Journal of Computer Networks and Communications
 Journal metrics
Acceptance rate9%
Submission to final decision74 days
Acceptance to publication46 days
CiteScore4.100
Journal Citation Indicator0.340
Impact Factor-

Towards the Development of a Cloud Computing Intrusion Detection Framework Using an Ensemble Hybrid Feature Selection Approach

Read the full article

 Journal profile

Journal of Computer Networks and Communications publishes original research and review articles that investigate both the theoretical and practical aspects of computer networks and communications.

 Editor spotlight

Journal of Computer Networks and Communications maintains an Editorial Board of practicing researchers from around the world, to ensure manuscripts are handled by editors who are experts in the field of study.

 Special Issues

Do you think there is an emerging area of research that really needs to be highlighted? Or an existing research area that has been overlooked or would benefit from deeper investigation? Raise the profile of a research area by leading a Special Issue.

Latest Articles

More articles
Research Article

Towards Building Cyberphysical Systems with Agile Architecture

The current stage of technology development is characterized by an increase in the complexity of the created anthropogenic systems, a constant expansion of the scope of information technologies, an increase in the intelligence level of the created systems, and the appearance of new paradigms for building information-oriented systems such as cyber-physical systems, the Internet of things, and cloud and fog systems. Modern information-oriented systems very often have dynamic structure, implement complex adaptive behavior, and can be considered as systems with agile architecture. The article discusses one of the possible approaches for building cyberphysical systems with agile architecture on fog platforms. The idea of the proposed approach is to accumulate knowledge about the current state of the observed cyberphysical systems in the form of knowledge graphs. As a model, it is proposed to use multilevel relatively finite state operating automaton at the upper level and knowledge graphs at the lower level. A distinctive feature of the developed approach is that models that describe the current state of the observed system can be built automatically.

Review Article

Threats from the Dark: A Review over Dark Web Investigation Research for Cyber Threat Intelligence

From proactive detection of cyberattacks to the identification of key actors, analyzing contents of the Dark Web plays a significant role in deterring cybercrimes and understanding criminal minds. Researching in the Dark Web proved to be an essential step in fighting cybercrime, whether with a standalone investigation of the Dark Web solely or an integrated one that includes contents from the Surface Web and the Deep Web. In this review, we probe recent studies in the field of analyzing Dark Web content for Cyber Threat Intelligence (CTI), introducing a comprehensive analysis of their techniques, methods, tools, approaches, and results, and discussing their possible limitations. In this review, we demonstrate the significance of studying the contents of different platforms on the Dark Web, leading new researchers through state-of-the-art methodologies. Furthermore, we discuss the technical challenges, ethical considerations, and future directions in the domain.

Research Article

SWIPT-Based Nonorthogonal Multiple Access under Arbitrary Nakagami-m Fading with Direct Links

This paper studies the joint impact of simultaneous wireless information and power transfer (SWIPT) and nonorthogonal multiple access (NOMA) to the cooperative relay (CoR) network where direct links exist. Over Nakagami-m fading environments, the near users employ decode-and-forward (DF) and energy harvesting (EH) to assist the transmission from the source to the far users. Exploiting the time-switching protocol (TSP) and power-splitting protocol (PSP) to the CoR-based NOMA system, analytical results for the outage probability are derived, and the corresponding throughput is obtained. Comparative results show that the PSP outperforms the TSP at low transmit power, while at high-transmit-power regime, the TSP provides similar performance as the PSP.

Research Article

Efficient Intrusion Detection System for SDN Orchestrated Internet of Things

Internet of Things (IoT) can simply be defined as an extension of the current Internet system. It extends the human to human interconnection and intercommunication scenario of the Internet by including things, to bring anytime, anywhere, and anything communication. A discipline in networking evolving in parallel with IoT is Software Defined Networking (SDN). It is an important technology that is aimed to solve the different problems existing in the traditional network systems. It provides a new convenient home to address the different challenges existing in different network-based systems including IoT. One important security challenge prevailing in such SDN-based IoT (SDIoT) systems is guarantying service availability. The ever-increasing denial of service (DoS) attacks are responsible for such service denials. A centralized signature-based intrusion detection system (IDS) is proposed and developed in this work. Random Forest (RF) classifier is used for training the model. A very popular and recent benchmark dataset, CICIDS2017, has been used for training and validating the machine learning (ML) models. An accuracy result of 99.968% has been achieved by using only 12 features on Wednesday’s release of the dataset. This result is higher than the achieved accuracy results of related works considering the original CICIDS2017 dataset. A maximum cross-validated accuracy result of 99.713% has been achieved on the same release of the dataset. These developed models meet the basic requirement of a supervised IDS system developed for smart environments and can effectively be used in different IoT service scenarios.

Research Article

New Network Selection Algorithm Based on Cosine Similarity Distance and PSO in Heterogeneous Wireless Networks

Future wireless communication networks will be composed of different technologies with complementary characteristics. Thus, vertical handover (VHO) must support seamless mobility in such heterogeneous environments. The network selection is an important phase in the VHO process and it can be formulated as a multiattribute decision-making problem. So, the mobile terminal equipped with multiple interfaces will be able to choose the most suitable network. This work proposes an access network selection algorithm, based on cosine similarity distance, subjective weights using Fuzzy ANP, and objective weights using particle swarm optimization. The comprehensive weights are based on the cosine similarity distance between the networks and the ideal network. Finally, the candidate network with the minimum cosine distance to the ideal network will be selected in the VHO network selection stage. The performance analysis shows that our proposed method, based on cosine similarity distance and combination weights, reduces the ranking abnormality and number of handoffs in comparison with other MADM methods in the literature.

Research Article

A Novel Approach for Detecting DGA-Based Botnets in DNS Queries Using Machine Learning Techniques

In today’s security landscape, advanced threats are becoming increasingly difficult to detect as the pattern of attacks expands. Classical approaches that rely heavily on static matching, such as blacklisting or regular expression patterns, may be limited in flexibility or uncertainty in detecting malicious data in system data. This is where machine learning techniques can show their value and provide new insights and higher detection rates. The behavior of botnets that use domain-flux techniques to hide command and control channels was investigated in this research. The machine learning algorithm and text mining used to analyze the network DNS protocol and identify botnets were also described. For this purpose, extracted and labeled domain name datasets containing healthy and infected DGA botnet data were used. Data preprocessing techniques based on a text-mining approach were applied to explore domain name strings with n-gram analysis and PCA. Its performance is improved by extracting statistical features by principal component analysis. The performance of the proposed model has been evaluated using different classifiers of machine learning algorithms such as decision tree, support vector machine, random forest, and logistic regression. Experimental results show that the random forest algorithm can be used effectively in botnet detection and has the best botnet detection accuracy.

Journal of Computer Networks and Communications
 Journal metrics
Acceptance rate9%
Submission to final decision74 days
Acceptance to publication46 days
CiteScore4.100
Journal Citation Indicator0.340
Impact Factor-
 Submit

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.