In this research, we investigate sophisticated methods for Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), leveraging AI-based feature optimization and diverse machine learning strategies to bolster network intrusion detection and prevention. The study primarily utilizes the NSL-KDD dataset, an enhanced version of the KDD Cup 1999 dataset, chosen for its realistic portrayal of various attack types and for addressing the shortcomings of the original dataset. The methodology includes AI-based feature optimization using Particle Swarm Optimization and Genetic Algorithm, focusing on maximizing information gain and entropy. This is integrated with the use of Random Forest (RF) to reduce class overlapping, further enhanced by boosting techniques. Grey Wolves Optimization (GWO) alongside Random Forest. This innovative approach, inspired by grey wolf hunting strategies, is employed for classification tasks on the NSL-KDD dataset. The performance metrics for each intrusion class are meticulously evaluated, revealing that the GWO-RF combination achieves an accuracy of 0.94, precision of 0.95, recall of 0.93, and an F1 score of 0.94.
Read MoreDoi: https://doi.org/10.54216/JCIM.160101
Vol. 16 Issue. 1 PP. 01-14, (2025)
A firewall is one of the devices that supports network security, especially at the organizational level. A Firewall's effectiveness in supporting network security is highly dependent on the capabilities and abilities of the Network Administrator. Unfortunately, the high complexity of creating rules and the process of configuring Firewall rules carried out statically by the Network Administrator weakens the effectiveness of the Firewall, and it cannot adapt to increasingly dynamic network pattern changes. Machine Learning is one of the potentials that can be used so that the Firewall can work adaptively. Adaptive Firewall configuration in recognizing various attacks in the network will undoubtedly increase the effectiveness of the Firewall in ensuring network security. The success of the machine learning model performance cannot be separated from the dataset used during the learning process. The dataset used in learning often has a large dimension, but various noises and attributes are irrelevant in representing one class of data. Therefore, it is necessary to support the feature selection technique, which will show the presence of relevant characteristics in the dataset and maximize the machine learning model's performance. This study will be conducted on adding feature selection techniques to develop machine learning models on the Benchmark dataset related to network security. Various popular feature selection techniques will be evaluated, and their performance will be compared based on scenarios between feature selection techniques or scenarios that only use a single classification.
Read MoreDoi: https://doi.org/10.54216/JCIM.160102
Vol. 16 Issue. 1 PP. 15-24, (2025)
Numerous criteria are in place for social network applications. They require identification of network's core nodes. Traditional centrality measurements focus on specific node's direct connections or reachability. Often this disregards inherent ambiguity and complexity in real-world social networks. To address these constraints, we have introduced new method called Node Pack Fuzzy Information Centrality based on Pythagorean Neutrosophic Fuzzy Theory. Three essential values truth, falsity and indeterminacy have been added to this approach. This new approach provides a thorough depiction of social networks and it also offers a more sophisticated comprehension of connections between nodes. Complex and ambiguous interactions between entities can be effectively expressed using Pythagorean Neutrosophic values. Unlike traditional values, Pythagorean Neutrosophic values consider several uncertainty dimensions; this is a major improvement over traditional fuzzy value. Our approach handles relational complexity well and it includes self-weight for every node too. It represents each node's unique value, significance, or impact on the network. The network assessment is now more precise and contextual so we can assess centrality with greater precision. We applied this approach to a small academic network called university faculty/researchers. The application of Node Pack Fuzzy Information Centrality yielded promising results. It can enhance various activities associated with social network analysis. It can also offer valuable insights into the network architecture.
Read MoreDoi: https://doi.org/10.54216/JCIM.160103
Vol. 16 Issue. 1 PP. 25-37, (2025)
The Rivest–Shamir–Adleman (RSA) cryptosystem is one of the most prevalently utilized public-key cryptographic systems in current practice. Prior investigations into vulnerabilities of this cryptosystem have concentrated on diminishing the complexity associated with the integer factorization challenge, which is integral to the RSA modulus, expressed as 𝑁=𝑝𝑞. Possessing partial knowledge about the least significant digits (LSDs) of both p and q is a common assumption attacker’s advantage to enable the polynomial-time factorization of N, ultimately undermining the security of RSA. This paper presents a novel heuristic algorithm predicated on the Constraint Satisfaction Problem (CSP) principles, which estimates k-LSD pairs of the RSA prime factors, and . The proposed Generate and Test (GT) and Backtracking with Heuristic Variable Ordering (BHVO) solver guarantees polynomial-time factorization of known bits by iteratively refining candidate pairs and eliminating invalid combinations through effective constraint propagation. The proposed approach obviates the requirement for specialized hardware for side-channel attacks to reveal a portion of and . In our results, we have successfully estimated up to 5-LSDs of and with a reduced number of iterations and factored 2048 bits, N based on the known 4-LSDs of the prime in polynomial time. Our research lays the groundwork for factorization algorithms that require partial knowledge of the prime factors. We have highlighted the possible vulnerabilities linked to existing RSA key generation techniques. These may make RSA moduli susceptible to the attacks discussed in this study and proposed countermeasures to ensure secure prime generation.
Read MoreDoi: https://doi.org/10.54216/JCIM.160104
Vol. 16 Issue. 1 PP. 38-52, (2025)
In recent years, most of the current intrusion detection methods run for critical information infrastructure are tested for IDS datasets, but does not provide desired protection against emerging cyber- threats. Most machine and deep learning-based intrusion detection methods are inefficient on networks due to their high imbalanced or noisy IDS datasets. Therefore, in this paper, our proposed work implements a comprehensive framework, using multiple models of machine learning and deep learning by taking advantage of advanced feature engineering approaches. Our research explores the impacts of a variety of feature engineering approaches on dimensionality reduction methods used to train and test model performance with execution time taken on the CICIDS2017 dataset to reduce the time complexity and enhance performance to detect intrusion by experiment and leveraging feature engineering techniques like PCA (Principal Component Analysis), LDA (Linear Discriminant Analysis), t_SNE (t-Distributed Stochastic Neighbor Embedding), and Autoencoders. This framework also resolves the class imbalance issues by using SMOTE (Synthetic Minority Oversampling Technique), generates synthetic samples of those classes, which have a very low number of samples to balance the class for a better model performance. Our comparative analysis is performed on metrics like accuracy, training time and memory usage for machine learning models like Gradient Boosting, Logistic Regression, XGBoost and deep learning models. DL with LDA feature engineering approach achieved the highest test accuracy of 95.99% and Gradient Boosting shows strong performance by attaining a high-test accuracy of 90.8%. Illustrated DL model had higher memory usage, but LR and XG- Boost models performed computationally efficient. Further, it is observed that LDA performed better with ML and DL models in comparison to other feature engineering techniques to enhance the intrusion detection efficiency.
Read MoreDoi: https://doi.org/10.54216/JCIM.160105
Vol. 16 Issue. 1 PP. 53-67, (2025)
This observe investigates the reasons and effects of cybersecurity way of life in IT agencies. Given the developing threats to cybersecurity and the essential role that organizational lifestyle plays in decreasing these risks, it's miles essential to realise the connection that exists among policy elements, employee conduct, and cyber security overall performance. By concentrating at the connections between distinct factors impacting cybersecurity culture and there have an effect on the efficacy of cyber security measures, the examine fills in gaps in empirical studies. This take a look act’s principal purpose is to behaviour an empirical investigation into the methods that many sides of cyber security culture, along with policy concerns, employee behaviour, and cyber security attention, have an effect on how properly cyber security measures work in IT companies. The studies in particular examines 3 hypotheses: (1) that coverage factors positively correlate with usual effectiveness; (2) that cyber security attention and engagement in preventive measures are predictively correlated; and (three) that behavioural worries are undoubtedly correlated with the implementation of powerful cyber security measures. Data had been collected the usage of a pass-sectional survey the use of a quantitative studies method. A stratified random pattern strategy became used inside the studies to select 100 IT employees from special corporations. A systematic questionnaire overlaying coverage variables, behavioural worries, cyber security recognition, preventative measures, and the perceived efficacy of cyber security strategies become used to collect information. The conclusions of the primary records had been in addition supported and given that means with the aid of secondary information taken from organizational reviews and already published literature. An enormous wonderful connection was discovered in the research between coverage variables and cyber security measures' efficacy, suggesting that robust regulations enhance cyber security overall performance as a whole. It has been proven that employee participation in preventative actions is extensively anticipated by cyber security recognition. The adoption of successful cyber security tactics turned into strongly correlated with behavioural issues. Aside from declaring regions where cyber security lifestyle needs to be stepped forward, the research additionally found gaps in preventative measures' efficacy. The study emphasizes how crucial it is to have clear policy guidelines and raise awareness of cyber security issues in order to encourage efficient cyber security practices in IT companies. The results provide insightful information on the dynamics of cyber security culture and offer doable recommendations for improving cyber security procedures and guidelines. Organizations may enhance their cyber security frameworks and strengthen their Defences against emerging threats by filling up the holes found in the report.
Read MoreDoi: https://doi.org/10.54216/JCIM.160106
Vol. 16 Issue. 1 PP. 68-85, (2025)
The model mentioned in the study introduces a new Puzzle Optimization Algorithm-Based Fault Tolerant Scheduling (POAB-FTS) model specifically designed for the cloud computing setting. This pinpoints the significant challenge of achieving reliability, availability, and performance in resource scheduling in the context of failure cases, which is addressed by this novel technique. The POAB-FTS methodology integrates optimization using a game theory approach to perform actions that reduce execution time and failure probability while using a fitness function to provide better decision-making. This work entails an assessment of the main reasons behind task and hardware failures such as lack of resources, hardware defects, and suboptimal implementation. The model covers both active and passive fault tolerance approaches to workload balancing, migration before failure, and migration after failure points. Cooking schedules derived from the POAB-FTS technique are compared against the MAXMIN, ACO, and GTO-FTASS algorithms to present the makespan, failure ratios, and failure slowdowns—giving a comprehensive comparison of the method. As shown in this paper, the POAB-FTS framework can improve the system’s fault-tolerance and adapt resource allocation based on the actual demand thereby stressing its capacity to act as a scalable and cost-efficient solution for the improvement of cloud computing infrastructures. On this contribution, a sound and optimal cloud resource management is made possible.
Read MoreDoi: https://doi.org/10.54216/JCIM.160107
Vol. 16 Issue. 1 PP. 86-98, (2025)
Biometric data is becoming increasingly valuable because of its uniqueness, and digital watermarking techniques are used to protect it. This paper presents a new method of hiding Palmprint images using wavelet decomposition and Encrypting Visual Information (EVI). EVI is a technique for securing Palmprint print images that has been extensively studied in this report. By embedding the Palmprint image in the cover image, and then using wavelet transformation, this output image can be decomposed into four segments (Segment Low Low, Segment Low High, Segment High Low, and Segment High High). A compressor is placed at the sender site to compress these four segments. DWT is obtained at the receiver side and then the bit-matching procedure is applied to obtain the original palmprint image. Using data concealing and EVI implementations on biometrics, palmprints, and related textual information can be protected from identity fraud. The watermarked cover images and palmprints, which could be used for authentication, have been improved from the existing approach. By reducing the segment size, quality is achieved along with higher security and bandwidth reduction. In addition, the three least significant bits are successfully applied to increase the length of a secret message while retaining palmprint quality.
Read MoreDoi: https://doi.org/10.54216/JCIM.160108
Vol. 16 Issue. 1 PP. 99-106, (2025)