1
|
Razaque A, Yoo J, Bektemyssova G, Alshammari M, Chinibayeva TT, Amanzholova S, Alotaibi A, Umutkulov D. Efficient Internet-of-Things Cyberattack Depletion Using Blockchain-Enabled Software-Defined Networking and 6G Network Technology. Sensors (Basel) 2023; 23:9690. [PMID: 38139535 PMCID: PMC10747852 DOI: 10.3390/s23249690] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/26/2023] [Revised: 11/09/2023] [Accepted: 11/29/2023] [Indexed: 12/24/2023]
Abstract
Low-speed internet can negatively impact incident response by causing delayed detection, ineffective response, poor collaboration, inaccurate analysis, and increased risk. Slow internet speeds can delay the receipt and analysis of data, making it difficult for security teams to access the relevant information and take action, leading to a fragmented and inadequate response. All of these factors can increase the risk of data breaches and other security incidents and their impact on IoT-enabled communication. This study combines virtual network function (VNF) technology with software -defined networking (SDN) called virtual network function software-defined networking (VNFSDN). The adoption of the VNFSDN approach has the potential to enhance network security and efficiency while reducing the risk of cyberattacks. This approach supports IoT devices that can analyze large volumes of data in real time. The proposed VNFSDN can dynamically adapt to changing security requirements and network conditions for IoT devices. VNFSDN uses threat filtration and threat-capturing and decision-driven algorithms to minimize cyber risks for IoT devices and enhance network performance. Additionally, the integrity of IoT devices is safeguarded by addressing the three risk categories of data manipulation, insertion, and deletion. Furthermore, the prioritized delegated proof of stake (PDPoS) consensus variant is integrated with VNFSDN to combat attacks. This variant addresses the scalability issue of blockchain technology by providing a safe and adaptable environment for IoT devices that can quickly be scaled up and down to pull together the changing demands of the organization, allowing IoT devices to efficiently utilize resources. The PDPoS variant provides flexibility to IoT devices to proactively respond to potential security threats, preventing or mitigating the impact of cyberattacks. The proposed VNFSDN dynamically adapts to the changing security requirements and network conditions, improving network resiliency and enabling proactive threat detection. Finally, we compare the proposed VNFSDN to existing state-of-the-art approaches. According to the results, the proposed VNFSDN has a 0.08 ms minimum response time, a 2% packet loss rate, 99.5% network availability, a 99.36% threat detection rate, and a 99.77% detection accuracy with 1% malicious nodes.
Collapse
Affiliation(s)
- Abdul Razaque
- School of Computing, Gachon University, Seongnam 13120, Republic of Korea;
| | - Joon Yoo
- School of Computing, Gachon University, Seongnam 13120, Republic of Korea;
| | - Gulnara Bektemyssova
- Department of Computer Engineering and Information System, International Information Technology University, Almaty 050000, Kazakhstan; (T.T.C.); (D.U.)
| | - Majid Alshammari
- Computers and Information Technology College, Taif University, Taif 26571, Saudi Arabia;
| | - Tolganay T. Chinibayeva
- Department of Computer Engineering and Information System, International Information Technology University, Almaty 050000, Kazakhstan; (T.T.C.); (D.U.)
| | - Saule Amanzholova
- Department of Cybersecurity, International Information Technology University, Almaty 050000, Kazakhstan;
| | - Aziz Alotaibi
- Computers and Information Technology College, Taif University, Taif 26571, Saudi Arabia;
| | - Dauren Umutkulov
- Department of Computer Engineering and Information System, International Information Technology University, Almaty 050000, Kazakhstan; (T.T.C.); (D.U.)
| |
Collapse
|
2
|
Javed MA, Bin Liaqat H, Meraj T, Alotaibi A, Alshammari M. Identification and Classification of Lungs Focal Opacity Using CNN Segmentation and Optimal Feature Selection. Comput Intell Neurosci 2023; 2023:6357252. [PMID: 37538561 PMCID: PMC10396675 DOI: 10.1155/2023/6357252] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/14/2022] [Revised: 09/07/2022] [Accepted: 09/26/2022] [Indexed: 08/05/2023]
Abstract
Lung cancer is one of the deadliest cancers around the world, with high mortality rate in comparison to other cancers. A lung cancer patient's survival probability in late stages is very low. However, if it can be detected early, the patient survival rate can be improved. Diagnosing lung cancer early is a complicated task due to having the visual similarity of lungs nodules with trachea, vessels, and other surrounding tissues that leads toward misclassification of lung nodules. Therefore, correct identification and classification of nodules is required. Previous studies have used noisy features, which makes results comprising. A predictive model has been proposed to accurately detect and classify the lung nodules to address this problem. In the proposed framework, at first, the semantic segmentation was performed to identify the nodules in images in the Lungs image database consortium (LIDC) dataset. Optimal features for classification include histogram oriented gradients (HOGs), local binary patterns (LBPs), and geometric features are extracted after segmentation of nodules. The results shown that support vector machines performed better in identifying the nodules than other classifiers, achieving the highest accuracy of 97.8% with sensitivity of 100%, specificity of 93%, and false positive rate of 6.7%.
Collapse
Affiliation(s)
| | - Hannan Bin Liaqat
- Department of Information Technology, Division of Science and Technology University of Education, Township Campus Lahore, Lahore, Pakistan
| | - Talha Meraj
- Department of Computer Science, COMSATS University Islamabad—Wah Campus, Wah Cantt, Rawalpindi 47040, Pakistan
| | - Aziz Alotaibi
- Department of Computer Science, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
| | - Majid Alshammari
- Department of Information Technology, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
| |
Collapse
|
3
|
Razaque A, Bektemyssova G, Yoo J, Alotaibi A, Ali M, Amsaad F, Amanzholova S, Alshammari M. Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things. Sensors (Basel) 2023; 23:6554. [PMID: 37514847 PMCID: PMC10386004 DOI: 10.3390/s23146554] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/31/2023] [Revised: 07/08/2023] [Accepted: 07/17/2023] [Indexed: 07/30/2023]
Abstract
Deep learning algorithms have a wide range of applications, including cancer diagnosis, face and speech recognition, object recognition, etc. It is critical to protect these models since any changes to them can result in serious losses in a variety of ways. This article proposes the consortium blockchain-enabled conventional neural network (CBCNN), a four-layered paradigm for detecting malicious vehicles. Layer-1 is a convolutional neural network-enabled Internet-of-Things (IoT) model for the vehicle; Layer-2 is a spatial pyramid polling layer for the vehicle; Layer-3 is a fully connected layer for the vehicle; and Layer-4 is a consortium blockchain for the vehicle. The first three layers accurately identify the vehicles, while the final layer prevents any malicious attempts. The primary goal of the four-layered paradigm is to successfully identify malicious vehicles and mitigate the potential risks they pose using multi-label classification. Furthermore, the proposed CBCNN approach is employed to ensure tamper-proof protection against a parameter manipulation attack. The consortium blockchain employs a proof-of-luck mechanism, allowing vehicles to save energy while delivering accurate information about the vehicle's nature to the "vehicle management system." C++ coding is employed to implement the approach, and the ns-3.34 platform is used for simulation. The ns3-ai module is specifically utilized to detect anomalies in the Internet of Vehicles (IoVs). Finally, a comparative analysis is conducted between the proposed CBCNN approach and state-of-the-art methods. The results confirm that the proposed CBCNN approach outperforms competing methods in terms of malicious label detection, average accuracy, loss ratio, and cost reduction.
Collapse
Affiliation(s)
- Abdul Razaque
- School of Computing, Gachon University, Seongnam-si 13120, Republic of Korea
| | - Gulnara Bektemyssova
- Department of Computer Engineering, International Information Technology University, Almaty 050000, Kazakhstan
| | - Joon Yoo
- School of Computing, Gachon University, Seongnam-si 13120, Republic of Korea
| | - Aziz Alotaibi
- Department of Computer Science, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
| | - Mohsin Ali
- Department of Computer Engineering, International Information Technology University, Almaty 050000, Kazakhstan
| | - Fathi Amsaad
- Computer Science Department, Wright State University, Fairborn, OH 45435, USA
| | - Saule Amanzholova
- Department of Cybersecurity, International Information Technology University, Almaty 050000, Kazakhstan
| | - Majid Alshammari
- Department of Information Technology, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
| |
Collapse
|
4
|
Hussain M, Shah N, Amin R, Alshamrani SS, Alotaibi A, Raza SM. Software-Defined Networking: Categories, Analysis, and Future Directions. Sensors (Basel) 2022; 22:5551. [PMID: 35898063 PMCID: PMC9331325 DOI: 10.3390/s22155551] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 06/15/2022] [Revised: 07/15/2022] [Accepted: 07/20/2022] [Indexed: 06/15/2023]
Abstract
Software-defined networking (SDN) is an innovative network architecture that splits the control and management planes from the data plane. It helps in simplifying network manageability and programmability, along with several other benefits. Due to the programmability features, SDN is gaining popularity in both academia and industry. However, this emerging paradigm has been facing diverse kinds of challenges during the SDN implementation process and with respect to adoption of existing technologies. This paper evaluates several existing approaches in SDN and compares and analyzes the findings. The paper is organized into seven categories, namely network testing and verification, flow rule installation mechanisms, network security and management issues related to SDN implementation, memory management studies, SDN simulators and emulators, SDN programming languages, and SDN controller platforms. Each category has significance in the implementation of SDN networks. During the implementation process, network testing and verification is very important to avoid packet violations and network inefficiencies. Similarly, consistent flow rule installation, especially in the case of policy change at the controller, needs to be carefully implemented. Effective network security and memory management, at both the network control and data planes, play a vital role in SDN. Furthermore, SDN simulation tools, controller platforms, and programming languages help academia and industry to implement and test their developed network applications. We also compare the existing SDN studies in detail in terms of classification and discuss their benefits and limitations. Finally, future research guidelines are provided, and the paper is concluded.
Collapse
Affiliation(s)
- Mudassar Hussain
- Department of Computer Science, University of Wah, Wah Cantt P.O. Box 47010, Pakistan
| | - Nadir Shah
- Department of Computer Science, COMSATS University Islamabad, Wah Campus, Wah Cantt P.O. Box 47010, Pakistan; (N.S.); (S.M.R.)
| | - Rashid Amin
- Department of Computer Science, University of Chakwal, Chakwal P.O. Box 48800, Pakistan
| | - Sultan S. Alshamrani
- Department of Information Technology, College of Computer and Information Technology, Taif University, Taif P.O. Box 21944, Saudi Arabia;
| | - Aziz Alotaibi
- Department of Computer Science, College of Computers and Information Technology, Taif University, Taif P.O. Box 21944, Saudi Arabia;
| | - Syed Mohsan Raza
- Department of Computer Science, COMSATS University Islamabad, Wah Campus, Wah Cantt P.O. Box 47010, Pakistan; (N.S.); (S.M.R.)
| |
Collapse
|
5
|
Ahmad B, Khan W, Haq TU, Ahmad S, Zahoor M, Alotaibi A, Ullah R. Beneficial effects of coconut oil (Cocos nucifera) on hematobiochemicl and histopathological markers in CCL4-intoxicated rabbits. BRAZ J BIOL 2022; 84:e252555. [PMID: 35293540 DOI: 10.1590/1519-6984.252555] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/24/2021] [Accepted: 12/23/2021] [Indexed: 11/22/2022] Open
Abstract
The study was designed to investigate the effect of Coconut Oil on the levels of some liver and hematological parameters in carbon tetrachloride intoxicated rabbits. Also the antioxidant capacity of Coconut Oil for various concentrations was assessed on the basis of percent scavenging of (DPPH) free radical. Experimental animals were divided into five groups, eight rabbits in each group. These were: group A (Normal control), group B (Toxic control), group C (Standard control), group D (Treated with Coconut Oil 50 mL/kg body weight after CCl4 intoxication), group E (Treated with Coconut Oil 200 mL/kg body weight after CCl4 intoxication). The effects observed were compared with a standard hepatoprotective drug silymarine (50 mL/kg body weight). The Coconut Oil (200 mL/kg body weight) significantly (P<0.05) reduced the elevated serum levels of alanine transaminase (ALT), aspartate transaminase (AST) and alkaline phosphatase (ALP) when compared to a toxic control rabbits. The results of extract treated rabbits were similar to silymarine administered rabbits group. Treatment with Coconut Oil root and silymarine caused no significant changes in RBC, Platelets, (Hb), (MCH) concentration and (HCT) values. However, significant (P<0.05) increase was observed in the total WBC count. The present study suggested that Coconut Oil can be used as an herbal alternative (need further exploration i.e to detect its bioactive compound and its efficacy) for hepatoprotective activity.
Collapse
Affiliation(s)
- B Ahmad
- University of Malakand, Department of Zoology, Dir Lower, Khyber Pakhtunkhwa, Pakistan
| | - W Khan
- University of Malakand, Department of Zoology, Dir Lower, Khyber Pakhtunkhwa, Pakistan
| | - T U Haq
- University of Malakand, Department of Biotechnology, Dir Lower, Khyber Pakhtunkhwa, Pakistan
| | - S Ahmad
- Islamia College Peshawar, Department of Zoology, Peshawar, Khyber Pakhtunkhwa, Pakistan
| | - M Zahoor
- University of Malakand, Department of Biochemistry, Chakdara, Dir Lower, Khyber Pakhtunkhwa, Pakistan
| | - A Alotaibi
- Princess Nourah bint Abdulrahman University, College Of Medicine, Department of Basic Science, Riyadh, Saudi Arabia
| | - R Ullah
- King Saud University, College of Pharmacy, Department of Pharmacognosy, Medicinal Aromatic and Poisonous Plant Research Center, Riyadh, Saudi Arabia
| |
Collapse
|
6
|
Abdelrahman H, Refaey H, Alotaibi A, Abdel-Aziz AA, Abd Rabbo M. Experimental investigations on the thermal performance of an ice storage system using twin concentric helical coil. Applied Thermal Engineering 2020; 179:115737. [DOI: 10.1016/j.applthermaleng.2020.115737] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/02/2023]
|
7
|
Alotaibi M, Alotaibi A, Ali A, Razzak HA, AlZoughool M. Understanding barriers to genetic screening for hemoglobinopathies patients in Saudi Arabia. Eur J Public Health 2017. [DOI: 10.1093/eurpub/ckx186.127] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/14/2022] Open
Affiliation(s)
- M Alotaibi
- General Administration for Research and Studies in Ministry of Health, KSA
- College of Public Health - King Saud Bin Abdulaziz Universty, KSA
| | - A Alotaibi
- Prince Sultan Military Medical City, College of Medicine, Al Maarefa Colleges, KSA
| | - A Ali
- Department of Statistics and Research, Ministry of Health, UAE
| | - HA Razzak
- Department of Statistics and Research, Ministry of Health, UAE
- University of Karachi, Pakistan
| | - M AlZoughool
- College of Public Health - King Saud Bin Abdulaziz Universty, KSA
| |
Collapse
|
8
|
Alotaibi A, Petrofsky J, Daher N, Lohman E, Syed H. Effect of monophasic pulsed current on inferior heel symptoms associated with plantar fasciitis. Physiotherapy 2015. [DOI: 10.1016/j.physio.2015.03.181] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
|
9
|
Alfarag A, Almutairi A, Alenzi F, Alotaibi A, Mohammed EY. Patients satisfaction about health care services provided by primary health care centres in Majmaah City, Kingdom Of Saudi Arabia. HAMDAN MEDICAL JOURNAL 2015. [DOI: 10.7707/hmj.561] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022] Open
|
10
|
Abstract
AIM The aim of this systematic review was to critically evaluate the evidence regarding the adverse effects (AEs) of homeopathy. METHOD Five electronic databases were searched to identify all relevant case reports and case series. RESULTS In total, 38 primary reports met our inclusion criteria. Of those, 30 pertained to direct AEs of homeopathic remedies; and eight were related to AEs caused by the substitution of conventional medicine with homeopathy. The total number of patients who experienced AEs of homeopathy amounted to 1159. Overall, AEs ranged from mild-to-severe and included four fatalities. The most common AEs were allergic reactions and intoxications. Rhus toxidendron was the most frequently implicated homeopathic remedy. CONCLUSION Homeopathy has the potential to harm patients and consumers in both direct and indirect ways. Clinicians should be aware of its risks and advise their patients accordingly.
Collapse
Affiliation(s)
- P Posadzki
- Complementary Medicine, Peninsula Medical School, Exeter, UK.
| | | | | |
Collapse
|