Computer Networks and Distributed Systems
Saeed Banaeian Far; Maryam Rajabzadeh Asaar; Afrooz Haghbin
Articles in Press, Accepted Manuscript, Available Online from 19 August 2022
Abstract
Privacy is a matter of considerable public concern in internet-based communications. In other words, it is sensed more with the growth of internet-based communications and the increasing number of connected users. This paper focuses on the blockchain-based retail markets. It presents a framework that ...
Read More
Privacy is a matter of considerable public concern in internet-based communications. In other words, it is sensed more with the growth of internet-based communications and the increasing number of connected users. This paper focuses on the blockchain-based retail markets. It presents a framework that allows retail market owners to change their retail markets' pseudonyms to a new ones and transfer their accumulated reputations to their new pseudonyms in an untraceable way so that no one can find a link between the transferred reputation and the previous retail market. The main idea is to assign the retail market reputation to a Non-Fungible Token (NFT) and anonymously transfer the NFT ownership to another owner. The presented method is named blockchain-based reputation transfer (BB-RT) and is designed using the two concepts of NFT and Signature of Knowledge (SoK) for providing an unknown and unlinkable transfer. The BB-RT framework provides security for retail markets, including unlinkable reputation transfer for removing retail markets' adversaries. Each retail market owner can prove its retail market's previous reputation in its new retail market. It is believed that the BB-RT framework can be applied in Distributed Autonomous Organization (DAO)-based markets (businesses) since markets' reputations are transferred without the help of a central manager. Finally, the mentioned BB-RT framework properties are analyzed.
Computer Networks and Distributed Systems
Mohsen Raji; Saeed Keshavarzi; Mehran Farvardin
Articles in Press, Accepted Manuscript, Available Online from 07 November 2022
Abstract
A Wireless Sensor Network (WSN) is consisted of thousands of sensor nodes to monitor environmental conditions. Energy plays a major role in these networks because nodes are worked with batteries and are sometimes placed in an inconsistent environment where their battery cannot be charged or replaced. ...
Read More
A Wireless Sensor Network (WSN) is consisted of thousands of sensor nodes to monitor environmental conditions. Energy plays a major role in these networks because nodes are worked with batteries and are sometimes placed in an inconsistent environment where their battery cannot be charged or replaced. In this paper, a new dynamic clustering method is presented for WSNs with moving targets. In this method, target tracking is carried out using the speed and direction of target movement as well as selection of the optimal cluster-head (CH) using the artificial bee colony (ABC) meta-heuristic algorithm with fuzzy TOPSIS. In the proposed CH selection method, three criteria are considered; i.e. the remaining energy of the node, the cost of selecting each node as the CH, and the risk of hardware failure of each node. Since each of these criteria should be assigned with a suitable weight, ABC optimization algorithm is used to find the best weights for ranking decisions. After specifying the objective function in the ABC algorithm and weighting the criteria, fuzzy TOPSIS algorithm is used and each of the nodes is fuzzified in each of the criteria that are normalized and weighted. The results show that in addition to maintaining the accuracy of tracking the moving target, the proposed method achieves a 5.4% improvement in network energy consumption in comparison with a state-of-the-art method called EEAC.
Computer Networks and Distributed Systems
Sara Mohammadi; Parvaneh Asghari; Amir Masoud Rahmani
Articles in Press, Accepted Manuscript, Available Online from 02 December 2022
Abstract
As a new technology, cloud computing is a key part of making systems more efficient and better and improving the Internet of Things. One of the significant challenges in fog computing is trust management, taking into account the processing, storage, and network constraints of fog devices. This study ...
Read More
As a new technology, cloud computing is a key part of making systems more efficient and better and improving the Internet of Things. One of the significant challenges in fog computing is trust management, taking into account the processing, storage, and network constraints of fog devices. This study suggests that a multi-objective imperialist competitive optimization algorithm be used to increase trust and decrease response time in fog environments. After formulating trust, delay, and accuracy, the multi-objective imperialist competitive optimization algorithm is developed and evaluated for fog server selection. Evaluations show that the proposed method is more efficient and works well in terms of accuracy, delay, and trust than other algorithms.
Computer Networks and Distributed Systems
Touraj BaniRostam; Hamid BaniRostam; Mir Mohsen Pedram; Amir Masoud Rahamni
Volume 7, Issue 3 , August 2021, , Pages 157-166
Abstract
Abstract—Several studies have been presented to solve challenges of electronic card (e-card) fraud that the two main purposes of these studies are to identify types of e-card fraud and to investigate the methods used in bank fraud detection. To achieve this purpose, one of the most common methods ...
Read More
Abstract—Several studies have been presented to solve challenges of electronic card (e-card) fraud that the two main purposes of these studies are to identify types of e-card fraud and to investigate the methods used in bank fraud detection. To achieve this purpose, one of the most common methods of detecting fraud is to investigate suspicious changes in user behavior. Supervised learning techniques help to find anomalies by analyzing user behavioral history based on past transaction patterns in fraud detection systems. One of challenging issues in detecting fraud is to consider the change of customer behavior and the ability of fraudsters to devise new patterns of fraud, which makes unsupervised learning techniques popular for detecting unknown and new frauds. In this paper, the concepts of fraud, types of banking fraud along with their challenges, different form of fraud and banks' data research tools for early identification have been examined, then a review of the researches on fraud detection will be conducted. This paper aims to introduce fraud detection techniques and methods that have provided appropriate results in the big data environment. Finally, the fraud detection algorithms and proposed methods of related works presented in this paper, will be fully compared on a common dataset in terms of parameters such as speed of fraud detection, accuracy, and cost (hardware and network resources). Ensemble Meta-Learning can be used alone to build a stronger classifier. These techniques have been relatively successful in detecting fraud and reducing costs.
Computer Networks and Distributed Systems
Elham Bozorgzadeh; hamid barati; Ali Barati
Volume 7, Issue 3 , August 2021, , Pages 167-176
Abstract
Vehicular ad hoc networks (VANETs) are a subclass of mobile ad hoc networks (MANETs) that have inherited some of this type of network's features. Due to road accidents, these networks are a promising technology to increase passengers' comfort and safety and increase road safety and provide traffic information. ...
Read More
Vehicular ad hoc networks (VANETs) are a subclass of mobile ad hoc networks (MANETs) that have inherited some of this type of network's features. Due to road accidents, these networks are a promising technology to increase passengers' comfort and safety and increase road safety and provide traffic information. In vehicular ad hoc networks, it is challenging to design an efficient routing protocol for data routing in vehicles due to rapid topology changes and frequent disconnections. Applications in these fields require efficient routing protocols. The design of a routing protocol must be done both in terms of useful information dissemination and under the information dissemination environment's actual conditions. In this paper, we overview the existing VANET routing protocols; As there are different routing protocols in VANET, we need to do detailed research on various routing protocols and their strengths/weaknesses. The routing protocols essentially concentrate on delay, packet delivery magnitude relation, information measure utilization, and plenty of alternative factors. However, there are challenges to select a routing protocol to a dynamic topology and special characteristics of VANETs. VANET is extremely advantageous because it helps in up the road safety through reducing the amount of accidents by warning drivers regarding the danger before they really face it and different facilities to comfort drivers.
Computer Networks and Distributed Systems
Elham shamsinejad; Mir Mohsen Pedram; Amir Masoud Rahamni; Touraj BaniRostam
Volume 7, Issue 3 , August 2021, , Pages 187-196
Abstract
By increasing access to high amounts of data through internet-based technologies such as social networks and mobile phones and electronic devices, many companies have considered the issues of accessing large, random and fast data along with maintaining data confidentiality. Therefore, confidentiality ...
Read More
By increasing access to high amounts of data through internet-based technologies such as social networks and mobile phones and electronic devices, many companies have considered the issues of accessing large, random and fast data along with maintaining data confidentiality. Therefore, confidentiality concerns and protection of specific data disclosure are one of the most challenging topics. In this paper, a variety of data anonymity methods, anonymity operators, the attacks that can endanger data anonymity and lead to the disclosure of sensitive data in the big data have been investigated. Also, different aspects of big data such as data sources, content format, data preparation, data processing and common data repositories will be discussed. Privacy attacks and contrastive techniques like k anonymity, neighborhood t and L diversity have been investigated and two main challenges to use k anonymity on big data will be identified, as well. Two main challenges to use k anonymity on big data will be identified. The first challenge of confidential attributes can also be as pseudo-identifier attributes, which increases the number of pseudo-identifier elements, and it may lead to the loss of great information to achieve k anonymity. The second challenge in big data is the unlimited number of data controllers are likely to lead to the disclosure of sensitive data through the independent publication of k anonymity. Then different anonymity algorithms will be presented and finally, the different parameters of time order and the consumable space of big data anonymity algorithms will be compared.
Computer Networks and Distributed Systems
Behzad Seif; mohammad goodarzi
Volume 7, Issue 2 , May 2021, , Pages 93-102
Abstract
Today, the use of wireless sensor networks has become very popular in many applications. Due to the connection in wireless sensor networks, it is done wirelessly, so they are naturally insecure and prone to various types of attacks. In the past, various solutions were offered in this regard, each of ...
Read More
Today, the use of wireless sensor networks has become very popular in many applications. Due to the connection in wireless sensor networks, it is done wirelessly, so they are naturally insecure and prone to various types of attacks. In the past, various solutions were offered in this regard, each of which had its problems. Therefore, in this proposed solution, an attempt was made to solve these problems. The proposed solution for securing sensor nodes uses authentication based on the ZKP protocol, which has been improved with Interlock, and game theory has also been used to more quickly identify intrusive nodes. One of the most important benefits of the proposed solution is to prevent attacks such as sleep deprivation. The proposed algorithm is able to detect quickly and is able to prevent network damage in the fastest possible time. The proposed solution was implemented and reviewed in MATLAB environment and the studies showed a very good performance of the proposed method.
Computer Networks and Distributed Systems
Fatemeh Davami; Sahar Adabi; Ali Rezaee; Amir Masoud Rahamni
Volume 7, Issue 2 , May 2021, , Pages 126-136
Abstract
In the last ten years, the Cloud data centers have been manifested as the crucial computing architectures to enable extreme data workflows. Due to the complicatedness and diverse kinds of computational resources like Fog nodes and Cloud servers, workflow scheduling has been proposed to be the main challenge ...
Read More
In the last ten years, the Cloud data centers have been manifested as the crucial computing architectures to enable extreme data workflows. Due to the complicatedness and diverse kinds of computational resources like Fog nodes and Cloud servers, workflow scheduling has been proposed to be the main challenge in Cloud and or Fog computing environments. For resolving this issue, the present study offers a scheduling algorithm according to the critical path extraction, referred to as the Critical Path Extraction Algorithm (CPEA). In fact, it is one of the new multi-criteria decision-making algorithms to extract the critical paths of multiple workflows because it is of high importance to find the critical path in the creation and control of the scheduling. Moreover, an extensive software simulation investigation has been performed to compare this new algorithm in the real work-loads and recent algorithm. We compare our algorithm with the GRP-HEFT algorithm. The experimental results confirm the proposed algorithm's superiority in fulfilling make-span and waiting time and that workflow scheduling based on CPEA further improves the workflow make-span and waiting time.
Computer Networks and Distributed Systems
Alireza Enami; Javad Akbari Torkestani
Volume 7, Issue 1 , February 2021, , Pages 19-34
Abstract
Fog computing is being seen as a bridge between smart IoT devices and large scale cloud computing. It is possible to develop cloud computing services to network edge devices using Fog computing. As one of the most important services of the system, the resource allocation should always be available to ...
Read More
Fog computing is being seen as a bridge between smart IoT devices and large scale cloud computing. It is possible to develop cloud computing services to network edge devices using Fog computing. As one of the most important services of the system, the resource allocation should always be available to achieve the goals of Fog computing. Resource allocation is the process of distributing limited available resources among applications based on predefined rules. Because the problems raised in the resource management system are NP-hard, and due to the complexity of resource allocation, heuristic algorithms are promising methods for solving the resource allocation problem. In this paper, an algorithm is proposed based on learning automata to solve this problem, which uses two learning automata: a learning automata is related to applications (LAAPP) and the other is related to Fog nodes (LAN). In this method, an application is selected from the action set of LAAPP and then, a Fog node is selected from the action set of LAN. If the requirements of deadline, response time and resources are met, then the resource will be allocated to the application. The efficiency of the proposed algorithm is evaluated through conducting several simulation experiments under different Fog configurations. The obtained results are compared with several existing methods in terms of the makespan, average response time, load balancing and throughput.
Computer Networks and Distributed Systems
Yaser Ramzanpoor; Mirsaeid Hosseini Shirvani; Mehdi GolSorkhTabar
Volume 7, Issue 1 , February 2021, , Pages 67-80
Abstract
Fog computing is known as a new computing technology where it covers cloud computing shortcomings in term of delay. This is a potential for running IoT applications containing multiple services taking benefit of closeness to fog nodes near to devices where the data are sensed. This article formulates ...
Read More
Fog computing is known as a new computing technology where it covers cloud computing shortcomings in term of delay. This is a potential for running IoT applications containing multiple services taking benefit of closeness to fog nodes near to devices where the data are sensed. This article formulates service placement issue into an optimization problem with total power consumption minimization inclination. It considers resource utilization and traffic transmission between different services as two prominent factors of power consumption, once they are placed on different fog nodes. On the other hand, placing all of the services on the single fog node owing to power reduction reduces system reliability because of one point of failure phenomenon. In the proposed optimization model, reliability limitations are considered as constraints of stated problem. To solve this combinatorial problem, an energy-aware reliable service placement algorithm based on whale optimization algorithm (ER-SPA-WOA) is proposed. The suggested algorithm was validated in different circumstances. The results reported from simulations prove the dominance of proposed algorithm in comparison with counterpart state-of-the-arts.
Computer Networks and Distributed Systems
behnam Kiani Kalejahi; Jala Guluzade; shabnam maharramli
Volume 6, Issue 4 , November 2020, , Pages 265-272
Abstract
AbstractBlockchain technology is the first successful Bitcoin Network. It enables the ledger to become more decentralized and secure. Since it is not limited to bitcoin and controlled by third parties by government, corporations, or banks, the technology is capturing several industries, including cryptocurrency, ...
Read More
AbstractBlockchain technology is the first successful Bitcoin Network. It enables the ledger to become more decentralized and secure. Since it is not limited to bitcoin and controlled by third parties by government, corporations, or banks, the technology is capturing several industries, including cryptocurrency, infrastructure& hardware, financial technology, Internet & mobile and so on. Blockchain is used as a public ledger to verify all peer-to-peer system transactions and maintain traded bitcoin spending from central authorities while bitcoin has distributed transactions. Achieving high Blockchain-based performance and privacy & security are global issues that are desire to be overcome as claims show they are still significant challenges in many Blockchain applications. This paper presents an introduction to Blockchain and the process of this technology in the way of outlining Blockchain types. Also, recent advances, challenges, real economy integration, and current situations of this technology have been listed. Key Words: Blockchain, transaction, nodes, privacy, scalability, consensus, future directions
Computer Networks and Distributed Systems
Bharat Mahaur; Aishwarya Gupta
Volume 6, Issue 3 , August 2020, , Pages 133-144
Abstract
Vehicular Ad-Hoc Networks (VANETs) is a novel technology that has recently emerged and due to its swift changing topology and high mobility nature, it has become problematic to design an efficient routing protocol in VANETs’ amongst both moving and stationary units. Also, the existing routing algorithms ...
Read More
Vehicular Ad-Hoc Networks (VANETs) is a novel technology that has recently emerged and due to its swift changing topology and high mobility nature, it has become problematic to design an efficient routing protocol in VANETs’ amongst both moving and stationary units. Also, the existing routing algorithms are not very effective to satisfy all requirements of VANETs. This paper explores the need of a reliable routing and proposes an approach that makes use of an extended restricted greedy forwarding mechanism to select the next forwarding vehicle on basis of its average relative velocity and neighborhood density with its own neighboring vehicles. We also use static PCR junction node which forwards the packet to correct road segment vehicle based upon the relative information. The objective of this paper is to increase route reliability by increasing throughput with considerable end to end delay. Simulation results show that the proposed approach IJDRP outperforms existing GPCR and E-GyTAR.
Computer Networks and Distributed Systems
Derdus Kenga; Vincent Oteke Omwenga; Patrick Job Ogao
Volume 6, Issue 3 , August 2020, , Pages 145-154
Abstract
The ability to measure the energy consumed by cloud infrastructure is a crucial step towards the development of energy efficiency policies in the cloud infrastructure. There are hardware-based and software-based methods of measuring energy usage in cloud infrastructure. However, most hardware-based energy ...
Read More
The ability to measure the energy consumed by cloud infrastructure is a crucial step towards the development of energy efficiency policies in the cloud infrastructure. There are hardware-based and software-based methods of measuring energy usage in cloud infrastructure. However, most hardware-based energy measurement methods measure the energy consumed system-wide - including the energy lost in transit. In an environment such as the cloud, where energy consumption can be a result of different components, it is important to isolate the energy, which is consumed as a result of executing application workloads. This information can be crucial in making decisions such as workload consolidation. In this paper, we propose an experimental approach of measuring power consumption as a result of executing application workloads in IaaS cloud. This approach is based on Intel’s Running Average Power Limit (RAPL) interface. Application workload is obtained from Phoronix Test Suite (PTS)’ 7zip and aio-stress. To demonstrate the feasibility of this approach, we have described an approach, which can be used to study the effect of workload consolidation on CPU and I/O's power performance by varying the number of Virtual Machines (VMs) . Power is measured in watts. Performance of CPU is measured in Million Instructions per Second (MIPS) and I/O performance (as a result of processing data intensive) is measured in MB/s. Our results on the effect of workload consolidation has been compared with previous research and was found to be consistent. This shows that the proposed method of measuring power consumption is accurate.
Computer Networks and Distributed Systems
Hanieh Ghorashi; Meghdad Mirabi
Volume 6, Issue 3 , August 2020, , Pages 155-168
Abstract
Cloud computing is a model for convenient on-demand user’s access to changeable and configurable computing resources such as networks, servers, storage, applications, and services with minimal management of resources and service provider interaction. Task scheduling is regarded as a fundamental ...
Read More
Cloud computing is a model for convenient on-demand user’s access to changeable and configurable computing resources such as networks, servers, storage, applications, and services with minimal management of resources and service provider interaction. Task scheduling is regarded as a fundamental issue in cloud computing which aims at distributing the load on the different resources of a distributed system in order to optimize resource utilization and response time. In this paper, an optimization-based method for task scheduling is presented in order to improve the efficiency of cloud computing. In the proposed approach, three criteria for scheduling, including the task execution time, the task transfer time, and the cost of task execution have been considered. Our method not only reduces the execution time of the overall tasks but also minimizes the maximum time required for task execution. We employ the Multi-objective Non-dominated Sorting Genetic Algorithm (NSGA-II) for solving the scheduling problem. To evaluate the efficiency of the proposed method, a real cloud environment is simulated, and a similar method based on Multi-Objective Particle Swarm Optimization is applied. Experimental results show the superiority of our approach over the baseline technique.
Computer Networks and Distributed Systems
Zahra Nafarieh
Volume 6, Issue 2 , May 2020, , Pages 61-70
Abstract
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer ...
Read More
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly engage in forbidden activities, while TLS (Transport Layer Security) protocols allow encrypted communication between client and server in the context of Internet provides. Methods of analyzing traffic behavior do not depend on payloads. This means that they can work with encrypted network communication protocols. Traffic behavior analysis methods do not depend on package shipments, which means they can work with encrypted network communication protocols. Hence, the analysis of TLS and HTTP traffic behavior has been considered for detecting malicious activities. Because of the exchange of information in the network context is very high and the volume of information is very large, storing and indexing of this massive data require a Big data platform.
Computer Networks and Distributed Systems
Maryam Amiri Kamalabad; farhad mardukhi; naser Nematbakhsh
Volume 6, Issue 2 , May 2020, , Pages 91-106
Abstract
In general, Policy-based approaches play an important role in the management of web services, for instance, in the choice of semantic web service and quality of services (QoS) in particular. The present research work illustrates a procedure for the web service selection among functionality similar web ...
Read More
In general, Policy-based approaches play an important role in the management of web services, for instance, in the choice of semantic web service and quality of services (QoS) in particular. The present research work illustrates a procedure for the web service selection among functionality similar web services based on WS-Policy semantic matching. In this study, the procedure of WS-Policy publishing in the UDDI registry was also described. The approach, which is used to represent the policies, is thus represented as semantic trees, and in this representation, measurable quality attributes are considered; and the certain matching operations are used to identify the similarity match via match function or similarity distance function. The illustration of semantic concepts and rules during policy matching, which is not possible by using a mere semantic concept, leads to better web service matches. The proposed approach has been validated through various tests that can evaluate the similarity of large and arbitrary sets of measurable quality attributes. We also compared the proposed procedure with the other ones. The proposed procedure for web service choose, which uses WS-Policy semantic matching, can be more effective to solve different problems like selection, composition, and substitution of services.
Computer Networks and Distributed Systems
Abbas Ali Khan; Dr. Mohammad Hanif Ali; Dr. A. K. M. Fazlul Haque; Chandan Debnath; DR. Md. Ismail Jabiullah
Volume 6, Issue 1 , February 2020, , Pages 9-18
Abstract
A Detailed Exploration of usability statistics and Application Rating on short-range Wireless protocols Bluetooth (IEEE 802.15.1), ZigBee (IEEE 802.15.4), Wi-Fi (IEEE 802.11) and NFC (ISO/IEC 14443) has been performed that being representing of those prominent wireless protocols evaluating their main ...
Read More
A Detailed Exploration of usability statistics and Application Rating on short-range Wireless protocols Bluetooth (IEEE 802.15.1), ZigBee (IEEE 802.15.4), Wi-Fi (IEEE 802.11) and NFC (ISO/IEC 14443) has been performed that being representing of those prominent wireless protocols evaluating their main characteristics and performances in terms of some metric such as co-existence, data rate, security, power consumption, joining time are analyzed and presented. Furthermore, considering the file sharing, tag connection, payment method apply and security parameters, usability statistics, application rating and research output is also depicted so that one can easily identify the scope of the protocols, and can visualize the most trending and demandable wireless protocol. A deeply analyzed bar graph illustrates the most demandable wireless protocol . This can be applied in any user's work in the Wireless Network lab and also be implemented in any real-world applications for the appropriate components and devices among the protocols in proper fields.
Computer Networks and Distributed Systems
Bello Kontagora Nuhu; Olayemi Olaniyi; Dauda Aji Idris; Chinedu Onyema
Volume 6, Issue 1 , February 2020, , Pages 25-32
Abstract
Carbon Monoxide (CO) is the most abundant air pollutant gas and accumulates rapidly to dangerous concentrations even in areas that seem to be well ventilated. Carbon monoxide detectors/alarm systems exist but people who are old, hearing impaired, partially sighted or heavy sleepers may not get the warning ...
Read More
Carbon Monoxide (CO) is the most abundant air pollutant gas and accumulates rapidly to dangerous concentrations even in areas that seem to be well ventilated. Carbon monoxide detectors/alarm systems exist but people who are old, hearing impaired, partially sighted or heavy sleepers may not get the warning or find it difficult to wake up and get out in the event of dangerous concentration of CO in their homes. This paper presents the development of a smart CO monitoring and control system to control the ventilation in a room when carbon monoxide concentration is at a level dangerous to human health. The system is comprised of a microcontroller interfaced with CO sensor (MQ-7) and ultrasonic distance sensor (HC-SR04) for CO concentration sampling and window state determination respectively. A third component interfaced with the controller is a DC motor, which accordingly control the window when the concentration of CO is high. A mechanism was provided to ensure that the fan in the room is ON and the window is completely open whenever CO concentration is high to ensure quick restoration of the air quality. Results from the performance evaluation of the system showed that it achieved an average response time of 6 seconds and consumed 321.62mW and 652.82mW of power during sampling and control respectively. The obtained results showed that the system is capable of responding quickly to dangerous concentration of CO, thus a desired attribute of CO monitoring systems hence, can adequately replace the existing systems with less power consumption.
Computer Networks and Distributed Systems
Zahra Nafarieh; Ebrahim Mahdipur; Haj Hamid Haj Seyed Javadi
Volume 5, Issue 3 , August 2019, , Pages 129-142
Abstract
Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential ...
Read More
Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and reducing the activity of the Botnets. DNS queries are sent in the early stages of the life cycle of each Botnet, so infected hosts are identified before any malicious activity is performed. Because the exchange of information in the network environment and the volume of information is very high, Storing and indexing this massive data requires a large database. By using the DNS traffic analysis, we try to identify the Botnets. We used the data generated from the network traffic and information of known Botnets with the Splunk platform to conduct data analysis to quickly identify attacks and predict potential dangers that could arise. The analysis results were used in tests conducted on real network environments to determine the types of attacks. Visual IP mapping was then used to determine actions that could be taken. The proposed method is capable of recognizing known and unknown Bots.
Computer Networks and Distributed Systems
Azam Seilsepour; Reza Ravanmehr; Hamid Reza Sima
Volume 5, Issue 3 , August 2019, , Pages 143-160
Abstract
Big data analytics is one of the most important subjects in computer science. Today, due to the increasing expansion of Web technology, a large amount of data is available to researchers. Extracting information from these data is one of the requirements for many organizations and business centers. In ...
Read More
Big data analytics is one of the most important subjects in computer science. Today, due to the increasing expansion of Web technology, a large amount of data is available to researchers. Extracting information from these data is one of the requirements for many organizations and business centers. In recent years, the massive amount of Twitter's social networking data has become a platform for data mining research to discover facts, trends, events, and even predictions of some incidents. In this paper, a new framework for clustering and extraction of information is presented to analyze the sentiments from the big data. The proposed method is based on the keywords and the polarity determination which employs seven emotional signal groups. The dataset used is 2077610 tweets in both English and Persian. We utilize the Hive tool in the Hadoop environment to cluster the data, and the Wordnet and SentiWordnet 3.0 tools to analyze the sentiments of fans of Iranian athletes. The results of the 2016 Olympic and Paralympic events in a one-month period show a high degree of precision and recall of this approach compared to other keyword-based methods for sentiment analysis. Moreover, utilizing the big data processing tools such as Hive and Pig shows that these tools have a shorter response time than the traditional data processing methods for pre-processing, classifications and sentiment analysis of collected tweets.
Computer Networks and Distributed Systems
Nguyen-Duy-Nhat Vien; Tri Ngo Minh; Thanh Vu Van
Volume 5, Issue 3 , August 2019, , Pages 161-168
Abstract
This paper studies interference alignment scheme and minimum mean square error (MMSE) improvement in Internet of Things (IoT)-oriented cognitive systems, where IoT devices share the licensed spectrum by cognitive radio in spectrum underlay. Target to manage the inter-tier interference caused by cognitive ...
Read More
This paper studies interference alignment scheme and minimum mean square error (MMSE) improvement in Internet of Things (IoT)-oriented cognitive systems, where IoT devices share the licensed spectrum by cognitive radio in spectrum underlay. Target to manage the inter-tier interference caused by cognitive spectrum sharing as well as ensure an MMSE at receivers, the interference alignment algorithms is proposed. In particular, we focus on the problem of designing the optimal linear pre-coding to minimize the total mean square error while satisfying transmit power constraints. Firstly, we introduce a system model of the downlink IoT-oriented cognitive multi-input multi-output (MIMO) system. Secondly, we propose an interference nulling based cognitive interference alignment scheme, and then, the pre-coding and post-coding matrix designs for the primary transceivers to minimum mean square error (MSE), as well as to eliminate the co-channel interference to the primary receivers. We also apply these interference alignment scheme and matrix designs for the secondary links. Finally, the numerical results are used to evaluate performance of the proposed algorithm.
Computer Networks and Distributed Systems
Scholastica Nwanneka Mallo; Francisca Nonyelum Ogwueleka
Volume 5, Issue 3 , August 2019, , Pages 169-180
Abstract
Cloud computing technology is providing businesses, be it micro, small, medium, and large scale enterprises with the same level playing grounds. Small and Medium enterprises (SMEs) that have adopted the cloud are taking their businesses to greater heights with the competitive edge that cloud computing ...
Read More
Cloud computing technology is providing businesses, be it micro, small, medium, and large scale enterprises with the same level playing grounds. Small and Medium enterprises (SMEs) that have adopted the cloud are taking their businesses to greater heights with the competitive edge that cloud computing offers. The limitations faced by (SMEs) in procuring and maintaining IT infrastructures has been handled on the cloud platform for the SMEs that adopt it. In this research, the impact and challenges of cloud computing on SME’s that have adopted it in Nigeria has been investigated. The impacts identified ranges from provisioning IT infrastructures, reshaping and extending business values and outreach to giving competitive edge to businesses subscribed to it. Though Cloud computing has many benefits; however, it is not without some pitfalls. These pitfalls include data vulnerability, vendor lock-in, limited control over the infrastructure by the subscribers etc. To investigate the level of impacts and challenges being faced by SMEs in Nigeria on the cloud platform, questionnaires were administered to managers and employees of about fifty SMEs that have deployed cloud. The data collected were analyzed using Statistical Package for Social Sciences (SPSS), from which appropriate recommendations were made.Key Words: Cloud Computing, Impacts, Challenges, SME.
Computer Networks and Distributed Systems
Gholamhossein Ekbatanifard; Omid Yousefi
Volume 5, Issue 2 , May 2019, , Pages 57-70
Abstract
The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. ...
Read More
The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. There may be misbehaving owners and consequently misbehaving devices that can perform harmful attacks based on their social relationships with other things for their own gain at the expense of other IoT devices. This motivates us to work on the issue of how to estimate the trust of a service provider to avoid malicious service providers and select the best service provider. In this paper, a novel trust management model is proposed based on four properties. The model deals with attacks (especially on-off attacks) and considers service levels for services provided by each node. A method to provide different levels of services via SIoT devices, and a new trust assessment scheme are the contributions of this paper. We evaluated the proposed scheme with extensive simulations and the results show that the proposed model can effectively select the best service provider and cope with most trust related attacks.
Computer Networks and Distributed Systems
Olayemi Mikail Olaniyi; Ameh Innocent Ameh; Lukman Adewale Ajao; Omolara Ramota Lawal
Volume 5, Issue 2 , May 2019, , Pages 107-116
Abstract
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s ...
Read More
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card cloning, card skimming, cost of issuance and maintenance. In this paper, we present secure bio-cryptographic authentication system for cardless ATM using enhanced fingerprint biometrics trait and encrypted Personal Identification Number (PIN). Fingerprint biometrics is used to provide automatic identification/verification of a legitimate customer based on unique feature possessed by the customer. Log-Gabor filtering algorithm was used for enhancing low image quality and effect of noise on feature extracted from customer’s fingerprint minutiae. Truncated SHA 512/256 hash algorithm was used to secure the integrity and confidentiality of the PIN from sniffers and possible adversary within the channel of remote ATM banking transactions. Performance evaluation was carried out using False Acceptance Rate (FAR), False Rejection Rate (FRR) metrics and Collision Attack was performed on the Truncated SHA-512/256 hashed data (PIN). Results of the system performance shows Genuine Acceptance Rate (1-FRR) of 97.5% to 100%, Equal Error Rate of 0.0015% and Collision Attack carried out on the encrypted PIN message digest gave an unsuccessful attack. Therefore, the results of performance evaluation show the applicability of the developed system for secure cardless ATM transaction
Computer Networks and Distributed Systems
Ojo Jayeola Adaramola; Jamiu Rotimi Olasina
Volume 4, Issue 4 , November 2018, , Pages 209-218
Abstract
Abstract- Communication has become inevitably part of our day to day activities, in academic, business, banking, and other sectors. It has therefore become so important to implement good and efficient communication system. A reference point according to this research is the wireless sensor networking ...
Read More
Abstract- Communication has become inevitably part of our day to day activities, in academic, business, banking, and other sectors. It has therefore become so important to implement good and efficient communication system. A reference point according to this research is the wireless sensor networking (WSN) system, and most important thing in communication is to be free from interference, attenuation, crosstalk, and fading. Any of these factors is a serious problem in communication system. To solve these problems, mobile and fixed nodes networks were considered for efficient operation of WSN when ZigBee technology was employed and designed using the OPNET when certain network parameters: Throughput (bits/s), load (bits/s), and end-to end delay (second) parameters from fixed and mobile networks were compared and considered for smooth operation of WSN that is free from interference, attenuation, crosstalk and fading. The network investigation and performance analysis of fixed and mobile networks were based on tree, star and mesh topologies between the two systems. After considering all the parameters for various analyses, the fixed network was considered the most suitable over the mobile network for WSN.