DEVELOPMENT OF SECURE MODELS AND ALGORITHMS FOR THE EXCHANGE OF SERVICE MESSAGES BY MESSENGERS

Авторы

  • M. M.Karimov Director of the State Test Center under the Cabinet of Ministers of the Republic of Uzbekistan
  • Sh. R.G`ulomov Dean of the Faculty of Cyber Security of Tashkent University of Information Technologies named after Muhammad al-Khorazmi, Uzbekistan
  • T. T.Eshniyozov Master's degree, Faculty of Cyber-Security,Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Uzbekistan

Ключевые слова:

Intrusion detection systems (IDSs),Neural networks (NNs),Back-propagation (BP), Secure messaging; Cryptography; Encryption; Decryption; Web application; Android apps.

Аннотация

Recently, intrusion detection systems (IDS) have been introduced to effectively secure networks. Using neural networks and machine learning in detecting and classifying intrusions are powerful alternative solutions. In this research paper, both of Gradient descent with momentum (GDM)-based back-propagation (BP) and Gradient descent with momentum and adaptive gain (GDM/AG)-based BP algorithms are utilized for training neural networks to operate like IDS. To investigate the efciency of the two proposed learning schemes, a neural network based IDS is built using the proposed learning algo- rithms. The efciency of both algorithms is inspected in terms of convergence speed to achieve system learning, and elapsed learning time using various settings of neural network parameters. The result demonstrated that the GDM/AG-based BP learning algorithm outperforms the GDM-based BP learning algorithm.

Mobile Instant Messenger is one of the most application which use to exchange a message between Sender and Receiver over public network, so that it is very important building an application with good level of security aspect and fast communication. This paper propose a secure Mobile IM in excanging data over internet with an virtual network method. In this model, we propose a Mobile Instant Messenger with virtual network. It will implemented in JXTA protocols which establish a virtual network overlay on top of the Internet, allowing peers or device to directly interact and self-organize independently of their network connectivity and domain topology. This method developed with Pipes as virtual communication channels used to send and receive messages between services and applications, the pipe binding consists of searching and connecting the two or more ends of a pipe. This is new approach of IM communication method, that is message must be deliver over virtual network with good level security.

 

Библиографические ссылки

Motta, R., Pasquale, J.: Wireless P2P: Problem or Opportunity?, pp. 32-37 (2020).

Kirsimäe, S., Norbisrath, U., Singer, G., Narayana Srirama, S., and Lind, A.: Extending Friend-to-Friend Computing to Mobile Environments, pp. 75-80 , (2021).

Ishikawa, N., Sumino, H., Kato, T., Hjelm, J., Murakami, S., Kitagawa,K., Saito, N. : Peer-to-Peer Networking Platform and Its Applications for Mobile Phones, Mobile peer-to-peer computing for next generation distributed environments: advancing conceptual and algorithmic applications, p. 374, (2019).

Kato, T., Ishikawa, N., Sumino, H., Hjelm, J., Yu,Y., Murakami, S.: A Platform And Applications for Mobile Peer-to-Peer Communications,( 2020).

Gunter Ollmann (2004). Securing against the threat of instant messengers. Network Security, Vol. 2004, March 2020, pp. 8-11

K. Ren, S. Yu, W. Lou, and Y. Zhang, “Multi-User Broadcast Authentication in Wireless Sensor Networks,” IEEE Trans. Vehicular Technology, vol. 58, no. 8, pp. 4554-4564, Oct. 2019

L. Harn and J. Ren, “Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications,”IEEE Trans. Wireless Comm.,vol. 10, no. 7, pp. 2372-2379, July 2021.

M. Yusof and A. Abidin, “A secure private instant messenger,” in Proc. 17th Ascia-Pacific Conference on Communications, 2021, pp.821-825

L. Ham, “Group Authentication,” IEEE Trans. Vehicular Technology, vol. 62, no. 9, Sep. 2019

I. Downnard, “Public-Key Cryptography Extensions into Kerberos,” IEEE Potentials,vol. 21, no. 5, pp. 30-34, 2018

Загрузки

Опубликован

2023-04-21