-
Mapping The Invisible Internet: Framework and Dataset
Authors:
Siddique Abubakr Muntaka,
Jacques Bou Abdo,
Kemi Akanbi,
Sunkanmi Oluwadare,
Faiza Hussein,
Oliver Konyo,
Michael Asante
Abstract:
This article presents a novel dataset focusing on the network layer of the Invisible Internet Project (I2P), where prior research has predominantly examined application layers like the dark web. Data was collected through the SWARM- I2P framework, deploying I2P routers as mapping agents, utilizing dynamic port mapping (30000-50000 range). The dataset documents over 50,000 nodes, including 2,077 Fa…
▽ More
This article presents a novel dataset focusing on the network layer of the Invisible Internet Project (I2P), where prior research has predominantly examined application layers like the dark web. Data was collected through the SWARM- I2P framework, deploying I2P routers as mapping agents, utilizing dynamic port mapping (30000-50000 range). The dataset documents over 50,000 nodes, including 2,077 FastSet nodes and 2,331 high-capacity nodes characterized by bandwidth, latency (mean 121.21ms +- 48.50), and uptime metrics. It contains 1,997 traffic records (1,003,032 packets/bytes) and 4,222,793 records (2,147,585,625 packets/bytes), with geographic distributions for 3,444 peers showing capacity metrics (mean 8.57 +- 1.20). Collection methods included router console queries (127.0.0.1:port/tunnels), netDb analysis, and passive monitoring, with anonymized identifiers. Data is structured in CSV/TXT formats (Zenodo) with collection scripts (GitHub). Potential applications include tunnel peer selection analysis, anonymity network resilience studies, and adversarial modelling.
△ Less
Submitted 22 June, 2025;
originally announced June 2025.
-
A Survey of Social Cybersecurity: Techniques for Attack Detection, Evaluations, Challenges, and Future Prospects
Authors:
Aos Mulahuwaish,
Basheer Qolomany,
Kevin Gyorick,
Jacques Bou Abdo,
Mohammed Aledhari,
Junaid Qadir,
Kathleen Carley,
Ala Al-Fuqaha
Abstract:
In today's digital era, the Internet, especially social media platforms, plays a significant role in shaping public opinions, attitudes, and beliefs. Unfortunately, the credibility of scientific information sources is often undermined by the spread of misinformation through various means, including technology-driven tools like bots, cyborgs, trolls, sock-puppets, and deep fakes. This manipulation…
▽ More
In today's digital era, the Internet, especially social media platforms, plays a significant role in shaping public opinions, attitudes, and beliefs. Unfortunately, the credibility of scientific information sources is often undermined by the spread of misinformation through various means, including technology-driven tools like bots, cyborgs, trolls, sock-puppets, and deep fakes. This manipulation of public discourse serves antagonistic business agendas and compromises civil society. In response to this challenge, a new scientific discipline has emerged: social cybersecurity.
△ Less
Submitted 5 April, 2025;
originally announced April 2025.
-
CCTFv1: Computational Modeling of Cyber Team Formation Strategies
Authors:
Tristan J. Calay,
Basheer Qolomany,
Aos Mulahuwaish,
Liaquat Hossain,
Jacques Bou Abdo
Abstract:
Rooted in collaborative efforts, cybersecurity spans the scope of cyber competitions and warfare. Despite extensive research into team strategy in sports and project management, empirical study in cyber-security is minimal. This gap motivates this paper, which presents the Collaborative Cyber Team Formation (CCTF) Simulation Framework. Using Agent-Based Modeling, we delve into the dynamics of team…
▽ More
Rooted in collaborative efforts, cybersecurity spans the scope of cyber competitions and warfare. Despite extensive research into team strategy in sports and project management, empirical study in cyber-security is minimal. This gap motivates this paper, which presents the Collaborative Cyber Team Formation (CCTF) Simulation Framework. Using Agent-Based Modeling, we delve into the dynamics of team creation and output. We focus on exposing the impact of structural dynamics on performance while controlling other variables carefully. Our findings highlight the importance of strategic team formations, an aspect often overlooked in corporate cybersecurity and cyber competition teams.
△ Less
Submitted 17 July, 2023;
originally announced July 2023.
-
Group Validation in Recommender Systems: Framework for Multi-layer Performance Evaluation
Authors:
Wissam Al Jurdi,
Jacques Bou Abdo,
Jacques Demerjian,
Abdallah Makhoul
Abstract:
Interpreting the performance results of models that attempt to realize user behavior in platforms that employ recommenders is a big challenge that researchers and practitioners continue to face. Although current evaluation tools possess the capacity to provide solid general overview of a system's performance, they still lack consistency and effectiveness in their use as evident in most recent stud…
▽ More
Interpreting the performance results of models that attempt to realize user behavior in platforms that employ recommenders is a big challenge that researchers and practitioners continue to face. Although current evaluation tools possess the capacity to provide solid general overview of a system's performance, they still lack consistency and effectiveness in their use as evident in most recent studies on the topic. Current traditional assessment techniques tend to fail to detect variations that could occur on smaller subsets of the data and lack the ability to explain how such variations affect the overall performance. In this article, we focus on the concept of data clustering for evaluation in recommenders and apply a neighborhood assessment method for the datasets of recommender system applications. This new method, named neighborhood-based evaluation, aids in better understanding critical performance variations in more compact subsets of the system to help spot weaknesses where such variations generally go unnoticed with conventional metrics and are typically averaged out. This new modular evaluation layer complements the existing assessment mechanisms and provides the possibility of several applications to the recommender ecosystem such as model evolution tests, fraud/attack detection and a possibility for hosting a hybrid model setup.
△ Less
Submitted 19 July, 2022;
originally announced July 2022.
-
Evolutionary Random Graph for Bitcoin Overlay and Blockchain Mining Networks
Authors:
Jacques Bou Abdo,
Shuvalaxmi Dass,
Basheer Qolomany,
Liaquat Hossain
Abstract:
The world economy is experiencing the novel adoption of distributed currencies that are free from the control of central banks. Distributed currencies suffer from extreme volatility, and this can lead to catastrophic implications during future economic crisis. Understanding the dynamics of this new type of currencies is vital for empowering supervisory bodies from current reactive and manual incid…
▽ More
The world economy is experiencing the novel adoption of distributed currencies that are free from the control of central banks. Distributed currencies suffer from extreme volatility, and this can lead to catastrophic implications during future economic crisis. Understanding the dynamics of this new type of currencies is vital for empowering supervisory bodies from current reactive and manual incident responders to more proactive and well-informed planners. Bitcoin, the first and dominant distributed cryptocurrency, is still notoriously vague, especially for a financial instrument with market value exceeding 1 trillion. Modeling of bitcoin overlay network poses a number of important theoretical and methodological challenges. Current measuring approaches, for example, fail to identify the real network size of bitcoin miners. This drastically undermines the ability to predict forks, the suitable mining difficulty and most importantly the resilience of the network supporting bitcoin. In this work, we developed Evolutionary Random Graph, a theoretical model that describes the network of bitcoin miners. The correctness of this model has been validated using simulated and measure real bitcoin data. We then predicted forking, optimal mining difficulty, network size and consequently the network's inability to stand a drastic drop in bitcoin price using the current mining configuration.
△ Less
Submitted 17 June, 2022;
originally announced June 2022.
-
Efficient and Secure Mobile Cloud Networking
Authors:
Jacques Bou Abdo
Abstract:
Mobile cloud computing is a very strong candidate for the title "Next Generation Network" which empowers mobile users with extended mobility, service continuity and superior performance. Users can expect to execute their jobs faster, with lower battery consumption and affordable prices; however this is not always the case. Various mobile applications have been developed to take advantage of this n…
▽ More
Mobile cloud computing is a very strong candidate for the title "Next Generation Network" which empowers mobile users with extended mobility, service continuity and superior performance. Users can expect to execute their jobs faster, with lower battery consumption and affordable prices; however this is not always the case. Various mobile applications have been developed to take advantage of this new technology, but each application has its own requirements. Several mobile cloud architectures have been proposed but none was suitable for all mobile applications which resulted in lower customer satisfaction. In addition to that, the absence of a valid business model to motivate investors hindered its deployment on production scale. This dissertation proposes a new mobile cloud architecture which positions the mobile operator at the core of this technology equipped with a revenue-making business model. This architecture, named OCMCA (Operator Centric Mobile Cloud Architecture), connects the user from one side and the Cloud Service Provider (CSP) from the other and hosts a cloud within its network. The OCMCA/user connection can utilize multicast channels leading to a much cheaper service for the users and more revenues, lower congestion and rejection rates for the operator.
△ Less
Submitted 5 March, 2021; v1 submitted 17 February, 2021;
originally announced February 2021.
-
Multi-Utility Market: Framework for a Blockchain Exchange Platform for Sustainable Development
Authors:
Jacques Bou Abdo,
Sherali Zeadally
Abstract:
Water and other resources are becoming scarcer every day, and developing countries are the neediest for an immediate intervention. Water, as a national need, is considered to be one of the main causes for conflicts in the 21st century. Peer-to-peer trading is one of the most convenient, scalable and sustainable solutions but faces organization challenges such as: the absence of suitable business m…
▽ More
Water and other resources are becoming scarcer every day, and developing countries are the neediest for an immediate intervention. Water, as a national need, is considered to be one of the main causes for conflicts in the 21st century. Peer-to-peer trading is one of the most convenient, scalable and sustainable solutions but faces organization challenges such as: the absence of suitable business models motivating normal users to sell their generated resources, currency and financial settlement complexities, and single utility markets. We propose a multi-utility trading platform, based on blockchain technology which can address the challenges faced by peer-to-peer trading. This platform meets the needs of developing countries in particular as well as rural areas of developed countries. The open nature of our proposed design makes it suitable for adoption and use by various stakeholders.
△ Less
Submitted 14 July, 2020;
originally announced July 2020.
-
Investigating Low Level Protocols for Wireless Body Sensor Networks
Authors:
Nadine Boudargham,
Jacques Bou Abdo,
Jacques Demerjian,
Christophe Guyeux,
Abdallah Makhoul
Abstract:
The rapid development of medical sensors has increased the interest in Wireless Body Area Network (WBAN) applications where physiological data from the human body and its environment is gathered, monitored, and analyzed to take the proper measures. In WBANs, it is essential to design MAC protocols that ensure adequate Quality of Service (QoS) such as low delay and high scalability. This paper inve…
▽ More
The rapid development of medical sensors has increased the interest in Wireless Body Area Network (WBAN) applications where physiological data from the human body and its environment is gathered, monitored, and analyzed to take the proper measures. In WBANs, it is essential to design MAC protocols that ensure adequate Quality of Service (QoS) such as low delay and high scalability. This paper investigates Medium Access Control (MAC) protocols used in WBAN, and compares their performance in a high traffic environment. Such scenario can be induced in case of emergency for example, where physiological data collected from all sensors on human body should be sent simultaneously to take appropriate action. This study can also be extended to cover collaborative WBAN systems where information from different bodies is sent simultaneously leading to high traffic. OPNET simulations are performed to compare the delay and scalability performance of the different MAC protocols under the same experimental conditions and to draw conclusions about the best protocol to be used in a high traffic environment.
△ Less
Submitted 25 November, 2016;
originally announced November 2016.