Cluster Computing, Journal Year: 2024, Volume and Issue: 28(1)
Published: Oct. 28, 2024
Language: Английский
Cluster Computing, Journal Year: 2024, Volume and Issue: 28(1)
Published: Oct. 28, 2024
Language: Английский
Information Fusion, Journal Year: 2025, Volume and Issue: unknown, P. 102922 - 102922
Published: Jan. 1, 2025
Language: Английский
Citations
2Journal of Knowledge Learning and Science Technology ISSN 2959-6386 (online), Journal Year: 2023, Volume and Issue: 2(3), P. 436 - 456
Published: Sept. 29, 2023
AI has found widespread application across various sectors, including security, healthcare, finance, and national defense. However, alongside its transformative advancements, there been an unfortunate trend of malicious exploitation capabilities. Concurrently, the rapid evolution cloud computing technology introduced cloud-based systems. Regrettably, vulnerabilities inherent in infrastructure also pose risks to security services. We observe that integrity training data is pivotal, as any compromise therein directly impacts efficacy Against this backdrop, we assert paramount importance preserving within To address imperative, propose a architecture guided by National Institute Standards Technology (NIST) cyber framework. Leveraging block chain smart contracts emerges fitting solution tackle challenges, owing their characteristics shared decentralized ledgers. Smart facilitate automated policy enforcement, enable continuous monitoring integrity, mitigate risk tampering.
Language: Английский
Citations
26Journal of Knowledge Learning and Science Technology ISSN 2959-6386 (online), Journal Year: 2023, Volume and Issue: 2(3), P. 457 - 472
Published: Nov. 30, 2023
Intrusion poses a significant challenge in Cloud networks, necessitating the development of efficient mechanisms to mitigate intrusions and enhance system security. To address this, we propose novel Artificial Bee-based Elman Neural Security Framework (ABENSF). This framework involves rescaling raw dataset using preprocessing functions integrating an optimal fitness function based on artificial bees into feature extraction phase identify extract attack features. Additionally, monitoring mechanism ABENSF enhances network security by proactively preventing attacks. By employing tracking functions, known unknown attacks can be effectively thwarted. We validate proposed NSL-KDD Python software conduct comparative analysis assess its performance against existing techniques. Our results demonstrate that developed model outperforms other methods terms prevention overall enhancement.
Language: Английский
Citations
25Journal of Knowledge Learning and Science Technology ISSN 2959-6386 (online), Journal Year: 2023, Volume and Issue: 2(2), P. 421 - 433
Published: Nov. 12, 2023
Artificial intelligence (AI) stands as a revolutionary force with profound implications for society, offering considerable advantages individuals disabilities. Yet, alongside its promise, AI brings inherent risks, including ethical dilemmas that could heighten discrimination against marginalized communities. This article conducts thorough analysis of the benefits and drawbacks people disabilities, specific focus on algorithmic biases. These biases, capable molding societal frameworks influencing decision-making, hold potential to perpetuate unfair treatment bias. Given these challenges, delves into remedies mitigate concerns ensure effectively caters needs all individuals, irrespective disability status.
Language: Английский
Citations
23Journal of Information Security, Journal Year: 2024, Volume and Issue: 15(03), P. 320 - 339
Published: Jan. 1, 2024
The landscape of cybersecurity is rapidly evolving due to the advancement and integration Artificial Intelligence (AI) Machine Learning (ML). This paper explores crucial role AI ML in enhancing defenses against increasingly sophisticated cyber threats, while also highlighting new vulnerabilities introduced by these technologies. Through a comprehensive analysis that includes historical trends, technological evaluations, predictive modeling, dual-edged nature examined. Significant challenges such as data privacy, continuous training models, manipulation risks, ethical concerns are addressed. emphasizes balanced approach leverages innovation alongside rigorous standards robust practices. facilitates collaboration among various stakeholders develop guidelines ensure responsible effective use cybersecurity, aiming enhance system integrity privacy without compromising security.
Language: Английский
Citations
13Deleted Journal, Journal Year: 2024, Volume and Issue: 3(1), P. 196 - 233
Published: April 12, 2024
The proliferation of internet usage has surged dramatically, prompting individuals and businesses to conduct myriad transactions online rather than in physical spaces. onset the COVID-19 pandemic further propelled this trend. Consequently, traditional forms crime have migrated digital realm alongside widespread adoption technologies such as cloud computing, Internet Things (IoT), social media, wireless communication, crypto currencies, amplifying security concerns cyberspace. Notably, cybercriminals begun offering cyber attacks a service, automating magnify their impact. These attackers exploit vulnerabilities across hardware, software, communication layers, perpetrating various including distributed denial service (DDoS), phishing, man-in-the-middle, password, remote, privilege escalation, malware attacks. sophistication these renders conventional protection systems, firewalls, intrusion detection antivirus access control lists, ineffective detection. there is an urgent imperative devise innovative pragmatic solutions thwart This paper elucidates primary drivers behind attacks, surveys recent attack instances, patterns, methodologies, explores contemporary technical non-technical strategies for preemptively identifying mitigating Leveraging cutting-edge like machine learning, deep platforms, big data analytics, blockchain holds promise combating present future threats. technological interventions can aid detection, spam filtering, DNS classification, fraud identification covert channels, discernment advanced persistent Nonetheless, it's crucial acknowledge that some promising solutions, notably learning are susceptible evasion techniques, necessitating careful consideration when formulating defenses against sophisticated
Language: Английский
Citations
10Deleted Journal, Journal Year: 2024, Volume and Issue: 3(1), P. 196 - 233
Published: April 12, 2024
The proliferation of internet usage has surged dramatically, prompting individuals and businesses to conduct myriad transactions online rather than in physical spaces. onset the COVID-19 pandemic further propelled this trend. Consequently, traditional forms crime have migrated digital realm alongside widespread adoption technologies such as cloud computing, Internet Things (IoT), social media, wireless communication, crypto currencies, amplifying security concerns cyberspace. Notably, cybercriminals begun offering cyber attacks a service, automating magnify their impact. These attackers exploit vulnerabilities across hardware, software, communication layers, perpetrating various including distributed denial service (DDoS), phishing, man-in-the-middle, password, remote, privilege escalation, malware attacks. sophistication these renders conventional protection systems, firewalls, intrusion detection antivirus access control lists, ineffective detection. there is an urgent imperative devise innovative pragmatic solutions thwart This paper elucidates primary drivers behind attacks, surveys recent attack instances, patterns, methodologies, explores contemporary technical non-technical strategies for preemptively identifying mitigating Leveraging cutting-edge like machine learning, deep platforms, big data analytics, blockchain holds promise combating present future threats. technological interventions can aid detection, spam filtering, DNS classification, fraud identification covert channels, discernment advanced persistent Nonetheless, it's crucial acknowledge that some promising solutions, notably learning are susceptible evasion techniques, necessitating careful consideration when formulating defenses against sophisticated
Language: Английский
Citations
8Deleted Journal, Journal Year: 2024, Volume and Issue: 3(1), P. 235 - 245
Published: April 2, 2024
With the widespread integration of artificial intelligence (AI) and blockchain technologies, safeguarding privacy has become paramount importance. These techniques not only ensure confidentiality individuals' data but also maintain integrity reliability information. This study offers an introductory overview AI blockchain, highlighting their fusion subsequent emergence protection methodologies. It explores various application contexts, such as encryption, de-identification, multi-tier distributed ledgers, k-anonymity techniques. Moreover, paper critically evaluates five essential dimensions systems within AI-blockchain integration: authorization management, access control, security, network integrity, scalability. Additionally, it conducts a comprehensive analysis existing shortcomings, identifying root causes suggesting corresponding remedies. The categorizes synthesizes methodologies based on contexts technical frameworks. In conclusion, outlines prospective avenues for evolution technologies resulting from emphasizing need to enhance efficiency security more privacy.
Language: Английский
Citations
4Lecture notes in networks and systems, Journal Year: 2025, Volume and Issue: unknown, P. 497 - 514
Published: Jan. 1, 2025
Language: Английский
Citations
0Lecture notes in computer science, Journal Year: 2025, Volume and Issue: unknown, P. 338 - 352
Published: Jan. 1, 2025
Language: Английский
Citations
0