Mesopotamian Journal of Cyber Security最新文献

筛选
英文 中文
Advanced cyber security using Spectral entity feature selection based on Cyber Crypto Proof Security Protocol (C2PSP) 基于C2PSP协议的频谱实体特征选择的高级网络安全
Mesopotamian Journal of Cyber Security Pub Date : 2023-02-27 DOI: 10.58496/mjcs/2023/008
G. S, Karabi Saikia, Ranadheer Reddy Vallem
{"title":"Advanced cyber security using Spectral entity feature selection based on Cyber Crypto Proof Security Protocol (C2PSP)","authors":"G. S, Karabi Saikia, Ranadheer Reddy Vallem","doi":"10.58496/mjcs/2023/008","DOIUrl":"https://doi.org/10.58496/mjcs/2023/008","url":null,"abstract":"The growth of internet become more development in communication medium to provide various services. Information sharing ad security is mostly suffered by crime attackers because of different models of cyber-attacks are carried out by attackers. Attackers creates jamming principles, communication delays, packet dropping, and information hacking, duplicate injection to do so many activities to destroy the security. Based on the communication data analysis and features are non-identified and difficult to find the malicious activities. So the development of cyber security needs advancement to find the attackers based on the communication breaking activities. To resolve this problem, we propose a Spectral entity feature selection based Cyber Crypto Proof Security Protocol (C2PSP) to improve the cyber security. The Defect Scaling Rate (DSR) is used to estimate the communication defect rate. By marginalize the scaling rate using Spectral entity feature selection approach (SEFSA) is applied to select the features and trained to identify with Artificial neural network classifier (ANN). Based on the attack principles and activities in communication medium, the Cyber Crypto Proof Security Protocol (C2PSP) is applied to ensure the security verification and validation to process the data safer and securely. The proposed system produce high performance compared to other system as well to identify the malicious activities to improve the security against the cyber-attacks","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132415489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Convolutional Neural Networks based Jaya algorithm Approach for Accurate Deepfake Video Detection 基于卷积神经网络的Jaya算法的深度假视频精确检测
Mesopotamian Journal of Cyber Security Pub Date : 2023-02-24 DOI: 10.58496/mjcs/2023/007
Z. F. Hussain, Hind Ra'ad Ibraheem
{"title":"Novel Convolutional Neural Networks based Jaya algorithm Approach for Accurate Deepfake Video Detection","authors":"Z. F. Hussain, Hind Ra'ad Ibraheem","doi":"10.58496/mjcs/2023/007","DOIUrl":"https://doi.org/10.58496/mjcs/2023/007","url":null,"abstract":"Deepfake videos are becoming an increasing concern due to their potential to spread misinformation and cause harm. In this paper, we propose a novel approach for accurately detecting deepfake videos using the combination of Convolutional Neural Networks (CNNs) with the Jaya algorithm optimization. The approach is evaluated on two publicly available datasets, the DeepFake Detection Challenge (DFDC) dataset and the Celeb-DF dataset, and achieves state-of-the-art performance on both datasets. Our approach achieves an accuracy of 99.3% on the DFDC dataset and 97.6% on the Celeb-DF dataset, with high F1 scores indicating a high precision and recall for detecting deepfake videos. Furthermore, our approach is more robust against adversarial attacks than existing state-of-the-art methods. The combination of CNNs with the Jaya algorithm optimization enables effective capture of the temporal information in the video sequence, while the use of robust evaluation metrics ensures objective measurement and comparison with existing methods. Our proposed approach offers a highly effective solution for detecting deepfake videos, which has the potential to be a valuable tool for media forensics, content moderation, and cyber security.","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115434964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SQL Injection Attack: Quick View SQL注入攻击:快速查看
Mesopotamian Journal of Cyber Security Pub Date : 2023-02-14 DOI: 10.58496/mjcs/2023/006
V. Abdullayev, Dr. Alok Singh Chauhan
{"title":"SQL Injection Attack: Quick View","authors":"V. Abdullayev, Dr. Alok Singh Chauhan","doi":"10.58496/mjcs/2023/006","DOIUrl":"https://doi.org/10.58496/mjcs/2023/006","url":null,"abstract":"SQL injection is a type of security vulnerability that occurs in database-driven web applications where an attacker injects malicious code into the application to gain unauthorized access to sensitive information. This paper aims to provide a comprehensive and systematic review of the existing methods for preventing and detecting SQL injection attacks. The review covers a range of techniques, including input validation, parameterized queries, and intrusion detection systems, as well as the advantages and disadvantages of each method. The most common prevention techniques include input validation, parameterized queries, and stored procedures, while the most common detection techniques include intrusion detection systems (IDS), honeypots, and signature-based detection. The choice of method will depend on the specific requirements of the organization and the level of security required. Still, a combination of prevention and detection methods is likely to be the most effective way to secure web applications against SQL injection attacks. The paper concludes that SQL injection attacks continue to be a significant security threat to web applications, and it is essential for organizations to implement effective prevention and detection methods to secure their web applications against SQL injection attacks.","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124891416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Threats Detection in the Internet of Things Using Convolutional neural networks, long short-term memory, and gated recurrent units 使用卷积神经网络、长短期记忆和门控循环单元的物联网威胁检测
Mesopotamian Journal of Cyber Security Pub Date : 2023-02-07 DOI: 10.58496/mjcs/2023/005
Naomi A. Bajao, Jae-an Sarucam
{"title":"Threats Detection in the Internet of Things Using Convolutional neural networks, long short-term memory, and gated recurrent units","authors":"Naomi A. Bajao, Jae-an Sarucam","doi":"10.58496/mjcs/2023/005","DOIUrl":"https://doi.org/10.58496/mjcs/2023/005","url":null,"abstract":"Security for IoT gadgets is an undertaking that has been made more troublesome by the far-reaching utilization of network safety in different applications, including wise modern frameworks, homes, individual devices, and vehicles. The fact that has been introduced makes deep learning for interruption recognition one productive security method. I thought about a few relevant systematic reviews that had already been written. Recent systematic reviews may include older and more recent works on the subject. For better IoT security, late exploration has focused on improving deep learning calculations. The ideal methodology for carrying out interruption recognition in the Internet of Things is determined by looking at the exhibition of different deep learning executions and investigating interruption location techniques that utilise them. Convolutional neural networks (CNNs), long short-term memory (LSTM), and gated recurrent units (GRUs) are the deep learning models used in this review. A standard dataset for IoT interruption identification is considered to evaluate the proposed model. The practical information is then investigated and diverged from current IoT interruption discovery strategies. In contrast with currently utilized approaches, the recommended strategy seems to have the best precision.","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124921943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
ChatGPT: Exploring the Role of Cybersecurity in the Protection of Medical Information 探讨网络安全在医疗信息保护中的作用
Mesopotamian Journal of Cyber Security Pub Date : 2023-02-01 DOI: 10.58496/mjcs/2023/004
Maad M. Mijwil, Mohammad Aljanabi, Ahmed Ali
{"title":"ChatGPT: Exploring the Role of Cybersecurity in the Protection of Medical Information","authors":"Maad M. Mijwil, Mohammad Aljanabi, Ahmed Ali","doi":"10.58496/mjcs/2023/004","DOIUrl":"https://doi.org/10.58496/mjcs/2023/004","url":null,"abstract":"ChatGPT is a large language model developed by OpenAI. It is trained on a dataset of conversational text and can be used to generate human-like responses to prompts in a variety of languages and formats. It can be used for tasks such as chatbots, language translation, and text completion. The role of ChatGPT is to generate human-like text based on a given prompt or context. It can be used in a variety of applications such as chatbots, language translation, text completion, and question answering. Additionally, it can be fine-tuned for specific tasks such as generating product descriptions or summarizing articles. It can also be used to generate creative writing such as poetry and stories. It can be integrated into a wide range of industries from customer service to entertainment, to research.","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124714834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
ChatGPT: Future Directions and Open possibilities ChatGPT:未来的方向和开放的可能性
Mesopotamian Journal of Cyber Security Pub Date : 2023-01-31 DOI: 10.58496/mjcs/2023/003
Mohammad Aljanabi, ChatGPT
{"title":"ChatGPT: Future Directions and Open possibilities","authors":"Mohammad Aljanabi, ChatGPT","doi":"10.58496/mjcs/2023/003","DOIUrl":"https://doi.org/10.58496/mjcs/2023/003","url":null,"abstract":"ChatGPT, the cutting-edge language model developed by OpenAI, is one of the most exciting advancements in the field\u0000of artificial intelligence. With its ability to generate human-like text and respond to complex questions, ChatGPT has\u0000already made a significant impact and is poised to continue its rapid progression in the coming years. As we look to the\u0000future of ChatGPT and large language models, there are many exciting possibilities and open opportunities for this\u0000technology to enhance our lives and change the way we interact with technology","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133069536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Theoretical Background of Cryptography 密码学的理论背景
Mesopotamian Journal of Cyber Security Pub Date : 2023-01-26 DOI: 10.58496/mjcs/2023/002
{"title":"Theoretical Background of Cryptography","authors":"","doi":"10.58496/mjcs/2023/002","DOIUrl":"https://doi.org/10.58496/mjcs/2023/002","url":null,"abstract":"Cryptography is the practice of secure communication and the study of secure communication techniques. The theoretical foundations of cryptography include concepts such as cryptography, secure key exchange, digital signatures, and authentication. These technologies are used to protect the confidentiality, integrity, and reliability of information while it is being transmitted over a network or stored in digital form. The core of encryption is the concept of an encryption algorithm, which is a set of mathematical rules used to encrypt and decrypt data. The security of a cryptographic system depends on the strength of the underlying algorithm and the confidentiality of the key used to encrypt and decrypt the data. In this paper, Cryptography concepts and modern techniques are reviewed for types of encryption algorithms and the best ones, and many types of attacks and their impact on the encryption process","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133243766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Purpose of Cybersecurity Governance in the Digital Transformation of Public Services and Protecting the Digital Environment 公共服务数字化转型与数字环境保护中的网络安全治理目的
Mesopotamian Journal of Cyber Security Pub Date : 2023-01-17 DOI: 10.58496/mjcs/2023/001
Maad M. Mijwil
{"title":"The Purpose of Cybersecurity Governance in the Digital Transformation of Public Services and Protecting the Digital Environment","authors":"Maad M. Mijwil","doi":"10.58496/mjcs/2023/001","DOIUrl":"https://doi.org/10.58496/mjcs/2023/001","url":null,"abstract":"The process of digital transformation is considered one of the most influential matters in circulation at\u0000the present time, as it seeks to integrate computer-based technologies into the public services provided\u0000by companies or institutions. To achieve digital transformation, basics and points must be established,\u0000while relying on a set of employee skills and involving customers in developing this process. Today,\u0000all governments are seeking electronic transformation by converting all public services into digital,\u0000where changes in cybersecurity must be taken into account, which constitutes a large part of the\u0000priorities of nations and companies. The vulnerability to cyberspace, the development of technologies\u0000and devices, and the use of artificial intelligence in the growth of modern applications have led to the\u0000acceleration of the digital transformation process and the utilization of its services. To adopt\u0000straightforward programs and strategies to establish cybersecurity governance that can be trusted and\u0000practical in completing tasks without hacking and tampering with data and information. In this article,\u0000the importance of cybersecurity governance is highlighted in providing safe and effective technical means that have the ability to face all threats and challenges and preserve the data of individuals in various sectors.","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115204960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Efficient Coherent Trust based Location Aware Clustering for Communication in Mobile Ad Hoc Networks 移动Ad Hoc网络中基于高效一致信任的位置感知聚类通信
Mesopotamian Journal of Cyber Security Pub Date : 2022-12-05 DOI: 10.58496/mjcs/2022/008
{"title":"Efficient Coherent Trust based Location Aware Clustering for Communication in Mobile Ad Hoc Networks","authors":"","doi":"10.58496/mjcs/2022/008","DOIUrl":"https://doi.org/10.58496/mjcs/2022/008","url":null,"abstract":"Mobile Ad Hoc Networks (MANETs) are the emerging technology for communication and it is used in maximum of the application hence it is noticed by the academic and industrial sectors. Due to the mobile nature of the nodes in MANETs it is complicated to transfer the ecological information. During communication in maximum of the cases link failures and high energy consumption occurred. In order to overcome this issues clustering techniques are introduced in earlier days which is the group of nodes into cluster and each cluster consists of a cluster head (CH) and the other nodes which are present in that coverage area is termed as cluster members (CM). Due to this method the energy efficiency of the network is increased but the current drawback is selection of effective CH. Improper CH selection reflects in ineffective communication. For that purpose in this paper Efficient Coherent Trust based Location Aware Clustering (ECTLAC) approach is proposed for the selection of CH in MANETs. The approach is sub divided into two sections. They are effective coherent trust calculation and location aware clustering. Through this process an effective CH is chosen the greatly increase the performance of MANETs. The simulation is performed in NS2 and the parameters which are calculated for the performance analysis are energy efficiency, energy consumption, packet delivery ratio, and end-to-end delay. The results are compared with the earlier approaches such as HAMBO and CAPIC. From the results it is understood that the proposed ECTLAC approach produce high energy efficiency and packet delivery ratio as well as lower energy consumption and end to end delay when compared with the earlier works.","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123953719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zero-Day Vulnerabilities: Unveiling the Threat Landscape in Network Security 零日漏洞:揭示网络安全的威胁格局
Mesopotamian Journal of Cyber Security Pub Date : 2022-11-29 DOI: 10.58496/mjcs/2022/007
Raheela zaib
{"title":"Zero-Day Vulnerabilities: Unveiling the Threat Landscape in Network Security","authors":"Raheela zaib","doi":"10.58496/mjcs/2022/007","DOIUrl":"https://doi.org/10.58496/mjcs/2022/007","url":null,"abstract":"Today's digital ecosystem is particularly vulnerable to attacks due to zero-day vulnerabilities. Attackers take advantage of these flaws, which software developers and security experts are unaware of, leading to catastrophic outcomes. Through an analysis of their lifetime, discovery approaches, exploitation methods, disclosure protocols, and patching strategies, this study tries to reveal the danger landscape of zero-day vulnerabilities. We examine the effects of zero-day vulnerabilities on network security and the difficulties that businesses confront by reviewing the relevant literature and discussing actual cases. We also investigate preventative measures and methods of defense, such as intrusion and anomaly detection systems and cutting-edge AI. We stress the need for responsible disclosure, prompt patching, and continued research to counter these difficult to detect dangers. In order to better understand zero-day vulnerabilities, implement countermeasures, and respond to them, this article is an invaluable resource for researchers, security experts, and organizations.","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128992323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信