https://journals.mesopotamian.press/index.php/CyberSecurity/issue/feedMesopotamian Journal of CyberSecurity2024-12-29T19:24:01+00:00Open Journal Systems<div class="flex flex-grow flex-col gap-3"> <div class="min-h-[20px] flex flex-col items-start gap-4 whitespace-pre-wrap break-words"> <div class="markdown prose w-full break-words dark:prose-invert light"> <p style="text-align: justify;">Attention cybersecurity scholars and researchers! The Mesopotamian Journal of Cybersecurity has successfully launched and is rapidly gaining recognition in the academic community. With three impactful issues already published, our journal is attracting attention from respected publishers such as Scopus, Taylor & Francis, and others. We invite you to contribute your cutting-edge research and insights to our esteemed publication.</p> </div> </div> </div>https://journals.mesopotamian.press/index.php/CyberSecurity/article/view/413Enhancing Electronic Agriculture Data Security with a Blockchain-Based Search Method and E-Signatures2024-09-10T10:14:22+00:00Duaa Hammoud Tahayurduaahammoud.comp@utq.edu.iqMishall Al-Zubaidiemishall_zubaidie@utq.edu.iq<p>The production of digital signatures with blockchain constitutes a prerequisite for the security of electronic agriculture applications (EAA), such as the Internet of Things (IoT). To prevent irresponsibility within the blockchain, attackers regularly attempt to manipulate or intercept data stored or sent via EAA-IoT. Additionally, cybersecurity has not received much attention recently because IoT applications are still relatively new. As a result, the protection of EAAs against security threats remains insufficient. Moreover, the security protocols used in contemporary research are still insufficient to thwart a wide range of threats. For these security issues, first, this study proposes a security system to combine consortium blockchain blocks with Edwards25519 (Ed25519) signatures to stop block data tampering in the IoT. Second, the proposed study leverages an artificial bee colonizer (ABC) approach to preserve the unpredictable nature of Ed25519 signatures while identifying the optimal solution and optimizing various complex challenges. Advanced deep learning (ADL) technology is used as a model to track and evaluate objects in the optimizer system. We tested our system in terms of security measures and performance overhead. Tests conducted on the proposed system have shown that it can prevent the most destructive applications, such as obfuscation, selfish mining, block blocking, block ignoring, blind blocking, and heuristic attacks, and that our system fends off these attacks through the use of the test of the Scyther tool. Additionally, the system measures performance parameters, including a scalability of 99.56%, an entropy of 60.99 Mbps, and a network throughput rate of 200,000.0 m/s, which reflects the acceptability of the proposed system over existing security systems.</p> <p><br /><br /></p>2024-09-09T00:00:00+00:00Copyright (c) 2024 Duaa Hammoud Tahayur, Mishall Al-Zubaidiehttps://journals.mesopotamian.press/index.php/CyberSecurity/article/view/643Intermediary Decentralized Computing and Private Blockchain Mechanisms for Privacy Preservation in the Internet of Medical Things2024-12-09T02:50:25+00:00Rasha Halim Razzaqrashahalim.comp@utq.edu.iqMishall Al-Zubaidiemishall_zubaidie@utq.edu.iqRajaa Ghali Atiyahm69280545@gmail.com<p>Protecting patient data in the Internet of Medical Things (IoMT) is one of the major challenges facing healthcare organizations because of increasing threats to privacy and security. Although there are many existing protocols and solutions, such as Rivest–Shamir–Adleman (RSA) and El-Gamal cryptographies or centralized methods, that aim to protect data, they suffer from weaknesses such as slow performance or inability to handle large volumes of data. The issue of security in medical records has become an urgent need, and the use of centralized methods can expose them to single-point failure. In this paper, we present the efficient approach to securing patient information (EASPI), which depends on blockchain and integrates innovative techniques such as the advanced encryption algorithm (AES), reverse word frequency analysis (TF-IDF), Lemplel-Ziv-Welch (LZW), decision tree model (DTM), and naive Bayes classifier (NBC). EASPI seeks to improve the security of medical data by storing it encrypted and securely via blockchain technology, providing a high level of privacy and reliability. The experimental results indicate that the EASPI reduces the encryption execution time to 0.2 ms and the decryption execution time to 0.3 ms while improving the accuracy of medical diagnosis. The potential of the suggested methods for healthcare systems is further demonstrated by the fact that the TF-IDF algorithm attained an execution time of 0.004 ms, while the blockchain's greatest execution time was 0.014 ms. Additionally, using the formal verification Scyther tool, the security of the suggested system is examined both theoretically and practically. The suggested solution is an appropriate option for healthcare institutions since it offers a strong defense against a range of cyber threats, including targeted and espionage assaults.</p>2024-12-05T00:00:00+00:00Copyright (c) 2024 Rasha Halim Razzaq, Mishall Al-Zubaidie, Rajaa Ghali Atiyahhttps://journals.mesopotamian.press/index.php/CyberSecurity/article/view/678Cybersecurity Defence Mechanism Against DDoS Attack with Explainability2024-12-27T11:11:14+00:00Alaa Mohammed Mahmood alaamahmood526@gmail.comİsa Avcı isaavci@karabuk.edu.tr<p>Application-layer attacks (Layer 7 attacks), a form of distributed denial-of-service (DDoS) aimed at web servers, have become a significant concern in cybersecurity because of their ability to disrupt services by overwhelming server resources. This study focuses on addressing the challenges of detecting and mitigating the impact of such attacks, which are difficult to counter due to their sophisticated nature. The primary objective of this study is to develop an effective monitoring and defence model to detect, defend, and respond to these attacks efficiently. To achieve this, SHapley Additive exPlanations (SHAP) technology was used to understand the behaviour of the model and to increase the efficiency of the detection classifiers. The defence model is designed with three states: normal, observing, and suspicious. The observing mode, which represents the detection part, is triggered when the server load exceeds a predefined threshold. The detection system incorporates five machine learning (ML) algorithms: decision trees (DTs), support vector machines (SVMs), logistic regression (LR), naive Bayes (NB), and K-nearest neighbours (KNNs). A stacked classifier (SC) was then employed to combine these models to achieve optimal performance. The algorithms were evaluated in terms of accuracy (ACC), precision (PRC), recall (REC), F1 score (F1), and time (T). The SC demonstrates superior accuracy in distinguishing between legitimate traffic and malicious traffic. If the server continues to suffer from overload, the suspicious part of the defence model will be activated, and the mitigation algorithm will be called, which, in turn, bans users responsible for the attack and prevents illegitimate users from connecting to the server. The effects of the mitigation algorithm were noticeable in the server traffic rate, transmission rate, memory utilization, and CPU utilization, confirming its ability to defend against application-layer attacks.</p> <p> </p>2024-12-26T00:00:00+00:00Copyright (c) 2024 Alaa Mohammed Mahmood , İsa Avcı https://journals.mesopotamian.press/index.php/CyberSecurity/article/view/589A Systematic Literature Review on Cyber Attack Detection in Software-Define Networking (SDN)2024-11-12T02:33:28+00:00Dalia Shihab Ahmeddalia_shihab@uomustansiriyah.edu.iqAbbas Abdulazeez Abdulhameed abbasabdulazeez@uomustansiriyah.edu.iqMethaq T. Gaata dr.methaq@uomustansiriyah.edu.iq<p>The increasing complexity and sophistication of cyberattacks pose significant challenges to traditional network security tools. Software-defined networking (SDN) has emerged as a promising solution because of its centralized management and adaptability. However, cyber-attack detection in SDN settings remains a vital issue. The current literature lacks comprehensive assessment of SDN cyber-attack detection methods including preparation techniques, benefits and types of attacks analysed in datasets. This gap hinders the understanding of the strengths and weaknesses of various detection approaches. This systematic literature review aims to examine SDN cyberattack detection, identify strengths, weaknesses, and gaps in existing techniques, and suggest future research directions in this critical area. A systematic approach was used to review and analyse various SDN cyberattack detection techniques from 2017--2024. A comprehensive assessment was conducted to address these research gaps and provide a comprehensive understanding of different detection methods. The study classified attacks on SDN planes, analysed detection datasets, discussed feature selection methods, evaluated approaches such as entropy, machine learning (ML), deep learning (DL), and federated learning (FL), and assessed metrics for evaluating defense mechanisms against cyberattacks. The review emphasized the importance of developing SDN-specific datasets and using advanced feature selection algorithms. It also provides valuable insights into the state-of-the-art techniques for detecting cyber-attacks in SDN and outlines a roadmap for future research in this critical area. This study identified research gaps and emphasized the importance of further exploration in specific areas to increase cybersecurity in SDN environments.</p>2024-11-11T00:00:00+00:00Copyright (c) 2024 Dalia Shihab Ahmed, Abbas Abdulazeez Abdulhameed , Methaq T. Gaata https://journals.mesopotamian.press/index.php/CyberSecurity/article/view/675Deepfake Detection in Video and Audio Clips: A Comprehensive Survey and Analysis2024-12-26T02:59:06+00:00Wurood A. Jbara wo_abdulkarim@uomustansiriyah.edu.iqNoor Al-Huda K. Hussein nooralhuda_khaled@ijsu.edu.iqJamila H. Soud dr.jameelahharbi@uomustansiriyah.edu.iq<p>Deepfake (DF) technology has emerged as a major concern due to its potential for misuse, including privacy violations, misinformation, and threats to the integrity of digital media. While significant progress has been made in developing deep learning (DL) algorithms to detect DFs, effectively distinguishing between real and manipulated content remains a challenge due to the rapid evolution of DF generation techniques. This study aims to address two key issues: the need for a comprehensive review of current DF detection methods and the challenge of achieving high detection accuracy with low computational cost. We conducted a systematic literature review to evaluate various DF detection algorithms, focusing on their performance, computational efficiency, and robustness. The review covers methods such as Convolutional Neural Networks (CNNs), Long Short Term Memory (LSTM) networks, hybrid models, and specialized approaches like spectral and phonetic analysis. Our findings reveal that while some methods achieve high accuracy, up to 94% in controlled environments, they often struggle to generalize across diverse DF applications. Hybrid models that combine CNNs and LSTMs typically offer a better balance between accuracy and computational efficiency. This paper provides valuable insights into the current state of DF detection and highlights the need for adaptive models that can effectively address the evolving challenges of DF generation.</p> <p> </p>2024-12-24T00:00:00+00:00Copyright (c) 2024 Wurood A. Jbara , Noor Al-Huda K. Hussein , Jamila H. Soud https://journals.mesopotamian.press/index.php/CyberSecurity/article/view/581Hybrid Classifier for Detecting Zero-Day Attacks on IoT Networks2024-11-05T06:59:50+00:00Rana M. Zaki rana.m.zaki@uotechnology.edu.iqInam S. Naserit@gmail.com<p>Recently, Internet of Things (IoT) networks have been exposed to many electronic attacks, giving rise to concerns about the security of these networks, where their weaknesses and gaps can be exploited to access or steal data. These networks are threatened by several cyberattacks, one of which is the zero-day distributed denial-of-service (DDoS) attack, which is considered one of the dangerous attacks targeting network security. As such, it is necessary to find smart solutions to address such attacks swiftly. To address these attacks, this research proposed a hybrid IDS to detect cyber-attacks on IoT networks via machine learning (ML) algorithms, namely, XGBoost, K-nearest neighbors, and stochastic gradient descent (SGD), while classifiers are combined via an ML ensemble. Grid search CV was used to find the best hyperparameters for each classifier at each classification stage. Random projection was used to select the relevant features for training the model. In the evaluation and performance testing phase of the model, two cybersecurity datasets (CIC-IDS2017 and CIC-DDoS2019) were used to test the efficiency of the model in detecting zero-day threats. The best results were obtained for the CIC-DDoS2019 dataset, where 20 features out of the total selection were used. The model was able to achieve an accuracy of 99.91% and an intrusion detection time of 0.22 seconds. The confusion matrix results also revealed a reduction in false alarms. The results and their comparison with those of recent relevant studies demonstrated the effectiveness of the hybrid model in securing IoT networks from zero-day attacks as well as its superiority in terms of accuracy and intrusion detection time. This study is an important step in enhancing security in the IoT environment by presenting a new hybrid model that is capable of dealing with zero-day attacks that are difficult to detect with traditional models.</p>2024-11-02T00:00:00+00:00Copyright (c) 2024 Rana M. Zaki , Inam S. Naserhttps://journals.mesopotamian.press/index.php/CyberSecurity/article/view/661Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix2024-12-19T04:51:15+00:00Nada Hussein M. Ali nada.husn@sc.uobaghdad.edu.iqMays M. Hoobi mays.m@sc.uobaghdad.edu.iqDunia F. Saffo f@sc.uobaghdad.edu.iq<p>Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a randomly predefined set of key numbers of size n via the Donald E. Knuths SRNG algorithm (subtractive method). The second phase uses the output key (or seed value) from the previous phase as input to the Latin square matrix (LSM) to formulate a new key randomly. To increase the complexity of the generated key, another new random key of the same length that fulfills Shannon’s principle of confusion and diffusion properties is XORed. Four test keys for each 128, 192,256,512, and 1024–bit length are used to evaluate the strength of the proposed model. The experimental results and security analyses revealed that all test keys met the statistical National Institute of Standards (NIST) standards and had high values for entropy values exceeding 0.98. The key length of the proposed model for n bits is 25*n, which is large enough to overcome brute-force attacks. Moreover, the generated keys are very sensitive to initial values, which increases the complexity against different attacks.</p>2024-12-10T00:00:00+00:00Copyright (c) 2024 Nada Hussein M. Ali , Mays M. Hoobi , Dunia F. Saffo https://journals.mesopotamian.press/index.php/CyberSecurity/article/view/522A Classifier-Driven Deep Learning Clustering Approach to Enhance Data Collection in MANETs2024-09-26T17:17:43+00:00Ali Abdullah Ali mohammed-ahmed@mtu.edu.iqMohammed Khaleel Hussein mohammed-ahmed@mtu.edu.iqMohammed Ahmed Subhimohammed-ahmed@mtu.edu.iq<p>The conventional clustering and routing approaches used in mobile ad hoc networks (MANETs) may fail to work effectively in a dynamic network environment where nodes are highly mobile and the traffic load may also vary significantly. These limitations result in negative effects such as high packet drop rates, delays in data transmission, and low delivery rates, which make these methods unfit for modern high-density networks. To overcome these issues, this paper proposes a new deep learning-based classifier for adaptive clustering in MANETs. Through the use of machine learning algorithms, the proposed method is able to adapt to node clustering through node behavior, mobility, and content distribution in real-time, thus improving network performance. This work compares the performance of the network on networks that contain 50, 100, and 200 nodes via a clustering algorithm. The performance parameters considered include the delivery ratio, packet drop ratio, and end-to-end delay. The evaluation findings show that the developed deep learning-based classifier is far more effective than the non-clustered and conventional clustering approaches are. In particular, the classifier approach provides a delivery rate of up to 89.4%, which is significantly better than that of the baseline scenarios and decreases packet drop rates by more than 70%, especially in high-density node scenarios. In addition, the proposed approach reduces the network delay and effectively handles the inherent dynamic characteristics of MANETs.</p>2024-09-26T00:00:00+00:00Copyright (c) 2024 Ali Abdullah Ali ; Mohammed Khaleel Hussein ; Mohammed Ahmed Subhihttps://journals.mesopotamian.press/index.php/CyberSecurity/article/view/648AI-Powered Cyber Threats: A Systematic Review 2024-12-15T02:53:47+00:00Mafaz Alanezimafazmhalanezi@uomosul.edu.iqRuah Mouad Alyas AL-Azzawi ruaa.moayad@uomosul.edu.iq<p>The joining of artificial intelligence (AI) across different areas has fundamentally improved productivity and development. Nevertheless, this progression has increased cybersecurity threats, especially those determined by AI itself. These AI-powered threats exploit the advancements intended to obtain computerized frameworks, in this manner subverting their honesty. This systematic review focuses on the intricacies of AI-driven cyber threats, which use complex AI abilities to lead to intricate and tricky cyberattacks. Our review integrates existing examinations to determine the extension, location procedures, effects, and relief systems connected with AI-initiated threats. We feature the powerful exchange between AI improvement and cybersecurity, underlining the requirement for cutting edge protective frameworks that advance pairs with increasing threats. The discoveries highlight the basic job of AI in both carrying out and countering cybersecurity measures, representing a dualistic effect that requires ceaseless development in cybersecurity techniques.</p>2024-12-06T00:00:00+00:00Copyright (c) 2024 Mafaz Alanezi, Ruah Mouad Alyas AL-Azzawi https://journals.mesopotamian.press/index.php/CyberSecurity/article/view/681Securing Real-Time Data Transfer in Healthcare IoT Environments with Blockchain Technology2024-12-29T19:24:01+00:00Safa Hussein Oleiwi safa.h@uokerbala.edu.iqSaraswathy Shamini Gunasekaran safa.h@uokerbala.edu.iqKarrar Ibrahim AbdulAmeer safa.h@uokerbala.edu.iqMazin Abed Mohammedsafa.h@uokerbala.edu.iqMoamin A. Mahmoudsafa.h@uokerbala.edu.iq<p>The increasing number of Internet of Things (IoT) devices in healthcare applications, particularly during emergencies, necessitates safe protocols for transmitting real-time data. Medical data are essential for healthcare applications, and reliance on IoT devices to control information flow necessitates the consideration of five critical areas. This work addresses the security challenges associated with the transmission and storage of copyrighted healthcare data, as well as the inadequacy of the present methods in facilitating real-time data transfer given the volume of data and network conditions. This research provides a theoretical framework for the secure and immediate offloading of computations in IoT healthcare systems. The objective is to implement secure communication and networking technologies to ensure the security and integrity of medical data, maintain confidentiality, and facilitate real-time transmission of information. The proposed framework is simulated in MATLAB for system model implementation. A blockchain network sandbox was established with the delegated proof-of- stake (DPoS) consensus method, supplemented by proof-of-work (PoW) and proof-of-validation (PoV) for enhanced security. To assess the efficacy of this framework, multiple test scenarios focused on the number of nodes, the volume of data, and the conditions of network connectivity. The results demonstrated the system's efficacy in facilitating the offloading of real-time data in IoT healthcare applications. The aforementioned study demonstrated that the framework exhibited rapid transaction processing, efficient resource use, and energy conservation while also enhancing secure data transmission across various network conditions. The findings confirm that the proposed architecture can effectively and securely transmit real-time data in IoT healthcare applications without jeopardizing data authenticity, privacy, or integrity. The system's ability to address security challenges and manage substantial data volumes under varying settings indicates that it can be effectively deployed in healthcare systems, particularly in critical situations.</p> <p> </p>2024-12-27T00:00:00+00:00Copyright (c) 2024 Safa Hussein Oleiwi , Saraswathy Shamini Gunasekaran , Karrar Ibrahim AbdulAmeer , Mazin Abed Mohammed, Moamin A. Mahmoudhttps://journals.mesopotamian.press/index.php/CyberSecurity/article/view/603Design and Practical Implementation of a Stream Cipher Algorithm Based on a Lorenz System2024-11-20T02:39:10+00:00Hayder Mazin Makki Alibraheemi hayder.mazen@qu.edu.iqMazen M. A. Al Ibraheemi mazen.ali@qu.edu.iqZainb Hassan Radhy zainb.hassan@qu.edu.iq<p>Currently, the security of data has gained significant attention in modern life. Researchers have continued to address this issue. This work addresses image encryption in communication systems. It presents a proposed design and implementation of a cryptography system based on the Lorenz chaos oscillator. The paper methodology uses Xilinx System Generator (XSG) and Field Programmable Gate Array (FPGA) technologies to implement the chaotic system. To determine the approach that uses the least amount of FPGA resources while providing effective and efficient performance, the differential equations of the Lorenz chaotic system are solved via the forward-Euler and Runge–Kutta integration techniques. In the XSG environment, a secure communication system is constructed on the basis of the solution of the differential equations. After that, the planned communication system is implemented on the FPGA board and tested to encrypt images (coloured images). The histogram, entropy and other related security analysis factors are calculated and analysed to test the efficiency of the designed system. Six statistical methods were employed to provide a high level of image encryption in this work. Findings have shown that the proposed system generates (with stable, fast and robust performance) pseudorandom bits that can be successfully used to encrypt the data bits. The simulation and FPGA results are in good agreement; however, the security analysis factors prove that the system can be successfully adopted for image encryption purposes in real-time applications.</p>2024-11-18T00:00:00+00:00Copyright (c) 2024 Hayder Mazin Makki Alibraheemi , Mazen M. A. Al Ibraheemi , Zainb Hassan Radhy https://journals.mesopotamian.press/index.php/CyberSecurity/article/view/677Collaborative Intrusion Detection System to Identify Joint Attacks in Routing Protocol for Low-Power and Lossy Networks Routing Protocol on the Internet of Everything 2024-12-26T16:30:15+00:00Omar A. Abdulkareemit@gmail.comRaja Kumar Konthamit@gmail.comFarhad E. Mahmood it@gmail.com<p>The Routing Protocol for Low-Power and Lossy Networks (RPL) routing protocol is utilized in the Internet of Everything (IoE) is highly vulnerable to various collaborative routing attacks. This attack can highly degrade network performance through increased delay, energy consumption, and unreliable data exchange. This critical vulnerability necessitates a robust intrusion detection system. This study aims to enhance a Collaborative Intrusion Detection System (CIDS) for detecting and mitigating joint attacks in the RPL protocol, focusing on improving detection accuracy while minimizing network delay and energy usage. A series of algorithms and techniques are implemented, including Queue and Workload-Aware RPL (QWL-RPL) for congestion reduction, weighted random forward RPL with a genetic algorithm for load balancing, fuzzy logic for trust evaluation, and Light Gradient Boosting Machine (GBM) for attack detection. Additionally, Q-learning with a trickle-time algorithm is used to classify and manage joint attacks effectively. Numerical analysis indicates that the proposed approach performs better than existing methods in multiple metrics, including accuracy, energy consumption, throughput, control message overhead, precision, and computing time. By integrating these diverse techniques, the proposed CIDS offers a scalable and efficient solution to improve the security and performance of RPL-based networks in IoE environments, outperforming current approaches in detection accuracy and resource optimization.</p> <p> </p>2024-12-25T00:00:00+00:00Copyright (c) 2024 Omar A. Abdulkareem, Raja Kumar Kontham, Farhad E. Mahmood https://journals.mesopotamian.press/index.php/CyberSecurity/article/view/583An optimized model for network intrusion detection in the network operating system environment2024-11-07T18:56:09+00:00Abbas A. Abdulhameed ss.aa.cs@uomustansiriyah.edu.iqSundos A. Hameed Alazawiss.aa.cs@uomustansiriyah.edu.iqGhassan Muslim Hassan ss.aa.cs@uomustansiriyah.edu.iq<p>With the heavy reliance on computers and information technology to send and receive data across networks of various types, there has been concern about securing that data from intrusions and cyber-attacks. The expansion of network usage has led to an increase in hacker attacks, which has led to prioritizing cybersecurity precautions in detecting potential threats. Intrusion detection techniques are a critical security measure to protect networks in both personal and corporate environments that are managed by network operating systems. For this, the paper relies on designing a network intrusion detection model. Since deep neural networks (DNNs) are classic deep learning models known for their strong classification performance, making them popular in intrusion detection along with other machine learning algorithms, they have been chosen to improve intrusion classification models based on datasets for intrusion detection systems. The basic structure of this proposal is to adopt one of the optimization algorithms in extracting features from the dataset to obtain more accurate results in the classification and intrusion detection stage. The developed Corona Virus algorithm is adopted to improve the system performance by identifying optimal features. This algorithm, which consists of several stages, optimally selects individuals based on features from the NSL-KDD dataset used for intrusion detection. The resulting optimization solution acts as a network structure for the intrusion classification model based on machine learning and deep learning algorithms. The test results showed exceptional performance on the NSL-KDD dataset, where the proposed Convolution Neural Network CNN model achieved 99.3% accuracy for multi-class classification, while the Decision Tree (DT) achieved 88.64% accuracy for anomaly detection in bi-class classification.</p>2024-11-07T00:00:00+00:00Copyright (c) 2024 Abbas A. Abdulhameed , Sundos A. Hameed Alazawi, Ghassan Muslim Hassan https://journals.mesopotamian.press/index.php/CyberSecurity/article/view/673A Novel Hybrid Fusion Model for Intrusion Detection Systems Using Benchmark Checklist Comparisons2024-12-22T20:20:36+00:00Widad K. Mohammed widadalsaedy@gmail.comMohammed A. Taha cs.19.54@grad.uotechnology.edu.iqSaleh M. Mohammed saleh.mahdi@ijsu.edu.iq<p>Due to the quick development of network technology, assaults have become more sophisticated and dangerous. Numerous strategies have been put out to target different types of attacks and conduct trials using various approaches. In order to maintain network integrity and ensure network security, intrusion detection systems, or IDSs, are necessary. In this work, we investigate the effects of several feature extraction methods on IDS performance. We analyze the performance of various feature extraction techniques on two well-known intrusion detection datasets, NSL-KDD and CICIDS2017. Two datasets are used to test these approaches. By lowering dimensionality, enhancing data quality, and enabling visualization, principal component analysis (PCA) is a useful preprocessing method. But it's crucial to take into account its drawbacks and use it in conjunction with other preprocessing methods as necessary. The results are classified using the Decision Tree (DT), Random Forest (RF), Extreme Gradient Boosting (XGBoost), and Naive Bayes algorithms. This study aims to compare the final intrusion detection accuracy of each model in order to assess the performance of these approaches and gain a better understanding of the robustness and generalizability of each strategy across different dataset features. The experimental findings showed that the RF method reached a maximum accuracy of 98.57% on the NSL-KDD dataset and 97.10% on the CICIDS2017 dataset when conventional preprocessing was applied. However, with an accuracy of 97.85%, the RF model proved to be the most dependable model when used on the NSL-KDD dataset with both standard and fusion preprocessing.With standard and fusion preprocessing, the RF model achieved the best accuracy of 98.56% in the instance of the CICIDS2017 dataset. The findings demonstrated that PCA-based fusion preprocessing is not always the best option.</p>2024-12-22T00:00:00+00:00Copyright (c) 2024 Widad K. Mohammed , Mohammed A. Taha , Saleh M. Mohammed https://journals.mesopotamian.press/index.php/CyberSecurity/article/view/557A New Lightweight Cryptosystem for IoT in Smart City Environments2024-10-13T13:36:58+00:00Firas HazzaaFiras.hazzaa@pgr.anglia.ac.ukMd Mahmudul HasanFiras.hazzaa@pgr.anglia.ac.ukAkram QashouFiras.hazzaa@pgr.anglia.ac.ukSufian YousefFiras.hazzaa@pgr.anglia.ac.uk<p>Internet of Things (IoT) devices, user interfaces (UI), software, as well as communication networks are all deployed within Smart Cities topology. The security approach designed for Internet of Things IoT should be able to prevent and detect both internal and external attacks. The problem in IoT network that not every linked node or device has an adequate amount of processing power. This means that data encryption and other related activities will be impossible and means that the security of any kind must be lightweight. A trustworthy security solution that stops illegal access to private data on the network is necessary for maintaining the privacy of information on the Internet of Things. Cryptographic processes need to be quicker and more compact without sacrificing security. The aim of this study is to reduce the execution time and power consumption of encryption processes without compromise the complexity of the encryption algorithm. This research presents a new lightweight cryptographic technique to protect various multimedia and real-time traffics across IoT network, by using two S-box in SubByte of encryption process, without affecting its performance. In this study, different audio samples will be used to test the new algorithm efficiency. Comparing the suggested method to the most advanced standard algorithm, it can reduce the cryptography process's execution time as well as energy consumption while maintaining the required security level. The outcomes demonstrate good performance in terms of power usage and delay. The new technique consumed a roughly 0.2 µJ for encryption process while the typical AES algorithm consumed 0.29 µJ, this mean the new algorithm achieved (33% power savings), while maintaining a good complexity level (security) within the process of encryption according to the results in tables I, II, and the comparison in table III. The novelty of this work can be showed by using dual XOR S-box technique which increased the complexity of SubByte process making it more secure without overload the processing performance, in addition to the reduction in encryption rounds which contribute to enhance the performance without compromise the security. Making it more suited for the Internet of Things (IoT) used in smart city environments.</p>2024-10-13T00:00:00+00:00Copyright (c) 2024 Firas Hazzaa, Md Mahmudul Hasan, Akram Qashou, Sufian Yousefhttps://journals.mesopotamian.press/index.php/CyberSecurity/article/view/660Dental segmentation via enhanced YOLOv8 and image processing techniques2024-12-19T02:54:39+00:00Dhiaa Mohammed Abed dhiaa.m.alfyadh@uotechnology.edu.iqShuzlina Abdul-Rahman dhiaa.m.alfyadh@uotechnology.edu.iqSofianita Mutalib dhiaa.m.alfyadh@uotechnology.edu.iq<p>By blending computer-aided medical systems with cutting-edge privacy technologies, healthcare providers can deliver more personalized, effective care while maintaining the highest data security standards and patient trust. The challenge of dental segmentation in computer vision, a task focused on accurately outlining dental structures in images, traditional methods, particularly convolution neural networks (CNNs), didn't reach high accuracy in this area due to suboptimal performance and computational inefficiency. The goal of image segmentation is to group pixels on the basis of their visual properties, such as color, texture, intensity, or spatial proximity, to identify and delineate the boundaries of distinct objects or regions within the image. In this paper, You Only Look Once (YOLOv8) algorithm is improved to segment teeth with high accuracy and high execution speed. The increase in the number of layers of YOLOv8 relied upon, as the accuracy of the algorithm segmentation depends on the number of layers used to extract features from the image (backbone) and the number of layers of the head (prediction). In addition, the size of the layers is decreased to increase the execution speed. The novelty of this paper is the proposed YOLOv8 model in addition to the Proposed Activation Function (PAF). The dataset (top view) used was taken from a dental clinic where 526 images were taken of dental and different patients. The best accuracy reached 99.561% when the enhanced YOLOv8 segmentation model was applied to the dental dataset. It can be concluded that the improved model of the YOLOv8 algorithm has increased the accuracy of dental segmentation compared to previous research because it relies on a proposed PAF that increases the difference between the features extracted from the layers of the proposed model which makes it able to distinguish between teeth and surrounding parts significantly.</p>2024-12-08T00:00:00+00:00Copyright (c) 2024 Dhiaa Mohammed Abed , Shuzlina Abdul-Rahman , Sofianita Mutalib https://journals.mesopotamian.press/index.php/CyberSecurity/article/view/352CryptoGenSec: A Hybrid Generative AI Algorithm for Dynamic Cryptographic Cyber Defence2024-07-30T08:06:54+00:00Ghada Al-Katebghada.emad@uoitc.edu.iqIsmael Khaleelismael.khaleel.cs70@gmail.comMohammad Aljanabimohammadaljanabi1988@gmail.com<p>As the world of cybersecurity constantly changes, traditional cryptographic techniques have faced limitations in the context of today's sophisticated and dynamic threats. Existing protections usually adopt static algorithms and key structures, making it difficult for them to resist the categories of modern attacks. This research paper, therefore, presents CryptoGenSec, a brand-new generative AI algorithm based on a hybrid consisting of generative adversarial networks (GANs) on reconnaissance learning (RL), for the purpose of increasing cryptographic cyber defences. CryptoGenSec applies a GAN to simulate various types of attack scenarios in cyberspace to perceive possible vulnerabilities. Then, RL refines the response strategies of our algorithm through recursive learning from the above simulations in real time and realizes the dynamic adaptation and evolution of defense mechanisms. By assessing the results of CryptoGenSec’s performance when traditional security methods are used as baselines, we can use several metrics for evaluation, such as detection accuracy, response time, resilience and evolution ability. According to these findings, the superiority of CryptoGenSec over conventional mechanisms becomes evident. To be more specific, it even shows an overwhelming edge in terms of threat detection, resulting in a 20% increase in speed of response, a 30% decrease in speed of response, and resisting power, making it 25% harder than the other methods. Moreover, it has a greater possibility of eliminating false-positive effects, which usually come from new and even dawned jeopardy: 50%. Moreover, to highlight the making-a-fortune frauds in the zero-day world, a comparison of the cohorts makes CryptoGenSec a 40% upper step. Stopping attackers from taking away all their data is also its plus point, which gains 95% achievement, whereas using mere methods only results in a 70% possibility. An enormous step in cybersecurity was taken with the combination of GANs and RL within the CryptoGenSec algorithm. Instead of being defenceless against all attacks, this approach changes and matches the threat level when necessary. The highly promising results presented here demonstrate its potential as a crucial technology for addressing the growing complexities of cyber challenges. This is a large step toward making defensive mechanisms more efficient and reliable.</p>2024-09-09T00:00:00+00:00Copyright (c) 2024 Ghada Emad Al-Kateb, Ismael Khaleel, Mohammad Aljanabi