Fusion: Practice and Applications

Journal DOI

https://doi.org/10.54216/FPA

Submit Your Paper

2692-4048ISSN (Online) 2770-0070ISSN (Print)

An efficient fusion method for Protecting Software-Defined Networks Against ARP Attacks: Analysis and Experimental Validation

Ehab R. Mohamed , Heba M. Mansour , Osama M. El-Komy

In this paper, to protect software-defined networks (SDN) from various ARP attacks, we implement a three-dimensional algorithm (TDA). The main objective of TDA is to limit the methods by which attackers can breach SDN privacy and to prevent the three main types of ARP attacks, such as ARP flooding, ARP spoofing, and ARP broadcasting. This work discusses the three different ARP attack types, which are broken down into five different scenarios, and how the proposed solution detects and mitigates each one. We simulated the five attack scenarios by creating five Python scripts utilizing the Scapy library. And then we applied an efficient TDA to restrict the five scenarios of ARP attacks more efficiently and faster than existing methods. TDA provides the Ryu controller with a modified module to detect and mitigate these types of attacks, using a three-dimensional secure channel to analyze incoming ARP packets, which works as a filter that analyzes and filters incoming ARP packets from malicious ones, and then giving the controller the choice to forward or drop the packet. To simulate our investigation and apply our proposed solution, we used a Mininet emulator. To evaluate TDA, we calculated the delay times, accuracy controller's throughput, bandwidth, and other metrics. The results that we showed after applying TDA 100 times on our test scenarios indicate that the accuracy is 99.9% for the three stages and that the detection and mitigation times are very short compared to the existing solutions, which are that the minimum detection time is only from 0.1ms to 3.6ms, and the minimum mitigation time is only from 0.3ms to 2.9ms. We evaluated our algorithm by other important metrics such as controller bandwidth, which ranged from 18 GB/sec to 17.7 GB/sec in the cases before and after the attack and 16.5GB/sec in the case of attack; controller throughput, which recorded 1.72GB/sec in the case under the attack and reached 2.11GB/sec in the case after defense; and CPU utilization, which recorded 30.4% during the attack and reduced to 0.3% after mitigation. These metrics proved that our algorithm achieved the highest efficiency compared to other work in this field.

Read More

Doi: https://doi.org/10.54216/FPA.120101

Vol. 12 Issue. 1 PP. 08-23, (2023)

Machine Learning Fusion and Data Analytics Models for Demand Forecasting in the Automotive Industry: A Comparative Study

Esraa Kamal , Amal F. Abdel-Gawad , Basem Ibraheem , Shereen Zaki

Demand forecasting is a crucial aspect of managing the supply chain, as it helps companies optimize inventory levels and minimize expenses related to inventory shortages. In recent years, machine learning (ML) algorithms have gained popularity for demand forecasting, as they can handle large and complex datasets and provide accurate predictions. Precise demand prediction for car brands is vital for companies to minimize costs and prevent inventory shortages. The demand for distributing cars is a critical component of inventory management. However, estimating demand for new car sales is difficult due to its continuous nature. To address this challenge, a study was conducted to train, test, and compare the performance of five machine learning algorithms (Random Forest, Multiple Linear Regression, k-Nearest Neighbors, Extreme Gradient Boosting, and Support Vector Machine) using a benchmark dataset. Among all the experiments, the Support Vector Machine algorithm achieved the highest accuracy score of 71.42%. Moreover, Multiple Linear Regression performed well, with an accuracy score of 66.66%. On the other hand, the Extreme Gradient Boosting algorithm had the lowest accuracy score of 42.85%. All experiments used a train-test split of 75/25.

Read More

Doi: https://doi.org/10.54216/FPA.120102

Vol. 12 Issue. 1 PP. 24-37, (2023)

Software Defined Network aided cluster key management system for secure fusion multicast communication in Internet of Vehicles

Antony Taurshia , Jaspher Willsie Kathrine , Venkatesan

Smart applications came into existence with technological advancements like Software Defined Networks (SDN), Cloud computing, Network Function Virtualization (NFV), and the Internet of Things (IoT). Internet of Vehicles (IoV) is a highly dynamic application with limited tolerance to latency since a small delay can lead to drastic disasters. For efficient network and vehicle management clusters are formed in IoV. Secure key management is unavoidable to secure communication between the vehicles in the cluster. In this article, a sustainable cluster key management approach is proposed to handle the dynamic and latency-sensitive nature of IoV. Security analysis proves that the proposed approach holds secrecy in group key management. The proposed approach reduces the communication complexity to a single broadcast for re-keying. The analysis proves that the computation and storage complexity is also minimal, hence proving that the scheme is sustainable with limited resource usage and efficient for usage in latency-sensitive IoV environments.

Read More

Doi: https://doi.org/10.54216/FPA.120103

Vol. 12 Issue. 1 PP. 38-52, (2023)

Blockchain-Based E-Voting System with Face Recognition

V. Sathya Preiya , V. D. Ambeth Kumar , R. Vijay , Vijay K. , N. Kirubakaran

Given the increasing importance of technology in meeting human needs, its utilization has become crucial. In contemporary democracies, where public trust in governments is declining and elections play a pivotal role, the widespread adoption of technology has led to new challenges. Elections hold significant importance as they determine the future leaders of countries or organizations. However, certain computerized voting systems have faced criticism for their lack of transparency. Establishing public trust in the government is a formidable task due to the lack of transparency and susceptibility to exploitation in existing voting procedures. Both traditional and current digital voting systems are ineffective due to their vulnerabilities. The main objective is to address issues in conventional and electronic voting systems, including errors and unfairness that may arise during the voting process. Integrating blockchain technology into the electoral process can ensure fair elections and reduce unfair practices. The computerized voting methods do not meet the necessary standards for widespread usage, and the physical voting systems also face numerous issues. This underscores the importance of finding a solution to protect the democratic principles of citizens. By offering a fast and secure voting method, this system has the potential to bring about a revolutionary change in the electoral process. It could lead to higher voter participation and more accurate election results. The proposed approach presents a framework for digital voting using blockchain technology, eliminating the need for physical polling locations. Our suggested design incorporates adaptable consensus algorithms to support a scalable blockchain. Smart contracts ensure secure interactions between users and the network during transaction execution. The security aspects of the blockchain-based voting mechanism have also been addressed, including the use of cryptographic hashes for transaction encryption and prevention of 51% attacks. Furthermore, blockchain technology has been utilized to establish transaction systems throughout the voting process. Performance studies of the proposed system demonstrate its feasibility for deployment in large populations.

Read More

Doi: https://doi.org/10.54216/FPA.120104

Vol. 12 Issue. 1 PP. 53-63, (2023)

An effective Decision making model through Fusion Optimization and risk associated with flash flood hazards: A case study Asyut, Egypt

Nabil M. AbdelAziz , Hassan H. Mohammed , Khalid A. Eldrandaly

One of the most dangerous natural disasters, which causes massive damage all over the world, is flash floods. Therefore, the assessment of flash floods disasters is considered increasingly urgent and important. The widely used techniques for studying and analyzing the causes and impact of natural hazards are multi-criteria techniques. Several researchers used traditional multi-criteria decision-making techniques in the estimation process of flash floods problems as the analytical hierarchy process, decision making trial and evaluation laboratory and analytic network process. The main disadvantage of these traditional models is the incapability of simulating and reflecting uncertain human thoughts. Since neutrosophic logic has a great ability for simulating human’s thoughts and increase the flexibility of expert's preferences in real world problems, we applied it in this study. There are different locations in Egypt that are at a serious risk of flooding, especially in Upper Egypt. Asyut has suffered from frequent flash floods, with some flood events that lead to mortality, damages, and economic losses in the last decades. The intensity of floods in Egypt varies from year to year, according to several climatic and hydrological variables. This study focuses on using a Neutrosophic Decision making trial and evaluation laboratory (N-DEMATEL) technique with remotely sensed data and geographical information system (GIS) for producing a flash floods hazard map. The N-DEMATEL technique is applied to determine the weights of various factors that related to flash flooding, including elevation, slope, topographic wetness index, distance from the stream, flow accumulation, aspect, flow direction, soil, land cover, watershed, curvature, drainage density , total population , population density and precipitation. The obtained weight of selected criteria used then to produce the flood hazard map (FHM) using a raster calculator tool in geographic information system.

Read More

Doi: https://doi.org/10.54216/FPA.120105

Vol. 12 Issue. 1 PP. 64-94, (2023)

Information Fusion Analysis for Evaluating Educational Equity

Byron Javier C. Lema , Iyo Alexis Cruz Piza , MarĂ­a Elena I. Miranda , Bekimbetova Gulnora