{"title":"Web-Based Botnet for Blocking Control Flow in Open-Source Medical Syringe Pump.","authors":"Wei Lu","doi":"10.1504/ijguc.2025.10070119","DOIUrl":"10.1504/ijguc.2025.10070119","url":null,"abstract":"<p><p>Integrating open-source medical systems, with advancements in 3D printing technology and microcomputer systems such as Arduino and Raspberry Pi, has revolutionized the healthcare industry. However, it has also exposed cybersecurity vulnerabilities in hospitals. This paper presents a web-based botnet as a proof-of-concept to demonstrate potential disruptions in the control flow of a syringe pump in an IoT medical network testbed. Our lightweight botnet stands out for its rapid deployment and minimal use of resources. We also provide a publicly available dataset from this botnet for cybersecurity research on open-source medical systems. Additionally, we developed a methodology for feature selection to detect botnet attacks. Our comparative study with various machine learning algorithms revealed the best strategy for detecting these attacks using network traffic data from benign and malicious environments. The results were impressive, with our feature selection technique achieving over 99% accuracy on the testing dataset, successfully identifying 63,380 out of 63,382 attack instances.</p>","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"16 2","pages":"162-172"},"PeriodicalIF":0.7,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12456968/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145138836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authentication and authorisation in service-oriented grid architecture","authors":"Arbër Beshiri, A. Mishev","doi":"10.1504/ijguc.2023.10058796","DOIUrl":"https://doi.org/10.1504/ijguc.2023.10058796","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"14 1","pages":"422-435"},"PeriodicalIF":0.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66888679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kwan-Wu Chin, Ahmad Aloqaily, S. Soh, Amitava Datta, Basima Elshqeirat
{"title":"On generating Pareto optimal set in bi-objective reliable network topology design","authors":"Kwan-Wu Chin, Ahmad Aloqaily, S. Soh, Amitava Datta, Basima Elshqeirat","doi":"10.1504/ijguc.2023.10057954","DOIUrl":"https://doi.org/10.1504/ijguc.2023.10057954","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66888596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jamilson Dantas, Carlos Melo, Paulo Maciel, Rubens Matos
{"title":"Cloud infrastructure planning: models considering an optimisation method, cost and performance requirements","authors":"Jamilson Dantas, Carlos Melo, Paulo Maciel, Rubens Matos","doi":"10.1504/ijguc.2023.132613","DOIUrl":"https://doi.org/10.1504/ijguc.2023.132613","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135828146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Layered management approach to cyber security of IoT solutions","authors":"Erdal Ozdoğan, Resul Das","doi":"10.1504/ijguc.2023.133442","DOIUrl":"https://doi.org/10.1504/ijguc.2023.133442","url":null,"abstract":"The Internet of Things consists of devices, each with its own vulnerabilities and interconnected by various technologies. This broad spectrum, a combination of old and new technologies, shows that there are many aspects to consider in ensuring IoT security. Besides the vulnerabilities inherited from pre-IoT technologies, there are a wide variety of IoT-specific vulnerabilities. The existence of large attack surfaces for cyber threat actors exposes IoT to a variety of attacks, from simple to complex. Developing defence strategies against this wide range of attacks is possible with a systematic approach. In this study, threats to IoT are examined from the perspective of IoT layered architecture, and an IoT Security Management Model is proposed as a comprehensive solution strategy. Also, based on the developed model, countermeasures related to IoT security have been proposed.","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135497480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SMGSAF: a secure multi-geocasting scheme for npportunistic Networks","authors":"Jagdeep Singh, S. K. Dhurandher","doi":"10.1504/ijguc.2023.10056149","DOIUrl":"https://doi.org/10.1504/ijguc.2023.10056149","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66888090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient data storage: adaptively changing chunk size in cloud computing storage systems","authors":"Chalabi Baya, Y. Slimani","doi":"10.1504/ijguc.2023.10057104","DOIUrl":"https://doi.org/10.1504/ijguc.2023.10057104","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"14 1","pages":"516-525"},"PeriodicalIF":0.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66888529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xin Tan, Chaoqi Wang, Mingwei Wang, Wenyuan Liu, Xianghui Wang
{"title":"Target imaging technology of wireless orbital communication radar Target imaging technology of wireless orbital communication radar","authors":"Xin Tan, Chaoqi Wang, Mingwei Wang, Wenyuan Liu, Xianghui Wang","doi":"10.1504/ijguc.2023.10059686","DOIUrl":"https://doi.org/10.1504/ijguc.2023.10059686","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136208863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing the 5G V2X reliability using turbo coding for short frames","authors":"Costas Chaikalis, Dimitros Kosmanos, Konstantinos E. Anagnostou, Ilias Savvas, Dimitros Bargiotas","doi":"10.1504/ijguc.2023.133412","DOIUrl":"https://doi.org/10.1504/ijguc.2023.133412","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135497205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}