期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A Secure Framework for Blockchain Transactions Protection
1
作者 Wafaa N.Al-Sharu Majdi K.Qabalin +1 位作者 Muawya Naser Omar A.Saraerh 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1095-1111,共17页
One of the most extensively used technologies for improving the security of IoT devices is blockchain technology.It is a new technology that can be utilized to boost the security.It is a decentralized peer-to-peer net... One of the most extensively used technologies for improving the security of IoT devices is blockchain technology.It is a new technology that can be utilized to boost the security.It is a decentralized peer-to-peer network with no central authority.Multiple nodes on the network mine or verify the data recorded on the Blockchain.It is a distributed ledger that may be used to keep track of transactions between several parties.No one can tamper with the data on the blockchain since it is unchangeable.Because the blocks are connected by hashes,the transaction data is safe.It is managed by a system that is based on the consensus of network users rather than a central authority.The immutability and tamper-proof nature of blockchain security is based on asymmetric cryptography and hashing.Furthermore,Blockchain has an immutable and tamper-proof smart contract,which is a logic that enforces the Blockchain’s laws.There is a conflict between the privacy protection needs of cyber-security threat intelligent(CTI)sharing and the necessity to establish a comprehensive attack chain during blockchain transactions.This paper presents a blockchain-based data sharing paradigm that protects the privacy of CTI sharing parties while also preventing unlawful sharing and ensuring the benefit of legitimate sharing parties.It builds a full attack chain using encrypted threat intelligence and exploits the blockchain’s backtracking capacity to finish the decryption of the threat source in the attack chain.Smart contracts are also used to send automatic early warning replies to possible attack targets.Simulation tests are used to verify the feasibility and efficacy of the suggested model. 展开更多
关键词 MANUSCRIPT preparation typeset FORMAT
下载PDF
VPN and Non-VPN Network Traffic Classification Using Time-Related Features
2
作者 Mustafa Al-Fayoumi Mohammad Al-Fawa’reh Shadi Nashwan 《Computers, Materials & Continua》 SCIE EI 2022年第8期3091-3111,共21页
The continual growth of the use of technological appliances during the COVID-19 pandemic has resulted in a massive volume of data flow on the Internet,as many employees have transitioned to working from home.Furthermo... The continual growth of the use of technological appliances during the COVID-19 pandemic has resulted in a massive volume of data flow on the Internet,as many employees have transitioned to working from home.Furthermore,with the increase in the adoption of encrypted data transmission by many people who tend to use a Virtual Private Network(VPN)or Tor Browser(dark web)to keep their data privacy and hidden,network traffic encryption is rapidly becoming a universal approach.This affects and complicates the quality of service(QoS),traffic monitoring,and network security provided by Internet Service Providers(ISPs),particularly for analysis and anomaly detection approaches based on the network traffic’s nature.The method of categorizing encrypted traffic is one of the most challenging issues introduced by a VPN as a way to bypass censorship as well as gain access to geo-locked services.Therefore,an efficient approach is especially needed that enables the identification of encrypted network traffic data to extract and select valuable features which improve the quality of service and network management as well as to oversee the overall performance.In this paper,the classification of network traffic data in terms of VPN and non-VPN traffic is studied based on the efficiency of time-based features extracted from network packets.Therefore,this paper suggests two machine learning models that categorize network traffic into encrypted and non-encrypted traffic.The proposed models utilize statistical features(SF),Pearson Correlation(PC),and a Genetic Algorithm(GA),preprocessing the traffic samples into net flow traffic to accomplish the experiment’s objectives.The GA-based method utilizes a stochastic method based on natural genetics and biological evolution to extract essential features.The PC-based method performs well in removing different features of network traffic.With a microsecond perpacket prediction time,the best model achieved an accuracy of more than 95.02 percent in the most demanding traffic classification task,a drop in accuracy of only 2.37 percent in comparison to the entire statistical-based machine learning approach.This is extremely promising for the development of real-time traffic analyzers. 展开更多
关键词 Network traffic-flow traffic classification time-based features machine learning VPN traffic analysis
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部