Forthcoming and Online First Articles

International Journal of Information and Computer Security

International Journal of Information and Computer Security (IJICS)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

International Journal of Information and Computer Security (23 papers in press)

Regular Issues

  • An efficient Cyberbullying detection framework on Social Media Platforms using a hybrid Deep Learning model   Order a copy of this article
    by Geetha R, Belshia Jebamalar, Darshan Vignesh B. G, Kamalanaban E, Srinath Doss 
    Abstract: People in social media are more vulnerable to the negative effects and the most serious consequences of utilising social media is cyberbullying. Cyberbullying is an offensive and deliberate act perpetrated online by a particular individual or an organisational structure. It is brought about by sending, publishing, and disseminating offensive, dangerous, and misleading information online. As cyberbullying becomes increasingly prevalent in social media, automatically detecting it and taking proactive steps to address it becomes critical. Humiliation of an individual in social media causes psychological disturbance in one’s life, in order to have a safe and secure platform. A hybrid deep learning model has been used that combines convolutional neural network (CNN) and long short-term memory (LSTM) to detect cyberbullying more precisely and effectively in this paper. Using convolutional layers and max-pooling layers, the CNN model recovers higher level features efficiently. Long-term dependencies between word sequences can be captured using the LSTM model. The findings reveal that in terms of accuracy, the presented hybrid CNN-LSTM Model performs better than standard approaches for machine learning and deep learning.
    Keywords: cyberbullying; security; convolutional neural network; CNN; long short-term memory; LSTM; max-pooling.
    DOI: 10.1504/IJICS.2024.10066295
     
  • A Collision Proof Energy Efficient Lightweight Hybrid Cryptosystem for Fog   Order a copy of this article
    by Sandeep Kumar, Ritu Garg 
    Abstract: Fog computing extends cloud capabilities to the network edge, aiding IoT and users. It mitigates cloud issues like latency and reliability. However, fog’s limited resources pose security vulnerabilities like data theft and unauthorised access. To tackle this, we proposed a lightweight, energy-efficient hybrid cryptosystem with dynamic key changes. This optimises fog node energy usage and the proposed security system is collision proof and uses proportional offloading to ensure the delivery of subscribed data to fog/cloud. We have utilised chosen-ciphertext attribute-based encryption scheme to produce the keys and principles of ECC-Elgamal are considered for encryption/decryption of data. Finally, the performance evaluation and security attacks analysis depicts that our security system performs better in terms of optimal energy utilisation, overall computation overhead as well as mitigating the attacks in contrast with other state of art methodologies.
    Keywords: fog computing; elliptic curve cryptography; ECC; CP-ABE; dynamic key change; attacks; access control.
    DOI: 10.1504/IJICS.2024.10066296
     
  • Common key multi-hop packet authentication protocol for Wireless Mesh Networks   Order a copy of this article
    by Vanlalhruaia Chhakchhuak, Ajoy Kumar Khan, Amit Kumar Roy 
    Abstract: To achieve security with efficiency in wireless mesh networks (WMNs) is an important issue due to its distributed nature and absence of centralised authority. Due to the absence of central authority, the authentication becomes a challenging task in WMNs. Several attacks could be easily launched in WMNs such as replay attack and impersonation attack. These types of attacks could be launched by an intruders by injecting malicious packets throughout the network among mesh entities. Therefore to overcome from such attacks, we had proposed an efficient multi-hop packet authentication protocol known as
    Keywords: WMNs Architecture; Attack types; Packet authentication; Data Integration; Diffie-Hellman.
    DOI: 10.1504/IJICS.2024.10066297
     
  • An Efficient Block Cipher Based on Multiple Optimal Quasigroups   Order a copy of this article
    by Umesh Kumar, V. Ch. Venkaiah 
    Abstract: An efficient block cipher that uses 16 optimal quasigroups is proposed in this paper. All the 16 optimal quasigroups are created using the 16 optimal S-boxes of 4x4 bits with the lowest differential and linearity characteristics. These S-boxes are secure against differential and linear attacks. The new block cipher is implemented in C++, compared its performance with the existing quasigroup based block ciphers, and found that the proposed cipher is more efficient than existing quasigroup based proposals. The proposed cipher is analyzed against various attacks including differential and linear attacks and we found it to be resistant to these attacks. Also, we evaluated our cipher using various statistical tests of the NIST-STS test suite, and we found it to pass each of these tests. We also established in this study that the randomness of our cipher is almost the same as that of the AES-128.
    Keywords: AES-128; Cryptography; Block cipher; Latin square; NIST-STS; Optimal quasigroup.
    DOI: 10.1504/IJICS.2024.10066298
     
  • Entropy Dragon Fly Optimization (EDFOA) Based Cluster Head Selection and Deep Learning Clone Node Detection (DLCND) For Wireless Sensor Network (WSN)   Order a copy of this article
    by K.JANE NITHYA, SHYAMALA KANNAN 
    Abstract: In a network with no fixed infrastructure, a wireless sensor network comprises mobile nodes that communicate with one another using wireless networks. Node clone attacks can exploit WSN. Attackers take control of one sensor node, create numerous copies with the same identity (ID), and spread these copies throughout the network. Clones appear authentic since they have all the credentials of a real member. The clustering of WSN nodes, a fundamental process, aims to achieve load balancing and prolonged network lifetime. This study created the energy efficient sleep awake aware protocol, which improves energy efficiency and chooses the appropriate CH based on node energy. The volume of data and distance between nodes and the base station determine WSN energy efficiency. The dragonfly optimisation technique boosts network performance. Deep learning clone node detection has been introduced to identify WSN clones. Clone identification is essential for preventing cloning assaults. A cheap identity verification approach can find clones locally and globally. Final validation of the suggested approach is done extensively with network simulator 2. (NS2). After the performance analysis, the scheme’s effectiveness is assessed by comparing planned and present methods.
    Keywords: clone attack; energy efficient sleep awake aware; EESAA; entropy dragonfly optimisation; EDFO; deep learning clone node detection; DLCND; wireless sensor network; WSN; quality of service.
    DOI: 10.1504/IJICS.2024.10067449
     
  • Optimizing the detection of Metamorphic Malwares using ensemble learning technique   Order a copy of this article
    by Vinay Kumar, Abhishek Vaish 
    Abstract: Metamorphic malware is a significant challenge for traditional malware detection techniques, as it continuously changes its code to evade its detection. The behavior-based approach involves analyzing the behavior of malware rather than its code. By monitoring the system’s behavior, it is possible to detect malicious activity that may be associated with malware. We have proposed API call-based technique to detect metamorphic malware. Our approach involves finding the top 30 malicious API calls having the highest probability score based on extra trees classifier and identifying patterns of malicious API calls that indicate malicious behavior. This paper presents an API call-based detection technique and proposes a novel approach based on ensemble learning techniques. The proposed algorithm has an accuracy of 0.99 and the f1-score is 0.85. Our system can detect changes in the code structure and behavior of the malware, even if the malware’s binary code has been obfuscated into a new variant. We demonstrate the effectiveness using a benchmark dataset of metamorphic malware.
    Keywords: metamorphic malware; gradient boosting; random forest; api calls.
    DOI: 10.1504/IJICS.2024.10067450
     
  • A Survey: On Detection and Prevention Techniques of SQL Injection Attacks   Order a copy of this article
    by Anwesha Kashyap, ANGSHUMAN JANA 
    Abstract: We are constantly exposed to the extensive usage of online applications in our daily lives. The web application’s backend uses database technology that stores and processes sensitive data. One of the primary concerns of a web application in terms of data security is to safeguard sensitive data in the database. SQL Injection Attacks are one of the most serious security concerns of web applications (SQLIA). Akamai report suggests that SQLIAs accounted for more than 72 percent of all web application security attacks in the last 5 years. Therefore, SQLIA is one of the most severe attacks used against database-driven web applications, which compromises data privacy. It is a code injection type attack where an attacker injects malicious SQL queries to get unauthorized access to the database. Several research proposals have been published to address these security threats. In this paper, we first provide the current state-of- the-art on SQLIA and
    Keywords: Data Security; Database Program; SQL Injection Attacks.
    DOI: 10.1504/IJICS.2024.10067451
     
  • Blockchain Based Dynamic Social Spider Optimization (BC-DSSO) Network Optimization for Supply Chain in IoT   Order a copy of this article
    by Anitha Rajendran, Dinesh Rai 
    Abstract: Supply chain management (SCM) in large-scale industries is evolving into a complex value network that offers competitive advantages. BC, with its distributed public ledger, is an excellent tool for enhancing SCM quality. However, network optimisation during data transmission and routing in blockchain technology remains a significant and challenging issue. Additionally, there are technical challenges related to source verification and security within SCM. This paper introduces BC-DSSO for optimising IoT nodes. It highlights the main characteristics of BC technology, such as smart contracts, decentralisation, security, and transparency. The DSSO algorithm is inspired by the foraging strategy of social spiders, which use web vibrations to locate prey and choose the best routes. DSSO improves the efficiency and speed of communication between nodes in a network. Blockchain enhances supply chain visibility and transparency, increasing trust in the model. IoT technology is utilised to track and monitor the activity of products within supply chains. BC-DSSO involves four key steps: hash function, encoding, TM, and routing. During the TM step, node behaviour is supervised by a GRU classifier. The results are measured using metrics such as PDR, PLR, throughput, and correct blocks.
    Keywords: internet of things; IoT; supply chain management; SCM; gated recurrent unit; GRU; network optimisation; blockchain-dynamic social spider optimisation.
    DOI: 10.1504/IJICS.2024.10067452
     
  • HP-CP-ABE scheme against collusion attacks under an attribute-key security model   Order a copy of this article
    by Keshuo Sun, Haiying Gao, Chao Ma, Bin Hu, Xiufeng Zhao 
    Abstract: Attribute-based encryption (ABE) is crucial for ciphertext access control in cloud settings. In this paper, we evaluate the resilience of classical ABE schemes to specific attacks, ensuring only robust schemes are employed and informing the design of secure ABE schemes. We demonstrate an attributekey attack on two ciphertext-policy ABE (CP-ABE) schemes using illegitimate private keys. To quantify the security of private keys against collusion, we propose a novel attribute-key security model. At last, we present a hidden-policy CP-ABE (HP-CP-ABE) scheme, proving its selective security and resistance to collusion attacks.
    Keywords: Attribute-based Encryption; Collusion Attack; Attribute-key Attack; Selective Security.
    DOI: 10.1504/IJICS.2024.10067453
     
  • NAIBI: A Neighbor-vehicle Approach for Anomaly Detection of Basic Safety Message Falsification in Internet of Vehicles Using Machine Learning   Order a copy of this article
    by Hussaini Aliyu Idris, Kazunori Ueda, Bassem Mokhtar, Samir A. Elsagheer Mohamed 
    Abstract: The alarming rate of fatality and injuries recorded through road accidents call for the deployment of intelligent transportation system (ITS). The internet of vehicles (IoV), being the backbone of ITS, provides vehicles with standards and protocols to disseminate Basic Safety Messages (BSM) containing kinematic information to other vehicles and infrastructures, making the IoV a complex network and therefore susceptible to cyberattacks. Despite employing public-key infrastructure (PKI) to ensure BSMs are digitally signed and authenticated, insider attackers can still falsify BSMs and cause chaos in the network. The research community has contributed by proposing data-centric approaches however, the over-reliance on one vehicle BSM data for training and inference gives the attacker an upper hand . To address these drawbacks, we proposed a machine learning-based neighbor-vehicle approach for anomaly detection of BSM falsification in IoV (NAIBI) and demonstrate its superiority over the state-of-the-art which exceeds 99% in Accuracy, Precision, Recall and F1-Score.
    Keywords: Machine learning; Intelligent Transportation System; Misbehavior detection system (MDS); internet of vehicle (IoV); BSM falsification attack.
    DOI: 10.1504/IJICS.2024.10068111
     
  • A secure and anonymous authentication and key agreement protocol based on ECC for edge computing environment   Order a copy of this article
    by Upendra Verma, Kapil Kumar Nagawanshi 
    Abstract: Edge computing provides various services closer to the smart devices. However, devices have limited computational resources; hence, security procedure should be anonymous and lightweight for edge computing environment. Therefore, the proposed work designs a secure and anonymous authentication and key agreement scheme based on elliptic curve cryptography (ECC). The informal security assessment indicates the proposed scheme resilience to various cryptographic attacks. The performance of proposed scheme is improved in terms of computation, storage and communication overhead. The correctness and robustness of the proposed scheme are confirmed by formal security analysis employing Burrows-Abadi-Needham (BAN) predicate logic. The research also demonstrates a comparative analysis of proposed scheme to the related schemes in terms of various security features. Finally, the proposed scheme undergoes formal security verification through the Automated Validation of Internet Security Protocols and Applications (AVISPA) simulation tool to validate correctness and security. Simulation results confirm our approach's resilience to cryptographic attacks.
    Keywords: Security and Privacy; ECC; Hash function; Edge computing; BAN predicate logic; AVISPA.
    DOI: 10.1504/IJICS.2024.10068112
     
  • Mean Black Widow-Based Optimization (MBWO) Feature Selection and Enhanced Kernel-Based SVM Classifier for Cyberbullying Twitter Data   Order a copy of this article
    by Menaka M, Sujatha P 
    Abstract: People are using online social networks (OSNs) to interact with others worldwide and discuss their preferences, which can lead to cyberbullying. A cyberbully sends threatening or damaging messages online. Social media cyberbullying must be found and stopped. For this, AI computations including pre-processing, highlight extraction, and grouping were built. Pre-processing Twitter data with tokenisation and stemming removes noise. Highlight extraction uses common data and SAE. Several AI classifiers detect cyberbullying. Due to the complexity of cyberbullying, identifying the best selection of features is difficult, affecting detection system scalability. Thus, this study selects and optimises parameters to improve cyberbullying categorisation. Twitter data is collected and pre-processed to remove stop words and other unwanted words. TF-IDF and SAE are used to extract features from pre-processed data. MBWO then selects the component subset that best reduces information dimensionality. To determine cyber bullying events, an enhanced bit support vector machine (EK-SVM) classifier uses these
    Keywords: Online Social Networks (OSN); Mean Black Widow-based Optimization (MBWO); and Enhanced Kernel Support Vector Machine (EK-SVM); Stacked Auto-Encoder (SAE); Term Frequency-Inverse Document Frequency.
    DOI: 10.1504/IJICS.2024.10068113
     
  • Prevention of Cyber Attacks & Real-Time Social Media Spam Detection and Sentiment Analysis Using Recurrent Self-Adaptive Windowing Approach   Order a copy of this article
    by Shankar M. Patil, Sonali Mhatre, Bhawana S. Dakahare, Gurunath T. Chavan 
    Abstract: Due to the fact that social networks have more than a billion members, they are regarded as a part of most users' lives and serve as a vehicle for spammers to disseminate their damaging actions The vast majority of current research focuses on identifying spammers using statistical data However, the misuse of email as a means of communication is growing The email spam issue is increasingly upsetting for email users as it continues Effective spam email detection methods are essential due to the consequent adverse effects The effectiveness of supervised spam classification algorithms is examined in this research along with the impact of pre-processing procedures To categorise the identified spam or phishing, RNN is proposed in this study together with a soft attention model The obtained data is initially pre-processed utilising filtering, tokenization, stop word removal, stemming/lemmatization algorithms, etc To strengthen communication security, content-based spam or phishing filters are critical
    Keywords: Cyber Attacks; Spam Detection; Recurrent Neural Network; Content-Based Spam; Self-Adaptive Windowing Approach.
    DOI: 10.1504/IJICS.2025.10068292
     
  • SR-GBN-ARQ Protocol using Error Correction Code in Fading Network   Order a copy of this article
    by Prajit Paul, Bappadittya Roy, Anup Kumar Bhattacharjee 
    Abstract: An SR-GBN ARQ protocol for maximizing throughput in fading networks through product code is proposed in this document. Integrating the GBN and SR model for the SR-GBN approach minimizes the disadvantages of the GBN model by applying some SR retransmissions before losing the GBN retransmission. In efforts to improve the performance of ARQ-based systems, the combined techniques of Packet Combining Approach (PCA), Modified Packet Combining (MPC) and Aggressive Packet Combining (APC) have been used at the receiver end used to avoid or reduce the retransmissions. The proposed protocol was implemented using the MATLAB tool, and the results were compared to existing scenarios. Subsequently, the results of the proposed protocol demonstrate superior performance by essentially using the performance metrics of power consumption, packet throughput, packet error correction probability (PEC), mean square error (MSE), and minimum mean square error (MMSE).
    Keywords: Selective repeat (SR); automatic repeat request (ARQ); Go-Back-N (GBN); packet combining approach (PCA); XOR operation; error correction.
    DOI: 10.1504/IJICS.2025.10068687
     
  • StealthGuard: A New Framework of Privacy-Preserving Human Action Recognition.   Order a copy of this article
    by Gazi Mohammad Ismail, ZHANG XUEPING, YANG JUNXIANG, Li Bin 
    Abstract: Privacy-preserving human action recognition is a crucial area of research, particularly in the context of video surveillance, assisted living systems, and healthcare applications. While human action recognition techniques offer significant benefits for automated video analysis, they also raise concerns about individual privacy when deployed in sensitive environments. This paper introduces, StealthGuard incorporates a temporal privacy-preserving component based on Generative Adversarial Networks (GANs) to obfuscate sensor data, thereby preventing the identification of individual people or their activities. This approach utilizes Deep Neural Network, ensuring both accuracy in action recognition and real-time deployment feasibility. Through extensive experimental results, StealthGuard demonstrates its ability to achieve high levels of privacy protection while maintaining recognition accuracy making it a promising solution for applications where privacy is paramount. This paper also provides a related works in the field, highlighting approaches and techniques for privacy-preserving human action recognition.
    Keywords: human action recognition ; HAR; privacy preserving ; Generative Adversarial Network ; GAN ; image segmentation; convolutional neural network; CNN ; recurrent neural network; anomaly detection.
    DOI: 10.1504/IJICS.2025.10068688
     
  • A Novel Mutual Quantum Identity Authentication of two-party Protocol with Chaotic Systems   Order a copy of this article
    by Lu Zhang, Chaonan Wang, Yan Sun, Hongfeng Zhu 
    Abstract: In order to ensure the security of communications, it is often necessary to legally verify the identity of the user before formal communications can take place. Given the growing and dramatic interest in quantum computing, it will be necessary to design mutual quantum authentication schemes implemented using quantum resources. In this paper, we design a two-party mutual authentication quantum identity authentication protocol based on GHZ-like state quantum resources and chaotic map theory. On the one hand, we ensure the true randomness of the authentication parameters, and on the other hand, we ensure the true randomness with fast propagation, so as to achieve the nature of fast true randomness. The scheme is able to make the authentication process complete the authentication in a shorter time while ensuring the security.
    Keywords: Quantum identity authentication; GHZ-like state; Chaotic system.
    DOI: 10.1504/IJICS.2025.10068828
     
  • A Blockchain-Aided Privacy Preservation using Lattice Homomorphic Encryption for Digital Forensic Investigation   Order a copy of this article
    by Suvarna Chaure, Vanita Mane 
    Abstract: This paper proposes a novel Secrecy-Preserving Optimized Machine Learning-based Digital Forensic Model (SOMLDFM) designed to address the computational complexities of existing forensic models. The model utilizes a Pelican Optimization-based Hybrid Support Vector Machine-Extreme Learning Machine (SVM-ELM) for feature extraction and classification. This hybrid approach classifies files into Forensically Related Files (FRFs) and Forensically Unrelated Files (FNRFs) while effectively removing noise and irrelevant data. The Pelican Optimization technique reduces potential losses in the hybrid SVM-ELM, resulting in enhanced overall performance. To protect confidential information, the model employs lattice-based homomorphic encryption (LHE), which offers superior security compared to elliptic curve and Diffie-Hellman methods. The discovered files are prioritized based on a calculated relevance score, arranged from highest to lowest by the investigator. The proposed model demonstrates high performance, achieving an accuracy of 98.69%, an F1 score of 97.79%, a recall score of 97.15%, and a precision score of 98.44%.
    Keywords: Support vector machine; interplanetary file storage system; pelican optimization; Digital Forensic Investigation Data; homomorphic encryption.
    DOI: 10.1504/IJICS.2025.10069311
     
  • A Novel Secure Key Generation and SPN-Based Transformation Algorithm for Grayscale Image Encryption   Order a copy of this article
    by Pramil Kesarwani, Ketan Puyad, Bharathi Chidirala, Bibhudendra Acharya 
    Abstract: In this paper, we introduce a novel gray-scale image encryption algorithm that leverages key generation through a secure message-based approach and employs a Substitution-Permutation Network (SPN) for enhanced security The algorithm takes an input image, a user-specified parameter N, and a secret message, from which a SHA-256 string is derived to generate cryptographic parameters for a Henon map The Henon map produces two arrays, 'x' and 'y', with lengths matching the dimensions of the input image A mask is created by performing XOR operations at specific positions in the image using 'x' and 'y' Prior to mask application, the image undergoes an P-round SPN transformation The SPN consists of substitution and permutation operations, where the substitution array is generated using the logistic map to ensure unique and random placement of values from 0 to 255 for gray-scale images Rows and columns of the image are rotated and substituted
    Keywords: Secure Key Generation; Henon Map; Logistic Map; SHA-256; Substitution-Permutation Network (SPN).
    DOI: 10.1504/IJICS.2025.10069312
     
  • Proving Multiplicative Relations for Different Lattice Commitments   Order a copy of this article
    by Mengfan Wang, Guifang Huang, Dong Fang, Lei Hu 
    Abstract: The BDLOP commitment of Baum et al. (SCN 2018) is the currently most efficient commitment scheme. Based on BDLOP commitment, Attema et al. in CRYPTO 2020 presented an efficient product proof in the ring $\mathcal{R}_q=\mathbb{Z}_q[X]/(X^d+1)$ where $X^d+1$ splits into low-degree factors (ALS scheme). Their proof has only one garbage commitment besides the necessary opening proof and works in the case that all the messages are committed simultaneously using the same randomness $\vec{\bm{r}}$. In this paper, we deal with the case where the messages involved in the multiplicative relation are committed using different randomnesses, and construct a parallel product proof and two sequential product proofs. Both of which still require need one additional garbage commitment. Furthermore, in the $\left(\frac{2}{1}\right)$ and $\left(\frac{1}{2}\right)$ sequential product proofs, previous opening proofs can be reused to reduce the proof length by about $2/3$ and $1/3$ respectively.
    Keywords: Commitment scheme; Zero-knowledge proof; MSIS and MLWE; Galois Automorphisms.
    DOI: 10.1504/IJICS.2025.10069313
     
  • DDoS Attack Detection in Blockchain Network Layer using Dual Attention based Dense Convolutional Gated Recurrent Unit   Order a copy of this article
    by Rohidas Balu Sangore, Manoj Eknath Patil 
    Abstract: This paper aims to design a novel hybrid deep learning model along with a new feature extraction technique. This paper collects the input data from publicly available datasets and is pre-processed by using min-max normalization and missing value imputation to eliminate unnecessary information. After, a new Squeeze Excited Deep ResNet-152 (SE-DRes152) model is introduced to extract the essential traffic attributes from pre-processed data. Finally, the DDoS attack from the provided inputs is identified by presenting a novel Dual Attention based Dense Convolutional Gated Recurrent Unit (DA_DCGRU) approach based on the extracted features. The ability of the proposed classifier is further enhanced by fine-tuning its parameters using by Modified Fire Hawks (MFH) approach. The simulation results and comparison analysis prove that the proposed model outperforms the other existing methods in terms of accuracy (98.83%), precision (97.54%), recall (97.81%), F-score (97.67%), specificity (98.51%), MAE (0.192%), MSE (0.01%) and RMSE (0.1082%).
    Keywords: Distributed denial of service attack (DDoS); Internet of Things (IoT); Deep learning (DL); Convolutional Neural Network (CNN).
    DOI: 10.1504/IJICS.2025.10069314
     
  • A Context-based Password Change Enforcement Model   Order a copy of this article
    by Adesina S. Sodiya, Akinkunmi A. Owolabi, Saidat A. Onashoga, ENOCH OLUWUMI 
    Abstract: Password-based authentication systems remain vulnerable to various cyber threats, highlighting the need for innovative approaches to enhance security. In this paper, we propose a Context-based Password Change Enforcement (PCE) model aimed at fortifying password-based authentication systems by dynamically evaluating password reliability through contextual parameters. Leveraging password frequency, uniqueness, attempt, environment, and age, these parameters were used to assess password security and enforce timely changes, thereby enhancing overall system resilience. The implementation of the PCE model led to a significant reduction in password compromise, with only 2 out of 450 user passwords compromised, representing a notable decrease of 96% compared to the initial 50 compromised passwords. Comparative analysis revealed a 99.99% performance rate of the proposed PCE model, outperforming other authentication methods. The PCE model therefore offers a systematic and effective approach to strengthen text-based password authentication systems, mitigating common password attacks and enhancing overall security posture.
    Keywords: Password Security; Contextual Authentication; Password Change Enforcement; Cybersecurity; Authentication Resilience.
    DOI: 10.1504/IJICS.2025.10069886
     
  • A Novel Hybrid Approach for Intrusion Detection System using Deep Learning Technique   Order a copy of this article
    by Sudhir Pandey, Ditipriya Sinha 
    Abstract: Intelligent cyber-attacks importantly threaten data security, prompting extensive research and investment in network security by researchers and businesses. Standard security measures like secrecy, firewalls, authentication, and antivirus programs may be insufficient, necessitating additional protection layers. One advanced technology is the intrusion detection system, capable of dynamically identifying intruders. In this paper we focus on network intrusion detection using a neural network and introduces a filter-based hybrid technique with three modules. The first module involves segmenting and selecting features from accessible data. The second module trains the deep neural network using the filtered features. The final module tests the trained neural network. Feature selection uses the Shuffled Frog Leaping Algorithm, and the Error Back Propagation Neural Network is trained to identify the most effective feature subset for classification. This hybrid technique aims to optimize feature selection for training and evaluation by deep learning methods.
    Keywords: Intrusion Detection System; Deep neural Network; Segmentation; Feature Selection; Shuffled Frog Leaping Algorithm; NSL-KDD and Accuracy.
    DOI: 10.1504/IJICS.2025.10069887
     
  • A new bottom-up l-diversity method for Apache spark   Order a copy of this article
    by Kabou Salheddine, Laid Gasmi, Abdelbasset Kabou, Sidi Mohammed BENSLIMANE 
    Abstract: Collecting and sharing enormous data for analysis is crucial for many applications, but it raises privacy concerns due to potential compromise of personal information and identity. Data anonymization models are used to guarantee the tradeoff between privacy and data utility while publishing the data. This paper introduces an enhanced multidimensional bottom-up anonymization approach, designed to satisfy the ldiversity privacy model. It is presented in a distributed manner using the Apache Spark framework. This approach places a strong emphasis on
    Keywords: Data anonymization; Bottom-up; l-diversity; Apache Spark.
    DOI: 10.1504/IJICS.2025.10069888