Electronic government (e-government) uses information and communication technologies to deliver public services to individuals and organisations effectively, efficiently and transparently. E-government is one of the most complex systems which needs to be distributed, secured and privacy-preserved, and the failure of these can be very costly both economically and socially. Most of the existing e-government systems such as websites and electronic identity management systems (eIDs) are centralized at duplicated servers and databases. A centralized management and validation system may suffer from a single point of failure and make the system a target to cyber attacks such as malware, denial of service attacks (DoS), and distributed denial of service attacks (DDoS). The blockchain technology enables the implementation of highly secure and privacy-preserving decentralized systems where transactions are not under the control of any third party organizations. Using the blockchain technology, exiting data and new data are stored in a sealed compartment of blocks (i.e., ledger) distributed across the network in a verifiable and immutable way. Information security and privacy are enhanced by the blockchain technology in which data are encrypted and distributed across the entire network. This paper proposes a framework of a decentralized e-government peer-to-peer (p2p) system using the blockchain technology, which can ensure both information security and privacy while simultaneously increasing the trust of the public sectors. In addition, a prototype of the proposed system is presented, with the support of a theoretical and qualitative analysis of the security and privacy implications of such system.
Intrusion detection systems are developed with the abilities to discriminate between normal and anomalous traffic behaviours. The core challenge in implementing an intrusion detection systems is to determine and stop anomalous traffic behavior precisely before it causes any adverse effects to the network, information systems, or any other hardware and digital assets which forming or in the cyberspace. Inspired by the biological immune system, Dendritic Cell Algorithm (DCA) is a classification algorithm developed for the purpose of anomaly detection based on the danger theory and the functioning of human immune dendritic cells. In its core operation, DCA uses a weighted sum function to derive the output cumulative values from the input signals. The weights used in this function are either derived empirically from the data or defined by users. Due to this, the algorithm opens the doors for users to specify the weights that may not produce optimal result (often accuracy). This paper proposes a weight optimisation approach implemented using the popular stochastic search tool, genetic algorithm. The approach is validated and evaluated using the KDD99 dataset with promising results generated.
In spite of the fact that e-government agency (ega) in Tanzania emphasize on the use of ICT within public institutions in Tanzania, accessibility, usability and web security vulnerabilities are still not considered by the majority of web developers. The main objective of this study is to assess the usability, accessibility and web security vulnerabilities of selected Tanzania e-government websites. Using several automatic diagnostic (evaluation) tools such as pingdom, google speed insight, wave, w3c checker and acunetix, this study assess the usability, accessibility and web security vulnerabilities of 79 selected e-government websites in Tanzania. The results reveal several issues on usability, accessibility and security of Tanzania e-government websites. There is high number of usability problems where 100% of websites were found to have broken links and 52 out of 79 websites have loading time of more than five (5) seconds for their main page. The accessibility results show that all 79 selected websites have accessibility errors and violate w3c Web Content Accessibility Guidelines (WCAG) 1.0. The results on web security vulnerabilities indicate that 40 out of 79 (50.6%) assessed websites have one or more high-severity vulnerability (SQL injection or cross site scripting-XSS) while 51 out of 79 (64.5%) have one or more mediumseverity vulnerabilities (Cross site request forgery or Denial of Service). Based on these results, this study provides some recommendations for improving the usability, accessibility and web security vulnerabilities of public institutions in Tanzania.
Dendritic cell algorithm (DCA) is a binary classification system developed by abstracting the biological danger theory and the functioning of human dendritic cells. The DCA takes three signals as inputs, including danger, safe and pathogenic associated molecular pattern (PAMP), which are generated in its pre-processing and initialization phase. In particular, after a feature selection process for a given training data set, each selected attribute is assigned to one of the three input signals. Then, these input signals are calculated as the aggregation of their associated features, usually implemented by a simple average function followed by a normalisation process. If a nonlinear relationship exists between a signal and its corresponding selected attributes, the resulting signal using the average function may negatively affect the classification results of the DCA. This work proposes an approach named TSK-DCA to address such limitation by aggregating the assigned features of a signal linearly or non-linearly depending on their inherit relationship using the TSK+ fuzzy inference system. The proposed approach was evaluated and validated using the popular KDD99 data set, and the experimental results indicate the superiority of the proposed approach compared to its conventional counterpart.
Dendritic cell algorithm (DCA) is an immuneinspired classification algorithm which is developed for the purpose of anomaly detection in computer networks. The DCA uses a weighted function in its context detection phase to process three categories of input signals including safe, danger and pathogenic associated molecular pattern to three output context values termed as co-stimulatory, mature and semi-mature, which are then used to perform classification. The weighted function used by the DCA requires either manually pre-defined weights usually provided by the immunologists, or empirically derived weights from the training dataset. Neither of these is sufficiently flexible to work with different datasets to produce optimum classification result. To address such limitation, this work proposes an approach for computing the three output context values of the DCA by employing the recently proposed TSK+ fuzzy inference system, such that the weights are always optimal for the provided data set regarding a specific application. The proposed approach was validated and evaluated by applying it to the two popular datasets KDD99 and UNSW NB15. The results from the experiments demonstrate that, the proposed approach outperforms the conventional DCA in terms of classification accuracy.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.