Smallholder dairy producers account for around half of all African livestock ventures; nevertheless, they face challenges in producing more milk due to an insufficient framework and infrastructure to maximize their output. Smallholder dairy producers in this scenario use a variety of tactics to boost milk output. However, the attempts need multiple heuristics, time, and financial investment. Furthermore, because of a lack of extension officers, smallholder dairy producers become trapped in failure cycles, unsuccessful attempts, and a diminished motivation to continue farming. Therefore, the interventions were more straightforward as smallholder dairy producers with comparable characteristics grouped. This research aimed to create a rule-based engine that automatically assigns smallholder dairy producers to predefined clusters. About 78 stakeholders were interviewed, including 69 smallholder dairy producers and 9 extension officers from Meru-Arusha, Tanzania. The 10 production features and 6 predefined clusters were adopted from the previous study. Therefore, a rule-based engine used the selected 10 production features. As a result, the rule-based engine automatically assigns the smallholder dairy producers to their respective clusters. Therefore, smallholder dairy producers share their farming skills and experience to increase milk output through these clusters. Furthermore, extension officers in the system provide timely assistance to smallholder dairy producers with farming concerns.
Over the last two decades (2000–2020), the Internet has rapidly evolved, resulting in symmetrical and asymmetrical Internet consumption patterns and billions of users worldwide. With the immense rise of the Internet, attacks and malicious behaviors pose a huge threat to our computing environment. Brute-force attack is among the most prominent and commonly used attacks, achieved out using password-attack tools, a wordlist dictionary, and a usernames list—obtained through a so-called an enumeration attack. In this paper, we investigate username enumeration attack detection on SSH protocol by using machine-learning classifiers. We apply four asymmetrical classifiers on our generated dataset collected from a closed-environment network to build machine-learning-based models for attack detection. The use of several machine-learners offers a wider investigation spectrum of the classifiers’ ability in attack detection. Additionally, we investigate how beneficial it is to include or exclude network ports information as features-set in the process of learning. We evaluated and compared the performances of machine-learning models for both cases. The models used are k-nearest neighbor (K-NN), naïve Bayes (NB), random forest (RF) and decision tree (DT) with and without ports information. Our results show that machine-learning approaches to detect SSH username enumeration attacks were quite successful, with KNN having an accuracy of 99.93%, NB 95.70%, RF 99.92%, and DT 99.88%. Furthermore, the results improve when using ports information.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.