Search results
1 – 10 of over 9000Wilson Charles Chanhemo, Mustafa H. Mohsini, Mohamedi M. Mjahidi and Florence U. Rashidi
This study explores challenges facing the applicability of deep learning (DL) in software-defined networks (SDN) based campus networks. The study intensively explains the…
Abstract
Purpose
This study explores challenges facing the applicability of deep learning (DL) in software-defined networks (SDN) based campus networks. The study intensively explains the automation problem that exists in traditional campus networks and how SDN and DL can provide mitigating solutions. It further highlights some challenges which need to be addressed in order to successfully implement SDN and DL in campus networks to make them better than traditional networks.
Design/methodology/approach
The study uses a systematic literature review. Studies on DL relevant to campus networks have been presented for different use cases. Their limitations are given out for further research.
Findings
Following the analysis of the selected studies, it showed that the availability of specific training datasets for campus networks, SDN and DL interfacing and integration in production networks are key issues that must be addressed to successfully deploy DL in SDN-enabled campus networks.
Originality/value
This study reports on challenges associated with implementation of SDN and DL models in campus networks. It contributes towards further thinking and architecting of proposed SDN-based DL solutions for campus networks. It highlights that single problem-based solutions are harder to implement and unlikely to be adopted in production networks.
Details
Keywords
Somia Boubedra, Cherif Tolba, Pietro Manzoni, Djamila Beddiar and Youcef Zennir
With the demographic increase, especially in big cities, heavy traffic, traffic congestion, road accidents and augmented pollution levels hamper transportation networks. Finding…
Abstract
Purpose
With the demographic increase, especially in big cities, heavy traffic, traffic congestion, road accidents and augmented pollution levels hamper transportation networks. Finding the optimal routes in urban scenarios is very challenging since it should consider reducing traffic jams, optimizing travel time, decreasing fuel consumption and reducing pollution levels accordingly. In this regard, the authors propose an enhanced approach based on the Ant Colony algorithm that allows vehicle drivers to search for optimal routes in urban areas from different perspectives, such as shortness and rapidness.
Design/methodology/approach
An improved ant colony algorithm (ACO) is used to calculate the optimal routes in an urban road network by adopting an elitism strategy, a random search approach and a flexible pheromone deposit-evaporate mechanism. In addition, the authors make a trade-off between route length, travel time and congestion level.
Findings
Experimental tests show that the routes found using the proposed algorithm improved the quality of the results by 30% in comparison with the ACO algorithm. In addition, the authors maintain a level of accuracy between 0.9 and 0.95. Therefore, the overall cost of the found solutions decreased from 67 to 40. In addition, the experimental results demonstrate that the authors’ improved algorithm outperforms not only the original ACO algorithm but also popular meta-heuristic algorithms such as the genetic algorithm (GA) and particle swarm optimization (PSO) in terms of reducing travel costs and improving overall fitness value.
Originality/value
The proposed improvements to the ACO to search for optimal paths for urban roads include incorporating multiple factors, such as travel length, time and congestion level, into the route selection process. Furthermore, random search, elitism strategy and flexible pheromone updating rules are proposed to consider the dynamic changes in road network conditions and make the proposed approach more relevant and effective. These enhancements contribute to the originality of the authors’ work, and they have the potential to advance the field of traffic routing.
Details
Keywords
Miao Ye, Lin Qiang Huang, Xiao Li Wang, Yong Wang, Qiu Xiang Jiang and Hong Bing Qiu
A cross-domain intelligent software-defined network (SDN) routing method based on a proposed multiagent deep reinforcement learning (MDRL) method is developed.
Abstract
Purpose
A cross-domain intelligent software-defined network (SDN) routing method based on a proposed multiagent deep reinforcement learning (MDRL) method is developed.
Design/methodology/approach
First, the network is divided into multiple subdomains managed by multiple local controllers, and the state information of each subdomain is flexibly obtained by the designed SDN multithreaded network measurement mechanism. Then, a cooperative communication module is designed to realize message transmission and message synchronization between the root and local controllers, and socket technology is used to ensure the reliability and stability of message transmission between multiple controllers to acquire global network state information in real time. Finally, after the optimal intradomain and interdomain routing paths are adaptively generated by the agents in the root and local controllers, a network traffic state prediction mechanism is designed to improve awareness of the cross-domain intelligent routing method and enable the generation of the optimal routing paths in the global network in real time.
Findings
Experimental results show that the proposed cross-domain intelligent routing method can significantly improve the network throughput and reduce the network delay and packet loss rate compared to those of the Dijkstra and open shortest path first (OSPF) routing methods.
Originality/value
Message transmission and message synchronization for multicontroller interdomain routing in SDN have long adaptation times and slow convergence speeds, coupled with the shortcomings of traditional interdomain routing methods, such as cumbersome configuration and inflexible acquisition of network state information. These drawbacks make it difficult to obtain global state information about the network, and the optimal routing decision cannot be made in real time, affecting network performance. This paper proposes a cross-domain intelligent SDN routing method based on a proposed MDRL method. First, the network is divided into multiple subdomains managed by multiple local controllers, and the state information of each subdomain is flexibly obtained by the designed SDN multithreaded network measurement mechanism. Then, a cooperative communication module is designed to realize message transmission and message synchronization between root and local controllers, and socket technology is used to ensure the reliability and stability of message transmission between multiple controllers to realize the real-time acquisition of global network state information. Finally, after the optimal intradomain and interdomain routing paths are adaptively generated by the agents in the root and local controllers, a prediction mechanism for the network traffic state is designed to improve awareness of the cross-domain intelligent routing method and enable the generation of the optimal routing paths in the global network in real time. Experimental results show that the proposed cross-domain intelligent routing method can significantly improve the network throughput and reduce the network delay and packet loss rate compared to those of the Dijkstra and OSPF routing methods.
Details
Keywords
A zero-day vulnerability is a complimentary ticket to the attackers for gaining entry into the network. Thus, there is necessity to device appropriate threat detection systems and…
Abstract
A zero-day vulnerability is a complimentary ticket to the attackers for gaining entry into the network. Thus, there is necessity to device appropriate threat detection systems and establish an innovative and safe solution that prevents unauthorised intrusions for defending various components of cybersecurity. We present a survey of recent Intrusion Detection Systems (IDS) in detecting zero-day vulnerabilities based on the following dimensions: types of cyber-attacks, datasets used and kinds of network detection systems.
Purpose: The study focuses on presenting an exhaustive review on the effectiveness of the recent IDS with respect to zero-day vulnerabilities.
Methodology: Systematic exploration was done at the IEEE, Elsevier, Springer, RAID, ESCORICS, Google Scholar, and other relevant platforms of studies published in English between 2015 and 2021 using keywords and combinations of relevant terms.
Findings: It is possible to train IDS for zero-day attacks. The existing IDS have strengths that make them capable of effective detection against zero-day attacks. However, they display certain limitations that reduce their credibility. Novel strategies like deep learning, machine learning, fuzzing technique, runtime verification technique, and Hidden Markov Models can be used to design IDS to detect malicious traffic.
Implication: This paper explored and highlighted the advantages and limitations of existing IDS enabling the selection of best possible IDS to protect the system. Moreover, the comparison between signature-based and anomaly-based IDS exemplifies that one viable approach to accurately detect the zero-day vulnerabilities would be the integration of hybrid mechanism.
Details
Keywords
Denial-of-service (DoS) attacks develop unauthorized entry to various network services and user information by building traffic that creates multiple requests simultaneously…
Abstract
Purpose
Denial-of-service (DoS) attacks develop unauthorized entry to various network services and user information by building traffic that creates multiple requests simultaneously making the system unavailable to users. Protection of internet services requires effective DoS attack detection to keep an eye on traffic passing across protected networks, freeing the protected internet servers from surveillance threats and ensuring they can focus on offering high-quality services with the fewest response times possible.
Design/methodology/approach
This paper aims to develop a hybrid optimization-based deep learning model to precisely detect DoS attacks.
Findings
The designed Aquila deer hunting optimization-enabled deep belief network technique achieved improved performance with an accuracy of 92.8%, a true positive rate of 92.8% and a true negative rate of 93.6.
Originality/value
The introduced detection approach effectively detects DoS attacks available on the internet.
Details
Keywords
Vasim Ahmad, Lalit Goyal, Tilottama Singh and Jugander Kumar
This chapter explores the significance of blockchain technology in protecting data for intelligent applications across various industries. Blockchain is a distributed ledger that…
Abstract
This chapter explores the significance of blockchain technology in protecting data for intelligent applications across various industries. Blockchain is a distributed ledger that ensures the immutability and security of transactions. Given the increasing need for security measures in industries, understanding blockchain technology is crucial for preparing for its future applications.
This chapter aims to examine the use of blockchain technology across industries and presents a compilation of existing and upcoming blockchain technologies for intelligent applications. The methodology involves reviewing research to understand the security needs of different industries and providing an overview of methods used to enhance multi-institutional and multidisciplinary research in areas like the financial system, smart grid, and transportation system.
The findings highlight the benefits of blockchain networks in providing transparency, trust, and security for industries. The Responsible Sourcing Blockchain Network (RSBN) is an example that utilizes blockchain's decentralized ledger to track sustainable sourcing from mine to final product. This information can be shared with auditors, corporate governance organizations, and customers.
The practical implications of this chapter are significant, serving as a valuable resource for industries concerned with identity privacy, traceability, immutability, transparency, auditability, and security. Understanding and implementing blockchain technology can address the growing need for secure and intelligent applications, ensuring data protection and enhancing trust in various sectors.
Details
Keywords
Adobi Jessica Timiyo and Samuel Foli
This paper aims to systematically review the literature on knowledge leakage through social networks in the past decade to find existing gaps, identify potential risk factors…
Abstract
Purpose
This paper aims to systematically review the literature on knowledge leakage through social networks in the past decade to find existing gaps, identify potential risk factors while, ultimately, proposing ways of mitigating these factors.
Design/methodology/approach
This study adopted Preferred Reporting Items for Systematic reviews and Meta-Analysis as guide for searching relevant scholarly publications. Subject-specific and -related research papers were obtained from three databases, namely, Scopus, Web of Science and EBSCOhost. The review data was generated from the search results while adopting specific criteria to either accept or reject a particular publication during the search process.
Findings
Technological, operational and human knowledge factors are some of the risks resulting from knowledge leakage. Highlights of the paper include strategies for mitigating these factors, including continuous training, creating awareness, banning social media usage at work and reinforcing nondisclosure policies. This study also found potential gaps from the literature, categorized as topical, geographical, industrial, theoretical, methodological and conceptual gaps while proposing ways of addressing these gaps using specific research questions. These questions set the direction for future studies on knowledge leakage and social networks.
Originality/value
Implications of the findings are laid out, particularly the idea of developing actionable managerial plans for preventing knowledge leakage from occurring in organizations in the first place. The systematic, rigorous, transparent and methodological procedures used throughout the entire research process strongly suggest that the findings and conclusions are legitimate. While the findings were not drawn arbitrarily, they potentially offer windows of opportunities for bridging the six potential gaps identified in this paper.
Details