Data leakage analysis in wireless networks using Super-vised and Unsupervised Testing

  • Shahzad Ashraf National Fertilizer Corporation Institute of Engineering and Technology Multan https://orcid.org/0000-0002-7637-7870
  • Zeeshan Aslam Alfanar Global Development Saudi Arabia
Keywords: Supervised testing, unsupervised testing, neural network, wireless networks

Abstract

Due to an increasing number of wireless spectrums, the multiple frequencies are tangling resource management process that results hindrance in operation. In addition, the previous data become vulnerable when reports are received for data leakage enigma. In this situation, it is indispensable to secure the data in the dataset and detect the actual amount of data during resource transformation mechanism in wireless networks. A system as been developed to detect the leaked data using supervised and unsupervised testing technique by conducting simulation in Python. The targeted and actual outcome is obtained which deduced through supervised and undersized testing, the outcome remained 96.03%, and 94.53% respectively.

Downloads

Download data is not yet available.

References

R. Zeeshan, and A. Muhammad, “Adopting proactive results by developing the Shrewd model of pandemic COVID-19,” Arch. Community Med. Public Health, vol. 8, no. 2, pp. 062–067, Apr. 2022, doi: 10.17352/2455-5479.000175.

Z. Rasheed, S. Ashraf, N. A. Ibupoto, P. K. Butt, and E. H. Sadiq, “SDS: Scrumptious Dataflow Strategy for IoT De-vices in Heterogeneous Network Environment,” Smart Cities, vol. 5, no. 3, pp. 1115–1128, Sep. 2022, doi: 10.3390/smartcities5030056.

S. Ashraf, “Avoiding Vulnerabilities and Attacks with a Proactive Strategy for Web Applications,” vol. 3, no. 2, p. 9.

Z. A. Arfeen, T. Ahmed, S. Ashraf, and S. Saleem, “Succulent link selection strategy for underwater sensor network,” Int. J. Comput. Sci. Math., vol. 15, no. 3, p. 224, 2022, doi: 10.1504/IJCSM.2022.10049407.

M. Gao, Z. Chen, H. Naeem, and T. Ahmed, “CED-OR Based Opportunistic Routing Mechanism for Underwater Wireless Sensor Networks,” Wirel. Pers. Commun., vol. 125, no. 1, pp. 487–511, Jul. 2022, doi: 10.1007/s11277-022-09561-w.

J. Cortés, G. E. Dullerud, S. Han, J. Le Ny, S. Mitra, and G. J. Pappas, “Differential privacy in control and network systems,” in 2016 IEEE 55th Conference on Decision and Control (CDC), Dec. 2016, pp. 4252–4272. doi: 10.1109/CDC.2016.7798915.

L. Ming, “A Deep Learning-Based Framework for Human Resource Recommendation,” Wirel. Commun. Mob. Com-put., vol. 2022, pp. 1–12, Jul. 2022, doi: 10.1155/2022/2377143.

H. Sun, X. Chen, Q. Shi, M. Hong, X. Fu, and N. D. Sidiropoulos, “Learning to optimize: Training deep neural net-works for wireless resource management,” in 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Sapporo: IEEE, Jul. 2017, pp. 1–6. doi: 10.1109/SPAWC.2017.8227766.

A. Shahzad, “Towards Shrewd Object Visualization Mechanism,” Trends Comput. Sci. Inf. Technol., pp. 097–102, Nov. 2020, doi: 10.17352/tcsit.000030.

D. Muhammad, M. A. Khan, and T. Ahmed, “Fuzzy based efficient Cosmetology Paradigm,” vol. 8, pp. 513–520, doi: 10.14741/ijmcr/v.8.4.3.

S. Saleem, and S. Afnan, “FTMCP: Fuzzy based Test Metrics for Cosmetology Paradigm,” Adv. Comput. Intell. Int. J. ACII, vol. 4, no. 7, pp. 1–13, 2020, doi: 10.5121/acii.2020.7401.

S. Saleem, S. Ashraf, and M. K. Basit, “CMBA - A Candid Multi-Purpose Biometric Approach,” ICTACT J. Image Video Process., vol. 11, no. 01, p. 6, 2020, doi: 10.21917/ijivp.2020.0317.

T. Ahmed, “Sagacious Intrusion Detection Strategy in Sensor Network,” in 2020 International Conference on UK-China Emerging Technologies (UCET), Glasgow, United Kingdom: IEEE, Aug. 2020, pp. 1–4. doi: 10.1109/UCET51115.2020.9205412.

S. Saleem, T. Ahmed, Z. Aslam, and M. Shuaeeb, “Iris and Foot based Sustainable Biometric Identification Approach,” in 2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Hvar, Croatia: IEEE, Sep. 2020, pp. 1–6. doi: 10.23919/SoftCOM50211.2020.9238333.

T. Ahmed, Z. Aslam, D. Muhammad, A. Yahya, and M. Shuaeeb, “Depuration‎ based Efficient Coverage Mechanism for ‎Wireless Sensor Network,” J. Electr. Comput. Eng. Innov. JECEI, vol. 8, no. 2, pp. 145–160, 2020, doi: 10.22061/jecei.2020.6874.344.

A. Yahya et al., “Underwater routing protocols: Analysis of link selection challenges,” AIMS Electron. Electr. Eng., vol. 4, no. 3, pp. 234–248, 2020, doi: 10.3934/ElectrEng.2020.3.234.

Received: 2023-03-25
Accepted: 2023-07-08
Published: 2023-09-30
How to Cite
[1]
S. Ashraf and Z. Aslam, “Data leakage analysis in wireless networks using Super-vised and Unsupervised Testing”, Innov. softw., vol. 4, no. 2, pp. 52-62, Sep. 2023.
Section
Journal papers