https://mesopotamian.press/journals/index.php/BJN/issue/feed Babylonian Journal of Networking 2024-07-23T08:59:49+00:00 Open Journal Systems <p style="text-align: justify;">The Babylonian Journal of Networking (EISSN: 3006-5372) focuses on cutting-edge advancements in networking technologies. This specialized publication invites researchers to share high-quality contributions covering computer networks, wireless communication, network security, and the Internet of Things (IoT). Through rigorous review, it aims to disseminate innovative insights and foster collaboration in this dynamic field</p> https://mesopotamian.press/journals/index.php/BJN/article/view/255 Advancements in Time Series-Based Detection Systems for Distributed Denial-of-Service (DDoS) Attacks: A Comprehensive Review 2024-01-21T04:45:36+00:00 Sara salman Qasim PT21289@student.uniten.edu.my Sarah Mohammed NSAIF 213720040@ogr.altinbas.edu.tr <p>Distributed denial-of-service assaults, often known as DDoS attacks, pose a significant danger to the stability and security of the internet, particularly in light of the increasing number of devices that are linked to the internet. Intelligent detection systems are absolutely necessary in order to lessen the impact of distributed denial of service assaults. In this study, a comprehensive overview of recent research on intelligent approaches, such as Machine Learning (ML), Deep Learning (DL), and Artificial Intelligence (AI), is presented. The review focuses on the application of these techniques in the detection of Distributed Denial of Service (DDoS) assaults. In addition to providing a taxonomy and conceptual framework for DDoS mitigation, the study places particular emphasis on the application of time series data analysis for the detection of distributed denial of service attacks. A number of different intelligent techniques are investigated in this paper. Some of these techniques include clustering, deep reinforcement learning, graph neural networks, support vector machines, and others. For the purpose of performance evaluation, real datasets are utilized, and prospective future research areas in this area are explored.</p> 2024-01-20T00:00:00+00:00 Copyright (c) 2024 Sara salman Qasim, Sarah Mohammed NSAIF https://mesopotamian.press/journals/index.php/BJN/article/view/445 Integrating Behavioral Analytics and Intrusion Detection Systems to Protect Critical Infrastructure and Smart Cities 2024-07-09T17:54:05+00:00 G. Amirthayogam amir.yogam@gmail.com N. Kumaran nkumaran@veltech.edu.in S. Gopalakrishnan drsgk85@gmail.com K.R.Aravind Brito krbritto1975@gmail.com S. RaviChand Shrutibhargava@sreenidhi.edu.in Shruti Bhargava Choubey Shrutibhargava@sreenidhi.edu.in <p>In an age notable by growing digitization and relatedness, protecting critical infrastructure and smart cities against cyber threats is a biggest obstacle. This abstract examines the combination of Behavioural Analytics (BA) and Intrusion Detection Systems (IDS) as a active and best plan to boost cybersecurity defences. Behavioural Analytics uses machine learning algorithms and statistical models to notice usual entities behaviour patterns inside networks, empowering the identification of anomalies that indicate possible security infringements. This approach is improved through modern techniques that includes Statistical Anomaly Detection, which measures divergence and Long Short-Term Memory (LSTM) networks, skilled at grabbing temporal dependencies in data flow of network pursuit. Cross-Event Correlation methodologies and approaches improve the abilities of IDS by finding similarity between disparate events, giving a broad aspect of possible threats across inter related systems. Entity Behaviour Analysis (EBA) enhance these works by building thorough behaviour profiles and allocating risk scores based on divergence, improving targeted response plans. Network-Based IDS (NIDS) lengthen defence by observing whole networks for unusual activities, while Cyber Threat Intelligence (CTI) devices gives findings into progressing threats, enabling defensive security scales. Convolutional Neural Networks (CNNs) plays a part in removing complicated attribute from network data, improving anomaly detection. The results shows enhancements in threat detection accuracy, with a drop in false positives by 30% and an rise in anomaly detection precision to 95%. The Sensor Data (Units) changes from 80 to 90 units over monitored time periods.</p> 2024-07-01T00:00:00+00:00 Copyright (c) 2024 G. Amirthayogam, N. Kumaran, S. Gopalakrishnan, K.R.Aravind Brito, S. RaviChand, Shruti Bhargava Choubey https://mesopotamian.press/journals/index.php/BJN/article/view/424 Underwater Wireless Sensors Increase Routing Performance using Impact Efficient localization-based Routing protocols 2024-06-15T08:56:55+00:00 T. Kavitha kavithaecephd@gmail.com M. Venkatesan venkatesan5488@gmail.com S. Gopalakrishnan drsgk85@gmail.com S.Ravi Chand ravichandsankuru1@gmail.com M Gopianand mgopianand@gmail.com S. Abirami abiramisathyamoorthy56@gmail.com <p>The Underwater Wireless Sensor Network (UWSN) is an organization used to perform observing of errands over a particular region; it is furnished with shrewd sensors and vehicles that are adjusted to convey helpfully through wireless connections. Remote sensor networks are enormous scope networks comprised of modest, reduced sensors with immense scope energy and settling limit that might be utilized in different unpredictable circumstances under factor conditions. The use of UWSNs is growing daily due to their significant contribution to several applications, including underwater surveillance and search. Wireless sensor networks submerged in water confront unique challenges. Therefore, particular routing protocols are needed from source to destination; security concerns that should be taken into consideration by routing protocols must be addressed by many UWSN applications. The proposed routing protocols influencing IHELBRP (Impact High Efficient Localization-Based Routing Protocols) and the UWSN architectural perspective. Reviewing and examining steering conventions concerning energy consumption, packet delivery rate, and packet delivery rate is finished. The advantages and disadvantages of each steering convention are recorded. To shield the correspondence medium here, a rundown of safety needs is incorporated alongside an investigation of safety worries in UWSN.</p> 2024-06-03T00:00:00+00:00 Copyright (c) 2024 T. Kavitha, M. Venkatesan , S. Gopalakrishnan , S.Ravi Chand, M Gopianand, S. Abirami https://mesopotamian.press/journals/index.php/BJN/article/view/317 Using a Fuzzy Approach as an Assessment Method to Extend the Lifespan of Wireless Sensor Networks using the LEACH Protocol 2024-03-12T09:05:53+00:00 Janan Farag Yonan jananfarag@gmail.com Ayser Hadi Oleiwi ayserhadi74@gmail.com <p>Wireless sensor network is the term used to describe a network where network nodes are wirelessly configured to collect data from the real world. Node sensors depend on finite energy sources, such as batteries, because of the wireless configuration they have. If the battery-operated sensor of the node is not charged, it will be unable to carry out its intended function. If a specific amount of nodes fail, the network will cease to function. Several energy-efficient protocols were developed for Wireless Sensor Networks (WSN), including the LEACH Protocol. The LEACH protocol demonstrates a single cluster-based protocol by dividing available sensor nodes into sets and interacting with each set individually. The shape of an energy can be altered by compressing or expanding it, based on the cluster's configuration. We are comparing the network lifespans of three distinct versions of the LEACH protocol that utilize fuzzy techniques for cluster selection with the lifespan of WSNs generated by a previous version of the protocol.</p> 2024-03-10T00:00:00+00:00 Copyright (c) 2024 Janan Farag Yonan, Ayser Hadi Oleiwi https://mesopotamian.press/journals/index.php/BJN/article/view/278 A ELECTRIC VEHICLE BLOCKCHAIN: PROBLEMS AND OPPORTUNITIES 2024-02-07T15:34:27+00:00 sahar Mohammed yousifsahar4@uoanbar.edu.iq Thaaer kh.Asman yousifsahar4@uoanbar.edu.iq Hadeel M Salih yousifsahar4@uoanbar.edu.iq Alaa Mohammed Mahmood yousifsahar4@uoanbar.edu.iq <p>These days, we are observing a very rapid spread of the electric vehicle<br>industry. This means a significant increase in the data and energy exchanged between<br>these vehicles. The existing centralized approach is less secure and more vulnerable<br>to data destruction and manipulation by intruders. Therefore, it became necessary to<br>search for an alternative that provides excellent protection for this massive amount<br>of data and energy. Although blockchain technology and cryptocurrencies are closely<br>associated, they also have many other potential applications in fields including energy<br>and sustainability, the Internet of Things (IoT), smart cities, smart mobility, and<br>more. In the Internet of Vehicles (IoV) idea, blockchain can provide security for<br>electric vehicle (EV) transactions, enabling electricity trading to be carried out in<br>a decentralized, transparent, and secure manner. . This paper will explain the use of<br>blockchain in this field and how it can handle the trade of transmitted and received<br>energy between electric vehicles. The advantages of using blockchain with electric<br>cars and how it can secure the transactions of energy trading will be shown too. A<br>group of researchers in this field and the challenges that face this technology in energy<br>trading will be discussed too; the studies will be looked at, and recommendations for<br>investments and security will be made. Additionally, the future implications of various<br>blockchain technologies will be highlighted.</p> 2024-02-19T00:00:00+00:00 Copyright (c) 2024 sahar Mohammed, Thaaer kh.Asman, Hadeel M Salih, Alaa Mohammed Mahmood https://mesopotamian.press/journals/index.php/BJN/article/view/453 Mapping Web Service Characteristics to Queueing Theory Models for Performance Analysis 2024-07-23T08:59:49+00:00 Raed Abdulkareem Hasan Raed.isc.sa@ntu.edu.iq Omar Ibrahim Obaid alhamdanyomar23@gmail.com Ans Ibrahim Mahameed AlQassab Raed.isc.sa@ntu.edu.iq Husniyah Jasim Husniyah_hwj@ntu.edu.iq Saad Ahmed Dheyab Raed.isc.sa@ntu.edu.iq <p>The article presents a comprehensive analysis of mapping the characteristics of Web services to queueing theory models, specifically the M/M/1 queueing model. The authors aim to establish a theoretical foundation for modeling the performance of Web services and deriving response time formulae. The key points covered in the article are as follows: 1. Analyzing the characteristics of Web services: The article examines the six fundamental characteristics of queueing systems, including arrival patterns, service patterns, queue discipline, system capacity, and the number of servers, and maps them to the Web service environment. 2. Representation using Kendall's notation: The Web service characteristics are represented using Kendall's notation, resulting in the M/M/1/∞/FCFS model, where M denotes exponential distributions for arrival and service patterns, 1 represents a single server, ∞ represents infinite system capacity, and FCFS represents the first-come, first-served queue discipline. 3. Derivation of response time formulae: The article provides a detailed derivation of the response time formulae for the M/M/1 model using stochastic processes, Markov chains, and the birth-death process. The derivation incorporates steady-state conditions and results in a formula that calculates the probability of completing a request within a user-specified response time. 4. Practical applications: The derived response time formula can be used by service providers to determine the probability of completing user requests within specified Service Level Agreements (SLAs). By setting a threshold value (filter value), the service provider can select requests with a higher probability of completion for further processing. Overall, the article contributes to the understanding of Web service performance modeling by establishing a theoretical foundation based on queueing theory. The mapping of Web service characteristics to the M/M/1 model and the derivation of response time formulae provide valuable insights for service providers to analyze and optimize the performance of their Web services while adhering to SLAs</p> 2024-07-20T00:00:00+00:00 Copyright (c) 2024 Raed Abdulkareem Hasan, Omar Ibrahim Obaid, Ans Ibrahim Mahameed AlQassab, Husniyah Jasim , Saad Ahmed Dheyab https://mesopotamian.press/journals/index.php/BJN/article/view/251 Evaluation of OFDM system in terms of PAPR and BER using PAPR Reduction Techniques : Windowing and Clipping 2024-01-14T08:01:33+00:00 Mounika Siluveru mounika.siluveru@gmail.com Dharavath Nanda dharavath.nandu81@gmail.com Madhavi Kesoju madhu_kesoju@yahoo.co.in <p>The issue of transferring signals in a non-intrusive and efficient manner is highly intriguing. Consequently, the utilisation of the Orthogonal Frequency Division Multiplexing (OFDM) transmission technology is employed due to its enhanced resilience against multipath fading and its ability to achieve better efficiency compared to alternative wireless communication methods. Although the PAPR issue offers certain benefits, it poses undesirable consequences for OFDM, leading to a significant decrease in data transmission rate. Consequently, the mitigation of peak-to-average power ratio (PAPR) issues leads to an improvement in the quality of service. The reduction of PAPR can be achieved by the implementation of clipping and windowing techniques. These approaches arrange the signal into discrete levels of similar magnitude and apply clipping to minimise the bit error rate (BER), resulting in a drop in PAPR. The proposed approach is implemented using the MATLAB software.</p> 2024-01-10T00:00:00+00:00 Copyright (c) 2024 Mounika Siluveru, Dharavath Nanda, Madhavi Kesoju https://mesopotamian.press/journals/index.php/BJN/article/view/427 Secure Routing and Reliable Packets Transmission In MANET Using Fast Recursive Transfer Algorithm 2024-06-17T07:32:51+00:00 M.Sahaya Sheela hisheelu@gmail.com R. Suganthi drrsuganthiphd@gmail.com S. Gopalakrishnan drsgk85@gmail.com T. Karthikeyan karthik.rt@gmail.com K. Jeevana Jyothi jyothikale7@gmail.com K. Ramamoorthy krmoorthy@psnacet.edu.in <p>Mobile Ad-hoc Network (MANET) autonomous operation can be multi-hop it is the infrastructure-less wireless network.&nbsp; Security is one of the biggest challenges in Mobile Adhoc Network. The MANETs security there are considerations must be so that the routing protocol in order to protect the secure data transmission. In the routing and security that is an important aspect for in a MANETs, existing method routing protocol, however, is not enough to security requirements. The proposed method using Fast Recursive Transmission Algorithm (FRTA) used designed to maximize the data security, routing optimization, minimizing the impact of malicious attack using Collision Detection Avoid Algorithm (CDAA) activity over the MANET and select the best path. Table-driven routing protocols, also known as proactive routing protocols, mandate that every node on the network keep up-to-date routing data. To maintain consistent routing information for network nodes, these protocols propagate frequent updates to the routing table throughout the network, necessitating changes to the network topology. There's a lot of overhead from these upgrades. The suggested FRTA algorithm lowers node data loss rates and increases network energy efficiency. Table-driven routing protocols, also known as proactive routing protocols, mandate that every node on the network keep up-to-date routing data. To maintain consistent routing information for network nodes, these protocols propagate frequent updates to the routing table throughout the network, necessitating changes to the network topology. There's a lot of overhead from these upgrades. The suggested FRTA algorithm lowers node data loss rates and increases network energy efficiency. The proposed method shows high performance than other existing evaluations of the most advanced security and routing energy, end-to-end delay, packet transfer rate, packet loss</p> 2024-06-15T00:00:00+00:00 Copyright (c) 2024 M.Sahaya Sheela, R. Suganthi, S. Gopalakrishnan, T. Karthikeyan, K. Jeevana Jyothi, K. Ramamoorthy https://mesopotamian.press/journals/index.php/BJN/article/view/379 Using Artificial Intelligence to Evaluating Detection of Cybersecurity Threats in Ad Hoc Networks 2024-05-05T16:51:54+00:00 Rasha Hameed Khudhur Al-Rubaye 213721418@ogr.altinbas.edu.tr AYÇA KURNAZ TÜRKBEN Ayca.turkben@altinbas.edu.tr <p>This paper is devoted to the use of AI managed to contribute to security of the MANETs (Mobile Ad-hoc Networks), decentralized and mobile wireless networks, that are fully dynamic in nature. The intention of the research is to audit the dangers of cyber and to spot the variety of cyber threats types, including Distributed Denial of Service (DDoS) attacks, malware intrusions, leakages or data breaches, or unauthorized access attempts, using AI-powered algorithms and models. The purpose is to obtain higher degree of veracity of defining and classifying these threats and as result puts more security and reliability to MANET networks. Anomaly detection addressed as a secondary line of defense specific for MANET hardware and network traffic. The monitoring method is needed here to find abnormal behavior that might anyhow signify the possible security flaws or the attacks of the MANET environments. This ultimate goal is penetrated with the timely detection Peculiarities, which makes possible to reinforce MANET security capabilities that require to be well-developed against cyber threats. Experimental results reveal a clear trend of Fleet Grid Algorithm Improvements along with Detection Accuracy (Digital Signals and Anomaly) by means of training AI models (CNN and RF) with algorithms like Random forest and Convolutional neural networks. The machine learning based algorithms often present remarkable results comprising efficiency in detecting and effectively categorizing different cyber threats existing such as DDoS attacks, malware infiltrations and attempted unauthorized access. This method of anomaly detection is able to accurately detect robot anomalies and malicious activities in network traffic in addition to we preventing system vulnerabilities or threats from occurring prematurely. Besides, the findings of this study wide relatively efficient AI-based cybersecurity systems for dynamic decentralized MANET systems, which are developed for street-view switching and path finding, self healing and self configuration.</p> 2024-04-30T00:00:00+00:00 Copyright (c) 2024 Rasha Hameed Khudhur Al-Rubaye , AYÇA KURNAZ TÜRKBEN https://mesopotamian.press/journals/index.php/BJN/article/view/315 Mining Utilities Itemsets based on social network 2024-03-09T06:25:27+00:00 Sara salman Qasim eng.lubna.m@gmail.com Lubna Mohammed Hasan eng.lubna.m@gmail.com <p>Mining utility item sets based on social network data involves extracting meaningful patterns and associations from user interactions. In this paper, the process begins by collecting and preprocessing data from platforms like Facebook, Twitter, or LinkedIn. Utility measures are defined based on frequency of occurrence, user engagement metrics, or other domain-specific criteria. Itemsets that meet certain thresholds are identified using techniques like frequent itemset mining or advanced algorithms like Apriori or FP-growth. Additional analyses, such as association rule mining, uncover relationships between different itemsets or user segments, providing valuable insights for personalized recommendations, targeted advertising, and decision-making processes.</p> <p>&nbsp;</p> 2024-03-03T00:00:00+00:00 Copyright (c) 2024 Sara salman Qasim, Lubna Mohammed Hasan