DataPub Date : 2021-04-05DOI: 10.1145/3460620.3460742
Abdul Hanan K. Mohammed, Hrag-Harout Jebamikyous, Dina Nawara, R. Kashef
{"title":"IoT Cyber-Attack Detection: A Comparative Analysis","authors":"Abdul Hanan K. Mohammed, Hrag-Harout Jebamikyous, Dina Nawara, R. Kashef","doi":"10.1145/3460620.3460742","DOIUrl":"https://doi.org/10.1145/3460620.3460742","url":null,"abstract":"A cyber-attack is precautious manipulation of computer systems and networks using malware to conciliate data or restrict processes or operations. These types of attacks are vastly growing over the years. This increase in structure and complexity calls for advanced innovation in defensive strategies and detection. Traditional approaches for detecting cyber-attacks suffer from low efficiency, especially with the high demands of increasing security threats. With the substitutional increase of computational power, machine learning and deep learning methods are considered significant solutions for defending and detecting those threats or attacks. In this paper, we performed a comparative analysis of IoT cyberattack detection methods. We utilized six different algorithms including, Random Forest, Logistic Regression, SVM, NB, KNN, and MLP. Each model is evaluated using precision, recall, F-score, and ROC.","PeriodicalId":36824,"journal":{"name":"Data","volume":"40 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81842816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
DataPub Date : 2021-04-05DOI: 10.1145/3460620.3460632
R. Kashef
{"title":"Detecting Overlapping Communities in Social Networks Using A Modified Segmentation by Weighted Aggregation Approach","authors":"R. Kashef","doi":"10.1145/3460620.3460632","DOIUrl":"https://doi.org/10.1145/3460620.3460632","url":null,"abstract":"Detecting communities of common behaviors, interests, and interactions in social networks is essential to model a network's structure. Overlapping community detection is an NP-Hard problem. Several solutions have been proposed; however, most of these techniques are computationally expensive. We have developed a fast-hierarchical algorithm using the notion of segmentation by weighted aggregation. Experimental results on synthetic and real benchmark networks show that the proposed algorithm effectively finds communities (Clusters) with varied overlap and non-exhaustiveness structures. Our method outperforms the state-of-the-art hierarchical clustering algorithms measured by the F-measure and the computational time.","PeriodicalId":36824,"journal":{"name":"Data","volume":"40 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78689319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
DataPub Date : 2021-04-05DOI: 10.1145/3460620.3460626
T. Pham, F. Y. A. Anezi
{"title":"Fuzzy Cross Recurrence Analysis and Tensor Decomposition of Major-Depression Time-Series Data","authors":"T. Pham, F. Y. A. Anezi","doi":"10.1145/3460620.3460626","DOIUrl":"https://doi.org/10.1145/3460620.3460626","url":null,"abstract":"The mechanism underlying the complex behavior of major or clinical depression has been hypothesized as a dynamical system. This study presents an analysis of mood self-assessment in major depression using the method of fuzzy cross recurrence plots and tensor decomposition. The relationships between positive and negative mental states can be visualized and quantified using the proposed approach. The discovery of cross recurrences or dynamic correlations of the two opposite mental states can be helpful for targeted therapy in the management of personalized depression either under or without antidepressant drugs.","PeriodicalId":36824,"journal":{"name":"Data","volume":"81 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75654832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
DataPub Date : 2021-04-05DOI: 10.1145/3460620.3460751
Arun Nagaraja, U. Boregowda, V. Radhakrishna
{"title":"Regression analysis for network intrusion detection","authors":"Arun Nagaraja, U. Boregowda, V. Radhakrishna","doi":"10.1145/3460620.3460751","DOIUrl":"https://doi.org/10.1145/3460620.3460751","url":null,"abstract":"Machine learning and statistics are categorized as part of data science. Regression is one of the techniques of machine learning. Most of the contributions in the literature in respect to intrusion detection are mainly based on dimensionality reduction using techniques such as PCA, SVD, feature selection, feature reduction techniques and application of classifier algorithms. Very less attention is paid on regression analysis for intrusion detection in the existing literature. There is a scope to apply regression-based analysis for intrusion detection. Regression analysis may be applied for dimensionality reduction, classification or prediction tasks. This paper throws light on the possibility of applying regression analysis for intrusion detection and outlines some of the contributions that addressed regression analysis to perform intrusion detection.","PeriodicalId":36824,"journal":{"name":"Data","volume":"15 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77914301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
DataPub Date : 2021-04-05DOI: 10.1145/3460620.3460628
Salma F. Elharish, I. Denna, Abdelsalam M. Maatuk, Ebitisam K. Elberkawi
{"title":"Application of Electronic Health Records in Polyclinics: Barriers & Benefits","authors":"Salma F. Elharish, I. Denna, Abdelsalam M. Maatuk, Ebitisam K. Elberkawi","doi":"10.1145/3460620.3460628","DOIUrl":"https://doi.org/10.1145/3460620.3460628","url":null,"abstract":"Electronic Health Records (EHRs) is one of many enlargements in health informatics. It is a computerized system to collect, store, and display patient information. Although with the many benefits, many barriers affect the implementation of these systems. Such barriers can be technical, financial, organizational, individual, or even legal. This study aims to identify the important barriers associated with the implementation of EHR in polyclinics and to measure the perception of healthcare staff and their knowledge about this system. A self-prepared modified questionnaire and 100 participants were involved in this study. The questionnaire was composed of three sections: section (A) was concerned with demographic data, Section (B) was related to the knowledge/attitude and the candidates' perception towards EHR, and whereas Section (C) was focused on the practical implementation of the e-health record such as what volunteer's perception about the benefits and concerns of the implementation of the system. There were different opinions, views, and perceptions among the health care staff who participated in the study. However, there is a general agreement among all participants to the factors that delay the implementation of the EHRs system in Libya. The results show a high cost of adopting EHRs, lack of experience with the use of computers, security concerns regarding the use of EHR systems, resistance to change and adopt new technology to be significant barriers when it comes to EHRs implementation and adoption.","PeriodicalId":36824,"journal":{"name":"Data","volume":"143 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86186730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
DataPub Date : 2021-04-05DOI: 10.1145/3460620.3460625
G. Bekmanova, Ye.A. Ongarbayev, Baubek Somzhurek, Nurlan Mukatayev
{"title":"Intelligent learning systems for LLL courses: Intelligent learning systems for LLL courses","authors":"G. Bekmanova, Ye.A. Ongarbayev, Baubek Somzhurek, Nurlan Mukatayev","doi":"10.1145/3460620.3460625","DOIUrl":"https://doi.org/10.1145/3460620.3460625","url":null,"abstract":"The proposed model for organizing blended and distance learning involves the creation of an individual learning path, which makes it flexible. The learning model is represented using an ontological model, and the decision rules for the model are logical rules. This training model is used to train teachers in digital literacy and distance learning in the context of Covid 19","PeriodicalId":36824,"journal":{"name":"Data","volume":"70 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73835613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
DataPub Date : 2021-04-05DOI: 10.1145/3460620.3460747
Abdalrahman Hwoij, As'har Khamaiseh, M. Ababneh
{"title":"SIEM Architecture for the Internet of Things and Smart City","authors":"Abdalrahman Hwoij, As'har Khamaiseh, M. Ababneh","doi":"10.1145/3460620.3460747","DOIUrl":"https://doi.org/10.1145/3460620.3460747","url":null,"abstract":"The Internet of things (IoT) is a new technology that shapes the future of a world that is rapidly being invaded by smart devices connected to the Internet. Such technology has a great role in developing the idea of a smart city. A smart city is a city that takes advantage of existing infrastructure and integrates it with the Internet of things technology to improve the quality of life. Internet of Things (IoT) sensors are distributed geographically around the city to collect data from the environment (i.e.: streets, cars, traffic lights...etc.), process, and manage it to provide intelligent actionable information to citizens. All data transferred through networks of a smart city may be threatened and susceptible to illegal actions such as violation, stealing, and inappropriate use. These security threats affect the privacy and security of users; where hackers can get access to user's data and gain control of their smart homes, cars, medical devices and might even gain control over city traffic lights. All the above enforce the need to have a security system that continuously monitors and tracks all data logs to detect any suspicious activity. In this paper, we propose a Security Information and Event Management (SIEM) approach for smart cities by forwarding event logs generated by smart devices to a security operation center that works around the clock to detect security incidents and handle them. Such an approach aims to create a safe smart living environment.","PeriodicalId":36824,"journal":{"name":"Data","volume":"29 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74942194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
DataPub Date : 2021-04-05DOI: 10.1145/3460620.3460737
Mohammed Nasereddin, A. Qusef
{"title":"Risk Assessment in Smartphones: Comprehensive Analysis","authors":"Mohammed Nasereddin, A. Qusef","doi":"10.1145/3460620.3460737","DOIUrl":"https://doi.org/10.1145/3460620.3460737","url":null,"abstract":"Smartphones are multi-purpose and widely used devices in various fields, in terms of personal use, and companies and governments. Increasing dependence on them opened the way for increased violations on its users, as it became a fat substance for criminals, for their illegal practices, so it encountered serious and targeted security threats. This paper presents a set of rules and controls that will reduce the risks that threaten smartphone users. Furthermore, this work provides the methods of risk assessment that are related to smartphones. It identifies the assets and lists several different threats that are relevant. Each risk has its impact on the assets, this is described by mapping it with the likelihood of each threat.","PeriodicalId":36824,"journal":{"name":"Data","volume":"81 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76269303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
DataPub Date : 2021-04-05DOI: 10.1145/3460620.3460746
Ahmed Hambouz, Yousef Shaheen, M. Ababneh
{"title":"An Internet Of Things (IoT) Forensics Model Using Third-Party Logs-Vault","authors":"Ahmed Hambouz, Yousef Shaheen, M. Ababneh","doi":"10.1145/3460620.3460746","DOIUrl":"https://doi.org/10.1145/3460620.3460746","url":null,"abstract":"Since the last decade, the number of Internet of Things (IoT) devices has increased dramatically. Consequently, the number of effected users and persons has also grown. By 2025 the number of connected IoT devices will reach 75.44 billion. This tremendous increase in IoT devices environments has increased the IoT threats, risks, and digital crimes. Thus, an efficient IoT forensic model should be laid out to fulfill the investigation requirements in IoT environments. In this paper, a new IoT forensics model has been introduced to face the IoT forensics challenges. The proposed model has satisfied the security, confidentiality, integrity, availability, authentication, and non-repudiation requirements.","PeriodicalId":36824,"journal":{"name":"Data","volume":"13 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85615102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
DataPub Date : 2021-04-05DOI: 10.1145/3460620.3460743
M. B. Yassein, Ismail Hmeidi, Fatimah Alghazo, Bayan Odat, Ayat Smairat
{"title":"Energy Saving Techniques in CoAP of Internet of Things","authors":"M. B. Yassein, Ismail Hmeidi, Fatimah Alghazo, Bayan Odat, Ayat Smairat","doi":"10.1145/3460620.3460743","DOIUrl":"https://doi.org/10.1145/3460620.3460743","url":null,"abstract":"Internet of Things is a connection of associated objects wherein theseobjects can gather information and interchange them utilizing sensors. IoT allowsconnecting objects and property as one unit, enables us to control everything we want,and tells us of the state of things, whether it is replacing or no. In the coming times,the world is adapting to apply the Internet of things in several major fields, among themost important domains that can integrate into it are industries, companies, healthcare, and communications. The inserted sensors of associated gadgets play out asignificant job and it has restricted energy abilities, many techniques studied theproblem of restricted energy. This works center around Application Layer methodsand explicitly on one of the main conventions, the Constrained Application Protocol(CoAP). We examine the most reasonable energy-effective procedures to actualizethe CoAP, and finally, we compare these techniques on different levels.","PeriodicalId":36824,"journal":{"name":"Data","volume":"15 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85931267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}