Dimri S. Algorithms. Big Data, Optimization Techniques, Cyber Security 2024
Dimri S. Algorithms. Big Data, Optimization Techniques, Cyber Security 2024
Dimri S. Algorithms. Big Data, Optimization Techniques, Cyber Security 2024
Edited by
Mangey Ram
Volume 17
Algorithms
Big Data, Optimization Techniques, Cyber Security
Edited by
Sushil C. Dimri
Abhay Saxena
Bhuvan Unhelkar
Akshay Kumar
ISBN 9783111228006
Contents
1. Preface
2.
Rajiv Ranjan Giri, Richa Indu, Sushil Chandra Dimri
Machine learning-enabled techniques for speech
categorization
1. 1 Introduction
2. 2 Recent trends in speech categorization
3. 3 Proposed methodology
1. 3.1 Categorizing comments
2. 3.2 Data acquisition and preprocessing
3. 3.3 The proposed algorithm
4. 4 Results and discussion
1. 4.1 Hijab case (Karnataka)
2. 4.2 Boycott movies dataset
3. 4.3 Dharamsansad (Haridwar)
5. 5 Conclusion
3.
Akash Dogra, Shiv Ashish Dhondiyal, Sushil Chandra Dimri
Comprehensive study of cybersecurity issues and challenges
1. 1 Introduction
2. 2 Cybercrime
3. 3 Cyberspace threats
4. 4 Notable recent cybercrime
5. 5 Cybersecurity
6. 6 Cybersecurity policy
7. 7 Future direction
8. 8 Conclusion
4.
Chandrashekhar Patel, Bhanu Priya Yadav, Aditi Saxena
An energy-efficient FPGA-based implementation of AES
algorithm using HSTL IO standards for new digital age
technologies
1. 1 Introduction
1. 1.1 The Advanced Encryption Standard (AES)
2. 1.2 FPGA
3. 1.3 HSTL (high-speed transceiver logic) IO standard
2. 2 Literature review
3. 3 Design methodology
1. 3.1 Simulation
2. 3.2 RTL analysis
3. 3.3 Synthesis
4. 3.4 Implementation
5. 3.5 Program and debug
4. 4 Results and analysis
1. 4.1 Computing total power consumption of HSTL_I_18
2. 4.2 Computing total power consumption of HSTL_II
3. 4.3 Computing total power consumption of HSTL_II_18
5. 5 Conclusion
6. 6 Future scope
5.
Bhawnesh Kumar, Ashwani Kumar, Harendra Singh Negi,
Ishwari Singh Rajput
A comparative study on security issues and clustering of
wireless sensor networks
1. 1 Introduction
1. 1.1 Popular research areas of WSNs
2. 1.2 Comparison of clustering objectives and energy
consumption of node
3. 1.3 Security and privacy issues in WSN
2. 2 Critical literature review
3. 3 Research gaps identified
4. 4 Conclusion
6.
Deonarain Brijlall, Tauqeer Ahmed Usmani, Richa Indu
Heuristic approach and its application to solve NP-complete
traveling salesman problem
1. 1 Introduction
2. 2 Related work
3. 3 Techniques and mathematical models
1. 3.1 The traveling salesman problem
2. 3.2 Nearest neighbor approach
3. 3.3 Greedy approach
4. 3.4 The proposed heuristic solution
4. 4 Results and discussion
1. 4.1 Identifying the optimal route of a milk van for 10
houses
2. 4.2 Identifying the optimal route of a milk van for 20
houses
5. 5 Conclusion
7.
Megha Shah, Akshay Kumar, Shristi Kharola, Mangey Ram
Assessment of fake news detection from machine learning
and deep learning techniques
1. 1 Introduction
2. 2 Literature survey
3. 3 Methodology
1. 3.1 Natural language processing (NLP)
2. 3.2 Machine learning (ML)
3. 3.3 Deep learning (DL)
4. 3.4 Study framework
5. 3.5 Datasets
6. 3.6 Data cleaning steps (preprocessing the dataset)
7. 3.7 Models utilized in the study
4. 4 Results and analysis of datasets
1. 4.1 Results for dataset 1
2. 4.2 Result for dataset 2
5. 5 Conclusion and future work
8.
Harendra Singh Negi, Aditya Bhatt, Vandana Rawat
Spam mail detection various machine learning methods and
their comparisons
1. 1 Introduction
2. 2 Related works
3. 3 Purposed work
4. 4 Implementation and result
1. 4.1 Performance metrics
2. 4.2 Time elapsed
3. 4.3 AUC-ROC
4. 4.4 PR curve
5. 5 Conclusion
9.
Rahul Bijalwan, Vandana Rawat, Akshita Patwal, Sudhanshu
Maurya
Cybersecurity threats in modern digital world
1. 1 Introduction
2. 2 Literature review
3. 3 Issues in cybersecurity
4. 4 Attacks with their classification
1. 4.1 Phishing
2. 4.2 SQL injection
3. 4.3 Brute force attack
4. 4.4 Malware
5. 4.5 Man-in-the-middle
5. 5 Data breaches
6. 6 Conclusion
10.
Parth Gautam, Apurva Omer, Jeetendra Pande, Devesh Bora
Mechanism to protect the physical boundary of organization
where the private and public networks encounter
1. 1 Introduction
2. 2 Literature review
3. 3 Purpose and objectives
4. 4 Overview of private and public networks
5. 5 Security considerations for private and public networks
1. 5.1 Network segmentation
2. 5.2 Segmentation techniques
3. 5.3 Use of firewalls and intrusion prevention systems
(IPS)
4. 5.4 Access control mechanisms
5. 5.5 Network access control (NAC) solutions
6. 5.6 Physical security measures
6. 6 Future trends and considerations
7. 7 Conclusion
11.
Bhawnesh Kumar, Aditya Bhatt, Neeraj Panwar
By combining binary search and insertion sort, a sorting
method for small input size
1. 1 Introduction
2. 2 Related works
3. 3 Proposed work
1. 3.1 Algorithm
2. 3.2 Time complexity
3. 3.3 In the worst case of binary insertion sort
4. 3.4 For average case of binary insertion sort
5. 3.5 Time complexity analysis
4. 4 Numerical illustration
5. 5 Conclusion
12. Index
1. V
2. 1
3. 2
4. 3
5. 4
6. 5
7. 6
8. 7
9. 8
10. 9
11. 10
12. 11
13. 12
14. 13
15. 14
16. 15
17. 16
18. 17
19. 18
20. 19
21. 20
22. 21
23. 22
24. 23
25. 24
26. 25
27. 26
28. 27
29. 28
30. 29
31. 30
32. 31
33. 32
34. 33
35. 34
36. 35
37. 36
38. 37
39. 38
40. 39
41. 41
42. 42
43. 43
44. 44
45. 45
46. 46
47. 47
48. 48
49. 49
50. 50
51. 51
52. 52
53. 53
54. 55
55. 56
56. 58
57. 59
58. 60
59. 61
60. 62
61. 63
62. 64
63. 65
64. 66
65. 67
66. 69
67. 70
68. 71
69. 72
70. 73
71. 74
72. 75
73. 76
74. 77
75. 78
76. 79
77. 80
78. 81
79. 82
80. 83
81. 84
82. 85
83. 86
84. 87
85. 88
86. 89
87. 90
88. 91
89. 92
90. 93
91. 94
92. 95
93. 96
94. 97
95. 98
96. 99
97. 100
98. 101
99. 102
00. 103
01. 104
02. 105
03. 106
04. 107
05. 108
06. 109
07. 110
08. 111
09. 112
10. 113
11. 114
12. 115
13. 116
14. 117
15. 118
16. 119
17. 120
18. 121
19. 122
20. 123
21. 124
22. 125
23. 126
24. 127
25. 128
26. 129
27. 130
28. 131
29. 132
30. 133
31. 134
32. 135
33. 137
34. 138
35. 139
36. 140
37. 141
38. 142
39. 143
40. 144
41. 145
42. 146
43. 147
44. 149
45. 150
46. 151
47. 153
48. 156
49. 157
50. 159
51. 160
52. 161
53. 162
54. 165
55. 166
56. 167
57. 168
58. 169
59. 170
60. 171
61. 172
62. 173
63. 174
64. 175
65. 176
66. 177
67. 183
68. 184
Preface
Algorithms play a vital role in all sciences, especially in
computer science. We are always in search of efficient
algorithms that give the results in less amount of time and that
consume less space for large input size.
3 Proposed methodology
According to the 267th report of the Law Commission of India,
hate speech is defined as “the incitement to hatred towards a
group of people based on their race, ethnicity, gender, sexual
orientation, or other characteristics” [→1]. Laws in India do not
exclusively define any section against hate speech, though the
Indian Penal Code (IPC) has some legal provisions to prohibit
the violation of the right of freedom of speech. These are
Sections 124A, 153, 295A, 298, and 505 [→1, →23, →24, →25,
→26, →27] constituting:
S. Original
Processed comments
no. comments
… This is
the real
jarnilisam
6 Truth 100%
Truth'
Speech_Categorization
Output: Categories { H, N, O, V, R}
Step 3. Match the occurrence of each noun or foreign word with its
presence in the sets SR, SV, and SO. And keep a count of each
occurrence in CR, CV, and CO.
Step 4. Assigning the respective categories based on the nature of
word:
5 Conclusion
This work is designed to categorize the comments on social
platforms into one out of five categories, which are hostile,
religious, offensive, violenceful, and normal. Traditional and
simple word-matching criteria to perform feature
categorization is used, based on the occurrence of words in
either one or all of three sets, named SR, SO, and SV containing
religion- oriented, offensive, and violence-provocating words,
respectively, as per different IPC sections. Comments were
extracted from the YouTube and Facebook pages of various
news channels reporting three different incidents: (i) the Hijab
case (Karnataka), (ii) the Boycott movies, and (iii) Dharmsansad
(Haridwar), which are then prepared as three datasets, and
preprocessed to maintain anonymity and to obtain clean data
for categorization. Furthermore, the total similarity index is
calculated to demonstrate the kinds of words used most in these
datasets. Finally, to estimate the feasibility of the algorithm,
linear-, polynomial-, and RBF-kernel SVMs, LR, Gini index and
entropy criteria DT, and RF classifiers are used, after handling
the imbalanced data with SVMSMOTE. Considering the
misclassification made by the proposed algorithm, which is
2.58%, 1.344%, and 0.813% of the total sample sizes on the Hijab
case (Karnataka), Boycott movies, and Dharmsansad
(Haridwar) datasets, respectively, the proposed speech
categorization approach obtained the highest efficacy of 99.03%
for the Dharmsansad (Haridwar) dataset, 98.66% for the
Boycott movies dataset, and 97.42% for Hijab case (Karnataka)
dataset with RF classifier. Furthermore, the misclassification
rate imparts that the presented approach generalizes better
with more samples than the smaller sample sizes. However, the
work also has certain limitations revealed while scrutinizing
the misclassified instances, like the inability of the work to
categorize comments with deep sarcasm, skepticism, or
questioning, and understanding of the context of violence-
supporting statements, where the explicit use of violence-
provocating words is missing. In the future work, we would
work to rectify these lacunae and try to identify more tones of
speech behind the comments.
References
[1] Dr. Justice B. S. Chauhan, “267. The Hate Speech (घृणा भाषण),”
Twenty-First Law Commission of India, March 23, 2017. Available
from:
→https://lawcommissionofindia.nic.in/report_twentyfirst/ a, b,
c, d
[6] N. Jacob, “Data Check: In Seven Years, India has Seen a 500%
Rise in Cases Filed Under Its Hate-speech Law,” Scroll.in, 23 June
2022. Available from: →https://scroll.in/article/1026701/data-
check-in-seven-years-india-saw-a-500-rise-in-cases-filed-under-
its-hate-speech-related-law →
2 Cybercrime
Cybercrime is a global phenomenon, with criminals operating
across multiple countries and jurisdictions. The effects of
cybercrime can be felt in many areas, including the economy,
national security, and the personal safety of citizens. The cost of
cybercrime is estimated to be in the billions of dollars, with the
financial losses caused by cybercriminals increasing each year.
One of the biggest challenges in combating cybercrime is the
lack of international cooperation. The threat of cybercrime has
grown significantly in recent years, with 2020 seeing a 358%
increase in malware attacks and 2021 seeing an additional
125% increase in global cyberattacks refer to →Figure 1.
Cybercrime has increased recently, with an annual increase in
the number of internet users who fall prey to phishing scams.
Victims of investment fraud lost, on average, $70,811 per
incident in 2022 [→8]. The UK announced the “Ukraine Cyber
Programmed” in 2022 to counter these dangers, offering a £6.35
million package to safeguard Ukrainian critical infrastructure.
The risk of cybercrime has recently increased because of the
COVID-19 pandemic, with expenses projected to soar to $10.5
trillion yearly by 2025 [→9]. Businesses of all sizes need to
invest in strong cybersecurity to safeguard against the most
recent attacks.
5 Cybersecurity
Any business or organization must prioritize cybersecurity
because it protects sensitive information about customers and
clients from external dangers like rivals or hostile actors. It
includes a variety of steps required to maintain the security of
computer systems, servers, intranets, and networks. These
safeguards must be put in place by cybersecurity specialists to
guarantee that only authorized users may access the data.
Understanding the many forms of cybersecurity available is
crucial for offering the greatest protection. There are several
sorts, including intrusion detection systems, firewalls, access
control, authentication, and encryption [→41]. To put the best
security measures into place, it is crucial to comprehend how
these measures differ from one another because each one has
advantages and disadvantages of its own. Security is an
important aspect of any organization’s operations and a key
component of any IT strategy. There are a variety of different
types of cybersecurity measures that can be taken to ensure the
safety of a company’s network, applications, information, and
operations.
1) Network security: Network security is a combination of
technologies, processes, and practices designed to protect an
organization’s computer networks from malicious attacks,
misuse, and disruption. This includes the implementation of
antivirus programs, the use of encryption to protect data in
transit, firewalls to block access from unauthorized users,
and security policies to ensure that all users and devices
adhere to the same set of acceptable practices [→9].
Organizations may employ monitoring tools to detect and
investigate any suspicious activities. Network security is
essential for any business as it helps to protect sensitive data,
maintain customer trust, and prevent costly downtime.
2) Information security: Information security is the practice
of protecting data from unauthorized access, disclosure,
misuse, modification, or destruction. It is a multilayered
approach that includes the implementation of strong access
control measures, the use of encryption technologies and
secure networks, and the adoption of robust policies and
procedures for data access and usage [→42]. It also requires
the active participation of all staff members, who must
adhere to prescribed security protocols and use technology
as appropriate. Information security requires all personnel
to be aware of their responsibility in maintaining the
security of the organization’s data and to take the necessary
steps to ensure that data is kept secure on all devices,
networks, and systems. Businesses must have a data
protection strategy in place to ensure the protection of their
data and the privacy of their customers.
3) Operational security: This involves the implementation of
technical, administrative, and physical controls to safeguard
data from unauthorized access, disclosure, modification, or
destruction. Data security measures include encryption,
access control, authentication, authorization, backup, and
disaster recovery [→43]. Data security should consider ways
to mitigate risk and maximize data privacy, such as data
minimization, data governance, and data classification.
4) Application security: Application security is a critical
component of any successful development project. Software
solutions, such as antivirus programs, encryption, and
firewalls, should be employed to protect the system against
external threats. Hardware solutions, such as network
segmentation, can be used to increase security and reduce
the chances of unauthorized access to sensitive data or
applications. To ensure that risk levels remain low, these
hardware and software solutions should be regularly
monitored and updated with the latest security protocols
[→44]. It is important to ensure that application developers
are trained on best practices regarding security and that they
are aware of the ramifications of their actions in the event of
a breach.
5) Cloud security: Cloud security is an essential component
of any business’s cybersecurity strategy. By implementing
cloud security measures, organizations can protect their
data, intellectual property, and other sensitive information
from unauthorized access, malicious attacks, and other
cyberthreats. Cloud security involves a range of techniques,
from encryption and authentication to firewalls and multi-
factor authentication [→45]. It also requires a comprehensive
approach that incorporates both technical and nontechnical
measures, such as user education, policies, and procedures.
With the right cloud security measures in place,
organizations can ensure the integrity, availability, and
confidentiality of their cloud-based data and applications.
6) User training: User training is an essential element of any
corporate security plan. It helps to educate employees on
how to protect their workplace from potential threats.
Training should focus on how to identify and remove
suspicious attachments in emails, how to safely interact with
external storage devices, and how to ensure that passwords
are used correctly and securely [→46]. User training should
also provide an understanding of the consequences of not
adhering to these security protocols. The purpose of this
training is to ensure that users are aware of the risks to their
system and their data, allowing them to make informed
decisions when interacting with their work environment.
7 Future direction
As we look toward the future of cybersecurity, it is evident that
this field will continue to evolve rapidly, driven by
advancements in technology and the ever-increasing
sophistication of cyberthreats. One key area that holds great
promise is the integration of artificial intelligence (AI) and
machine learning (ML) into security systems [→57]. These
technologies have the potential to analyze vast amounts of data
in real time, enabling faster threat detection and response. By
leveraging AI and ML, organizations can proactively defend
against emerging threats and stay one step ahead of
cyberattackers. Another crucial aspect of the future of
cybersecurity is quantum-resistant cryptography [→58]. With
the rise of quantum computing, traditional cryptographic
methods may become vulnerable to attacks. As a result,
researchers and industry experts must work together to
develop and implement cryptographic solutions that can
withstand the computing power of quantum machines,
ensuring the security of digital communication and data [→59].
8 Conclusion
Computer security is an ever-growing area of concern as the
world becomes increasingly interconnected. Networks are used
to carry out essential transactions, making cybercrime a real
and ongoing threat. In the twenty-first century, cyberspace and
related technology constitute a major source of power and
influence in international relations, alongside existing
governments. This means other actors, such as private
companies, terrorist and criminal organizations, and
individuals, must now also be considered. When considering
the implications of these changes to national security, three
distinct elements must be analyzed: security, quality of life, and
the lack of geographical boundaries [→64]. Security is the
primary consideration when discussing national security, as
opposed to geopolitical or military concerns. The threat posed
by cybercrime extends far beyond traditional geographic
constraints, making it a global issue. The quality of life of
citizens can be negatively impacted by cybercrime, making it a
matter of national security [→65].
Cyberthreats can be difficult to identify and devastating in their
effects. They are unpredictable and multifaceted and require
cooperation between governments and the private sector in
order to be effectively combated. Conventional means of
dealing with them, such as the use of military and police force,
are not enough. It must also be remembered that individuals
and businesses are just as susceptible to cyberrisks as
governments. As such, international relations must consider the
security of the digital age, which is no longer solely a matter of
concern for governments. There is a need for a wide range of
theoretical approaches that go beyond the traditional state-
centric view of international relations if we are to successfully
confront the threat of cyberrisks.
References
[37] The Hindu Bureau, “1.3 TB Data Encrypted and Five Servers
Affected in AIIMS Ransomware Attack: Centre,” Thehindu.com,
16 Dec. 2022. →https://www.thehindu.com/news/national/13-tb-
data-encrypted-in-ransomware-attack-on-aiims-by-unknown-
threat-actors-centre/article66271226.ece
Our daily activities in the new digital age are heavily reliant on
the internet. Online communication is used for many purposes,
including leisure, commerce, and work-related activities. It
suggests that a significant amount of data being exchanged
online. Therefore, the researcher is concentrating on security to
stop threats and online vulnerabilities. To make digital
communication quick and secure, the authors used an energy-
efficient FPGA-based implementation of the AES algorithm. The
XPA (XPower Analyzer) tool is used to analyze total power
usage throughout the experimental activity, and the Vivado IDE
tool is utilized for simulation using the Verilog language. To
calculate the overall amount of power consumed with voltages
ranging from 0.95 to 1.20 V, voltage scaling is applied. The
average total power consumption of the IO standard family
HSTL_I, according to the researcher’s analysis, is 0.0938 W that
is less than that of the other IO standard families, making it the
most appropriate for our digital component.
1. Features of AES
Figure 1: Features of AES.
1. Encryption
1. Decryption
For the experimental work, Vivado IDE tool used for designing
purpose using Verilog language and XPA (XPower Analyzer) tool
was used for analyzing total power consumption. →Figure 4
shows the AES_encipher_block Code using the Vivado IDE tool.
Figure 4: AES_encipher_blockCode.
2 Literature review
The rapid growth of digital technologies in recent years has
necessitated the need for energy-efficient cryptographic
algorithms to secure sensitive data [→1]. The Advanced
Encryption Standard (AES) has emerged as one of the most
widely used symmetric encryption algorithms due to its robust
security and widespread adoption [→2]. However, the demand
for faster and more energy-efficient implementations of AES
has led to research focusing on hardware acceleration using
FPGAs and the integration of modern input/output (IO)
standards, such as HSTL, to cater to the requirements of the
new digital age technologies [→3, →4].
3 Design methodology
→Figure 6 shows the design methodology of FPGA-based AES
algorithm [→12]. The researcher briefly explains the
implementation steps of FPGA-based AES algorithm [→13].
Figure 6: Design methodology of FPGA-based AES algorithm.
3.1 Simulation
3.3 Synthesis
Synthesis refers to the process of transforming a high-level
hardware description language (HDL) description, such as
VHDL or Verilog [→18], into a lower-level gate-level
representation that can be implemented on the FPGA hardware
[→19, →20].
3.4 Implementation
5 Conclusion
During the analysis, the researchers considered two
parameters, leakage power and IO power, for computing the
total power consumption by implementing voltage scaling
technique. During the analysis, it was observed that leakage
power is constant among all four families of the HSTL; it varies
from 0.030 to 0.049 W. For computing the total power
consumption, IO power is the main factor in calculating total
power consumption; it determines that 64% of total power in
HSTL_I and 73% of total power in HSTL_II_18 are the minimum
and maximum values, respectively. In our whole analysis, we
found that the HSTL_I IO standard is most suitable for our AES
algorithm because its average value of total power
consumption is 0.0938 W, less than all other IO standard
families.
6 Future scope
Here researchers used Spartan 7 FPGA board for computing the
total power consumption of an energy-efficient FPGA-based AES
algorithm. However, in the future, research can be done on the
latest 28 nm Virtex 7 and Airtex-7 board for computing the total
power consumption. In this work, the authors have
implemented only voltage scaling technique, but in the
upcoming research the frequency scaling can also be taken into
consideration.
References
To minimize the data loss and also balance the energy usage
of sensor nodes [→43].
4 Conclusion
While working with the energy effectiveness of sensor
organization, clustering is used to separate the entire region
into little organizations known as groups. In each cluster, there
are models of CHs to assume the part of getting the detected
information from their cluster nodes individually. To send all
the data to the BS of the sensor network, these CHs perform
data aggregation. During transmission between the CH and
member, the energy-efficient clustering approach faces security
issues, such as attacks (within and outside). In this chapter, the
clustering approaches and security concerns are tended to. This
research takes into account several issues related to cluster-
based sensor networks, including how nodes construct clusters
and how to extend the network’s lifespan. The critical and
related survey conducted for this study revealed several
opportunities for researchers to investigate the challenges
associated with sensor network clustering. Critical aspects are
also taken into account when protecting clustering in a WSN.
Research gaps are identified and explained during this study of
security issues and clustering-based WSNs.
References
[11] Y.-J. Han, M.-W. Park, and T.-M. Chung, “SecDEACH: Secure
and Resilient Dynamic Clustering Protocol Preserving Data
Privacy in WSNs,” in ICCSA 2010, Part III, LNCS 601, Springer, pp.
142–157, 2010. →
From long ago, TSP was used in overhauling gas turbine engines
[→5], drilling the PCBs to minimize the travel time of machine
heads [→6], in X-ray crystallography [→7], routing postal
vehicles, school buses [→8, →9], scheduling printing press,
cranes, and crew [→10, →11, →12], picking orders from
warehouses [→13, →14, →15], in global navigation satellite
systems [→16], network optimization [→1, →17], and in steel
and iron industries [→18]. Therefore, as per the general TSP, the
salesman compulsorily visits all cities at least once depicted as
vertices (or nodes) in a graph by selecting the shortest possible
route illustrated as edges connecting the cities in various
possible ways. In this way, TSP also has several special cases,
such as multiple TSPs (mTSP), k-TSP, family TSP (FTSP), clusters
TSP (CTSP), and precedence constraint-generalized TSP
(PCGTSP), which are used in different scenarios [→1, →17, →19,
→20, →21, →22, →23]. Even today, the use of TSP cannot be
overlooked in our routine. Flight and parcel delivery route
scheduling, medicine and food delivery, and so forth are the
very recent applications of TSP. Therefore, the sustainable, cost-
effective, and fast ways of route scheduling with minimal
human involvement always remain an open mathematical
problem.
2 Related work
Numerous strategies have been put forth recently for solving
various TSP variations. Some of them are discussed in this
section. Erol and Bulut presented a real-world calculation of the
TSP’s route based on current traffic intensity data from Google
Maps [→25]. Greedy, exhaustive, and heuristic A-star searches
along with branch-and-bound algorithm and BitMask dynamic
programming were used in the development of the user
interface for the identification of the shortest route via Google
Maps, either in distance or duration, whichever opted by the
user. Ismail [→26] demonstrated a Domino algorithm to solve
TSP datasets of less than or equal to 100 cities, to reduce the
calculation complexity of tour lengths. In contrast to random
permutation in the global search of meta-heuristics that
generates n! of prospective solutions, it only generates n2.C (n,
n2) constructed tours.
The growth in the count of cities to visit turns TSP toward the
NP-hard problem, which makes it difficult to optimize. Thus, for
solving TSP comprising 29 to 7,397 cities, Alipour et al. [→37]
hybridized the GA and multiagent reinforcement learning
(MARL) heuristic. The initial population was generated by smart
multipoint crossover, comprising GA and GA with a novel
crossover operator, whereas the route construction and
improvement were suggested by MARL. Their approach
provided an efficient trade-off across CPU time and the quality
of the solution. Dahiya and Sangwan [→38] reviewed the
different approaches used for solving TSP. These included a vast
discussion on methods of total enumeration, the efficient
algorithm of Clarke and Wright, the branch-and-bound method,
computer simulation, and evolutionary approaches like ACO,
particle swarm optimization (PSO), and GA. Taillard suggested a
linearithmic heuristic solution for TSP and tested it on more
than 2 billion cities [→39]. This method used POPMUSIC (partial
optimization metaheuristic under special intensification
conditions) approach to generate initial solutions and to
improve them too. Their method was designed to improve the
3D printing problem; however, the time consumed by the
printing head’s nonproductive moves overshadowed its
advantages.
(1)
G(A, V − {A}) = min{cij + G(j, V − {A, j}), s. t. , i, j ∈ V }
|E| =
n
C2
(2)
Or simply,
n (n−1) (3)
|E| =
2
Algorithm
Input: A complete weighted graph G (V, E), where |V|=n, and |E|
=nC2.
k=k+1;
else
ecounter= ecounter+1;
return Hx;
h(x) = e − ∑ w(ei)
(4)
ei∈Hx
Since we have sorted the set of edges using the quick sort
method [→45], the time complexity of this operation would be
O(|E|log2|E|), where |E|= nC2, or
n(n−1) (5)
|E| =
2
n(n−1) n(n−1)
O( (log2 ))
2 2
n(n−1) 2
∈ O(n )
2
n(n−1)
log2 ∈ O(log2 n)
2
n(n−1)
log2n + log2 ∈ O(log2 n)
2
And so
n(n−1) n(n−1) 2
log2 ∈ O(n log2 n)
2 2
Now, the sorted edge set E will be {(A, B, 5), (A, C, 7), (C, D, 8), (A, D,
9), (B, D, 10), (B, C, 12)}. Let Hx = {} is an empty set, and the global
variable ecounter is initialized with 0. Then, with each iteration,
we have
Again, from the sorted list, the first route with minimal weight
represents the dairy node. Now, out of 189 remaining routes, the
20 optimum routes of Hamiltonian cycle length 328 obtained in
0.2488 s are Hx = {(3, 14, 1), (7, 8, 1), (8, 19, 1), (12, 18, 1), (5, 20,
2), (11, 19, 2), (15, 17, 2), (4, 13, 4), (11, 14, 4), (13, 15, 4), (6, 9, 9),
(7, 10, 10), (12, 16, 10), (1, 17, 14), (2, 9, 15), (1, 4, 16), (10, 18,
23), (2, 3, 29), (5, 6, 81), (16, 20, 99)}. The graph for the same
case is portrayed in →Figure 6 using the circular layout.
Figure 6: TSP solution graph arranged in the circular layout for n = 20 houses.
5 Conclusion
The chapter studies the TSP and some of its renowned
applications since 1932 and discusses recent heuristic solutions
of TSP along with their benefits and drawbacks. Considering the
vast scope and capability of the heuristic approaches, the
chapter presents a simple and effective heuristic approach as
the solution to the TSP. The approach suggests identifying n
feasible routes from nC2 total routes using the degree constraint.
It foretells that only those routes are selected in the set of
feasible routes (Hx), which have a degree less than or equal to 2.
On implementing the presented approach to determine the
traveling route of a milk van supplying milk to (i) 10 houses and
(ii) 20 houses, from 45 and 190 routes, respectively. Ensuring
that none of the houses is visited more than once, we obtained
the optimal routes of Hamiltonian cycle lengths 188 in 0.1344s
for (i), and 328 in 0.2488 s for (ii). Furthermore, the complexity
of the algorithm is O(n2 log2n), which is equivalent to the greedy
approach and is free from the drawback of time consumption.
References
[41] P. Du, N. Liu, H. Zhang and J. Lu, “An Improved Ant Colony
Optimization Based on an Adaptive Heuristic Factor for the
Traveling Salesman Problem,” Journal of Advanced
Transportation, vol. 2021. doi: 10.1155/2021/6642009. →
Abstract
2 Literature survey
Recent technological advancements and the usage of apps in
everyday life have led to a mess on numerous social media
platforms due to publishing and sharing of undesired and
meaningless situations. One of the social media sites that was
mentioned is Twitter, which has a sizable user base and daily
shares millions of tweets on a range of subjects and phrases
[→12, →13]. In order to identify and highlight language trends
in terms of fake or authentic news, majorly ML algorithms and
NLP approaches have been utilized [→14]. The majority of the
ML process involves classifier models, which can distinguish
between phony and true information. →Table 1 shows various
kinds of false news available on the internet online.
Table 1: Some various types of fake news.
3 Methodology
The methodology utilizes NLP techniques in ML and DL models
to construct a trust-based architecture for online shared news.
These approaches are further explained below.
1. Classification
2. Regression
1. Clustering
2. Association
Figure 3: Venn diagram showing relationship among ML, DL, NLP, and AI.
3.5 Datasets
Four datasets have been used in this project out of which two
are true datasets and two are fake datasets. The data is mainly
true and fake news. True news is gathered from the website of
Hindustan Times and fake news are collected from Kaggle. True
dataset 1 and Fake dataset 1 are used for ML models whereas
True dataset 2 and Fake dataset 2 are used for DL models.
→Tables 2 and →4 represent True dataset 1 and True dataset 2,
on the other hand →Tables 3 and →5 represent Fake dataset 1
and Fake dataset 2, respectively.
Table 2: True dataset 1 [→34].
The text of the article and headline was tokenized using NLTK in
Python. Lemmatizing the remaining portion of the data was
made easier by eliminating the stop words (using the NLTK
stop-word list). The subsequent processing processes were used
to create the labeled text list for each course. The Punkt (an
unsupervised trainable model) expression tokenizer from the
library called NLTK to create tokens for the body and headline
was used. This tokenizer can recognize sentence punctuation
marks and the placement of words in a statement because it
uses an unsupervised ML algorithm that has been trained on a
generic English corpus. Each sample is tagged with the tokens
from the complete headline and body sets.
y = 1/(1 + e
(−z)
), y is a logistic model
(2)
For the body of our dataset, a network of words has been made.
A word cloud is a brand-new type of visual representation of
content data that is frequently utilized to locate metadata
(catchphrase labels) on websites or to imagine free-form text.
→Figures 8 and →9 represent word cloud for dataset 1.
Figure 8: Word cloud for true dataset 1.
Accuracy =
TP + TN (4)
TP + TN + FP + FN
Precision =
TP
.
(5)
TP + FP
Machine F1
Accuracy Precision Recall
learning models sco
→Figures 22 and →23 represent word cloud for true and fake
dataset 2.
Figure 22: Word cloud for true dataset 2.
Figure 23: Word cloud for fake dataset 2.
From →Table 8 we can clearly say that accuracy with both the
models is equivalent to 90% so we can use either of the models
to classify whether news is true or fake in DL.
Table 8: Results using deep learning models.
Deep
F1
learning Accuracy Precision Recall
score
models
References
[46] Simplilearn.com.
→https://www.simplilearn.com/tutorials/machine-learning-
tutorial/random-forest-algorithm. Accessed 18 August 2023. →
2 Related works
Numerous academics have used different ML algorithms to
classify mail as spam. Additionally, the performance of the
process of recognizing spam mail has been exploited, as have a
number of preprocessing approaches. Here, a thorough analysis
of the relevant literature on spam mail detection is provided,
including various feature extraction, preprocessing, and
machine learning techniques. We will also go through the
advantages and disadvantages of each strategy and point out
the research hole that our study attempts to fill.
3 Purposed work
In order to identify spam emails from a preprocessed dataset,
this chapter offers to investigate the efficacy of five machine
learning algorithms. →Figure 1 visualizes the workflow of
proposed work. Here, over 30,000 emails from the Enron
Corporation, a now-defunct energy corporation in the United
States that was embroiled in a significant accounting
controversy in the early 2000s, are included in the dataset used
in this research, which was obtained through Kaggle [→18]. The
dataset consists of thousands of emails covering a wide variety
of topics and communication styles including sales pitches,
phishing scams, and fraudulent schemes. It also includes
legitimate emails sent and received by Enron employees in
order to compare spam and nonspam messages. The author has
organized her mail into six distinct folders, each having ham
and spam folders. From there, we organized the emails into two
folders: ham and spam. The emails were preprocessed by
eliminating punctuation, stop-words, headers, footers, and
HTML elements before to utilizing the dataset for training and
testing. For training and testing, 3,000 emails were randomly
chosen from the preprocessed dataset. The preprocessed emails
were turned into numerical feature vectors using the NLP
[→19] methods CountVectorizer and TF-IDF vectorizer. From
the features obtained we trained the model and evaluated their
performance.
Figure 1: Workflow of purposed work.
Table 1: Email dataset.
Emails Spam
Algorithms TP TN FP FN
Algorithms TP TN FP FN
We have plotted the two graphs of AUC-ROC for both Count and
TF-IDF vectorizers separately including all models are compiled
in one graph. They can be observed in →Figure 6 for models
trained using CountVectorizer and →Figure 7 for models
trained using TF-IDF vectorizer. Based on the values obtained
we have compiled all values into →Table 7 and all the
algorithms performed well for both vectorizer techniques.
However, SVM and RF show the highest AUC-ROC values for
both CountVectorizer and TF-IDF vectorizer. Naive Bayes has
the lowest AUC-ROC value for CountVectorizer, but it still
performs well with a value of 0.924. For the TF-IDF vectorizer
technique, naive Bayes has an AUC-ROC value of 0.96, which is
the second-highest value after SVM and RF. Decision tree and
XGBoost show similar AUC-ROC values for both techniques. The
results suggest that SVM and RF could be the best options for
spam mail detection using both vectorizer techniques. Overall,
it can be inferred that all the models have performed well in
both vectorizers. However, SVM and RF have shown slightly
higher performance than the other models in both techniques.
Figure 6: AUC-ROC for models trained using CountVectorizer.
Figure 7: AUC-ROC for models trained using TF-IDF vectorizer.
Table 7: AUC-ROC for models trained.
4.4 PR curve
SVM 0.99 1
5 Conclusion
The study explored different machine learning algorithms for
spam mail detection using the Enron spam dataset from Kaggle.
We preprocessed the dataset by removing punctuation, stop-
words, header and footer, and HTML tags from the email data.
We then randomly selected 3,000 emails out of the total dataset
of 30,000 emails and split it into 80:20 for training and testing
purposes. We used two NLP techniques, CountVectorizer and
TF-IDF vectorizer, for feature extraction and applied five
different algorithms.
References
[1] F. Rustam, N. Saher, A. Mehmood, E. Lee, S. Washington and
I. Ashraf, “Detecting Ham and Spam Emails Using Feature Union
and Supervised Machine Learning Models,” Multimedia Tools
and Applications, vol. 82, no. 17, pp. 26545–26561, 2023. doi:
10.1007/s11042-023-14814-2. →
Abstract
New and enhanced methods of protection against malware have been designated as an
immediate priority by the cybersecurity community. This also includes the rising number of
cyberattacks during the COVID-19 era and shows the problems faced by the organization due to
data breeches which cause loss of secured data. The issue of cybersecurity has prompted the
development of a number of frameworks and models. It also explains what cybersecurity is, how
it works, and how to keep your personal data safe online. The effectiveness and limitations of
current cutting-edge mitigation strategies are then discussed. We then take a look at how
hackers are using emerging platforms like social media, the cloud, mobile devices, and key
infrastructure to launch their attacks. This chapter gives the review about the most common
cyberattack used by the hacker during COVID era.
Attacks involving crypto-mining provided cybercriminals with a simple entry point into
corporate computer systems [→5]. This year saw numerous high-profile data breaches,
substantial ransomware payouts, and the emergence of a broad and novel set of security
challenges [→6]. And this year, cybercriminals significantly increased the danger they posed.
Cybersecurity is a measure that protects computer systems, networks, and information from
disruption or unauthorized access, use, disclosure, modification, or destruction, according to our
definition [→7].
This chapter summarizes the cybersecurity threads and models. It includes datasets and data
breaches occurred during the COVID-19 era, and how this caused the reduction of efficiency in
organizations [→8]. This chapter helps academics and professionals to understand
contemporary cybersecurity [→9]. The different types of cybersecurity are displayed in →Figure
1.
2 Literature review
This chapter shows that the number of cyberattacks is increasing day by day. However, the
security and encryption technology is also improved in the past decade [→10]. This chapter also
shows the various types of attacks used for data breaches. It also shows [→11] the increasing
challenges faced by organization from data breaches [→12].
In recent cybersecurity reports, the attackers are using new technology algorithms to access data
easily. The technologies used by attackers are cryptography and emerging machine learning
[→13, →14]. Cyberattacks also increase the use of new programing languages like Rust, Ruby, Sql,
and python because of their low compile time and encryption.
There have been incredible technological breakthroughs in the digital era, but there is also a
much more complicated environment of cybersecurity dangers. The breadth and severity of
these challenges are shown in this chapter. From advanced persistent threats to new dangers in
AI-driven security, no area is safe. Organizations and individuals need to take a multipronged
strategy to tackle these issues, one that incorporates technical solutions, increased awareness
and education, new legal frameworks, and increased international cooperation. Continued study
and adjustments will be required to remain ahead of the constantly shifting cyber threats of the
digital age [→15].
3 Issues in cybersecurity
Cybersecurity involves understanding cyberattacks and devising defense strategies (i.e.,
countermeasures) that preserve digital and information technology confidentiality, integrity, and
availability. Some of the malware attacks [→16] datasets are shown in →Figure 2.
Malware is widely regarded as a vital tool for cybercriminals by many industry experts [→18].
Malware refers to a category of attacks installed on a system secretly for the benefit of an
opponent. Malware includes programs like viruses, worms, Trojan horses, spyware, and bot
executables [→19]. Infected computers can then infect other computers, users can be tricked
into opening infected files, or users can be led to malicious websites. Malware can spread to
other computers when a USB drive is introduced into one that is already infected. Malware can
be disseminated via embedded systems and computational logic. Any point in time is a potential
entry point for malware [→20]. In addition to infecting end-user devices, servers, and network
gear like routers and switches, malware can also make its way into SCADA systems used for
controlling industrial processes. The development and spread of malware are serious issues in
the modern Internet [→21].
Historically, malware assaults took use of flaws in the hardware, software, and network layers
[→22]. Perimeter defense creates an outside barrier around an organization’s resources to deter
outsiders from gaining access to those resources. Firewalls and antivirus programs are
commonly used in perimeter security systems. All incoming data from the outside world is
filtered and checked for viruses. Due to the ease and lower cost of securing a single perimeter
[→23], this style of defense has gained widespread acceptance. Perimeter security and access
control systems are used to regulate who has access to what within an organization. Perimeter
defense has been ineffective as malware evolves and becomes more complex. Hackers are
continuously discovering new ways for malware to escape detection.
The growing number of people using the internet has led to an increase in the number of
security issues [→24]. Phishing attacks are carried out, for the most part, to obtain the personal
information of the user as well as access to the user’s private accounts. Since COVID-19 occurred,
attackers have thought of innovative ways to attract a variety of internet users, such as using a
variety of articles involving the subject matter of the pandemic [→25, →26]. The articles or links
that the attackers provide may give the impression that they are genuine and trustworthy;
however, in the end, private information may be given to individuals engaging in phishing
activities.
Most phishing attackers target uninformed people. Internet users who are familiar with
phishing are not typical victims [→27, →28]. Phishers create enticing websites, links, or articles
in order to steal sensitive information from unsuspecting Internet users [→29]. Intruders can
then utilize this knowledge to steal more sensitive data or money [→30].
There has been prior research into spam and spam filtering. Bayesian analysis,
blacklist/whitelist, keyword verification, and email header analysis are all used together to
identify incoming spam. Spam filtering strategies are based on message content: Support vector
machine; Bayesian classifier (BC); K-nearest neighbors; distributed adaptive blocklists (DABLs).
There is no foolproof text filtering method currently available. →Figure 3 shows the phishing
attacks occurred in 2021–2022.
Figure 3: Phishing attacks occurred in 2021–2022.
SQL -infected code gets access to the application which allows the hacker to modify the database.
The effects of an SQL injection attack on a business can be devastating. SQL injection attacks
frequently target organizations because of their access to private company data and customer
information. Any of the following can happen if a malicious user can complete an SQL injection
attack: Using SQL injection, attackers can access and modify data on the SQL server [→31],
potentially exposing sensitive company information.
User privacy is at risk because an SQL server attack could reveal sensitive information like
credit card numbers. To counteract this risk, you should create a database user with minimum
permissions possible. If you use insecure SQL commands to verify user credentials, an attacker
could gain access to your entire system. An intruder can do even more harm by gaining access to
and manipulating private data once they completely control your system [→32].
SQL injection allows attackers to insert, update, or delete data from your system without your
knowledge. Businesses need to take precautions and reduce their exposure to SQL injection
attacks because the consequences of a successful attack can be significant. One must be familiar
with the inner workings of an SQL injection attack to effectively defend against such an assault
[→33]. Consider the following SQL code, which a web interface would use to display all records
from the database “Users” in response to a user-supplied username and password: To select all
users who match the criteria:
When requested for login information on a website, a malevolent user could enter the following:
∗ ∗
Ingest FROM Users AND SELECT WHERE The correct credentials are : Username =
The above code injects an OR condition into the authentication procedure, allowing the attacker
to bypass security measures. Since “1” = “1” is always authentic, using this SQL query is the same
as using no authentication.
Attempting to crack security features, such as a password or login credentials, through sheer
repetition of the process is known as a brute force attack. It’s a foolproof method for breaking
into people’s personal accounts and corporate networks. Hackers try every conceivable
combination until they succeed.
Brute-force assaults occur when an attacker repeatedly and aggressively tries to gain access to a
system, usually a private one(s). This is a tried and true hacker favorite despite being decades
old because the time required to crack a password can range from a few seconds to several
years, depending on its length and complexity.
4.4 Malware
Malware is a type of software that has been designed to affect your computer system or network.
It may steal your identity, destroy files, or take control of the system. A variety of ways, including
email attachments, downloads, and infected websites, can be used to spread malware.
Viruses are the most commonly used type of malware. They’re linked to other files and
programs, spreading as soon as they open them. Viruses are capable of damaging files and
stealing sensitive information [→34].
Trojan: Trojan is a malicious program that’s disguised as legitimate software. The Trojan can
steal personal information, destroy files, or even control the system when it is downloaded and
started by a user.
Rootkits: A type of malicious software that enables an attacker to have complete control over the
system. It’s hard to detect and remove rootkits, and they can be used for stealing personal data,
files that have been damaged, or even controlling the system. →Figure 4 shows the number of
attacks increase in the past decade.
Figure 4: Malware attacks increase in decade.
4.5 Man-in-the-middle
In MIM attacker intercepts and eavesdrops on conversations between two parties, potentially
modifying or stealing sensitive information.
Application-level attack: An attacker can exploit weaknesses in a firewall’s web or email server to
obtain unauthorized access or compromise data.
Buffer overflow attack: Sending extra data to a firewall crashes or makes it subject to further
exploitation.
This involves updating firmware and security patches, installing firewalls, and monitoring logs
and warnings for unexpected activities.
5 Data breaches
When protected, important, and confidential data of any organization is accessed by any
unethical group, this is known as data breach. The following terms are also used: inadvertent
disclosure, data leakage, information leaks, and data degradation. Any organization, regardless
of size or industry, may be subject to a data breach. Any organization, regardless of size or
industry, may be subject to a data breach. A variety of factors can lead to this:
Human error: This is the most frequent reason for a data breach. Human error may include
things like an accidental click to a malicious link, the opening of infected attachments, or not
following security procedures.
Hacking: By exploiting vulnerabilities in software or systems, hackers are often able to gain
access to sensitive data.
6 Conclusion
The COVID-19 epidemic has become a useful tool for cybercriminals. There has been a rise in
cyberattacks after the appearance of COVID-19. Primary objectives are institutions in the
healthcare industry that own significant patient data. The main purpose of these attacks on any
organization is to affect their services; due to this organization faces lots of problems. Huge
amount of money is charged by the attackers for resuming the services of organizations.
Increasing work from home business in COVID-19 era faced this type of issues. When workers
are in the comfort of their own homes, they may be less inclined to follow safety protocols. The
targets of the attacks include healthcare providers and pandemic management agencies like the
World Health Organization. Since it is now simple to send emails that cover their tracks by
concealing information about COVID-19, phishing has become the primary method of attack. To
better identify the tendencies and protect against phishing assaults, we investigated the use of
neural network to optimize data on these attacks as depicted in →Figure 5.
References
[1] S. N. Brohi, N. Z. Jhanjhi, N. N. Brohi and M. N. Brohi, “Key Applications of State-of-the-Art
Technologies to Mitigate and Eliminate COVID-19,” 2020. →
[2] S. Perez, “Videoconferencing apps saw a record 62M downloads during one week in March,”
2020. Available: →https://techcrunch.com/2020/03/30/video-conferencing-appssaw-arecord-62m-
downloads-during-oneweek-in-march/. →
[3] B. Vigliarolo, “Who has banned Zoom? Google, NASA, and more,” 2020. →
[6] G. N. Reddy and G. J. Reddy, “A Study of Cyber Security Challenges and Its Emerging Trends on
Latest Technologies,” 2014, arXiv preprint arXiv:1402.1842. →
[7] Y. Harel, I. B. Gal and Y. Elovici, “Cyber Security and the Role of Intelligent Systems in
Addressing Its Challenges,” ACM Transactions on Intelligent Systems and Technology (TIST), vol. 8,
no. 4, pp. 1–12, 2017. →
[8] K. M. Rajasekharaiah, C. S. Dule and E. Sudarshan, “Cyber Security Challenges and Its
Emerging Trends on Latest Technologies,” in IOP Conference Series: Materials Science and
Engineering (Vol. 981, No. 2, p. 022062). IOP Publishing. →
[9] I. Frank and E. Odunayo, “Approach to Cyber Security Issues in Nigeria: Challenges and
Solution,” International Journal of Cognitive Research in Science, Engineering and Education, vol.
1, no. 1, pp. 100–110, 2013. →
[10] L. Tawalbeh, F. Muheidat, M. Tawalbeh and M. Quwaider, “IoT Privacy and Security:
Challenges and Solutions,” Applied Sciences, vol. 10, no. 12, pp. 4102, 2020. →
[11] T. Mais, M. Quwaider and A. Tawalbeh Lo’ai, “Authorization Model for IoT Healthcare
Systems: Case Study,” in 2020 11th International Conference on Information and Communication
Systems (ICICS), IEEE, pp. 337–342, 2020. →
[12] Song and A. Kunz, “Towards Standardized Prevention of Unsolicited Communications and
Phishing Attacks,” Journal of ICT Standardization, pp. 109–122, 2021. →
[13] S. Nasiri, M. Tahghighi Sharabian and M. Aajami, “Using Combined One-Time Password for
Prevention of Phishing Attacks,” Engineering, Technology & Applied Science Research, vol. 7, no. 6,
pp. 2328–2333, 2017. →
[14] A. Alhashmi, A. Darem and J. Abawajy, “Taxonomy of Cyber Security Awareness Delivery
Methods: A Countermeasure for Phishing Threats,” International Journal of Advanced Computer
Science and Applications, vol. 12, no. 10, 2021. →
[15] A. Baiomy, M. Mostafa and A. Youssif, “Anti-Phishing Game Framework to Educate Arabic
Users: Avoidance of URLs Phishing Attacks,” Indian Journal of Science and Technology, vol. 12, no.
44, pp. 01–10, 2019. →
[16] M. Jensen, M. Dinger, R. Wright and J. Thatcher, “Training to Mitigate Phishing Attacks Using
Mindfulness Techniques,” Journal of Management Information Systems. →
[18] M. Cha, F. Benevenuto, H. Haddadi and K. Gummadi, “The World of Connections and
Information Flow in Twitter,” IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems
and Humans, vol. 42, no. 4, pp. 991–998, 2012. →
[19] S. Delany, M. Buckley and D. Greene, “SMS Spam Filtering: Methods and Data,” Expert
Systems with Applications, vol. 39, no. 10, pp. 9899–9908, 2012. →
[20] R. Kumar, G. Poonkuzhali and P. Sudhakar, “Comparative Study on Email Spam Classifier
Using Data Mining Techniques,” in The International Multiconference of Engineers and Computer
Scientists, volume 1, Hong Kong, China, pp. 14–16, 2012. →
[21] C. Ten, C. Liu and G. Manimaran, “Vulnerability Assessment of Cybersecurity for Scada
Systems,” IEEE Transactions on Power Systems, vol. 23, no. 4, pp. 1836–1846, 2008. →
[23] J. Li, “The Research and Application of Multi-firewall Technology in Enterprise Network
Security,” International Journal of Security and Its Applications, vol. 9, no. 5, pp. 153–162, 2015. →
[24] N. Rani, A. Satyanarayana and P. Bhaskaran, “Coastal Vulnerability Assessment Studies over
India: A Review,” Natural Hazards, vol. 77, no. 1, pp. 405–428, 2015. →
[25] X. Ye, J. Zhao, Y. Zhang and F. Wen, “Quantitative Vulnerability Assessment of Cyber Security
for Distribution Automation Systems,” Energies, vol. 8, no. 6, pp. 5266–5286, 2015. →
[26] H. Sun, Y. Chen and Y. Lin, “Opass: A User Authentication Protocol Resistant to Password
Stealing and Password Reuse Attacks,” IEEE Transactions on Information Forensics and Security,
vol. 7, no. 2, pp. 651–663, 2012. →
[27] H. Hu, G. Ahn and K. Kulkarni, “Detecting and Resolving Firewall Policy Anomalies,” IEEE
Transactions on Dependable and Secure Computing, vol. 9, no. 3, pp. 318–331, 2012. →
[28] K. Gai, M. Qiu, B. Thuraisingham and L. Tao, “Proactive Attribute Based Secure Data Schema
for Mobile Cloud in Financial Industry,” in The IEEE International Symposium on Big Data Security
on Cloud, New York, USA, 1332–1337, 2015. →
[29] K. Gai, M. Qiu, L. Tao and Y. Zhu, “Intrusion Detection Techniques for Mobile Cloud
Computing in Heterogeneous 5G,” Security and Communication Networks, pp. 1–10, 2015. →
[30] L. Tao, S. Golikov, K. Gai and M. Qiu, “A Reusable Software Component for Integrated Syntax
and Semantic Validation for Services Computing,” in 9th Int’l IEEE Symposium on Service-Oriented
System Engineering, San Francisco Bay, USA, pp. 127–132, 2015. →
[31] K. Cabaj, Z. Kotulski, B. Księżopolski and W. Mazurczyk, “Cybersecurity: Trends, Issues, and
Challenges,” EURASIP Journal on Information Security, vol. 2018, no. 1, pp. 1–3, 2018. →
[32] L. Thames and D. Schaefer, Cybersecurity for Industry, Heidelberg: Springer, 2017, pp. 1–33.
→
[33] H. Santos, T. Pereira and I. Mendes, “Challenges and Reflections in Designing Cyber Security
Curriculum,” in 2017 IEEE World Engineering Education Conference (EDUNINE), IEEE, pp. 47–51,
2017. →
[34] Z. Zhang, H. Ning, F. Shi, F. Farha, Y. Xu, J. Xu … K. K. R. Choo, “Artificial Intelligence in Cyber
Security: Research Advances, Challenges, and Opportunities,” Artificial Intelligence Review, pp. 1–
25, 2022. →
Mechanism to protect the physical
boundary of organization where the
private and public networks
encounter
Parth Gautam
Apurva Omer
Jeetendra Pande
Devesh Bora
Abstract
2 Literature review
The paper by Saklani and Dimri [→1] provides a technical
comparison between IPv4 and IPv6, emphasizing the
limitations of IPv4 and the benefits of adopting IPv6. IPv6 offers
a larger address space, enhanced security features, and
improved efficiency. The paper also discusses the challenges
and strategies involved in migrating from IPv4 to IPv6. Dobhal
and Dimri [→2] present a design and implementation of a TCP-
friendly layered solution for mobile ad hoc networks (MANET).
The solution aims to improve the performance of TCP-based
applications in MANET scenarios. The research addresses the
challenges of congestion control and fairness in MANETs,
contributing to the efficiency of data transmission. Goki [→3]
propose a novel approach for network authentication,
identification, and secure communication using optical physical
unclonable function (OPUF). OPUFs leverage the unique
properties of optical devices to establish secure communication
channels, ensuring confidentiality and integrity of data
transmission. Singhal’s survey paper [→4] delves into security
issues on mobile cloud computing (MCC) and explores
preventive measures. The research highlights various threats
such as data breaches, unauthorized access, and data loss in
MCC environments. The preventive measures discussed aim to
fortify the security posture of MCC systems.
Bahuguna et al.’s study [→5] presents a comprehensive
assessment of country-level cybersecurity practices. The
research analyzes the cybersecurity measures and practices
adopted by different countries, providing insights into various
strategies to strengthen national cyber defense. In another
study, Bahuguna et al. [→6] investigate the cybersecurity
maturity of organizations in the Indian context. The research
assesses the current state of cybersecurity practices in
organizations, identifying areas for improvement and offering
valuable recommendations. Marin [→7] offers a primer on
network security fundamentals. The paper provides an
overview of security principles, mechanisms, and best practices
to safeguard networks from potential threats. These Cisco
documents [→8, →9] serve as guides for deploying and
configuring Cisco’s adaptive security virtual appliance (ASAv)
and secure firewall ASA virtual, which are critical components
of network security infrastructures. The configuration guide
[→10] by Cisco Systems covers the software configuration
aspects of Cisco 850 Series and 870 Series Access Routers, which
are widely used for network connectivity and security. This
guide [→11, →12] by Cisco Systems elaborates on the network
address translation (NAT) configurations in Cisco IOS Release
12.4T. NAT plays a crucial role in enhancing network security by
concealing internal IP addresses.
Natalino [→13] proposes an autonomous security management
approach for optical networks. The research focuses on self-
protecting and self-healing mechanisms to mitigate security
threats in optical communication systems. Shin et al. [→14]
present the concept and prototype of network security
virtualization, an innovative approach to improving the
efficiency and scalability of network security solutions. Lara
and Ramamurthy [→15] introduce OpenSec, a policy-based
security framework that leverages software-defined networking
(SDN) to enhance network security management and control.
Hu [→16] proposes an adaptive secure transmission
mechanism for physical layer security in cooperative wireless
networks. The research focuses on leveraging the physical layer
properties to enhance wireless communication security. Pande
and Maheshwari [→17, →18] present an identity-based
encryption algorithm that employs hybrid encryption and MAC
address for secure key generation, ensuring confidentiality and
integrity in data transmission.
7 Conclusion
The protection of the physical boundary where private and
public networks converge is a critical aspect of ensuring the
security and integrity of organizational assets and information.
This convergence introduces potential security risks and
vulnerabilities that can be mitigated through the
implementation of robust mechanisms and practices.
Throughout this study, we have examined various mechanisms
employed by organizations to safeguard their physical
boundaries in the context of private-public network
convergence. These mechanisms include the use of network
security technologies such as firewalls, intrusion detection
systems, VPN, and network segmentation. Additionally,
organizational policies and guidelines, as well as employee
awareness and training programs, play significant roles in
establishing a security-conscious culture and ensuring
compliance with security protocols.
References
[1] A. Saklani and S. C. Dimri, “Technical Comparison between
IPv4 & IPv6 and Migration from IPv4 to IPv6,” International
Journal of Science and Research, vol. 2, no. 7, pp. 231–235, 2013.
→
[10] Cisco Systems Inc, “Cisco Secure Firewall ASA Virtual Getting
Started Guide, 9.18,” 2022. a, b
[11] Cisco Systems, Inc, “Cisco 850 Series and Cisco 870 Series
Access Routers Software Configuration Guide,” 2005. a, b
2 Related works
Bender et al. [→10] showed the gapped insertion sort technique.
Library sort is far better than traditional insertion sort because
library sort is based on a priority queue. This algorithm has a space
one-third overhead than the library. Ahmad et al. [→11] suggested a
modified efficient approach to sort an array to reduce the
complexity. It showed the comparison with insertion, binary with
insertion, and shell sort. Patel et al. [→12] proposed a novel
approach to sort an array for the worst case and take more space.
Where double space is taken to implement this approach if n is the
number of elements, then 2n is taken as double-size array space. As a
comparison point of view, the complexity of the Best Case for
ascending order, the worst case for descending order, and the
average case for random orders is shown through the graph.
3 Proposed work
Insertion sort is a sorting method based on the concept of decrease
and conquer; stepwise we decrease the unsorted portion. Initially,
the size of the sorted portion would be 1, an array (sub-array)
containing a single element is a sorted array. Then we take the first
element of the unsorted portion as key, that is, key = A[i], for i = 1, 2, 3
– (n – 1) and then insert it at its appropriate position; in the sorted
portion this will increase the size of the sorted portion by 1. In
insertion sort to insert key at its appropriate position, there are lot
many comparisons, which increase the complexity of the algorithm,
rather than this if we use the strategy of binary search, this will be
helpful to reduce the number of comparisons significantly.
3.1 Algorithm
N = length (A)
j=i, key=A[i]
low=0, high=i
high = mid
else:
low = mid +1
end of if
A[j] = A[j-1]
j = j-1
A[low] = key
end of function
The best case of binary insertion sort occurs when the input array is
already sorted, thus left = i = j, the element remains in its initial
position and so condition (j > left) is false and so no right shifting of
elements thus time complexity in this case.
To locate the appropriate position for the key element the time
requirement is of order θ(n log 2 i) for ith iteration since there is
no right shifting of element and only binary search works to locate
the position and so the time complexity in this case:
(1)
n−1
i=1
1 ≤ n (2)
2 ≤ n
3 ≤ n
n
n − 1 ≤ n ⇒ 1, 2, 3, … (n − 1). n ↔≤ n
n
n = n ⇒ ⌊n ≤ n
n
And so log 2 ⌊n ≤log 2 n
n
⇒log 2 ⌊n ≤log 2 n
= (n − 1) log 2 n
⇒ T B (n) ∈ (n log 2 n)
∵ (n − 1) ∈ θ (n)
log 2 n ∈ θ(log 2 n)
n−1
T W (n) = ∑ {log 2 i + i}
i=1
i=1
n−1
T W (n) = ∑ {log 2 i + i}
i=1
n−1 n−1
= ∑ log 2 i + ∑ i
i=1 i=1
And so,
2
T W (n) ∈ θ(n )
n−1
2
T A (n) = ∑ (log 2 i + i/2) ∈ θ(n )
i=1
(n−1) (n−1)
1
= ∑ log 2 i + ∑ i
2
(i=1) (i=1)
1 n(n−1)
= θ(n log 2 n) + .
2 2
1
= θ(n log 2 n) + . n(n − 1)
4
2
= θ(n log 2 n) + θ(n )
And thus,
2
T A (n) ∈ θ(n )
Thus, it has been observed that the average case and worst case have
some order of time complexity.
0 1 2 3 4 5 6
2 5 7 4 4 9 1
Figure 2: Array.
A[i]=A[3]=4=key
j=3, i=3
low=0, high=3
(0<3)
mid=(0+3)/2=1
high=mid=1
So, low=0+1=1
(j=3>1)
A[3]=A[3-1] i.e.A[3]=A[2]=7
0 1 2 3 4 5 6
2 4 5 7 4 9 1
(j=2>1)
j=1
(1>1) false
2 4 5 7 4 9 1
This way this approach works fine and sorts the given array.
5 Conclusion
This chapter combines the binary search and insertion sorting
methods and presents an efficient way to sort an array. Both binary
search and insertion sort are based on decrease and conquer; thus
this new method is also based on the same strategy. In insertion sort
we insert the element one by one on the sorted portion; to locate the
appropriate position it compares A[i] one by one with A[i – 1] and so
on till the exact position does not confirm. Instead of this, if we use
binary search to locate the position this drastically reduces the
number of comparisons but a significant improvement in time
complexity does not achieve since we need to shift those elements
which are greater than A[i] to one place right. But this approach is
fruitful for small-size arrays and when the cost of comparison is
very high. Since the number of comparisons has been reduced this
method is an improved version of insertion sort.
References
[1] T. SinghSodhi, S. Kaur and S. Kaur, “Enhanced Insertion Sort
Algorithm,” International Journal of Computer Applications, vol. 64,
no. 21, pp. 35–39, 2013. doi: 10.5120/10761-5724. →
B. Mahanthesh (Ed.)
→www.degruyter.com
usive 1
usive language 1
celeration 1
acency matrix 1
vanced persistent threats 1
alyzer 1
omaly-based detection 1
t colony optimization 1
cending order 1
sessment 1
thentication 1
tonomous 1
yesian 1
irectional 1
ary 1
ary search 1
cklist 1
tnets 1
ycott 1
allenges 1
ematograph 1
her 1
ne 1
ud security 1
stering 1
mparison 1
mplexity 1, 2
mplex relationship 1
mputationally 1
nfidentiality 1
nfusion matrix 1
nstraint 1
nsumption 1
ntemporary 1
nventional 1
nvergence 1
nvolutional 1
st-effective 1
untermeasures 1
untVectorizer 1
VID era 1
dit card 1
tical 1
bersecurity 1
berwarfare 1
ta breaches 1
cision tree 1
crease and conquer 1
cryption 1
famation 1
fense-in-depth 1
militarized zones 1
moralization 1
ital world 1
astrous 1
criminatory speech 1
harmony 1
semination 1
tributed denial-of-service 1
minant 1
rmancy mechanism 1
astically reduces 1
one-customer 1
vesdrops 1
ommerce platforms 1
ctronic soldiers 1
bedded systems 1
otions 1
cryption 1
cryption 1
forcement 1
raction 1
score 1
ricated 1
cebook 1
e news 1
sible 1
ture extraction 1
ewalls 1
od 1
mework 1
quency 1
nctionality 1
adient 1
avitational 1
eedy 1
cker 1
miltonian 1
althcare 1
uristic 1
st-based intrusion prevention systems 1
brid 1
perparameters 1
prisonment 1
dian Penal Code (IPC) 1
egration 1
egrity 1
erpretability 1
rusion prevention systems 1
ration 1
K
ggle 1
rnel 1
kage 1
al 1
itimate 1
ical 1
earithmic 1
guistic 1
d balancing 1
al search 1
ging 1
istic regression 1
licious 1
lware 1
mory resources 1
taheuristic 1
nimize damage 1
tigate 1
obile cloud computing 1
obility management 1
nte Carlo 1
orpheme 1
orphology 1
ultivariate 1
timizations 1
ganizations and corporations 1
erfitting 1
rallel processing 1
rameter 1
rsing 1
nalizing 1
rformance metrics 1
rmutation 1
shing 1
onology 1
ysical boundary 1
arization 1
icies 1
itical Comments, and Religious Comments 1
tential benefits 1
agmatics 1
ecautionary 1
ecision-recall trade-off 1
vacy 1
ogrammable 1
opaganda 1
otection 1
otocols 1
ovocating 1
adratic sorting 1
ck sort 1
ndom forest 1
ndomized variable neighborhood 1
nsomware 1, 2
all 1
gister 1
gression 1
ative relevance 1, 2
ability 1
ant 1
tricted 1, 2
rieval 1
hingyas 1
uting 1
eguard 1
ling 1
cure key generation 1
curity audits 1
curity issues 1
curity virtual appliance 1
mantics 1
nsational 1
nsor 1
verity 1
nature-based detection 1
khole 1
dging 1
am 1
ambase 1
anning 1
keholders 1
pervised 1
pport vector machine 1
spicious 1
stainable 1
bil 1
ntax 1
nthesized 1
tematic 1
rorism 1
eat 1
me elapsed 1
pologies 1
ditional 1
nsmission scheduling 1
versing 1
gger 1
ojan 1
lling 1
stworthiness 1
tter 1
authorized 1
predictable 1
ization 1
rtex 1
lence-provocating 1
tual private network 1
tages 1
nerability 1
ight 1
rst 1
Y
uTube 1
o trust architecture 1