• Title/Summary/Keyword: Security Techniques

Search Result 1,571, Processing Time 0.023 seconds

A Study on Efficient Data De-Identification Method for Blockchain DID

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.60-66
    • /
    • 2021
  • Blockchain is a technology that enables trust-based consensus and verification based on a decentralized network. Distributed ID (DID) is based on a decentralized structure, and users have the right to manage their own ID. Recently, interest in self-sovereign identity authentication is increasing. In this paper, as a method for transparent and safe sovereignty management of data, among data pseudonymization techniques for blockchain use, various methods for data encryption processing are examined. The public key technique (homomorphic encryption) has high flexibility and security because different algorithms are applied to the entire sentence for encryption and decryption. As a result, the computational efficiency decreases. The hash function method (MD5) can maintain flexibility and is higher than the security-related two-way encryption method, but there is a threat of collision. Zero-knowledge proof is based on public key encryption based on a mutual proof method, and complex formulas are applied to processes such as personal identification, key distribution, and digital signature. It requires consensus and verification process, so the operation efficiency is lowered to the level of O (logeN) ~ O(N2). In this paper, data encryption processing for blockchain DID, based on zero-knowledge proof, was proposed and a one-way encryption method considering data use range and frequency of use was proposed. Based on the content presented in the thesis, it is possible to process corrected zero-knowledge proof and to process data efficiently.

Feature Selection with Ensemble Learning for Prostate Cancer Prediction from Gene Expression

  • Abass, Yusuf Aleshinloye;Adeshina, Steve A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.526-538
    • /
    • 2021
  • Machine and deep learning-based models are emerging techniques that are being used to address prediction problems in biomedical data analysis. DNA sequence prediction is a critical problem that has attracted a great deal of attention in the biomedical domain. Machine and deep learning-based models have been shown to provide more accurate results when compared to conventional regression-based models. The prediction of the gene sequence that leads to cancerous diseases, such as prostate cancer, is crucial. Identifying the most important features in a gene sequence is a challenging task. Extracting the components of the gene sequence that can provide an insight into the types of mutation in the gene is of great importance as it will lead to effective drug design and the promotion of the new concept of personalised medicine. In this work, we extracted the exons in the prostate gene sequences that were used in the experiment. We built a Deep Neural Network (DNN) and Bi-directional Long-Short Term Memory (Bi-LSTM) model using a k-mer encoding for the DNA sequence and one-hot encoding for the class label. The models were evaluated using different classification metrics. Our experimental results show that DNN model prediction offers a training accuracy of 99 percent and validation accuracy of 96 percent. The bi-LSTM model also has a training accuracy of 95 percent and validation accuracy of 91 percent.

Buffer Overflow Attack and Defense Techniques

  • Alzahrani, Sabah M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.207-212
    • /
    • 2021
  • A buffer overflow attack is carried out to subvert privileged program functions to gain control of the program and thus control the host. Buffer overflow attacks should be prevented by risk managers by eradicating and detecting them before the software is utilized. While calculating the size, correct variables should be chosen by risk managers in situations where fixed-length buffers are being used to avoid placing excess data that leads to the creation of an overflow. Metamorphism can also be used as it is capable of protecting data by attaining a reasonable resistance level [1]. In addition, risk management teams should ensure they access the latest updates for their application server products that support the internet infrastructure and the recent bug reports [2]. Scanners that can detect buffer overflows' flaws in their custom web applications and server products should be used by risk management teams to scan their websites. This paper presents an experiment of buffer overflow vulnerability and attack. The aims to study of a buffer overflow mechanism, types, and countermeasures. In addition, to comprehend the current detection plus prevention approaches that can be executed to prevent future attacks or mitigate the impacts of similar attacks.

Comparative Analysis of IoT Enabled Multi Scanning Parking Model for Prediction of Available Parking Space with Existing Models

  • Anchal, Anchal;Mittal, Pooja
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.404-412
    • /
    • 2022
  • The development in the field of the internet of things (IoT) have improved the quality of the life and also strengthened different areas in the society. All cities across the world are seeking to become smarter. The creation of a smart parking system is the essential use case in smart cities. In recent couple of years, the number of vehicles has increased significantly. As a result, it is critical to make the use of technology that enables hassle-free parking in both public and private spaces. In conventional parking systems, drivers are not able to find free parking space. Conventional systems requires more human interference in a parking lots. To manage these circumstances there is an intense need of IoT enabled parking solution that includes the well defined architecture that will contain the following components such as smart sensors, communication agreement and software solution. For implementing such a smart parking system in this paper we proposed a design of smart parking system and also compare it with convetional system. The proposed design utilizes sensors based on IoT and Data Mining techniques to handle real time management of the parking system. IoT enabled smart parking solution minimizes the human interference and also saves energy, money and time.

Virtual Assets as the Newest Object of Property Rights

  • Davydova, Iryna;Zhurylo, Serhii;Tserkovna, Olena;Herasymchuk, Lidiia;Tokareva, Vira
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.115-120
    • /
    • 2022
  • New realities of social relations are changing the understanding of certain phenomena, including the emergence of new concepts among the objects of property rights, such as: virtual assets, and the circulation of virtual assets. The rapid development of the virtual assets market involves the legislative consolidation of the status of such assets, changes in taxation, their circulation, and so on. These circumstances increase the interest in the study of virtual assets as the latest object of property rights and necessitate the study of this topic. The work aims to explore the theoretical developments and regulations on virtual assets in the modern world, as well as to summarize the conclusions about virtual assets as the latest object of property rights. The object of research is the content of the concept of "virtual asset" and its legal status. The methodology of work is represented by a set of methods and techniques that were used to achieve this goal, namely: hermeneutic, historical, extrapolation, comparative law, generalization, analysis, synthesis, and deduction. The study analyzed different approaches to understanding virtual assets, analyzed the characteristics of virtual assets, and concluded that in today's conditions there is no single unified legal regulation of virtual assets, although many countries are moving towards consolidating the status of virtual assets.

The Effect of a Web Quests Instructional Program on Developing Saudi EFL Learning Habits

  • Alsamadani, Hashem A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.220-224
    • /
    • 2022
  • The teacher is considered the cornerstone of the educational process; the quality of education is linked mainly to teachers who perform such a necessary process. The shift in pedagogical thinking has led to progress in looking at the teacher's roles; he is no longer transferring knowledge to learners, but instead, he has become a mentor, a mediator, a planner, an intellect, and a leader. If we analyze these missions from the perspective of mental habits, we will see that they require the teacher to develop the skills of perseverance, listening comprehension, thinking flexibly, controlling emotions, self-confidence, communication skills, and other essential skills. The current research verifies the effectiveness of an instructional program based on web quests in developing habits of the mind of English language students. The study employed a quasi-experimental design. The sample consisted of 46 male students representing two classes. They were assigned randomly into an experimental group (n=24) and a control group (n=22). They were undergraduate students majoring in the English language. The findings showed a statistically significant difference in the mean scores of the experimental and control groups favoring the experimental group. The study concludes with some recommendations to differentiate teaching techniques in EFL classrooms.

A Hybrid Soft Computing Technique for Software Fault Prediction based on Optimal Feature Extraction and Classification

  • Balaram, A.;Vasundra, S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.348-358
    • /
    • 2022
  • Software fault prediction is a method to compute fault in the software sections using software properties which helps to evaluate the quality of software in terms of cost and effort. Recently, several software fault detection techniques have been proposed to classifying faulty or non-faulty. However, for such a person, and most studies have shown the power of predictive errors in their own databases, the performance of the software is not consistent. In this paper, we propose a hybrid soft computing technique for SFP based on optimal feature extraction and classification (HST-SFP). First, we introduce the bat induced butterfly optimization (BBO) algorithm for optimal feature selection among multiple features which compute the most optimal features and remove unnecessary features. Second, we develop a layered recurrent neural network (L-RNN) based classifier for predict the software faults based on their features which enhance the detection accuracy. Finally, the proposed HST-SFP technique has the more effectiveness in some sophisticated technical terms that outperform databases of probability of detection, accuracy, probability of false alarms, precision, ROC, F measure and AUC.

Estimation of Automatic Video Captioning in Real Applications using Machine Learning Techniques and Convolutional Neural Network

  • Vaishnavi, J;Narmatha, V
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.316-326
    • /
    • 2022
  • The prompt development in the field of video is the outbreak of online services which replaces the television media within a shorter period in gaining popularity. The online videos are encouraged more in use due to the captions displayed along with the scenes for better understandability. Not only entertainment media but other marketing companies and organizations are utilizing videos along with captions for their product promotions. The need for captions is enabled for its usage in many ways for hearing impaired and non-native people. Research is continued in an automatic display of the appropriate messages for the videos uploaded in shows, movies, educational videos, online classes, websites, etc. This paper focuses on two concerns namely the first part dealing with the machine learning method for preprocessing the videos into frames and resizing, the resized frames are classified into multiple actions after feature extraction. For the feature extraction statistical method, GLCM and Hu moments are used. The second part deals with the deep learning method where the CNN architecture is used to acquire the results. Finally both the results are compared to find the best accuracy where CNN proves to give top accuracy of 96.10% in classification.

Prediction of Energy Consumption in a Smart Home Using Coherent Weighted K-Means Clustering ARIMA Model

  • Magdalene, J. Jasmine Christina;Zoraida, B.S.E.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.177-182
    • /
    • 2022
  • Technology is progressing with every passing day and the enormous usage of electricity is becoming a necessity. One of the techniques to enjoy the assistances in a smart home is the efficiency to manage the electric energy. When electric energy is managed in an appropriate way, it drastically saves sufficient power even to be spent during hard time as when hit by natural calamities. To accomplish this, prediction of energy consumption plays a very important role. This proposed prediction model Coherent Weighted K-Means Clustering ARIMA (CWKMCA) enhances the weighted k-means clustering technique by adding weights to the cluster points. Forecasting is done using the ARIMA model based on the centroid of the clusters produced. The dataset for this proposed work is taken from the Pecan Project in Texas, USA. The level of accuracy of this model is compared with the traditional ARIMA model and the Weighted K-Means Clustering ARIMA Model. When predicting,errors such as RMSE, MAPE, AIC and AICC are analysed, the results of this suggested work reveal lower values than the ARIMA and Weighted K-Means Clustering ARIMA models. This model also has a greater loglikelihood, demonstrating that this model outperforms the ARIMA model for time series forecasting.

A Fuzzing Seed Generation Technique Using Natural Language Processing Model (자연어 처리 모델을 활용한 퍼징 시드 생성 기법)

  • Kim, DongYonug;Jeon, SangHoon;Ryu, MinSoo;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.417-437
    • /
    • 2022
  • The quality of the fuzzing seed file is one of the important factors to discover vulnerabilities faster. Although the prior seed generation paradigm, using dynamic taint analysis and symbolic execution techniques, enhanced fuzzing efficiency, the yare not extensively applied owing to their high complexity and need for expertise. This study proposed the DDRFuzz system, which creates seed files based on sequence-to-sequence models. We evaluated DDRFuzz on five open-source applications that used multimedia input files. Following experimental results, DDRFuzz showed the best performance compared with the state-of-the-art studies in terms of fuzzing efficiency.