Exploring the Security Vulnerability in Frequency-Hiding Order-Preserving Encryption
Frequency-hiding order-preserving encryption (FH-OPE) has emerged as an important tool in data security, particularly in cloud computing, because of its unique ability to preserve the order of plaintexts in their corresponding ciphertexts and enable ...
An Extensive Classification of 5G Network Jamming Attacks
- Vincent O. Nyangaresi,
- Shreya Savadatti,
- Sakshi Kuldeep Dhariwal,
- Shruthi Krishnamoorthy,
- Radhakrishnan Delhibabu
The paper introduces a pioneering taxonomy for 5G jamming attacks, meticulously crafted through diverse research methodologies, including literature review, case studies, incident database analysis, and network architecture assessment. This taxonomy is ...
A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features
With the advancement of image steganography, coverless image steganography has gained widespread attention due to its ability to hide information without modifying the carrier of images. However, existing coverless image steganography methods often ...
Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing
- Andrea Michienzi,
- Radjaa Bensaid,
- Nabila Labraoui,
- Ado Adamou Abba Ari,
- Leandros Maglaras,
- Hafida Saidi,
- Ahmed Mahmoud Abdu Lwahhab,
- Sihem Benfriha
The growth of the Internet of Things (IoT) has recently impacted our daily lives in many ways. As a result, a massive volume of data are generated and need to be processed in a short period of time. Therefore, a combination of computing models such as ...
Feature-Weighted Naive Bayesian Classifier for Wireless Network Intrusion Detection
Objective. Wireless sensor networks, crucial for various applications, face growing security challenges due to the escalating complexity and diversity of attack behaviours. This paper presents an advanced intrusion detection algorithm, leveraging feature-...
Effective and Efficient Android Malware Detection and Category Classification Using the Enhanced KronoDroid Dataset
Android is the most widely used mobile operating system and responsible for handling a wide variety of data from simple messages to sensitive banking details. The explosive increase in malware targeting this platform has made it imperative to adopt ...
Securing the Transmission While Enhancing the Reliability of Communication Using Network Coding in Block-Wise Transfer of CoAP
The practical employment of network coding (NC) has shown major improvements when it comes to the transmission reliability of sender data and bandwidth utilization. Moreover, network coding has been employed recently to secure the transmission of data and ...
HMMED: A Multimodal Model with Separate Head and Payload Processing for Malicious Encrypted Traffic Detection
Malicious encrypted traffic detection is a critical component of network security management. Previous detection methods can be categorized into two classes as follows: one is to use the feature engineering method to construct traffic features for ...
Systematic Mapping Study of Blockchain Integrated Supply Chain Management
With globalization and emerging competition, there is an intense rise in using trending technologies. One of them is blockchain technology. It is incorporated in various fields, focusing on benefits such as decentralization, security, and transparency. ...
Using MSPG to Suppress Flooding in the Data-Link Layer for SDN
The media access control (MAC) address is the basis of frame forwarding in data-link layer. When MAC missing occurs in the software-defined network (SDN), the processing method is the same as that of Ethernet, which is also broadcast. The broadcast will ...