{"title":"A Novel Approach of BRELU RESNET Based Cyber Attack Detection System with BAIT Based Approach for Mitigation","authors":"S. Prabhu, Nethravathi P. S.","doi":"10.47992/ijaeml.2581.7000.0134","DOIUrl":"https://doi.org/10.47992/ijaeml.2581.7000.0134","url":null,"abstract":"Purpose: Industrial Control Systems become more vulnerable to digital attacks by merging communication groups and the Internet of Things, which could have severe implications. An Intrusion Detection System is essential in IoT businesses for identifying and stopping assaults. To ensure data privacy and security in the face of digital attacks, legislation and large enterprises should develop network security policies today. As people-based full frameworks have become more vital in today's society, they've also become targets for hostile activities, compelling both industry and research to concentrate more on dealing with local area disruption recognition issues. Contraption reviewing techniques have shown to be effective tools for resolving in-network interruption location issues.\u0000\u0000Design/Methodology/Approach: This investigation yielded a very unique strategy for tackling hub moderation utilizing a Classification and Encryption method. The UNSW-NB15 dataset is acquired and divided into Data for preparation and testing from the start. The information is pre-handled and included are eliminated right away within the preparation time frame. The TWM Algorithm is then used to determine the relevant highlights from that moment onward. The BRELU-RESNET classifier then sorts the input into went after and non-went after categories. The compromised information is then saved in the security log record, and the typical data is encrypted using the ESHP-ECC computation. The shortest path distance is then calculated using Euclidean distance. Finally, the data is available. Finally, using the DSHP-ECC computation, the information is decrypted. If the information is available in the log document during testing, it is regarded as the sought-after data and is prevented from the transmission. If it is not present, then the process of digital assault recognition begins.\u0000\u0000Findings/Result: The research is based on the UNSW-NB 15 dataset, which shows that the proposed method achieves an unreasonable awareness level of 98.34 percent, particularity level of 77.54 percent, exactness level of 96.6 percent, Precision level of 97.96 percent, review level of 98.34 percent, F-proportion of 98.15 percent, False Positive Rate of 22.46 percent, False Negative Rate of 1.66 percent, and Matthew's connection coefficient of 77.38\u0000\u0000Originality/Value: This experimental-based research article examines the malicious activities in the cyberspace using BRELU-RESNET approach and mitigated by using BAIT based approach mechanism.\u0000\u0000Paper Type: Research Analysis.","PeriodicalId":184829,"journal":{"name":"International Journal of Applied Engineering and Management Letters","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116319475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perspectives, Challenges and Opportunities of E-Learning in Higher Education – A Brief Review","authors":"R. Aswin Herbert Sathish, Nethravathi P. S.","doi":"10.47992/ijaeml.2581.7000.0133","DOIUrl":"https://doi.org/10.47992/ijaeml.2581.7000.0133","url":null,"abstract":"Purpose: In this developed world education plays an important role at all stages of an individual. From last one decade the education has been grown and advanced in the form of E-learnings process. The advancement and usage of e-learnings is varied from developing to developed countries. Today in this internet generation, the individuals including teachers and students are connected with various e-learning modes via worldwide internet connection, which makes e-learning process necessary in the field of learning and education. E-learning provides the formal and informal learning atmosphere which encourages the students and learners with live interaction. The recent studies also shows that the e-learning improves the self-assessment, teaching performance and participation of the students. This paper provides the descriptive review of different-learning methodology used in various applications. \u0000Methodology: This comprehensive literature analysis includes more than 50 high-quality review articles, research papers, and case studies on e-learning and online education systems. The study takes into account both the teacher's and students' perspectives on the use of e-learning techniques.\u0000Findings/Result: The idea behind empirical methods in e-learning was to better comprehend the complicated approach that is employed when it comes to teaching methodology over the internet. Many ways have been created to make this process competent, including on-the-job learning, in-class assignments, and team-based learning.\u0000Originality: The e-learning process is still a multi-dimensional and sophisticated technique in terms of study. Although technical advancements have seized this field, research and regular case studies are still in short supply. It is necessary to comprehend topics such as the infrastructure utilised to produce technology, pedagogy, admirative supports, and social usage in order to implement the e-learning process.\u0000Paper Type: Literature Review.","PeriodicalId":184829,"journal":{"name":"International Journal of Applied Engineering and Management Letters","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129920912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Voice Biometric Systems for User Identification and Authentication – A Literature Review","authors":"Amjad Hassan Khan M. K., P. Aithal","doi":"10.47992/ijaeml.2581.7000.0131","DOIUrl":"https://doi.org/10.47992/ijaeml.2581.7000.0131","url":null,"abstract":"Purpose: Biometric trends are used in many systems because of security aspects. The cryptosystem is such an example which uses a biometric. But due to stored biometric data for the authentication, this can be a dangerous issue. Therefore, in comparison to conventional used biometric system, voice biometric system provides an efficient safety, security and unique identity. Among various speech recognition or processing methods, there is one called automated speech conversion methods, which also used to convert the recorded voice into text format. The overall concept of voice reorganization and voice biometric system is based on the acoustic modelling. Therefore, for getting the perfect speech detection, robust acoustic modelling is required. Our analysis describes the advancement and usage of voice biometric system for user identification and authentication. This paper provides a descriptive review of different voice biometric systems, their advancement and applications in different fields.\u0000Methodology: The core principles of the research issue have been well discussed in the literature review on speech biometrics. During this process, selected journals from a variety of secondary data sources, such as research papers published in a variety of reputed journals periodicals that are related to the topic are studied in the methodology.\u0000Findings/Result: A vocal biometric system is a biological system that captures an individual's voice and assigns it a unique characteristic for authentication purposes. This speech biometric method is primarily used to provide secure, quick, and frictionless access to various electronic devices. In the last three years, rapid technological advancements in neural networks have improved the deployment of speech biometric systems in a variety of industries. The majority of speech biometric system designs are based on the CPU, necessary power, and memory concepts. The advancement of software and hardware interface has been dramatically enhanced and implemented for many applications in the last few years, including smart watches, mobile phones, and car locking systems, where the interface between humans and electronics devices is critical. Banking security, attendance system, file access system, security control, and forensic development system are some of the other commercial applications.\u0000Originality: Following the literature study, the findings were utilized to conclude that, despite advances in biometric technology, there is still a significant gap in practical application, particularly for voice biometric systems. When building and developing a voice biometric system, it is necessary to integrate it with an IoT system.\u0000Paper Type: Literature Review.","PeriodicalId":184829,"journal":{"name":"International Journal of Applied Engineering and Management Letters","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121099782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Factors Affecting Design Review: A Case from Dang Valley, Nepal-Asia","authors":"A. Dahal, Ajay K. Mishra, P. Aithal","doi":"10.47992/ijaeml.2581.7000.0127","DOIUrl":"https://doi.org/10.47992/ijaeml.2581.7000.0127","url":null,"abstract":"Purpose: There seem some flaws during design by consultants because of time and cost constraints. To deal with this problem there is a need for a design review for those design parts to assess their compliance for implementation. The overall objective of the research is to analyze the causes of the design review of small farmer-managed surface irrigation schemes developed by the Community Irrigation Project (CIP) about Dang Valley.\u0000\u0000Design/Methodology/Approach: Based on selected fifteen surface irrigation schemes developed by CIP in Dang Valley, a Questionnaire survey, interviews, and observations were done along with the intensive study of Feasibility Assessment Report, project-related datasheets, and As-Built Drawings. These data have been analyzed using the Relative Importance Index (RII).\u0000\u0000Findings/Result: The study revealed that faulty survey, design, and change in local demand by users are the major reasons to change the design. The major four significant factors to cause design change in small surface irrigation schemes as obtained from the Relative Importance Index (RII) were survey leading to (1) the efficient system, (2) design with cost-effective and sustainable approach, (3) social issues, and (4) unforeseen site condition. It indicates that for the better construction and performance of FMIS there is a need for improvement in the survey, design, and other social issues like the mechanism of distributing equal water to all the beneficiary farmers.\u0000\u0000Originality/Value: The care against the influence of unnecessary political factors with due consideration of technical, social, environmental as well as the financial viability of schemes will be assured through the provision of a flexible Cost ceiling. Concept of design through extended team will be maintained.\u0000\u0000Paper Type: Action Research","PeriodicalId":184829,"journal":{"name":"International Journal of Applied Engineering and Management Letters","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131255812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel SHP-ECC Mechanism Architecture for Attack Node Mitigation and to Predict Future Community Intrusions","authors":"S. Prabhu, Nethravathi P. S.","doi":"10.47992/ijaeml.2581.7000.0128","DOIUrl":"https://doi.org/10.47992/ijaeml.2581.7000.0128","url":null,"abstract":"Purpose: Because of the apparent rapid advancement in the field of information and communication technology and its constant connection to the internet, customer and organizational data have become vulnerable to cyber-attacks, necessitating the explanation of solutions to ensure the security and protection of information throughout the industry. Today, it is critical for governments and major corporations to implement cybersecurity systems to ensure the confidentiality and security of data in the face of cyber-attacks. As community-based fully systems have become more important in today's society, they've become targets for malicious actions, prompting both industry and the research community to place a greater emphasis on resolving community intrusion detection difficulties. In network intrusion detection challenges, gadget examining algorithms have proven to be a valuable tool.\u0000Design/Methodology/Approach: This research provided a fully unique architecture for attack node mitigation as a result of the use of a novel type and encryption mechanism. First, the UNSW-NB15 dataset is received and separated into training and testing data. Within the Training section, information is first and foremost pre-processed, and capabilities are extracted. The relevant features are then chosen using the Taxicab Woodpecker Mating algorithm (TWMA). The BRELU-ResNet classifier is then used to classify the attacked and non-attacked data. The typical statistics are encrypted using the ESHP-ECC method, which is then saved in the security log report. Following that, the shortest distance will be calculated using Euclidean distance. Finally, the information is decrypted utilizing a set of ideas known as DSHP-ECC. If the entry appears in the log record while testing, it is marked as attacked statistics and will not be communicated. The method of detecting cyber-assaults will continue if it is not detected.\u0000Findings/Result: The analysis is based on the UNSW-NB 15 dataset, which shows that the proposed approach achieves an excessive security level of 93.75 percent. \u0000Originality/Value: This experimental-based research article examines the malicious activities in the cyberspace and mitigated by using a SHP-ECC mechanism.\u0000Paper Type: Research Article","PeriodicalId":184829,"journal":{"name":"International Journal of Applied Engineering and Management Letters","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133413042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on Conceptual Model of Cyber Attack Detection and Mitigation Using Deep Ensemble Model","authors":"S. Prabhu, Nethravathi P. S.","doi":"10.47992/ijaeml.2581.7000.0126","DOIUrl":"https://doi.org/10.47992/ijaeml.2581.7000.0126","url":null,"abstract":"Purpose: When communication networks and the internet of things are integrated into business control systems, they become more vulnerable to cyber-attacks, which can have disastrous consequences. An Intrusion Detection System is critical for identifying and blocking attacks in IoT networks. As a result, utilizing a unique Classification and Encryption approach, this article offered a novel architecture for attack node mitigation.\u0000Design/Methodology/Approach: This study reviews the current status of various cyber-attack detection models and their mitigation techniques. The proposed model works so that the system is first trained on the dataset, including the DDoS attack and ransomware components. The model examines if it contains malware from DDoS or Ransomware. When tested, we use trained information or a data set to provide the results on attack existence and what sort of attack we offer the extracted characteristics of the input. When the model identifies the attacker node, it is removed via the BAIT technique from the network. \u0000Findings/Result: Recognizing the importance of information security is critical to combating cybercrime and encouraging cyber security. There are numerous tactics, strategies, and equipment currently in use to detect intrusion in a computer network, and continuing research is being conducted to improve their ability to detect intrusion. The basic version of a cyber-assault detection and mitigation system using the BRELU-RESNET method was evaluated in this study.\u0000Originality/Value: This review-based research article examines the present state of cyber-attack detection and mitigation, as well as the research gaps and research goals.\u0000Paper Type: Review-based research analysis","PeriodicalId":184829,"journal":{"name":"International Journal of Applied Engineering and Management Letters","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130205270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investors Behavioural Intention of Cryptocurrency Adoption – A Review based Research Agenda","authors":"Bhuvana R., P. Aithal","doi":"10.47992/ijaeml.2581.7000.0125","DOIUrl":"https://doi.org/10.47992/ijaeml.2581.7000.0125","url":null,"abstract":"Purpose: The current study investigates the behavioral intention to use cryptocurrencies. The study's major goal is to prioritize the key motivations behind it mainly Investment in cryptocurrency and to learn the investors behavioral intentions.\u0000Design/Methodology: This study examines whether different factors determine the investors towards cryptocurrency usage like Ease of use, Social Impact, Convenience, Trust, Price volatility, Individual believes, Privacy, Risk and Decision making.\u0000Findings: This research's findings are intended to provide useful information on behavioral intentions of cryptocurrency users and merchants will be able to construct a viable business strategy to stay competitive. \u0000Originality: A literature review is conducted to examine the cryptocurrency usage behavior of Investors. The goal is to review the existing cryptocurrency behavior & try classifying and provide an exhaustive analysis of the determinants influencing the cryptocurrency behavioral intention of its users. Academic references, as well as essential facts and data taken from websites, scholarly articles were used in the study.\u0000Paper Type: Review Paper","PeriodicalId":184829,"journal":{"name":"International Journal of Applied Engineering and Management Letters","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116266663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IFE & EFE, TOWS and QPSM Analysis of Online Food Delivery Services","authors":"Dsouza Prima Frederick","doi":"10.47992/ijaeml.2581.7000.0124","DOIUrl":"https://doi.org/10.47992/ijaeml.2581.7000.0124","url":null,"abstract":"Purpose: This study attempts to analyse internal and external factors that favourably lead to increased turnover of Online Food Delivery Services and to offer best strategies that can be implemented based on those indicators, and select the most effective strategy.\u0000Design: The study is based on primary and secondary data. Focus group method were employed as primary data source for IFE and EFE analysis followed by TOWS matrix and QSPM analysis and secondary data was obtained by reference to journal papers and books.\u0000Findings: The results shows that the company should select the best strategy as improvement in food quality followed by related food diversification.\u0000Originality/Value: The paper helps to understand the internal and external factors influencing sales of Online Food Delivery Services by the use of different analysis framework.\u0000Type of the Paper: Qualitative Analysis","PeriodicalId":184829,"journal":{"name":"International Journal of Applied Engineering and Management Letters","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131168016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social Engineering Attacks in E-Government System: Detection and Prevention","authors":"M. Ahmed","doi":"10.47992/ijaeml.2581.7000.0123","DOIUrl":"https://doi.org/10.47992/ijaeml.2581.7000.0123","url":null,"abstract":"Purpose: E-Government system emerged as a novel public service provision platform that enables governance in an efficient and transparent manner globally. However, despite the success recorded so far by the increase in the use of information and communication technology (ICT) and E-government for public service provision. Social engineering attack (SEA) is one of the challenging information security attacks that prove to be difficult to tackle. This is because the attackers leverage on peoples’ weakness to exploit the system instead of technical vulnerabilities.\u0000Design/Methodology/Approach: This paper uses PESTLE (political, economic, social, technology, legal and environment) analysis to critically evaluate the external factors affecting SEAs in E-government system. \u0000Findings/Result: The study identified phishing, Baiting, Pretexting, Quid Pro Quo, Honey Trap, Tail Gating, and Pharming as the major SEA techniques used to exploit E-government systems. Furthermore, the author suggest training and awareness programme as the most effective way to detect as well as prevent SEA in E-government system. Users should be aware of the languages with terms requesting urgent response as well as unusual or unexpected situation in a suspicious messages or attachment as factors to detect SEA. Technical controls using natural language processes (NLP), security policies, multifactor authentication (MFA) as well as secured preservation of confidential information from suspicious users are some of the SEA preventive measures.\u0000Originality/Value: A flexible and efficient interaction among citizens, businesses and government organizations is a critical factor for successful E-Government system. SEA is one of major challenges affecting communications in E-government system that requires attention. In conclusion, studies toward technological approach for solution of SEA in E-government is recommended.\u0000Paper Type: Conceptual Research.","PeriodicalId":184829,"journal":{"name":"International Journal of Applied Engineering and Management Letters","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114813825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Direct to Consumer using Livestream as an Innovative Marketing Medium during COVID-19","authors":"D. Rajasekar, P. Aithal","doi":"10.47992/ijaeml.2581.7000.0121","DOIUrl":"https://doi.org/10.47992/ijaeml.2581.7000.0121","url":null,"abstract":"Purpose: Owing to COVID, when many of the physical retail areas were closed and customers were inside, brands were always considering inventive ways to associate with the customers. The accessibility of customers to sellers remained. The live stream was an awesome way to access customers and multiply engagement. \u0000Design/Methodology/Application: Establishing a conceptual notion based on model development using the emphasis group - learning method and model analysis using the ABCD listing methodology.\u0000Findings/Result: The analyst has recognized that engagement must not be restricted to buyers alone. Livestream is an amazing stage to lock in accomplices as well as internal employees within the company. Livestreaming is long-term of retail and e-commerce. The coronavirus pandemic devastated almost all sectors of the business.\u0000Research limitations/implications: Businesses across the country and across the world experienced their supplies, business relations adversely hampered. The demand for most of the products and services reduced to a great extent. The business interruption insurance policy can come to the rescue but unfortunately, if a particular business is not listed on, the policy is not covered. It becomes inevitable to review and reiterate the policies. In many places, in almost all sectors, all spheres, all levels, from the rich to the poor, the losses and damages caused by coronavirus havoc are irreparable. No agency or organization ponders over their compensation of them.\u0000Originality/New knowledge/Interpretation/Value: The objective of this paper is to exhibit the most recent patterns and upgrades in live streaming. Moreover, the feasibility of utilizing Livestream as an integrated marketing communication channel is explained. \u0000Paper Type: Conceptual research","PeriodicalId":184829,"journal":{"name":"International Journal of Applied Engineering and Management Letters","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117209513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}