Journal of Network and Systems Management最新文献

筛选
英文 中文
DT-ARO: Decision Tree-Based Artificial Rabbits Optimization to Mitigate IoT Botnet Exploitation DT-ARO:基于决策树的人工兔子优化技术缓解物联网僵尸网络攻击
IF 3.6 3区 计算机科学
Journal of Network and Systems Management Pub Date : 2023-12-07 DOI: 10.1007/s10922-023-09785-6
Mohammad Almseidin, Jamil Al-Sawwa, Mouhammd Alkasassbeh, Maen Alzubi, Khaled Alrfou
{"title":"DT-ARO: Decision Tree-Based Artificial Rabbits Optimization to Mitigate IoT Botnet Exploitation","authors":"Mohammad Almseidin, Jamil Al-Sawwa, Mouhammd Alkasassbeh, Maen Alzubi, Khaled Alrfou","doi":"10.1007/s10922-023-09785-6","DOIUrl":"https://doi.org/10.1007/s10922-023-09785-6","url":null,"abstract":"<p>The rapid growth of Artificial Intelligence (AI) algorithms has created the opportunity to solve complex problems such as Internet of Things (IoT) botnet attacks. The severity of IoT botnet attacks is a critical challenge for improving the smart IoT environment. Therefore, there is an urgent need to design and implement an efficient detection model to deal with various IoT bot attacks and simultaneously handle issues related to the massive feature space. This paper introduces a wrapper feature selection technique by adapting the Artificial Rabbit Optimization (ARO) algorithm and the Decision Tree (DT) algorithm to detect various types of IoT botnet attacks. During the design of the suggested DT-ARO model, the N-BaIoT datasets were used as a testbed environment. The feature space optimization step was carried out using the ARO algorithm to select only the high-priority features for detecting the IoT botnet attacks. The binary vector technique was used to distinguish the optimal features. The detection engine was performed using the DT algorithm. The conducted experiments have demonstrated the ability of the suggested DT-ARO model to detect various types of IoT botnet attacks, where the accuracy rate was 99.89%. Meanwhile, effectively reducing the feature’s space. In addition, the accomplished results were compared with the latest typical approaches. The DT-ARO model was found to be competitive with these methods and even outperformed them in reducing the feature space. </p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"268 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138565880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Path Towards Virtualized Wireless Communications: A Survey and Research Challenges 迈向虚拟化无线通信之路:调查与研究挑战
IF 3.6 3区 计算机科学
Journal of Network and Systems Management Pub Date : 2023-11-30 DOI: 10.1007/s10922-023-09788-3
Marco Silva, José Santos, Marília Curado
{"title":"The Path Towards Virtualized Wireless Communications: A Survey and Research Challenges","authors":"Marco Silva, José Santos, Marília Curado","doi":"10.1007/s10922-023-09788-3","DOIUrl":"https://doi.org/10.1007/s10922-023-09788-3","url":null,"abstract":"<p>To keep up with the increasing number of connected devices in people’s daily lives, it is necessary to develop intelligent mechanisms that perform the entire network management, interconnecting Wi-Fi, and the emerging beyond Fifth-Generation (5G) communications. Hence, it is essential to consider multiple usage scenarios, while managing end devices’ limitations. As a result, developing a system that allows network operators to link Wi-Fi services on their main networks becomes a critical issue. These include a new paradigm that tackles optimal and dynamic resource allocation techniques. Thus, to consider in a combined way, the applications requirements, the resources available, and the different tiers involved, mechanisms such as virtualization and slicing have emerged to handle the heterogeneous context of the next-generation wireless communications. Moreover, the allocation of Radio Access Network (RAN) resources needs to be addressed. For this purpose, Open-RAN has in mind an open environment, which relies on virtualized functions and is mostly vendor agnostic. This technology will enable high data rates while maintaining adequate Quality of Service (QoS) in wireless communications. This paper advances current literature, which mainly discusses these themes individually, by providing a comprehensive survey in Next Generation Wireless Communications, highlighting their integration with beyond 5G Communications. First, we introduce the Wi-Fi evolution and explain the main standards developed over the years. Second, we present the most recent Wi-Fi standards, Wi-Fi 6 and 7, compared with 5G and beyond. Lastly, we explain the concepts related to slicing, virtualization, RAN, Open-RAN and the open research challenges.\u0000</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"43 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138543677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposal and Evaluation of GPU Offloading Parts Reconfiguration During Applications Operations for Environment Adaptation 环境适应应用运行中GPU卸载部件重构的建议与评价
IF 3.6 3区 计算机科学
Journal of Network and Systems Management Pub Date : 2023-11-28 DOI: 10.1007/s10922-023-09789-2
Yoji Yamato
{"title":"Proposal and Evaluation of GPU Offloading Parts Reconfiguration During Applications Operations for Environment Adaptation","authors":"Yoji Yamato","doi":"10.1007/s10922-023-09789-2","DOIUrl":"https://doi.org/10.1007/s10922-023-09789-2","url":null,"abstract":"<p>In recent years, not only CPUs with few cores but also heterogeneous hardware such as GPUs, FPGAs, and multi-core CPUs are increasingly used in many applications. However, to fully utilize these, users need to have technical knowledge that covers hardware such as CUDA. To overcome this high technical barrier, we have proposed environment-adaptive software that enables high-performance operation by automatically converting application code written for normal CPUs by engineers in accordance with the deployed environment and by setting appropriate amounts of resources. So far, we have also verified the elemental technologies that automatically offload to GPU and FPGA before the start of operation. Until now, we only considered conversions and settings before the start of operation. In this paper, we verify that the logic is reconfigured in accordance with the usage characteristics during operation. Especially for GPU logic, there is no example of reconfiguration during operation, so the proposed method can be expected to have a great impact on clouds or similar businesses. We propose a GPU reconfiguration method during operation and find that the application running on the GPU is reconfigured to other offload loops or other offload applications in accordance with the current usage trends. Through a reconfiguration experiment, performance improvement and break time are measured, and the effectiveness of the method is demonstrated.\u0000</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"27 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138518567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Genetic Algorithm for Multi-hop VANET Clustering Based on Coalitional Game 基于联盟博弈的多跳VANET聚类遗传算法
IF 3.6 3区 计算机科学
Journal of Network and Systems Management Pub Date : 2023-11-23 DOI: 10.1007/s10922-023-09787-4
Siwapon Charoenchai, Peerapon Siripongwutikorn
{"title":"Genetic Algorithm for Multi-hop VANET Clustering Based on Coalitional Game","authors":"Siwapon Charoenchai, Peerapon Siripongwutikorn","doi":"10.1007/s10922-023-09787-4","DOIUrl":"https://doi.org/10.1007/s10922-023-09787-4","url":null,"abstract":"<p>Various applications of intelligent transport systems require road traffic data that can be collected from vehicles and sent over a vehicular ad hoc network (VANET). Due to rapid mobility and limited channel capacity in a VANET, where vehicles must compete to access the roadside units (RSUs) to report their data, clustering is used to create a group of vehicles to collect, aggregate, and transfer data to RSUs acting as sink nodes. Unlike prior works that mostly focus on cluster head selection for prolonging cluster lifetime or maximizing throughput, we applied the coalitional game model to create a multi-hop cluster with the largest possible coverage area for a given transmission delay time constraint to economize the number of RSUs. The coalitional game models the profit and cost of nodes as the utility, which is a weighted function of the coverage area, amount of cluster’s members, relative velocities, distances among nodes, and transmission delay toward the sink nodes. Due to the problem complexity, the genetic algorithm is developed to obtain the model solution. The simulation results reveal that the solution quickly converges within a few generations, where the most suitable structure attains the maximum summation utility from all nodes in the coalition. Additionally, the GA-based solution approach outperforms the brute-force approach in terms of the problem scale, and the coalitional game model yields higher coverage areas compared to those obtained from the non-cooperation model.\u0000</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"3 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138518560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Link State Estimator for VANETs Using Neural Networks 基于神经网络的vanet链路状态估计
IF 3.6 3区 计算机科学
Journal of Network and Systems Management Pub Date : 2023-11-23 DOI: 10.1007/s10922-023-09786-5
Hamida Ikhlef, Soumia Bourebia, Ali Melit
{"title":"Link State Estimator for VANETs Using Neural Networks","authors":"Hamida Ikhlef, Soumia Bourebia, Ali Melit","doi":"10.1007/s10922-023-09786-5","DOIUrl":"https://doi.org/10.1007/s10922-023-09786-5","url":null,"abstract":"<p>In Vehicular Ad-hoc NETworks (VANETs), it is important to consider the quality of the path used to forward data packets. Because of the fluctuating conditions of VANETs, stringent requirements have been imposed on routing protocols and thus complicating the entire process of packet delivery. To determine which path is the best, a routing protocol relies on a path assessment mechanism. In this paper, the problem of link quality estimation in VANET networks is addressed. Based on the information gathered from the packet decoding errors at the physical layer, a novel link quality estimator is proposed. The proposed link quality estimator named LSENN for Link State estimation based on Neural Networks, has been tested under realistic physical layer and mobility models for reactivity, accuracy and stability evaluation.\u0000</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"181 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138518566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites 基于cnn的SIA截图方法视觉识别钓鱼网站
IF 3.6 3区 计算机科学
Journal of Network and Systems Management Pub Date : 2023-11-21 DOI: 10.1007/s10922-023-09784-7
Dong-Jie Liu, Jong-Hyouk Lee
{"title":"A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites","authors":"Dong-Jie Liu, Jong-Hyouk Lee","doi":"10.1007/s10922-023-09784-7","DOIUrl":"https://doi.org/10.1007/s10922-023-09784-7","url":null,"abstract":"<p>Phishing evolves rapidly nowadays, causing much damage to finance, brand reputation, and privacy. Various phishing detection methods have been proposed along with the rise of phishing, but there are still research issues. Phishing websites mainly steal users’ information through visual deception and deep learning methods have been proved very effective in computer vision applications but there is a lack in the research on visual analysis using deep learning algorithms. Moreover, most research use balanced datasets, which is not the case in a real Web environment. Therefore, this paper proposes a security indicator area (SIA) which contains most security indicators that are designed to help users identify phishing sites. The proposed method then takes screenshots of SIA and uses a convolutional neural network (CNN) as a classifier. To prove the efficiency of the proposed method, this paper carries out several comparative experiments on an unbalanced dataset with much fewer phishing sites, which increases detection difficulty but also makes the detection closer to reality. The results show that the proposed method achieves the highest F1-score among the compared methods, while providing advantages on detection efficiency and data expansibility in phishing detection.\u0000</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"3 ","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138518568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Light Reflection-Random Walk for Smart Sensors Relocation 一种用于智能传感器重新定位的光反射随机漫步方法
3区 计算机科学
Journal of Network and Systems Management Pub Date : 2023-11-08 DOI: 10.1007/s10922-023-09780-x
Nadia Belguerche, Samir Brahim Belhaouari, Noureddine Lasla, Mahfoud Benchaïba
{"title":"A Novel Light Reflection-Random Walk for Smart Sensors Relocation","authors":"Nadia Belguerche, Samir Brahim Belhaouari, Noureddine Lasla, Mahfoud Benchaïba","doi":"10.1007/s10922-023-09780-x","DOIUrl":"https://doi.org/10.1007/s10922-023-09780-x","url":null,"abstract":"","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"101 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135342232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices 基于p4的数据平面设备机器学习模型对抗性攻击缓解
3区 计算机科学
Journal of Network and Systems Management Pub Date : 2023-11-01 DOI: 10.1007/s10922-023-09777-6
Sankepally Sainath Reddy, Kosaraju Nishoak, J. L. Shreya, Yennam Vishwambhar Reddy, U. Venkanna
{"title":"A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices","authors":"Sankepally Sainath Reddy, Kosaraju Nishoak, J. L. Shreya, Yennam Vishwambhar Reddy, U. Venkanna","doi":"10.1007/s10922-023-09777-6","DOIUrl":"https://doi.org/10.1007/s10922-023-09777-6","url":null,"abstract":"","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"194 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135321619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BoostSec: Adaptive Attack Detection for Vehicular Networks BoostSec:车辆网络自适应攻击检测
3区 计算机科学
Journal of Network and Systems Management Pub Date : 2023-11-01 DOI: 10.1007/s10922-023-09781-w
Marwa A. Elsayed, Nur Zincir-Heywood
{"title":"BoostSec: Adaptive Attack Detection for Vehicular Networks","authors":"Marwa A. Elsayed, Nur Zincir-Heywood","doi":"10.1007/s10922-023-09781-w","DOIUrl":"https://doi.org/10.1007/s10922-023-09781-w","url":null,"abstract":"","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"253 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135320565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Group Teaching Optimization-Based Approach for Energy and QoS-Aware Internet of Things Services Composition 基于群组教学优化的能源与qos感知物联网服务组合方法
3区 计算机科学
Journal of Network and Systems Management Pub Date : 2023-10-28 DOI: 10.1007/s10922-023-09779-4
Salma Hameche, Mohamed Essaid Khanouche, Abdelghani Chibani, Abdelkamel Tari
{"title":"A Group Teaching Optimization-Based Approach for Energy and QoS-Aware Internet of Things Services Composition","authors":"Salma Hameche, Mohamed Essaid Khanouche, Abdelghani Chibani, Abdelkamel Tari","doi":"10.1007/s10922-023-09779-4","DOIUrl":"https://doi.org/10.1007/s10922-023-09779-4","url":null,"abstract":"","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"4 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136160011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信