{"title":"Advanced cyber security using Spectral entity feature selection based on Cyber Crypto Proof Security Protocol (C2PSP)","authors":"G. S, Karabi Saikia, Ranadheer Reddy Vallem","doi":"10.58496/mjcs/2023/008","DOIUrl":"https://doi.org/10.58496/mjcs/2023/008","url":null,"abstract":"The growth of internet become more development in communication medium to provide various services. Information sharing ad security is mostly suffered by crime attackers because of different models of cyber-attacks are carried out by attackers. Attackers creates jamming principles, communication delays, packet dropping, and information hacking, duplicate injection to do so many activities to destroy the security. Based on the communication data analysis and features are non-identified and difficult to find the malicious activities. So the development of cyber security needs advancement to find the attackers based on the communication breaking activities. To resolve this problem, we propose a Spectral entity feature selection based Cyber Crypto Proof Security Protocol (C2PSP) to improve the cyber security. The Defect Scaling Rate (DSR) is used to estimate the communication defect rate. By marginalize the scaling rate using Spectral entity feature selection approach (SEFSA) is applied to select the features and trained to identify with Artificial neural network classifier (ANN). Based on the attack principles and activities in communication medium, the Cyber Crypto Proof Security Protocol (C2PSP) is applied to ensure the security verification and validation to process the data safer and securely. The proposed system produce high performance compared to other system as well to identify the malicious activities to improve the security against the cyber-attacks","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132415489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel Convolutional Neural Networks based Jaya algorithm Approach for Accurate Deepfake Video Detection","authors":"Z. F. Hussain, Hind Ra'ad Ibraheem","doi":"10.58496/mjcs/2023/007","DOIUrl":"https://doi.org/10.58496/mjcs/2023/007","url":null,"abstract":"Deepfake videos are becoming an increasing concern due to their potential to spread misinformation and cause harm. In this paper, we propose a novel approach for accurately detecting deepfake videos using the combination of Convolutional Neural Networks (CNNs) with the Jaya algorithm optimization. The approach is evaluated on two publicly available datasets, the DeepFake Detection Challenge (DFDC) dataset and the Celeb-DF dataset, and achieves state-of-the-art performance on both datasets. Our approach achieves an accuracy of 99.3% on the DFDC dataset and 97.6% on the Celeb-DF dataset, with high F1 scores indicating a high precision and recall for detecting deepfake videos. Furthermore, our approach is more robust against adversarial attacks than existing state-of-the-art methods. The combination of CNNs with the Jaya algorithm optimization enables effective capture of the temporal information in the video sequence, while the use of robust evaluation metrics ensures objective measurement and comparison with existing methods. Our proposed approach offers a highly effective solution for detecting deepfake videos, which has the potential to be a valuable tool for media forensics, content moderation, and cyber security.","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115434964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SQL Injection Attack: Quick View","authors":"V. Abdullayev, Dr. Alok Singh Chauhan","doi":"10.58496/mjcs/2023/006","DOIUrl":"https://doi.org/10.58496/mjcs/2023/006","url":null,"abstract":"SQL injection is a type of security vulnerability that occurs in database-driven web applications where an attacker injects malicious code into the application to gain unauthorized access to sensitive information. This paper aims to provide a comprehensive and systematic review of the existing methods for preventing and detecting SQL injection attacks. The review covers a range of techniques, including input validation, parameterized queries, and intrusion detection systems, as well as the advantages and disadvantages of each method. The most common prevention techniques include input validation, parameterized queries, and stored procedures, while the most common detection techniques include intrusion detection systems (IDS), honeypots, and signature-based detection. The choice of method will depend on the specific requirements of the organization and the level of security required. Still, a combination of prevention and detection methods is likely to be the most effective way to secure web applications against SQL injection attacks. The paper concludes that SQL injection attacks continue to be a significant security threat to web applications, and it is essential for organizations to implement effective prevention and detection methods to secure their web applications against SQL injection attacks.","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124891416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Threats Detection in the Internet of Things Using Convolutional neural networks, long short-term memory, and gated recurrent units","authors":"Naomi A. Bajao, Jae-an Sarucam","doi":"10.58496/mjcs/2023/005","DOIUrl":"https://doi.org/10.58496/mjcs/2023/005","url":null,"abstract":"Security for IoT gadgets is an undertaking that has been made more troublesome by the far-reaching utilization of network safety in different applications, including wise modern frameworks, homes, individual devices, and vehicles. The fact that has been introduced makes deep learning for interruption recognition one productive security method. I thought about a few relevant systematic reviews that had already been written. Recent systematic reviews may include older and more recent works on the subject. For better IoT security, late exploration has focused on improving deep learning calculations. The ideal methodology for carrying out interruption recognition in the Internet of Things is determined by looking at the exhibition of different deep learning executions and investigating interruption location techniques that utilise them. Convolutional neural networks (CNNs), long short-term memory (LSTM), and gated recurrent units (GRUs) are the deep learning models used in this review. A standard dataset for IoT interruption identification is considered to evaluate the proposed model. The practical information is then investigated and diverged from current IoT interruption discovery strategies. In contrast with currently utilized approaches, the recommended strategy seems to have the best precision.","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124921943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ChatGPT: Exploring the Role of Cybersecurity in the Protection of Medical Information","authors":"Maad M. Mijwil, Mohammad Aljanabi, Ahmed Ali","doi":"10.58496/mjcs/2023/004","DOIUrl":"https://doi.org/10.58496/mjcs/2023/004","url":null,"abstract":"ChatGPT is a large language model developed by OpenAI. It is trained on a dataset of conversational text and can be used to generate human-like responses to prompts in a variety of languages and formats. It can be used for tasks such as chatbots, language translation, and text completion. The role of ChatGPT is to generate human-like text based on a given prompt or context. It can be used in a variety of applications such as chatbots, language translation, text completion, and question answering. Additionally, it can be fine-tuned for specific tasks such as generating product descriptions or summarizing articles. It can also be used to generate creative writing such as poetry and stories. It can be integrated into a wide range of industries from customer service to entertainment, to research.","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124714834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ChatGPT: Future Directions and Open possibilities","authors":"Mohammad Aljanabi, ChatGPT","doi":"10.58496/mjcs/2023/003","DOIUrl":"https://doi.org/10.58496/mjcs/2023/003","url":null,"abstract":"ChatGPT, the cutting-edge language model developed by OpenAI, is one of the most exciting advancements in the field\u0000of artificial intelligence. With its ability to generate human-like text and respond to complex questions, ChatGPT has\u0000already made a significant impact and is poised to continue its rapid progression in the coming years. As we look to the\u0000future of ChatGPT and large language models, there are many exciting possibilities and open opportunities for this\u0000technology to enhance our lives and change the way we interact with technology","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133069536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Theoretical Background of Cryptography","authors":"","doi":"10.58496/mjcs/2023/002","DOIUrl":"https://doi.org/10.58496/mjcs/2023/002","url":null,"abstract":"Cryptography is the practice of secure communication and the study of secure communication techniques. The theoretical foundations of cryptography include concepts such as cryptography, secure key exchange, digital signatures, and authentication. These technologies are used to protect the confidentiality, integrity, and reliability of information while it is being transmitted over a network or stored in digital form. The core of encryption is the concept of an encryption algorithm, which is a set of mathematical rules used to encrypt and decrypt data. The security of a cryptographic system depends on the strength of the underlying algorithm and the confidentiality of the key used to encrypt and decrypt the data. In this paper, Cryptography concepts and modern techniques are reviewed for types of encryption algorithms and the best ones, and many types of attacks and their impact on the encryption process","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133243766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Purpose of Cybersecurity Governance in the Digital Transformation of Public Services and Protecting the Digital Environment","authors":"Maad M. Mijwil","doi":"10.58496/mjcs/2023/001","DOIUrl":"https://doi.org/10.58496/mjcs/2023/001","url":null,"abstract":"The process of digital transformation is considered one of the most influential matters in circulation at\u0000the present time, as it seeks to integrate computer-based technologies into the public services provided\u0000by companies or institutions. To achieve digital transformation, basics and points must be established,\u0000while relying on a set of employee skills and involving customers in developing this process. Today,\u0000all governments are seeking electronic transformation by converting all public services into digital,\u0000where changes in cybersecurity must be taken into account, which constitutes a large part of the\u0000priorities of nations and companies. The vulnerability to cyberspace, the development of technologies\u0000and devices, and the use of artificial intelligence in the growth of modern applications have led to the\u0000acceleration of the digital transformation process and the utilization of its services. To adopt\u0000straightforward programs and strategies to establish cybersecurity governance that can be trusted and\u0000practical in completing tasks without hacking and tampering with data and information. In this article,\u0000the importance of cybersecurity governance is highlighted in providing safe and effective technical means that have the ability to face all threats and challenges and preserve the data of individuals in various sectors.","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115204960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Coherent Trust based Location Aware Clustering for Communication in Mobile Ad Hoc Networks","authors":"","doi":"10.58496/mjcs/2022/008","DOIUrl":"https://doi.org/10.58496/mjcs/2022/008","url":null,"abstract":"Mobile Ad Hoc Networks (MANETs) are the emerging technology for communication and it is used in maximum of the application hence it is noticed by the academic and industrial sectors. Due to the mobile nature of the nodes in MANETs it is complicated to transfer the ecological information. During communication in maximum of the cases link failures and high energy consumption occurred. In order to overcome this issues clustering techniques are introduced in earlier days which is the group of nodes into cluster and each cluster consists of a cluster head (CH) and the other nodes which are present in that coverage area is termed as cluster members (CM). Due to this method the energy efficiency of the network is increased but the current drawback is selection of effective CH. Improper CH selection reflects in ineffective communication. For that purpose in this paper Efficient Coherent Trust based Location Aware Clustering (ECTLAC) approach is proposed for the selection of CH in MANETs. The approach is sub divided into two sections. They are effective coherent trust calculation and location aware clustering. Through this process an effective CH is chosen the greatly increase the performance of MANETs. The simulation is performed in NS2 and the parameters which are calculated for the performance analysis are energy efficiency, energy consumption, packet delivery ratio, and end-to-end delay. The results are compared with the earlier approaches such as HAMBO and CAPIC. From the results it is understood that the proposed ECTLAC approach produce high energy efficiency and packet delivery ratio as well as lower energy consumption and end to end delay when compared with the earlier works.","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123953719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Zero-Day Vulnerabilities: Unveiling the Threat Landscape in Network Security","authors":"Raheela zaib","doi":"10.58496/mjcs/2022/007","DOIUrl":"https://doi.org/10.58496/mjcs/2022/007","url":null,"abstract":"Today's digital ecosystem is particularly vulnerable to attacks due to zero-day vulnerabilities. Attackers take advantage of these flaws, which software developers and security experts are unaware of, leading to catastrophic outcomes. Through an analysis of their lifetime, discovery approaches, exploitation methods, disclosure protocols, and patching strategies, this study tries to reveal the danger landscape of zero-day vulnerabilities. We examine the effects of zero-day vulnerabilities on network security and the difficulties that businesses confront by reviewing the relevant literature and discussing actual cases. We also investigate preventative measures and methods of defense, such as intrusion and anomaly detection systems and cutting-edge AI. We stress the need for responsible disclosure, prompt patching, and continued research to counter these difficult to detect dangers. In order to better understand zero-day vulnerabilities, implement countermeasures, and respond to them, this article is an invaluable resource for researchers, security experts, and organizations.","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128992323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}