge in a broader domain like computer networks is
very limited. Ling et al. [3] developed an educational Ontology for computer networks, which
explores concepts, communication sub network, application sub network, standards and network
security with the main purpose to be used as a teaching aid. The major drawback of the existing
system is the relations between the concepts have not been analyzed properly. In general "is-a"
and "part-of" is used in common for all the relations, which makes the Ontology weak.
3. COMPUTER NETWORKS ONTOLOGY
3.1. Classification of Computer Networks
The domain of computer networks can be categorized based on scope, scale, topology,
communication media, OSI model, TCP/ IP model, protocol, security, network operating system,
network hardware and performance.The main concepts explored under scope are Intranet,
Extranet and Internet in terms of services provided and technology used. Scale is classified as
LAN, MAN and WAN and how it could be achieved. Topology is ranked out based on its types
and standards. Communication media are
3. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013
15
analyzed based on its types of variant, the way it operates and standards. The main concepts make
out of OSI and TCP/ IP model are its layers and functionalities. Protocol is a vast area explored in
terms of Ethernet standards and technologies, Internet Protocol (IP) versions, classes, support to
upper layers. Security itself a vast sub domain which is categorized in terms of threats, attacks,
encryption techniques, malicious software's and approaches to system security. The network
operating system is classified based on its types of operating system used in router, types of
server operating system and types of operating system used for peer-to-peer communication.
Network hardware concepts are analyzed based on its types and functionalities. The factors to be
considered to improve the performance of communication are explored under performance.
Figure 1 shows the part of developed Ontology with the relation between them.
The relations are used to complete the meaning of the concepts. For example concepts 'IANA' and
'Internet Protocol' uses the relation 'allocate' which has knowledge 'IANA allocate Internet
Protocol', concepts 'Transport Layer' and 'Datagram' uses relation 'transmits' which contains
knowledge 'Transport Layer transmits Datagram'.
Figure 1. Part of Developed Ontology
4. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013
16
2.2. Ontology Development
The Ontology development process is to first identify the key concepts and then the relation
between the concepts and finally classify the concepts based on their properties.The main
drawback of the existing system is the concepts not explored in detail, and the relation between
the concepts is not analyzed, which provides open world semantics. In our Ontology we analyzed
about 550-relationship instance with 33 types of relationship. Semantic annotations are available
for most of the concepts, which make the user get to know more details about the concepts.
The key concepts or sub concepts are represented as Classes. We found key concepts in the
domain of computer networks and analyzed all the equivalent concepts to find the relation
between the concepts. We studied the properties of each concept to categories all sub concepts
under one main concept and we found the total number of concepts grouped under one main
concept in Table 1. Table 2 and Table 3 are the sub concepts of Security and Protocol
respectively.
Table 1. Explored Concepts in Computer Networks.
Sl. No. Concepts No. of Sub Concepts
1 Scope 47
2 Scale 8
3 Topology 24
4 Communication Media 94
5 OSI Model 37
6 TCP/ IP Model 8
7 Protocol 121
8 Security 125
9 Network Operating System 24
10 Network Hardware 48
11 Performance 7
Table 2. List of Concepts Related to Security.
Sl. No. Concepts No. of Sub Concepts
1 Goals 3
2 Threads 4
3 Attacks 19
4 Cryptography 23
5 Intrusion Detection System 18
6 Virtual Private Network 13
7 Firewall 14
8 Malicious Software 26
5. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013
17
Table 3. Protocol Related Concepts.
Sl. No. Concepts No. of Sub Concepts
1 Ethernet 19
2 Internet Protocol 68
3 SONET/ SDH 10
4 ATM 22
4. IMPLEMENTATION
There are many tools like Protégé [17], OilEd [22] and KAON [23], which are used to develop
Ontology. We used Protégé user interface in developing the Ontology for Computer Networks.
Through study about the concepts are made before categorizing it. There are some sub concepts,
which are to be categorized under different main concepts whose complex relations can be easily
retrieved through the developed Ontology.
The part of code of developed Ontology is given in Figure 2. This code is in XML format where
"www.w3.org/2002/07/owl#" has the schema definition for Ontology development. The concepts
'Internet' and 'World Wide Web' are declared as classes in the Ontology, and the relation between
them is 'uses' which is declared as object property. The actual knowledge stored in the code is
'Internet uses World Wide Web'.
Figure 2. Screenshot of part of developed Ontology
6. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013
18
Figure 3 shows the various concepts explored with Networking Hardware in Protégé tool. The
'Thing' is the system class of the Protégé tool under which the user defined classes are created.
Figure 3. Concepts explored in Networking Hardware
Figure 4 shows the visualization of the developed Ontology. OWLViz plug-in has been used to
show the visualization. It identifies the concepts from the classes in the OWL file and creates a
default 'is a' relationship between those concepts which are related by the SubClassOf tag.
7. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013
19
Figure 4. Visualization of Network Ontology
8. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013
20
5. CONCLUSION
This paper report the first stage of research which focus on the development of Ontology for the
domain of computer networks with 500+ concepts, 550 relationship instance with 33 types of
relationship, which is considered as fuel to run the Semantic applications, so that the user can
seek for domain knowledge. The domain of computer networks has evolved and still growing, so
the Ontology we have developed tends to dynamically grow with new invention and advancement
in technology over time.
REFERENCES
[1] Berners-Lee, J. Hendler, and O. Lassila, "The Semantic Web", Scientific American, vol. 284, no. 5,
pp. 34-43, May 2001.
[2] M. Uschold and M. Gruninger, "Ontologies: Principles, methods and applications", Knowledge
Engineering Review, vol. ll, no.2, pp.93-155, 1996.
[3] Ling Jiang, Chengling Zhao and Haimei Wei, "The Development of Ontology-Based Course for
Computer Networks", International Conference on Computer Science and Software Engineering,
2008, 978-0-7695-3336-0/08, DOI 10.1109/CSSE.2008.185
[4] Yip Chi Kiong, Sellappan Palaniappan and Nor Adnan Yahaya, "Health Ontology System", 7th
International Conference on IT in Asia (CITA), 2011 IEEE, 978-1-61284-130-4/11.
[5] Mei-ying Jia, Bing-ru Yang, De-quan Zheng and Wei-cong Sun, "Research on Domain Ontology
Construction in Military Intelligence", Third International Symposium on Intelligent Information
Technology Application, 2009, IEEE, pp.116–119.
[6] Song Jun-feng, Zhang Wei-ming, Xiao Wei-dong and Xu Zhen-ning, "Study on Construction and
Integration of Military Domain Ontology, Situation Ontology and Military Rule Ontology for
Network Centric Warfare", The 2005 IEEE International Conference on e-Technology, e-Commerce
and e-Service.
[7] Maojun Huang, "On The Concept of Geographic Ontology—From The Viewpoints of Philosophy
Ontology, Information Ontology and Spatial Ontology", 18th International Conference on
Geoinformatics, 2010, IEEE.
[8] Gang Liu, Yanni Wang and Chonglong Wu, "Research and Application of Geological Hazard
Domain Ontology", 18th International Conference on Geoinformatics, 2010, IEEE.
[9] Fragiskos A. Batzias and Christina G. Siontorou, "Creating a specific domain Ontology for supporting
R&D in the science-based sector – The case of biosensors", Expert Systems with Applications,
Volume 39, Issue 11, 1 September 2012, Pages 9994–10015.
[10] Hui Xu and Debao Xiao, “Building Information Specification Ontology for Computer Network
Management based on Formal Concept Analysis”, International Conference on Information and
Automation, June 2009, pp. 312-317.
[11] Hui Xu and Debao Xiao, "Common Ontology-based Intelligent Configuration Management Model for
IP Network Devices", Innovative Computing, Information and Control, ICICIC '06, pp.385-388.
[12] A.K.Y. Wong, An Chi Chen, N. Paramesh, P. Rav, "Ontology Mapping for Network Management
Systems", Network Operations and Management Symposium, IEEE/IFIP, April 2004, Vol.1,pp.885-
886.
[13] M.J. Taylor, D. Gresty and R. Askwith, "Knowledge for Network Support", Information and Software
Technology, Volume 43, Issue 8, 1 July 2001, Pages 469–475.
[14] Dieter Fensel, Frank van Harmelen, Ian Horrocks, Deborah L. McGuinness and Peter F. Patel-
Schneider. "OIL: An Ontology Infrastructure for the Semantic Web", IEEE INTELLIGENT
SYSTEMS, MARCH/APRIL 2001, pp.38-45.
[15] OWL Web Ontology Language. Available: http://www.w3.org/TR/owl-features/
[16] World Wide Web Consortium (W3C). Available: http://www.w3.org/standards/semanticweb/
ontology
[17] Protégé. Available: http://protege.stanford.edu/
[18] An Introduction to the Gene Ontology. Available: http://www.geneontology.org/GO.doc.shtml
9. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013
21
[19] About the Plant Ontology project. Available: http://www.plantontology.org/docs/otherdocs/poc
_project.html
[20] SWEET Ontologies. Available: http://sweet.jpl.nasa.gov/
[21] Foundational Model of Anatomy ontology - About. Available: http://sig.biostr.washington.edu/
projects/fm/AboutFM.html
[22] OilEd. Available: http://oiled.semanticweb.org/index.shtml
[23] KAON - The Karlsruhe Ontology and Semantic Web Tool Suite. Available: http://kaon.
semanticweb.org/
[24] DAML+OIL. Available: http://www.w3.org/TR/daml+oil-reference
[25] SHOE: Simple HTML Ontology Extensions. Available: http://www.cs.umd.edu/projects/plus/ SHOE/
[26] XOL Ontology Exchange Language. Available: http://www.ai.sri.com/pkarp/xol/