A. Shukla, S. Pippal, Deepak Singh, Somula Rama Subba Reddy
{"title":"An evolutionary-based technique to characterise an anomaly in internet of things networks","authors":"A. Shukla, S. Pippal, Deepak Singh, Somula Rama Subba Reddy","doi":"10.1504/ijitst.2021.10040780","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10040780","url":null,"abstract":"Internet of things (IoT) can connect devices embedded in various systems to the internet. Distributed denial-of-service, commonly referred as DDoS is an attack to disrupt normal traffic of a victim in IoT system, facility, or network by crushing the target or its surrounding infrastructure with overflow of internet traffic. Unfortunately, modern DDoS attack detection strategies have been failed to rationalise the early detection of DDoS attacks. Therefore, in this study, teaching learning-based optimisation (TLBO) with the learning algorithm is integrated to mitigate denial of service attacks. Furthermore, TLBOIDS selects the most relevant features from the original IDS dataset which can help to distinguish typical low-rate DDoS attacks with the use of four classification algorithms. KDD Cup 99 dataset is used in the experimental study. From the simulation results, it is obvious that TLBOIDS with C4.5 achieves high detection and accuracy with a false positive rate.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42457845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced adaptive trust management system for socially related IoT","authors":"Geetha Venkatesan, Avadhesh Kumar","doi":"10.1504/ijitst.2021.10040791","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10040791","url":null,"abstract":"The social IoT (SIoT) is a network involving heterogeneous entities like humans, and devices referred to as 'things' are connected with social relationship. Every individual thing has its own ID, functional property, limited storage and capacity. Each one expects to establish trusted communication with other reliable entities in the IoT network, which paves the essential of trust management system (TMS). We propose an adaptive trust management design that performs trust assessment considering both QoS and social parameter for deciding the trustiness of a node in the IoT network. The design uses direct assessment and indirect recommendation, which are aggregated using a dynamic weighted method. The decay factor for the past experiences and dynamic updating of the trust profiles enhances the system performances. The work is compared with static, distributed, social and single trust type of system in terms of resiliency and performance. The proposed work shows very efficient trust assessment and maximum performance.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42306029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital application of analogue-like time perception mechanism based on analogue on digital theory","authors":"Ziran Fan, T. Fujimoto","doi":"10.1504/ijitst.2021.10040784","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10040784","url":null,"abstract":"This paper analyses the human time perception mechanism regarding the use of analogue clocks based on the design theory of analogue on digital (AoD theory). With the examination, the authors would propose the method to apply the design elements of analogue clock into the digital devices such as smart watches and smartphones to the schedule management. The proposed application, targets smartwatches as media and represents the reality of time passing that is originally provided by analogue clocks. The interface design adopts the time representation of analogue clocks into the schedule display so that it can intuitively indicate the lapse of time passing for each activity scheduled in a day. Moreover, we design the user's operational experience close to that of analogue tools by realising 'the real feel of using clocks' through the representation of the spring-driven system on digital style.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49278953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Appropriation of Fear as a Context by Cybersecurity","authors":"A. Caldwell","doi":"10.20533/jitst.2046.3723.2021.0089","DOIUrl":"https://doi.org/10.20533/jitst.2046.3723.2021.0089","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"67 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81725681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cost-benefit Analysis of Information Security Mitigation Methods for ORVIs","authors":"J. Street, F. Olajide","doi":"10.20533/jitst.2046.3723.2021.0092","DOIUrl":"https://doi.org/10.20533/jitst.2046.3723.2021.0092","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"03 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85962595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Best Practices Used by Businesses to Maintain Good Cyber Hygiene During Covid19 Pandemic","authors":"T. Ncubukezi, L. Mwansa","doi":"10.20533/jitst.2046.3723.2021.0086","DOIUrl":"https://doi.org/10.20533/jitst.2046.3723.2021.0086","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77694028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Patricia Yetunde Omole-Matthew, G. Arome, A. Thompson, B. Alese
{"title":"Monte Carlo Simulation Approach to Network Access Control","authors":"Patricia Yetunde Omole-Matthew, G. Arome, A. Thompson, B. Alese","doi":"10.20533/jitst.2046.3723.2021.0088","DOIUrl":"https://doi.org/10.20533/jitst.2046.3723.2021.0088","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79735394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Behavioral Factors That Influence Employees to Comply With Information Security Policies","authors":"Golan Carmi, D. Bouhnik","doi":"10.20533/jitst.2046.3723.2021.0087","DOIUrl":"https://doi.org/10.20533/jitst.2046.3723.2021.0087","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79411083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Storage and Sharing of COVID-19 Data in Health Facilities using AES-Cryptography and Audio Steganography","authors":"G. Arome","doi":"10.20533/jitst.2046.3723.2021.0090","DOIUrl":"https://doi.org/10.20533/jitst.2046.3723.2021.0090","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"37 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75589358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Oversampling Techniques in Machine Learning Detection of Credit Card Fraud","authors":"C. Obimbo, Davleen Mand, Simarjeet Singh","doi":"10.20533/jitst.2046.3723.2021.0091","DOIUrl":"https://doi.org/10.20533/jitst.2046.3723.2021.0091","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83525139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}