ASPG Menu
search

American Scientific Publishing Group

verified Journal

Journal of Cybersecurity and Information Management

ISSN
Online: 2690-6775 Print: 2769-7851
Frequency

Continuous publication

Publication Model

Open access · Articles freely available online · APC applies after acceptance

Journal of Cybersecurity and Information Management

Volume 14 / Issue 2 ( 22 Articles)

Full Length Article DOI: https://doi.org/10.54216/JCIM.140227

Systematic Analysis of threats, Machine Learning solutions and Challenges for Securing IoT environment

The Internet of Things (IoT) has revolutionized our daily lives, impacting everything from healthcare to transportation and even home automation and industrial control systems. However, as the number of connected devices continues to rise, so do the security risks. In this review, we explore the different types of attacks that target various layers of IoT infrastructure. To counter these threats, researchers have proposed using machine learning (ML) and deep learning (DL) techniques for detecting different types of attacks. However, our examination of existing literature reveals that the effectiveness of these techniques can vary greatly depending on factors like the dataset used, the features considered, and the evaluation methods employed. Finally, we delve into the current challenges facing Intrusion Detection Systems (IDS) in their mission to protect IoT environments from evolving threats.
Bharti Yadav, Deepak Dasaratha Rao, Yasaswini Mandiga et al.
visibility 3494
download 3882
Full Length Article DOI: https://doi.org/10.54216/JCIM.140226

An Efficient Algorithm for Stock Market Prediction Using Attention Mechanism

Forecasting the stock market is a significant challenge in the financial industry due to its time series' complicated, noisy, chaotic, dynamic, volatile, and non-parametric nature. Nevertheless, due to computer advancements, an intelligent model can assist investors and expert analysts mitigate the risk associated with their investments. In recent years, substantial research has been conducted on deep learning models. Many studies have investigated using these techniques to anticipate stock values by analyzing historical data and technical indications. However, since the goal is to create predictions for the financial market, validating the model using profitability indicators and model performance is crucial. This article incorporates the attention mechanism model, incorporating attention from both feature and time perspectives. Utilize artificial neural networks. This approach addresses issues in time series prediction. The issue is the varying degrees of influence that many input features have on the target sequence. To tackle this, the method utilizes a feature attention mechanism to obtain the weights of distinct input features. An enhanced feature association relationship is achieved, whereas the data before and following the sequence exhibit a significant time correlation. An attention technique is employed to address this issue, allowing for the acquisition of weights at various time intervals to enhance robustness and temporal dependence. The system is applied to the three global SMs (TESLA, S&P500, and NASDAQ) datasets, the best enhancement results are 99% in Acc, and the better results improvement to minimize error in MSE, MAPE, and RMSE are 0.004, 0.004 and 0.01 respectively.
Zena Kreem Minsoor, Ali Yakoob Al-Sultan
visibility 3153
download 3834
Full Length Article DOI: https://doi.org/10.54216/JCIM.140225

Enhanced Face Detection in Videos Based on Integrating Spatial Features (LBP, CS-LBP) with CNN Technique

Face detection is a crucial aspect of computer vision and image processing, in order to enable the automatic detection and identification of human faces in video streams, face detection is an essential component of computer vision and image processing. Applications for facial recognition, video analytics, security systems, and surveillance all depend on it. Face identification techniques face many obstacles and issues, such as positional fluctuations, illumination changes, resolution and scale issues, facial emotions, and cosmetics. Robust algorithms are required for efficient face detection. This field looks at the feature extraction process using a variety of techniques. These consist of the center symmetric local binary patterns (CS_LBP) approach and the local binary patterns (LBP) method. The YouTube Face database provided the video frames that we used for our study. In order to train the convolutional neural network (CNN) to detect human faces in the video and draw a bounding box around them. The experimental results of the suggested approaches show that. The accuracy rate was 94% higher with the LBP techniques. However, the CS_LBP technique showed the best level of accuracy in both face detection and face rectangle recognition, with an accuracy rate of 95%.
Faqeda Hassen Kareem, Mohammed Abdullah Naser
visibility 2635
download 3736
Full Length Article DOI: https://doi.org/10.54216/JCIM.140224

Credit Card Fraud Detection Model Based on Correlation Feature Selection

Credit card fraud is a widespread cybercrime that threatens financial security. Effective cybersecurity measures are essential to mitigate these risks. Machine learning has shown promising results in detecting credit card fraud by analyzing transaction data and identifying patterns of suspicious behavior. Feature selection is crucial in machine learning because it simplifies the model, improves its performance, and prevents overfitting. This research introduces a machine learning model designed for credit card fraud detection. The model makes use of three types of correlations. Pearson, Spearman, and Kendall, to identify features and enhance the fraud detection process. Testing on datasets yielded impressive results achieving category accuracies of 99.95% and 99.58% surpassing alternative approaches. Also, the results showed that Kendall correlation is the best among the three types of correlation in selecting attributes in all approved datasets.
Ahmad Salim, Salah N. Mjeat, Daniah Abul Qahar Shakir et al.
visibility 3556
download 5165
Full Length Article DOI: https://doi.org/10.54216/JCIM.140223

Enhanced Credit Card Fraud Detection Using Deep Learning Techniques

Credit card fraud is a huge challenge in the financial sector, causing huge losses every year. The problem is exacerbated by increased marketing and sophisticated fraudulent activities. This study addresses the important issue of accurate real-time detection of fraudulent transactions to minimize financial losses and enhance transactional security. The main objective of this study is to develop a comprehensive fraud detection algorithm using deep learning techniques, specially designed to address the complexity and volume of modern credit card transactions. Key contributions of this research include the presentation of a new deep learning algorithm optimized for credit card fraud detection, the integration of feature engineering techniques to improve the performance of the model, and a potential scalable solution analysis in real-time Significant improvement in proven rates. The results show that the proposed deep learning-based model achieves higher accuracy and lower false positive rate, giving financial institutions a significant advantage in protecting against fraudulent activities about the character. This study highlights the power of deep learning in reforming fraud detection systems, and lays the foundation for future developments in this important area.
Ola Imran Obaid, Ali Yakoob Al-Sultan
visibility 3710
download 5098
Full Length Article DOI: https://doi.org/10.54216/JCIM.140222

A Hybrid Deep Learning Model for Securing Smart City Networks Against Flooding Attack

Due to the increasing digitization of city processes, there has been a significant shift in how cities are governed and how people make their living. However, several types of attacks could target smart cities, and Flooding Attacks (FA) are the most dangerous type. It is also a major issue for many people and programs using the Internet nowadays. Security in smart cities refers to preventative measures necessary to shield the city and its residents from direct or indirect harm by attackers who try to crash the system and deny legitimate users the use of the services. Smart city security, in contrast to standard security mechanisms, necessitates new and creative approaches to protecting the systems and applications while considering characteristics like resource limitations, distributed architecture nature, and geographic distribution. Smart cities are vulnerable to several particular issues, including faulty communication, insufficient data, and privilege protection. Therefore, a hybrid CRNN model that consists of Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN) algorithms is employed for the detection of Flood Attacks based on the classification of traffic data. Subsequently, the performance of the CRNN is tested and evaluated using the CIC-Bell-DNS-EXF-2021 dataset. The obtained accuracy results of the proposed CRNN model achieved in FA detection is 99.2%.
Bashar Ahmed Khalaf, Siti Hajar Othman, Shukor Abd Razak et al.
visibility 3450
download 4058
Full Length Article DOI: https://doi.org/10.54216/JCIM.140221

Enhanced Visual Cryptographic Schemes with Essential Access Structures and Pixel-Wise Operations

By splitting a picture into many parts, which, when reassembled, disclose the original image without requiring complicated math, visual cryptography is a strong method for protecting visual information. Problems with pixel enlargement, decreased picture quality, and restricted access structures are common with traditional visual cryptography techniques. Our proposed improved visual cryptography approach incorporates pixel-wise operations and critical access structures to solve these challenges and increase flexibility, picture quality, and security. To reconstruct a picture, our technique calls for building visual cryptographic shares based on critical access structures that specify the exact combinations of shares needed. In order to maintain the image's resolution and reduce pixel expansion, we use pixel-wise processes. By improving the peak signal-to-noise ratio (PSNR) by up to 20% compared to conventional approaches, experimental data show that our strategy greatly improves picture quality. In addition, the suggested approach guarantees that individual shares do not disclose any information on the original picture, thereby maintaining high security requirements. Finally, it is clear that the enhanced visual cryptographic system is well-suited for a wide range of uses in safe communications and data security due to its strong solution for secure picture sharing, increased picture quality, and adjustable access control.
M. Revathi, Devi .D, R. Menaha et al.
visibility 2954
download 4078
Full Length Article DOI: https://doi.org/10.54216/JCIM.140216

Automated Brain Tumor Detection and Classification in MRI Images: A Hybrid Image Processing Techniques

Due to the complex structure of brain images, accurately detecting and segmenting brain tumors with Magnetic Resonance Imaging (MRI) is a difficult process. This paper suggests an automated brain tumor identification and segmentation approach employing hybrid salient segmentation with K-Means clustering and hybrid CLEACH-median filter algorithm on MRI images. The proposed method enhances the contrast and detail of MRI images using a hybrid CLEACH-median filter algorithm, and segments the most important features of the images using a hybrid salient segmentation method with K-Means clustering. The proposed method includes a stages classification step to determine the stage of the brain tumor. The findings show that the suggested approach outperformed existing methods in terms of efficiency and accuracy for both detecting and segmenting brain tumors. The suggested technique can be a useful tool for automating the detection and segmentation of brain tumors, which will help radiologists and physicians make quicker and more accurate diagnosis.
N. Senthilkumaran
visibility 2835
download 3289
Full Length Article DOI: https://doi.org/10.54216/JCIM.140215

A Machine Learning Approach for Automated Detection and Classification of Cracks in Ancient Monuments using Image Processing Techniques

Stone monuments stand as enduring testaments to human history and cultural heritage, yet they are susceptible to deterioration over time. In this paper, we propose a comprehensive approach for the automated detection and classification of cracks in ancient monuments, integrating machine learning and advanced image processing techniques. Our method addresses the pressing need for efficient and objective assessment of structural integrity in these invaluable artifacts. The proposed algorithm begins with preprocessing steps, including image enhancement using adaptive histogram equalization to improve crack visibility. Subsequently, feature extraction techniques such as Grey Level Co-occurrence Matrix (GLCM) and Local Binary Pattern (LBP) are applied to capture essential characteristics of crack patterns. Central to our approach are the Back Propagation Neural Network (BPNN) and Improved Support Vector Machine (ISVM) classifiers, which are trained on the extracted features to detect and classify cracks with high accuracy. The BPNN learns complex relationships between input features and crack types, while the ISVM leverages a margin-based approach for robust classification. Through extensive experimentation on a diverse dataset of ancient monuments, we demonstrate the effectiveness of our approach in accurately identifying and categorizing cracks. The proposed method offers a scalable and objective solution for monitoring the structural health of ancient monuments, contributing to proactive conservation efforts and the preservation of cultural heritage.
Ramani Perumal, Subbiah Bharathi Venkatachalam
visibility 3286
download 6192
Full Length Article DOI: https://doi.org/10.54216/JCIM.140214

Trustworthy-Based Authentication Model with Intrusion Detection for IoT-Enabled Networks with Deep Learning Algorithm

In the burgeoning field of the Internet of Things (IoT), ensuring secure and trustworthy communication between devices is paramount. This paper proposes a novel Trustworthy-Based Authentication Model (TBAM) integrated with Intrusion Detection Systems (IDS) leveraging deep learning algorithms to secure IoT-enabled networks. The proposed model addresses the dual challenges of authenticating legitimate devices and detecting malicious intrusions. Specifically, we employ a Convolutional Neural Network (CNN) to analyse network traffic patterns for intrusion detection, leveraging its prowess in feature extraction and classification. Additionally, a Long Short-Term Memory (LSTM) network is utilized for continuous monitoring and anomaly detection, capturing temporal dependencies in data flows that are indicative of potential security threats. The authentication mechanism integrates a trust evaluation system that assigns trust scores to devices based on their behaviour, enhancing the model's capability to distinguish between trusted and malicious entities. Our extensive experiments on real-world IoT datasets demonstrate that the TBAM significantly outperforms traditional security models in terms of detection accuracy, false-positive rate, and computational efficiency. Specifically, our model achieves a detection accuracy of 98.7%, a false-positive rate of 1.2%, and a processing time reduction of 30% compared to baseline models. This work contributes a robust, scalable, and efficient solution to the pressing security concerns in IoT networks, paving the way for more secure and reliable IoT applications.
M. Rajendiran, Jayanthi .E, Suganthi .R et al.
visibility 2634
download 3363
Full Length Article DOI: https://doi.org/10.54216/JCIM.140213

Integrating Quantum Computing and NLP for Advanced Cyber Threat Detection

The exponential growth of digital data and the increasing sophistication of cyber threats demand more advanced methods for threat analysis. This paper explores the integration of quantum computing and natural language processing (NLP) to enhance cyber threat analysis. Traditional computing methods struggle to keep up with the scale and complexity of modern cyber threats, but quantum computing offers a promising avenue for accelerated data processing, while NLP provides sophisticated tools for interpreting and understanding human language, crucial for analysing threat intelligence. Our proposed framework leverages quantum algorithms for rapid anomaly detection and advanced NLP techniques for precise threat identification and analysis. The methodology includes data collection from diverse sources, pre-processing for normalization, quantum-assisted data processing using Grover's search and Quantum Approximate Optimization Algorithm (QAOA), NLP analysis with transformers and BERT-based models, and integration of findings to build comprehensive threat profiles. Experimental results demonstrate significant improvements: quantum algorithms reduced data processing time by up to 50%, NLP models achieved 92% accuracy in threat identification, and the false positive rate was reduced by 30%. These findings indicate a promising direction for next-generation cybersecurity solutions, enabling more proactive and efficient threat mitigation. Future work will focus on refining quantum algorithms, enhancing NLP models, and expanding the framework for real-time threat detection capabilities.
P. Ramya, R. Anitha, J. Rajalakshmi et al.
visibility 3573
download 8251
Full Length Article DOI: https://doi.org/10.54216/JCIM.140212

Optimized Group-Centric Data Routing in Heterogeneous Wireless Sensor Networks for Enhanced Energy Efficiency

Wireless Sensor Networks (WSNs) are increasingly being utilized in environments where human presence is limited or dangerous. The main goal is to enhance the data processing capabilities of these components to extend the overall lifespan of the design. Researchers have explored conventional energy-saving methods to address the energy constraints of sensor nodes. However, it became clear that traditional routing methods, specifically those based on packet grouping, were inadequate. The proposed system, known as Optimized Group-Centric Data Routing (OGC-DR), introduces an efficient method of data routing by utilizing the concept of grouping nodal points. This approach enhances data routing management by differentiating between routing within a nodal group and routing between adjacent nodal groups. Group Heading Nodes (GHN) are assigned to each group of sensory nodes according to fitness criteria. The implementation of a tree-based routing structure improves data routing by creating a "meeting-zone" and strategically selecting intermediary nodes between the source and destination node. To improve data privacy, a sender and receiver engage in an asymmetric secret-key exchange at nodal points. Data is then directed to its ultimate destination via predetermined intermediary nodes and Group Heading Nodes. Simulations of the proposed method indicate several advantages, such as lower end-to-end delays, reduced energy consumption, higher active node count, and enhanced packet delivery rates. Furthermore, it improves data privacy for all communication within the sensory architecture.
P. Muthusamy, A. Rajan, R. Praveena et al.
visibility 2735
download 3318
Full Length Article DOI: https://doi.org/10.54216/JCIM.140211

Advanced Cyber Attack Detection Using Generative Adversarial Networks and NLP

A key difficulty in the ever-changing cybersecurity scene is the detection of sophisticated cyber-attacks. Because new threats are so much more sophisticated and difficult to detect, traditional tactics typically fail. A new technique to improving cyber-attack detection skills is explored in this study. It uses Generative Adversarial Networks (GANs) and Natural Language Processing (NLP). Using GANs' realistic data generation capabilities, possible attack paths are simulated, creating a strong dataset for training detection systems. At the same time, natural language processing (NLP) methods are used to decipher the mountain of textual information produced by cyberspace, including incident reports, communication patterns, and logs.  Our approach is based on building a fake dataset using GANs that mimics the features of advanced cyberattacks. A detection model is then trained using this dataset. Simultaneously, we improve the detection model's capacity to spot intricate and nuanced assault patterns by processing and analysing text-based data using natural language processing approaches. We use a benchmark cybersecurity dataset to test the integrated method. The experimental findings show that our GAN-NLP based detection system outperforms existing systems, which have an average accuracy of 85.3%, by a wide margin. It achieves a recall of 93.2%, precision of 92.5%, and accuracy of 94.7%. These findings prove that GANs and NLP work well together to identify complex cyberattacks. Finally, GANs and NLP together provide a potent instrument for better cyber-attack detection. A scalable solution that can adapt to the ever-changing nature of cyber threats is offered by this integrated approach, which also increases detection accuracy and efficiency. Improving the models and investigating their use in a real-world cybersecurity setting will be the primary goals of future research.
P. Ramya, Himagiri Chandra Guntupalli
visibility 3629
download 4704
Full Length Article DOI: https://doi.org/10.54216/JCIM.140210

Fuzzy Sampling Strategy Based on IPD

If a production process modification is implemented with the intention of enhancing product quality, IPD models a suitable probability distribution for the number of sample defects. If a manufacturing process intervention is done with the purpose of increasing product quality, IPD models a suitable probability distribution for the sample's total number of defects. When the production process with the interference parameter is considered, fuzzy sampling plans based on IPD are found to be more effective than the current strategy. The Intervened Poisson distribution is used to develop single sampling strategy for such lots when there is ambiguity regarding the percentage of defective items. With fuzzy probability, the plan's operating characteristic curve is obtained. The mean of outgoing quality is derived using fuzzy parameters.  
V. Jemmy Joyce, K. Rebbeca Jebaseeli Edna, Evanzlin P. et al.
visibility 2965
download 3361
Full Length Article DOI: https://doi.org/10.54216/JCIM.140209

Integrating Novel Mechanisms for Threat Detection in Enhanced Data Classification using Ant Colony Optimization with Recurrent Neural Network

In new technologies like fog computing, edge computing, cloud computing, and the Internet of Things (IoT), cybersecurity concerns and cyber-attacks have surged. The demand for better threat detection and prevention systems has increased due to the present global uptick in phishing and computer network attacks. In order to identify irregularities and attacks on the network, which have increased in scale and prevalence, threat identification is essential. However, the community is forced to investigate and create novel threat detection approaches that are capable of detecting threats using anomalies due to the increase in network threats, the growth of new methods of attack and computations, and the requirement to ensure security measures. A novel mechanism is employed to identify threats in a data based on optimized deep learning. The main aim of this paper is the usage of data classification system based on Deep Learning (DL). The proposed mechanism employed the TCP (Transmission Control Protocol) communication protocol to extract data from loud IoT (Internet of Things) networks for the purpose of threat detection. To perform feature extraction an Ant Colony Optimization (ACO) is utilised, through Recurrent Neural Network (RNN), the attacks in data are classified and detected. Additionally, the suggested approach has been evaluated and trained using the BOUN DDoS contemporary dataset, which comprises a variety of attack types and allows for the effectiveness of the framework to be determined to compare it to previous approaches. The Findings indicate that the suggested approach achieved higher accuracy in DDoS attack identification in comparison with Traditional deep learning methods. The existing method detects the generic attack with lower efficiency however; the proposed mechanism achieves better accuracy in both the detection of the DDoS attack and the detection of regular traffic.  
Vivek alias M. Chidambaram, Karthik Painganadu Chandrasekaran
visibility 2916
download 3592