https://journals.iub.edu.pk/index.php/JCIS/issue/feed Journal of Computers and Intelligent Systems 2024-08-26T09:00:22+00:00 Dr. Muhammad Ibrahim muhammad.ibrahim@iub.edu.pk Open Journal Systems <p data-sider-select-id="0a69b567-7e9f-4ed4-851b-54a97a9203a1">The <strong data-sider-select-id="2b1fe455-deda-4f74-9cbf-c2d1607fbfdf">Journal of Computers and Intelligent Systems (JCIS)</strong> bridges the gap between researchers and the dissemination of their research findings. JCIS is an open access international refereed research publishing journal with the focused aim of promoting and publishing original, high-quality research. The journal has an international perspective and publishes articles on a wide range of subjects and issues in computer science and its allied disciplines.</p> <div data-sider-select-id="70b1f3f7-ad80-44d2-84e6-854f779a00e7"><strong>Publisher:</strong> Department of Computer Science, The Islamia University of Bahawalpur, Pakistan.</div> <div data-sider-select-id="70b1f3f7-ad80-44d2-84e6-854f779a00e7"><strong>ISSN:</strong> 3007-3391<br /><strong>Frequency</strong>: Bianually<br /><strong>Access:</strong> Open<br /><strong>Publication Charges</strong>: Free<br /><strong>Peer Review Process:</strong> Single-blind</div> <div> <p align="justify"> </p> <table> <tbody> <tr> <td width="37"> <p> </p> </td> <td width="37"> <p> </p> </td> <td width="78"><img src="https://journals.iub.edu.pk/public/site/images/jcis/submission-7c0b1856c3cd4c99b8d28898c75b1b5a.png" alt="" width="128" height="132" /></td> <td width="48"> <p> </p> </td> <td width="48"> <p> </p> </td> <td width="48"> <p> </p> </td> <td width="84"><img src="https://journals.iub.edu.pk/public/site/images/jcis/guidelines.png" alt="" width="104" height="108" /></td> <td width="24"> <p> </p> </td> <td width="54"> <p> </p> </td> <td width="54"> <p> </p> </td> <td width="84"><img src="https://journals.iub.edu.pk/public/site/images/jcis/reviewer.png" alt="" width="112" height="110" /></td> <td width="42"> <p> </p> </td> </tr> <tr> <td width="37"> <p> </p> </td> <td colspan="3" width="163"> <p><a href="https://journals.iub.edu.pk/index.php/jcis/submission/wizard">Submit Your Manuscript</a></p> </td> <td width="48"> <p> </p> </td> <td colspan="3" width="156"> <p><a href="https://journals.iub.edu.pk/index.php/jcis/author">Submission Guidelines</a></p> </td> <td width="54"> <p> </p> </td> <td colspan="3" width="180"> <p><a href="https://journals.iub.edu.pk/index.php/jcis/reviewers">Instructions for Reviewers</a></p> </td> </tr> </tbody> </table> <p align="justify"> </p> </div> https://journals.iub.edu.pk/index.php/JCIS/article/view/2804 Cross-Site Request Forgery Attacks and Preventions 2024-05-23T04:49:54+00:00 Muhammad Sajjad sajjadpervaiz50@gmail.com Aasir Mehmood aashir.hunt@gmail.com Dr. Muhammad Saifullah msaifullah@gsec.edu.pk Junaid Iqbal Baig junaidiqbalbaig@cuivehari.edu.pk <p>CSRF stands for Cross-Site Request Forgery, which is among the top web vulnerabilities in which the attacker maliciously exploits a website using victims’ credentials and sends unauthorized actions/calls on a trusted web application. In Cross-site request forgery, the attacker sends a malicious forged link to the user. Upon clicking, the forged request is sent on behalf of the user which results in data leakage. Till today, numerous defense mechanisms (on both the client and server sides) have been proposed as the result of increasing attacks and leakage of personal data. Such mechanisms include HTTP header, validation of random tokens, hybrid-model HTTP and content analysis, client-server proxy, and so on. However, even today, such attacks exist and occur. This report analyzes various existing defense mechanisms and models, critically assesses each of them, and addresses the voids in each of them. It also describes how combining two mechanisms help overcome the flaws.</p> 2024-05-24T00:00:00+00:00 Copyright (c) 2024 Journal of Computers and Intelligent Systems https://journals.iub.edu.pk/index.php/JCIS/article/view/2805 File Sharing & Copyright Infringement in Peer-to-Peer 2024-05-23T04:09:36+00:00 M. Zulkifl Hasan zulkifl.hasan@ucp.edu.pk Muhammad Musa L1F19BSCS0055@ucp.edu.pk Ahmad Mujahid L1F19BSCS0053@ucp.edu.pk Dr. Muhammad Saifullah msaifullah@gsec.edu.pk Junaid Iqbal Baig junaidiqbalbaig@cuivehari.edu.pk <p>In the past, we used a centralized system which is server-client architecture but today along with server-client peer-to-peer or P2P is widely used which is based on the decentralized system in it each client is also a server purpose of the server for all the different clients as well by analyzing various articles, research papers, and literary works. We investigate many software and technological innovations including Napster, uTorrent, BitTorrent, and Gnutella.Peer-to-peer technology might go either way in the future; perhaps the copyright legislation has made it better or worse. Peer-to-peer has an impact on the music and film industries, among others, since it makes it simple for users to distribute information that is protected by copyright. Additionally, this article considers copyright infringement from both domestic and foreign viewpoints. The article demonstrates the connection between peer-to-peer file sharing and copyright infringement in general as well as the difficulties in safeguarding owners' copyrights on a P2P network. People mistakenly assume that it is impossible to identify and track copyright violations, yet some tools and procedures may be used to identify material that is protected by copyrights.</p> 2024-08-26T00:00:00+00:00 Copyright (c) 2024 Journal of Computers and Intelligent Systems https://journals.iub.edu.pk/index.php/JCIS/article/view/3027 Intrusion Detection Systems for In-Vehicle Networks 2024-08-22T13:33:26+00:00 Muhammad Atif Noor matifnoor@cuvas.edu.pk <p>This paper presents an overview of the Intrusion Detection system for In-Vehicle Networks which is a competition designed to provide security professionals with an opportunity to enhance their knowledge and experience in the field of car hacking and defense. The competition involves teams of professionals who compete in a simulated environment to develop and test car-hacking and defense strategies. Teams are provided with a wide range of tools and resources to help them analyze, exploit and defend against car-hacking attacks. The competition consists of several rounds of challenges, which include both theoretical and practical tasks. Results of the competition are used to identify security vulnerabilities and develop countermeasures to protect vehicles from malicious attacks. The paper also provides an overview of the structure and rules of the competition.</p> 2024-08-26T00:00:00+00:00 Copyright (c) 2024 Journal of Computers and Intelligent Systems https://journals.iub.edu.pk/index.php/JCIS/article/view/3028 ANALYSIS OF DOS ATTACK USING MACHINE LEARNING 2024-07-31T10:08:19+00:00 Muhammad Atif Noor matifnoor@cuvas.edu.pk <p>The use of the internet has increased significantly in today's digital world; however, this has also increased the potential risk of a denial-of-service attack. A DoS attack occurs when a malicious user tries to consume an excessive amount of computing and network resources, avoiding reasonable users from accessing them. The attacks can be triggered from any location and level of OSI model e.g network layer, transport layer, and application layers. The goal of the paper to identify DoS attacks using algorithm of Machine Learning and Neural Network, while focusing on application layer attack detection except transport and network layer. The experiments perform different train test split dataset. The experiment used the most recent DoS attack dataset, which was divided into different splits. The best decision tree and logistics regression split, it was discovered that Decision tree outperformed Logistics regression in terms of algorithms</p> 2024-08-26T00:00:00+00:00 Copyright (c) 2024 Journal of Computers and Intelligent Systems https://journals.iub.edu.pk/index.php/JCIS/article/view/3032 Child Alert System 2024-07-31T09:57:57+00:00 junaid altaf junaid.altaf@gdec.edu.pk <p>In the early times questions come out on how to protect the child or make them safe as many children were facing death, being lost or come across some serious accidents. Later many researches come out and many systems were developed for different child safety purposes like health safety, danger from surroundings etc. As technology advanced many systems were developed including tracking, wrist bands and alarm system. In this paper we will describe some of the child alert systems that can prove handy and functional.</p> 2024-08-26T00:00:00+00:00 Copyright (c) 2024 Journal of Computers and Intelligent Systems