Babylonian Journal of Networking https://mesopotamian.press/journals/index.php/BJN <p style="text-align: justify;">The Babylonian Journal of Networking (EISSN: 3006-5372) focuses on cutting-edge advancements in networking technologies. This specialized publication invites researchers to share high-quality contributions covering computer networks, wireless communication, network security, and the Internet of Things (IoT). Through rigorous review, it aims to disseminate innovative insights and foster collaboration in this dynamic field</p> Mesopotamian Academic Press en-US Babylonian Journal of Networking 3006-5372 Advancements in Time Series-Based Detection Systems for Distributed Denial-of-Service (DDoS) Attacks: A Comprehensive Review https://mesopotamian.press/journals/index.php/BJN/article/view/255 <p>Distributed denial-of-service assaults, often known as DDoS attacks, pose a significant danger to the stability and security of the internet, particularly in light of the increasing number of devices that are linked to the internet. Intelligent detection systems are absolutely necessary in order to lessen the impact of distributed denial of service assaults. In this study, a comprehensive overview of recent research on intelligent approaches, such as Machine Learning (ML), Deep Learning (DL), and Artificial Intelligence (AI), is presented. The review focuses on the application of these techniques in the detection of Distributed Denial of Service (DDoS) assaults. In addition to providing a taxonomy and conceptual framework for DDoS mitigation, the study places particular emphasis on the application of time series data analysis for the detection of distributed denial of service attacks. A number of different intelligent techniques are investigated in this paper. Some of these techniques include clustering, deep reinforcement learning, graph neural networks, support vector machines, and others. For the purpose of performance evaluation, real datasets are utilized, and prospective future research areas in this area are explored.</p> Sara salman Qasim Sarah Mohammed NSAIF Copyright (c) 2024 Sara salman Qasim, Sarah Mohammed NSAIF https://creativecommons.org/licenses/by/4.0 2024-01-20 2024-01-20 2024 9 17 10.58496/BJN/2024/002 Using a Fuzzy Approach as an Assessment Method to Extend the Lifespan of Wireless Sensor Networks using the LEACH Protocol https://mesopotamian.press/journals/index.php/BJN/article/view/317 <p>Wireless sensor network is the term used to describe a network where network nodes are wirelessly configured to collect data from the real world. Node sensors depend on finite energy sources, such as batteries, because of the wireless configuration they have. If the battery-operated sensor of the node is not charged, it will be unable to carry out its intended function. If a specific amount of nodes fail, the network will cease to function. Several energy-efficient protocols were developed for Wireless Sensor Networks (WSN), including the LEACH Protocol. The LEACH protocol demonstrates a single cluster-based protocol by dividing available sensor nodes into sets and interacting with each set individually. The shape of an energy can be altered by compressing or expanding it, based on the cluster's configuration. We are comparing the network lifespans of three distinct versions of the LEACH protocol that utilize fuzzy techniques for cluster selection with the lifespan of WSNs generated by a previous version of the protocol.</p> Janan Farag Yonan Ayser Hadi Oleiwi Copyright (c) 2024 Janan Farag Yonan, Ayser Hadi Oleiwi https://creativecommons.org/licenses/by/4.0 2024-03-10 2024-03-10 2024 31 44 10.58496/BJN/2024/005 A ELECTRIC VEHICLE BLOCKCHAIN: PROBLEMS AND OPPORTUNITIES https://mesopotamian.press/journals/index.php/BJN/article/view/278 <p>These days, we are observing a very rapid spread of the electric vehicle<br>industry. This means a significant increase in the data and energy exchanged between<br>these vehicles. The existing centralized approach is less secure and more vulnerable<br>to data destruction and manipulation by intruders. Therefore, it became necessary to<br>search for an alternative that provides excellent protection for this massive amount<br>of data and energy. Although blockchain technology and cryptocurrencies are closely<br>associated, they also have many other potential applications in fields including energy<br>and sustainability, the Internet of Things (IoT), smart cities, smart mobility, and<br>more. In the Internet of Vehicles (IoV) idea, blockchain can provide security for<br>electric vehicle (EV) transactions, enabling electricity trading to be carried out in<br>a decentralized, transparent, and secure manner. . This paper will explain the use of<br>blockchain in this field and how it can handle the trade of transmitted and received<br>energy between electric vehicles. The advantages of using blockchain with electric<br>cars and how it can secure the transactions of energy trading will be shown too. A<br>group of researchers in this field and the challenges that face this technology in energy<br>trading will be discussed too; the studies will be looked at, and recommendations for<br>investments and security will be made. Additionally, the future implications of various<br>blockchain technologies will be highlighted.</p> sahar Mohammed Thaaer kh.Asman Hadeel M Salih Alaa Mohammed Mahmood Copyright (c) 2024 sahar Mohammed, Thaaer kh.Asman, Hadeel M Salih, Alaa Mohammed Mahmood https://creativecommons.org/licenses/by/4.0 2024-02-19 2024-02-19 2024 18 24 10.58496/BJN/2024/003 Evaluation of OFDM system in terms of PAPR and BER using PAPR Reduction Techniques : Windowing and Clipping https://mesopotamian.press/journals/index.php/BJN/article/view/251 <p>The issue of transferring signals in a non-intrusive and efficient manner is highly intriguing. Consequently, the utilisation of the Orthogonal Frequency Division Multiplexing (OFDM) transmission technology is employed due to its enhanced resilience against multipath fading and its ability to achieve better efficiency compared to alternative wireless communication methods. Although the PAPR issue offers certain benefits, it poses undesirable consequences for OFDM, leading to a significant decrease in data transmission rate. Consequently, the mitigation of peak-to-average power ratio (PAPR) issues leads to an improvement in the quality of service. The reduction of PAPR can be achieved by the implementation of clipping and windowing techniques. These approaches arrange the signal into discrete levels of similar magnitude and apply clipping to minimise the bit error rate (BER), resulting in a drop in PAPR. The proposed approach is implemented using the MATLAB software.</p> Mounika Siluveru Dharavath Nanda Madhavi Kesoju Copyright (c) 2024 Mounika Siluveru, Dharavath Nanda, Madhavi Kesoju https://creativecommons.org/licenses/by/4.0 2024-01-10 2024-01-10 2024 1 8 10.58496/BJN/2024/001 Mining Utilities Itemsets based on social network https://mesopotamian.press/journals/index.php/BJN/article/view/315 <p>Mining utility item sets based on social network data involves extracting meaningful patterns and associations from user interactions. In this paper, the process begins by collecting and preprocessing data from platforms like Facebook, Twitter, or LinkedIn. Utility measures are defined based on frequency of occurrence, user engagement metrics, or other domain-specific criteria. Itemsets that meet certain thresholds are identified using techniques like frequent itemset mining or advanced algorithms like Apriori or FP-growth. Additional analyses, such as association rule mining, uncover relationships between different itemsets or user segments, providing valuable insights for personalized recommendations, targeted advertising, and decision-making processes.</p> <p>&nbsp;</p> Sara salman Qasim Lubna Mohammed Hasan Copyright (c) 2024 Sara salman Qasim, Lubna Mohammed Hasan https://creativecommons.org/licenses/by/4.0 2024-03-03 2024-03-03 2024 25 30 10.58496/BJN/2024/004