Previous Issue
Volume 17, March
 
 

Future Internet, Volume 17, Issue 4 (April 2025) – 4 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
25 pages, 973 KiB  
Article
Distributed Denial of Service Attack Detection in Software-Defined Networks Using Decision Tree Algorithms
by Ali Zaman, Salman A. Khan, Nazeeruddin Mohammad, Abdelhamied A. Ateya, Sadique Ahmad and Mohammed A. ElAffendi
Future Internet 2025, 17(4), 136; https://doi.org/10.3390/fi17040136 (registering DOI) - 22 Mar 2025
Abstract
A software-defined network (SDN) is a new architecture approach for constructing and maintaining networks with the main goal of making the network open and programmable. This allows the achievement of specific network behavior by updating and installing software, instead of making physical changes [...] Read more.
A software-defined network (SDN) is a new architecture approach for constructing and maintaining networks with the main goal of making the network open and programmable. This allows the achievement of specific network behavior by updating and installing software, instead of making physical changes to the network. Thus, SDNs allow far more flexibility and maintainability compared to conventional device-dependent architectures. Unfortunately, like their predecessors, SDNs are prone to distributed denial of service (DDoS) attacks. These attack paralyze networks by flooding the controller with bogus requests. The answer to this problem is to ignore machines in the network sending these requests. This can be achieved by incorporating classification algorithms that can distinguish between genuine and bogus requests. There is abundant literature on the application of such algorithms on conventional networks. However, because SDNs are relatively new, they lack such abundance both in terms of novel algorithms and effective datasets when it comes to DDoS attack detection. To address these issues, the present study analyzes several variants of the decision tree algorithm for detection of DDoS attacks while using two recently proposed datasets for SDNs. The study finds that a decision tree constructed with a hill climbing approach, termed the greedy decision tree, iteratively adds features on the basis of model performance and provides a simpler and more effective strategy for the detection of DDoS attacks in SDNs when compared with recently proposed schemes in the literature. Furthermore, stability analysis of the greedy decision tree provides useful insights about the performance of the algorithm. One edge that greedy decision tree has over several other methods is its enhanced interpretability in conjunction with higher accuracy. Full article
20 pages, 2995 KiB  
Article
Explainable Identification of Similarities Between Entities for Discovery in Large Text
by Akhil Joshi, Sai Teja Erukude and Lior Shamir
Future Internet 2025, 17(4), 135; https://doi.org/10.3390/fi17040135 (registering DOI) - 22 Mar 2025
Abstract
With the availability of a virtually infinite number of text documents in digital format, automatic comparison of textual data is essential for extracting meaningful insights that are difficult to identify manually. Many existing tools, including AI and large language models, struggle to provide [...] Read more.
With the availability of a virtually infinite number of text documents in digital format, automatic comparison of textual data is essential for extracting meaningful insights that are difficult to identify manually. Many existing tools, including AI and large language models, struggle to provide precise and explainable insights into textual similarities. In many cases, they determine the similarity between documents as reflected by the text, rather than the similarities between the subjects being discussed in these documents. This study addresses these limitations by developing an n-gram analysis framework designed to compare documents automatically and uncover explainable similarities. A scoring formula is applied to assigns each of the n-grams with a weight, where the weight is higher when the n-grams are more frequent in both documents, but is penalized when the n-grams are more frequent in the English language. Visualization tools like word clouds enhance the representation of these patterns, providing clearer insights. The findings demonstrate that this framework effectively uncovers similarities between text documents, offering explainable insights that are often difficult to identify manually. This non-parametric approach provides a deterministic solution for identifying similarities across various fields, including biographies, scientific literature, historical texts, and more. Code for the method is publicly available. Full article
(This article belongs to the Special Issue Generative Artificial Intelligence in Smart Societies)
Show Figures

Figure 1

25 pages, 482 KiB  
Article
Understanding Consumer Acceptance for Blockchain-Based Digital Payment Systems in Bhutan
by Tenzin Norbu, Joo Yeon Park, Kok Wai Wong and Hui Cui
Future Internet 2025, 17(4), 134; https://doi.org/10.3390/fi17040134 - 21 Mar 2025
Viewed by 120
Abstract
Blockchain is a secure, digital ledger that enables faster transactions, reduces fraud, lowers costs, and enhances transparency. The blockchain is capable of changing the face of digital payments by providing greater opportunities for transformation. Consumer acceptance in emerging markets such as Bhutan depends [...] Read more.
Blockchain is a secure, digital ledger that enables faster transactions, reduces fraud, lowers costs, and enhances transparency. The blockchain is capable of changing the face of digital payments by providing greater opportunities for transformation. Consumer acceptance in emerging markets such as Bhutan depends on a number of key factors. This paper explores the impact of performance expectancy, effort expectancy, social influence, and facilitating conditions on consumer acceptance of blockchain-based digital payment systems in Bhutan. Sustained by the Unified Theory of Acceptance and Use of Technology (UTAUT), the study uses PLS-SEM to analyze survey data from 302 respondents. The results show that performance expectancy, the expectation of blockchain’s usefulness, is the most influential factor determining customer acceptance. Effort expectancy and facilitating conditions are equally important. Social influences, although rather marginal, play an important role in Bhutan’s collectivist culture. The paper sheds light on factors for consumer acceptance of blockchain adoption. The findings add to the literature on blockchain adoption in burgeoning economies and provide the foundation for further research on blockchain adoption in multi-cultural contexts. Full article
(This article belongs to the Special Issue Advances in Smart Environments and Digital Twin Technologies)
Show Figures

Figure 1

21 pages, 753 KiB  
Review
Enterprise Networking Optimization: A Review of Challenges, Solutions, and Technological Interventions
by Oladele Afolalu and Mohohlo Samuel Tsoeu
Future Internet 2025, 17(4), 133; https://doi.org/10.3390/fi17040133 - 21 Mar 2025
Viewed by 127
Abstract
Enterprise networking optimization has become crucial recently due to increasing demand for a secure, adaptable, reliable, and interoperable network infrastructure. Novel techniques to optimize network security and toimprove scalability and efficiency are constantly being developed by network enablers, particularly in more challenging multi-cloud [...] Read more.
Enterprise networking optimization has become crucial recently due to increasing demand for a secure, adaptable, reliable, and interoperable network infrastructure. Novel techniques to optimize network security and toimprove scalability and efficiency are constantly being developed by network enablers, particularly in more challenging multi-cloud and edge scenarios. This paper, therefore, presents a comprehensive review of the traditional and most recent developments in enterprise networking. We structure the paper with particular emphasis on the adoption of state of-the-art technologies, such as software-defined wide area network(SD-WAN), secure access service edge (SASE) architecture, and network automation, driven by artificial intelligence (AI). The review also identifies various challenges associated with the adoption of the aforementioned technologies. These include operational complexity, cybersecurity threats, and trade-offs between cost-effectiveness and high performance requirements. Furthermore, the paper examines how different organizations are addressing a plethora of challenges by exploiting these technological innovations to drive robust and agile business interconnectivity. The review is concluded with an outline of possible solutions and future prospects, capable of promoting digital transformation and enhancing seamless connectivity within the enterprise networking environment. Full article
Show Figures

Figure 1

Previous Issue
Back to TopTop