1 | AMADI EMMANUEL C.Eze U. F, Ikerionwu C. | Game Theory Basics and its Application in Cyber Security | The concept of game theory has in recent times has found application extensively in the area of security usually called security games. A game could be a normal form or extensive form and are used to model the behaviour of players in a simple or complex contest for resources within a given scenario. The game theory finds application in various areas including finance, economics, politics, auction, sciences and cybersecurity. This work reviews the application of game theory in cybersecurity. A brief introduction to the concept of game theory is presented alongside a detailed review of research works carried out using the concept of game theory for cybersecurity. | Advances in Wireless Communications and Networks | science publishing group
|
2 | Dr Anthony Otuonye Dr Emeka Chinedu | Using ICT Policy Framework as a Panacea for Economic Recession and Instability in Nigeria | In this research article, we have developed an ICT-based strategic model for Nigeria as a panacea for her current fight against economic recession. Research has shown that Nigeria is currently in a recession with her GDP growth rate for the first quarter of 2016 at -1.5% and that of the second quarter of 2016 at -0.36%. The reduced economic activities in Nigeria clearly show in the lower gross domestic product (GDP), and high inflation rate. The model developed in this work shows the correlation among the various elements of the framework including Integration, Incentives, Challenges, and Direct Positive Effects, to ensure economic benefits to Nigeria as a nation via the following channels: ICT policy, an entrepreneurial roadmap, a broadband policy, and an deployment of ICT component policy in all educational disciplines across the nation. This paper recommends full implementation of the model for a quick recovery of the Nigerian economy and for her economic growth. The government of Nigeria should encourage the dispersal of ICT into the socio-economic life of the people by adoption and implementation of ICT policies, including adequate investment in IT infrastructure. We have equally proved that ICT plays a complementary role in industrial development, trade, farming, education, housing, health and financial institutions. We strongly recommend that the government should link ICT planning to her national economic and social planning, and the best time to do that is now. Contribution/Originality: This study contributes to the existing literature having highlighted the important role that Information and Communication Technology will play in addressing the problem of economic recession in Nigeria. This study uses a new estimation methodology known as the Decision Process Theory. This study also originates new models for sustainable economic growth. It is one of the very few studies which have investigated the solution to the economic recession in Nigeria. Keywords GDP ICT policy Economic recession ICT diffusion Economic growth. | Journal of Future Internet, volume 2, No. 1, pg.1-9, June 2017. www.mdpi.com/journal/futureinternet | Conscientia Beam
|
3 | Dr Anthony Otuonye Nwaimo E.C., Udunwa I.A | Remedy to Economic Recession in Nigeria: An ICT-driven Model for a Sustainable Economic Growth | This research paper develops a new ICT-based strategic model for Nigeria as a panacea for her current economic recession. Nigeria is currently in a recession with her GDP growth rate in the first and second quarters of 2016 at -0.36% and -1.5% respectively, and with a significant decline in economic activity spread across the economy, and visible in real gross domestic product (GDP), real This research paper develops a new ICT-based strategic model for Nigeria as a panacea for her current economic recession. Nigeria is currently in a recession with her GDP growth rate in the first and second quarters of 2016 at -0.36% and -1.5% respectively, and with a significant decline in economic activity spread across the economy, and visible in real gross domestic product (GDP), real income, employment, industrial production, and very high inflation rate. This research also established the perceptions of other researchers and experts in the IT sector with regards to the challenges and benefits of ICT diffusion in Nigeria. The model developed in this work shows the relationship among the various elements of the framework including Integration, Incentives, Challenges, and Direct Positive Effects, to ensure economic benefits to the Nigerian state via the following channels, an ICT policy, an entrepreneurial roadmap, a broadband policy, a local content development agenda, and an implementation of ICT component policy in all educational disciplines across the nation. The adoption of the new ICT-model will open many doors for socio-economic and political development in all developing countries especially Nigeria. This paper recommends full implementation of the model for a quick recovery of the Nigerian economy and for her sustainable economic growth. The government should fully embrace the application and diffusion of ICT into the socio-economic and political life of the people by adoption and implementation of ICT policies, including adequate investment in IT infrastructure. We have equally proved that ICT plays a complementary role in the development of industry, trade, farming, education, housing, health and financial institutions. We, therefore, recommend that the government should link ICT planning to her national economic and social planning, especially now. Keywords: Economic Recession, ICT diffusion, ICT Policy, Economic Growth, GDP. | International Journal of Science and Research Methodology, volume 6, Issue 4, June 2017. www.ijsrm.human journals.com | Human Journals
|
4 | Amadi Emmanuel C Eze F.U, Ikerionwu .C. | Game Theory Basics and its Application in Cyber Security | The concept of game theory has in recent times have found application extensively in the area of security usually called security games. A game could be a normal form or extensive form and are used to model the behaviour of players in a simple or complex contest for resources within a given scenario. The game theory finds application in various areas including finance, economics, politics, auction, sciences and cybersecurity. This work reviews the application of game theory in cybersecurity. A brief introduction to the concept of game theory is presented alongside a detailed review of research works carried out using the concept of game theory for cybersecurity. | Advances in Wireless Communications and Networks | science publishing group
|
5 | Amaobi U.M. Amadi E. C., Nwokonkwo Obi C. | A Cost-effective Image Steganography Application for Document Security | Steganography is the art or practise of concealing a message, image, or file within another message, image, or file. In image steganography, a document is not just encrypted or locked as conventional security techniques could provide, which could leave room for hacking attempts; rather the documents are disguised from their original nature (document hiding behind an image) and as such hacking attempt may not be considered. The image can only be retrieved by individuals with the applications running on their computers. This paper presents an easy to use lightweight application that can be used to secure documents within images. This application is developed using C programming language and can be applied in any organization ranging from educational institutions, government agencies financial institutions and private agencies. | Management Science and Information Technology | Science Publishing Group
|
6 | Amadi Emmanuel C. Eheduru G.E, Eze U., Ikerionwu C., Okafor K. C. | Anti-DDoS Firewall; A Zero-Sum Mitigation Game Model for Distributed Denial of Service Attack Using Linear Programming | Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial-of-service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for a greater share of a resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of the maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a testbed that using linear programming to model the network behaviour and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall. | IEEE Xplore Digital Library | IEEE
|
7 | Dr Anthony Otuonye. Udunwa I.A, Nwokonkwo .O.C. | A Model Design of Big Data Processing System using HACE Theorem | In this research paper, we have developed a new big data processing model using the HACE theorem to fully harness the potential benefits of the big data revolution and to enhance the socio-economic development of in developing countries. The paper proposes a three-tier data mining structure for big data storage, processing and analysis from a single platform and provides accurate and relevant social sensing feedback for a better understanding of our society in real-time. The whole essence of data mining is to analytically explore data in search of consistent patterns and to further validate the findings by applying the detected patterns to new data sets. Big Data concern large-volume, complex, and growing data sets with multiple, autonomous sources. Our data-driven model involves a demand-driven aggregation of information sources, mining and analysis to overcome the perceived challenges of the big data. The study became necessary due to the growing need to assist governments and business agencies to take advantage of the big data technology for the desired turn-around in their socio-economic activities. The researchers adopted the HACE theorem in the model design which characterizes the unique features of the big data revolution. The Hadoop’s MapReduce technique was also adopted for big data mining, while the k-means and Naïve Bayes algorithm were used to ensure big data clustering and classification. By this model, the suggestions of various IT scholars and authors has been achieved who observed the need to revisit most of our data mining techniques and suggested distributed versions available methods of data analysis due to the new challenges of big data. Keywords – Big Data, HACE Theorem, Data Mining, Open Source, Real-Time. | International Journal of Electronics Communication and Computer Engineering, Volume 9, Issue 1 http://ijecce.org/index.php/issues | Timeline Publication Pvt.Ltd
|
8 | Dr Anthony Otuonye, Nwokonkwo O.C., Eke F.N. | Overcoming Big Data Challenges for Revolutionary Breakthroughs in Commerce and Industry | Big-data computing is perhaps the biggest innovation in computing in the last decade. We have only begun to see its potential to collect, organize, and process data for profitable business ventures. Data mining is a major component of the big data technology and the whole essence is to analytically explore data in search of consistent patterns and to further validate the findings by applying the detected patterns to new data sets. Big Data concern large-volume, complex, growing data sets with multiple, autonomous sources. This paper explores the major challenges of big data mining some of which are as a result of the intrinsically distributed and complex environment and some due to the large, unstructured and dynamic datasets available for mining. We discover that the gradual shift towards distributed complex problem-solving environments is now prompting a range of new data mining research and development problems. In this paper also, we have proffered solution to the new challenges of big data mining by a proposition of the HACE theory to fully harness the potential benefits of the big data revolution and to trigger a revolutionary breakthrough in commerce and industry. The research also proposed a three-tier data mining structure for big data that provides accurate and relevant social sensing feedback for a better understanding of our society in real-time. Based on our observations, we recommend a re-visitation of most of the data mining techniques in use today and deployment of distributed versions of the various data mining models available in order to meet the new challenges of big data. Developers should take advantage of available big data technologies with affordable, open-source, and easy-to-deploy platforms. Keywords – Big data, Data mining, Autonomous sources, Distributed database, HACE theory. | International Journal of Electronics Communication and Computer Engineering, Volume 9, Issue 1 http://ijecce.org/index.php/issues | Timeline Publication Pvt.Ltd
|
9 | Dr Anthony Otuonye.Nwaimo E.C., Igboanusi C.C., Chukwu E.O. | An Analysis of Big Data Computing for Efficiency of Business Operations among Indigenous Firms | This paper aims at examining the impact of the big data technology and its effect on the efficiency of business operations among indigenous firms. The research established the perception of most business entrepreneurs and IT experts who seek to join the moving trend of the big data revolution for competitive advantage. It identified the major driving factors behind the big data market in other to evaluate their collective effect on business competency within the global market. The study became necessary due to the rising need to better inform our government and corporate managers to take their rightful place in the fast-paced global economy. The researchers adopted an analytical field survey and two quantitative analysis approaches Factor Analysis and the Multiple Regression aimed at analyzing the factors of big data computing and their perceived effects on business competency. Both primary and secondary data were used in achieving our research objective, which gave enough insights into the contributing factors of big data success and business competency. Based on the findings in this paper, we recommend that corporate managers should be encouraged to take advantage of big data computing which offers new, affordable, open-source, and distributed platforms (such as the Apache Hadoop), and relatively easy to deploy by all business corporations. Big data has been proved to have the capacity to deliver phenomenal computing power, and its adoption is bound to bring about improved business competency and added competitive advantage. Keywords – Big Data, Business Competency, Open Source, Unstructured Data, Real-Time. | International Journal of Electronics Communication and Computer Engineering, Volume 9, Issue 1 http://ijecce.org/index.php/issues | Timeline Publication Pvt.Ltd
|
10 | Amadi Emmanuel C. Eheduru G.E, Eze U., Ikerionwu C., Amuji H O | A zero-sum mitigation game model for distributed denial of service attack using linear programming | The concept of game theory has found application in security and are usually called security games. Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. This paper proposes a Linear programming model for solving a game problem that involves the interaction of an attacker (Zombie) and a defender (firewall) during a distributed denial-of-service attack (DDoS). In a DDoS attack scenario, the players (zombie and firewall) are competing for a greater share of a particular resource of the network. An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network. This paper presents a zero-sum game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network. Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. | IEEE Xplore Digital Library | IEEE
|