Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1066

Predicting Intrusion in a Network Traffic Using Variance of Neighboring Object’s Distance

Predicting Intrusion in a Network Traffic Using Variance of Neighboring Object’s Distance

Krishna Gopal Sharma, Yashpal Singh

Статья научная

Activities in network traffic can be broadly classified into two categories: normal and malicious. Malicious activities are harmful and their detection is necessary for security reasons. The intrusion detection process monitors network traffic to identify malicious activities in the system. Any algorithm that divides objects into two categories, such as good or bad, is a binary class predictor or binary classifier. In this paper, we utilized the Nearest Neighbor Distance Variance (NNDV) classifier for the prediction of intrusion. NNDV is a binary class predictor and uses the concept of variance on the distance between objects. We used KDD CUP 99 dataset to evaluate the NNDV and compared the predictive accuracy of NNDV with that of the KNN or K Nearest Neighbor classifier. KNN is an efficient general purpose classifier, but we only considered its binary aspect. The results are quite satisfactory to show that NNDV is comparable to KNN. Many times, the performance of NNDV is better than KNN. We experimented with normalized and unnormalized data for NNDV and found that the accuracy results are generally better for normalized data. We also compared the accuracy results of different cross validation techniques such as 2 fold, 5 fold, 10 fold, and leave one out on the NNDV for the KDD CUP 99 dataset. Cross validation results can be helpful in determining the parameters of the algorithm.

Бесплатно

Prediction of Intermittent Failure by Presage Debacle Model in Network on Chip

Prediction of Intermittent Failure by Presage Debacle Model in Network on Chip

Sangeeta Singh, J. V. R. Ravindra, B. Rajendra Naik

Статья научная

With the emergence of deep sub-micron technology, the reliability issues in on-chip interconnect has enormously increased. This includes single event upsets, like soft errors, and hard faults which are rapidly becoming important factors to be considered. Aggressive technology scaling renders these architectures vulnerable to system performance, intermittent failure, capacitive crosstalk, and power dissipation problem. To improve the performance of the area and power consumption along with bandwidth, throughput and latency, a Buffer Potency Power Gating Technique is carried out to predict the Intermittent Failure by Presage Debacle Model in Network on Chip. In the Presage Debacle Model, the links present in the application-specific topology are provided with real application traffic to assist in prediction of the intermittent failure. By predicting the failure, the output of the model provides the power dissipated over the connection of the application link. Then the crosstalk noise in the topology is reduced by the Adaption of Simulated Annealing (SA) based Particle Swarm Optimization (PSO) congruence algorithm. The optimization congruence algorithm assigns each task in the application software to each node in the topology to determine the network's optimal output. It continuously changes the task park position in the topology system and reduces the crosstalk of the NoC. Consecutively, the area and power consumption are minimized by Buffer Potency Power Gating Technique. Buffer efficiency is increased and the power-gating is a practical way to mitigate NoC power control schemes properly and effectively without any loss in performance. Thus the prediction of intermittent failure is obtained by utilizing NoC to improve the performance of area and power consumption.

Бесплатно

Preventive Aspect of Black Hole Attack in Mobile AD HOC Network

Preventive Aspect of Black Hole Attack in Mobile AD HOC Network

Kumar Roshan, Vimal Bibhu

Статья научная

Mobile ad hoc network is infrastructure less type of network. In this paper we present the prevention mechanism for black hole in mobile ad hoc network. The routing algorithms are analyzed and discrete properties of routing protocols are defined. The discrete properties support in distributed routing efficiently. The protocol is distributed and not dependent upon the centralized controlling node. Important features of Ad hoc on demand vector routing (AODV) are inherited and new mechanism is combined with it to get the multipath routing protocol for Mobile ad hoc network (MANET) to prevent the black hole attack. When the routing path is discovered and entered into the routing table, the next step is taken by combined protocol to search the new path with certain time interval. The old entered path is refreshed into the routing table. The simulation is taken on 50 moving nodes in the area of 1000 x 1000 square meter and the maximum speed of nodes are 5m/sec. The result is calculated for throughput verses number of black hole nodes with pause time of 0 sec. to 40 sec., 120 sec. and 160 sec. when the threshold value is 1.0.

Бесплатно

Priority Metric based Ad Hoc Routing for Underwater Sensor Network

Priority Metric based Ad Hoc Routing for Underwater Sensor Network

Md. Ashraf Uddin, Md. Mamun-or-Rashid, Md. MustafizurRahman

Статья научная

Underwater sensor network has been burgeoned as an interesting research area which has to face a couple of challenges to provide scalable and efficient routing services because of its unique characteristics. In many aspects, it differs from the ground based terrestrial sensor network, Firstly, In UWSNs, acoustic signal is used instead of radio-frequency that attenuates much in underwater environment in comparison with radio-frequency channels. Acoustic channels attribute much lower bandwidth and the propagation speed of acoustic signals in water is several of magnitudes longer. Secondly, nodes of underwater sensor networks move with water current which results dynamic topology. Thirdly, underwater sensor networks consume more power than terrestrial networks due to the underwater channel characteristics and it has high error probability because of acoustic underwater channels' sensibility in noise, multi-path and Doppler spread. Some routing protocols have been proposed to deal with these challenges. But most of these protocols espouse the greedy technique to forward packets to the neighboring node which consumes a lot of energy when network is dense. In this thesis, we propose a Priority Metric Based Ad hoc Routing Protocol for UWSNs. The leading advantages of the protocol are that it consumes less energy in dense network as only one neighboring node needs to capture the packet and process it and it guarantees less number of packet loss in high mobile node environment. Extensive simulation is executed to attest the competence of the proposed routing protocol. The result and analysis bear the indication of the proposed routing protocol's surpassing the existing routing protocol in terms of total energy consumption and average end to end delay.

Бесплатно

Privacy Notions and Review of Privacy Preservation Mechanisms in Wireless Sensor Networks

Privacy Notions and Review of Privacy Preservation Mechanisms in Wireless Sensor Networks

Manjusha Pandey, Shekhar Verma

Статья научная

The current research work in wireless sensor networks has mostly focused on the resolving issues related to power consumption and computational resource constraints in the wireless sensor networks .To achieve the same various specific routing schemes ,MAC and cross layered protocols and techniques have been proposed and designed .But with recent advances the privacy issues related to the data collected and transmitted by the wireless sensor networks had taken the center stage .Privacy preservation in wireless sensor networks has become more challenging because of the wireless nature of communication in WSN as well as its self organizing architecture. The present paper provides a comparative review of various privacy preserving mechanisms proposed and implemented in wireless sensor networks with respect to the privacy notions of k-anonymity and L-diversity. Along with the discussion and analysis the present work is an effort for the pavement of a way towards the future research in the field of privacy preservation in WSN.

Бесплатно

Privacy Protection in Smart Cities by a Personal Data Management Protocol in Blockchain

Privacy Protection in Smart Cities by a Personal Data Management Protocol in Blockchain

Hossein Mohammadinejad, Fateme Mohammadhoseini

Статья научная

Due to the increase of cybercrime and security risks in computer networks as well as violations of user privacy, it is essential to upgrade the existing protection models and provide practical solutions to meet these challenges. An example of these risks is the presence of a third party between users and various services, which leads to the collection and control of large amounts of users' personal information and the possibility of their databases being misused or hacked. Blockchain technology and encrypted currencies have so far shown that a decentralized network of peer-to-peer users, along with a general ledger, can do reliable computing. So, in this article, we are going to introduce a protocol that converts the blockchain network to an automated access control manager without the presence of a third party. To this end, we designed a mutual authentication protocol to create a secure channel between the user and the service and then demonstrate its accuracy and completeness using the Gong-Nidham-Yahalom belief logic [1]. The results of our evaluations show that our proposed protocol is secure enough to be used on the blockchain network and attackers are unable to penetrate, track, impersonate, inject, misrepresent or distort information using the common attacks.

Бесплатно

Privacy and security concerns in electronic commerce websites in Ghana: a survey study

Privacy and security concerns in electronic commerce websites in Ghana: a survey study

Issah Baako, Sayibu Umar, Prosper Gidisu

Статья научная

This paper examines the privacy and security issues on electronic commerce websites in Ghana. Ghana is reported to have an Internet users’ rate of 27.8% and a mobile Internet subscription of 14% in 2017. The study assessed e-commerce websites for privacy policies that are meant to guide and inform website users on the collection of customer data, data use, protection and other related privacy issues on personal data. The study also analyzed e-commerce websites for encryption security tools that protect customer data and test e-commerce websites for the presence of security vulnerabilities that could threaten the sites and their users. The study used a combination of three methods; web content analysis, information security audit and testing of the websites using penetration testing tools for data collection and analysis. Nmap was used to test and identify possible vulnerabilities on the e-commerce websites that could be used by malicious users to steal customer data for fraudulent intent. The research revealed the presence or otherwise of privacy policies on e-commerce websites. The security weaknesses in these e-commerce websites have been highlighted as findings in the study. The findings of the study will inform policy direction on electronic data collection, protection and use in the e-commerce industry in Ghana is on areas that bother on privacy and security of the customer could be given attention. The findings will also inform industry players in the e-commerce sector on the need to strengthen security on their websites.

Бесплатно

Proposing a method for enhancing the reliability of RPL routing protocol in the smart grid neighborhood area networks

Proposing a method for enhancing the reliability of RPL routing protocol in the smart grid neighborhood area networks

Hossein Mohammadinejad, Fateme Mohammadhoseini

Статья научная

The RPL routing protocol is one of the most prominent protocols for low-power wireless networks. It has many benefits, including high flexibility and compatibility with different topologies, quality assurance, automatic configuration, self-healing, avoiding the creation of tree loops, and independence and transparency. Since the RPL's capability to meet the reliability requirements has not been sufficiently investigated and there is not much research about the reliability of this protocol, the purpose of this study is to propose a method for enhancing the reliability of RPL routing protocol in the Smart Grid Neighborhood Area Networks (NAN). We propose three methods for increasing the reliability of the RPL protocol: addition of cache at each node, considering two parents for each node and finally the combination of the two mentioned methods. The type of research is descriptive-analytic. Simulations have been performed in OPNET simulator. The results of this study indicate that the proposed methods significantly increase the reliability of this routing protocol in Smart Grid NAN.

Бесплатно

Prospect for Using Low-Element Adaptive Antenna Systems for Radio Monitoring Stations

Prospect for Using Low-Element Adaptive Antenna Systems for Radio Monitoring Stations

Olga Shcherbyna, Maksym Zaliskyi, Olena Kozhokhina, Felix Yanovsky

Статья научная

This article is devoted to the analysis of prospect to apply multifunctional adaptive antenna systems for radio monitoring stations. The review of publications done demonstrates that current antennas that are developed and used in radio monitoring systems to control and measure the parameters of electromagnetic radiation should be applicable to conduct accurate measurements in wide frequency range under the condition of interferences. The analysis shows that modern adaptive antenna systems are mostly developed for radar and telecommunications applications. In this context we consider possible ways to solve the problem of adapting radio monitoring devices to a complex electromagnetic environment using antenna systems with primary processing of received signals . It was found that the developers of the antennas, which are based on adaptive interference suppression methods, focus basically on the development and implementation of adaptation processes, limiting themselves only to solving electromagnetic compatibility problems. In such approach, the functions of direction finding and measurement of radiation field parameters important exactly for radio monitoring systems are mostly ignored. Therefore, this research area opens up a wide field for identifying new possibilities for constructing multifunctional antenna systems. Focusing on this direction of research, we consider as an example the constraction of a simple two-element adaptive antenna system, which can be used to measure the parameters of the electromagnetic field in radio monitoring systems. The main relations for the error of determining the direction of arrival of the interference signal with a simple two-element antenna are investigated. The influence of the stability of the antenna array parameters and functional units of signal processing onto the errors is estimated

Бесплатно

Protecting Hybrid Information Transmission Network from Natural and Anthropogenic Hazards

Protecting Hybrid Information Transmission Network from Natural and Anthropogenic Hazards

Vadym Mukhin, Pavlo Anakhov, Viktoriia Zhebka, Vladislav Kravchenko, Aksieniia Shtimmerman, Valerii Zavgorodnii, Yurii Bazaka

Статья научная

A hybrid network, which consists of the sections of communication lines with the transmission of signals of different physical nature on different transmission media, has been considered. Communication lines respond differently to threats, which allows to choose the line with the best performance for the transmission of information. The causal diagram of events that determine the state of the information transmission network, such as changes in emergency/accident-free time intervals, has been presented. The application scheme of the protection measures against dangerous events has been shown. To verify the measures, a matrix of their compliance with typical natural disasters has been developed and relevant examples have been given. It is suggested to evaluate the flexibility of the telecommunication network by its connectivity, characterized by the numbers of vertex and edge connectivity, the probability of connectivity. The presented scheme of the device for multi-channel information transmission in a hybrid network allows the choice for the transmission of information to the channel with the best performance. Using this device is the essence of the suggestion about increasing the flexibility of the network.

Бесплатно

Protection Against DDoS and Data Modification Attack in Computational Grid Cluster Environment

Protection Against DDoS and Data Modification Attack in Computational Grid Cluster Environment

Basappa B. Kodada, Gaurav Prasad, Alwyn R. Pais

Статья научная

In the past decades, focus of computation has shifted to high performance computing like Grid Computing and Cloud Computing. In Grid computing, grid server is responsible for managing the all resources like processor, memory and CPU cycles. Grids are basically networks that pool resources, CPU cycles, storage or data from many different nodes used to solve the complex or scientific problem. However in this case, security is a major concern. Even most grid security researches focus on user authentication, authorization and secure communication. This paper presents DDoS and Data Modification attack scenario and also provides the solution to prevent it. In case of data modification attack, it shows how easy to read/forward/modify the data exchanged between a cluster head node and computing nodes. Therefore this paper provides the solution to protect the grid computing environment against Data Modification and DDOS attack.

Бесплатно

Pseudo Random Ternary Sequence and Its Autocorrelation Property Over Finite Field

Pseudo Random Ternary Sequence and Its Autocorrelation Property Over Finite Field

Md. Arshad Ali, Emran Ali, Md. Ahsan Habib, Md. Nadim, Takuya Kusaka, Yasuyuki Nogami

Статья научная

In this paper, the authors have proposed an innovative approach for generating a pseudo random ternary sequence by using a primitive polynomial, trace function, and Legendre symbol over odd characteristics field. Let p be an odd prime number, FP be an odd characteristic prime field, and m be the degree of the primitive polynomial f(x) Let w be its zero and a primitive element in Fpm* In the beginning, a primitive polynomial f(x) generates maximum length vector sequence, then the trace function Tr(.) is used to map an element of the extension field (Fpm) to an element of the prime field Fp then non-zero scalar A∈Fp is added to the trace value, and finally the Legendre symbol (a/p) is utilized to map the scalars into ternary sequence having the values, {0,1,and -1} By applying the new parameter A the period of the sequence is extended to its maximum value that is n=pm-1 Hence, our proposed sequence has some parameters such as p,m,and A This paper mathematically explains the properties of the proposed ternary sequence such as period and autocorrelation. Additionally, these properties are also justified based on some experimental results.

Бесплатно

Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review

Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review

Sumit Goyal

Статья научная

These days cloud computing is booming like no other technology. Every organization whether it's small, mid-sized or big, wants to adapt this cutting edge technology for its business. As cloud technology becomes immensely popular among these businesses, the question arises: Which cloud model to consider for your business? There are four types of cloud models available in the market: Public, Private, Hybrid and Community. This review paper answers the question, which model would be most beneficial for your business. All the four models are defined, discussed and compared with the benefits and pitfalls, thus giving you a clear idea, which model to adopt for your organization.

Бесплатно

QSWMCA - Quality of Service in Wireless Mesh Networks by Configuration Arguments

QSWMCA - Quality of Service in Wireless Mesh Networks by Configuration Arguments

N.Kannaiya Raja, R. Saritha, A.Senthamaraiselvan, K. Arulanandam

Статья научная

In this paper, we present a Quality of Experience (QoE) based upon the analyze the key Quality of Service (QoS) parameters such as delay, jitter, throughput, packet loss, packet inspection in the mesh networks which executing the better approach for reconfiguration wireless mesh networks in the routing protocol. In this system evaluates the actual QoE level for each mesh node taking into an account to calculate QoS parameters and then this response as reducing the node broadcasting rate and investigating the problems of selecting in which links would be established that all nodes are connected for cost of constructions are minimized.

Бесплатно

QoS Comparison of MANET Routing Protocols

QoS Comparison of MANET Routing Protocols

Tarunpreet Bhatia, A.K. Verma

Статья научная

The primary concern for the deployment of MANET is to promote flexibility, mobility and portability. This mobility causes dynamic change in topology and poses challenges for designing routing algorithms. In the past few years, many ad hoc network protocols have been developed and research is still going on. It becomes quite difficult to say which protocols may perform well under different network scenarios such as varying network size, mobility of nodes and network load etc. This paper analyzes the performance of proactive protocols like DSDV, OSLR, reactive protocols like AODV, DSR and hybrid protocol such as ZRP. The analysis guides us to the evaluation of various performance metrics such as throughput, packet delivery fraction, normalized routing load and average end to end delay under different scenarios such as varying network size, speed of the node and pause time. The focus of this paper is to have quantitative analysis to guide which protocol to choose for specified network and goal.

Бесплатно

QoS Enabled Probabilistic Routing for Heterogeneous Wireless Sensor Networks

QoS Enabled Probabilistic Routing for Heterogeneous Wireless Sensor Networks

Sanjay Kumar, Mayank Dave, Surender Dahiya

Статья научная

There is an increasing research interest in solving routing problems in Wireless Sensor Networks (WSN) and most of the existing routing protocols for WSN consider homogeneous nodes wherein, all sensor nodes have the same capabilities in terms of sensing, communication and computation capabilities. However, deployment of a homogeneous sensor network may suffer from poor performance. In this paper, we present a novel QoS routing scheme that adaptively learns an optimal routing strategy, depending on multiple optimization goals. We base our approach on Ant Colony Optimization (ACO) technique which is insensitive to initial setting, thus ideal in the context of WHSNs. The key feature of the protocol is its ability to meet diverse QoS requirements posed by different kinds of traffic generated due to heterogeneous nature of nodes thus maximizing network performance and utilization. Experimental results suggest a significant gain in the performance of proposed protocol over AODV protocol.

Бесплатно

QoS oriented cross-synch routing protocol for event driven, mission-critical communication over MANET: Q-CSRPM

QoS oriented cross-synch routing protocol for event driven, mission-critical communication over MANET: Q-CSRPM

Shashi Raj K., Siddesh G. K.

Статья научная

The decentralized and infrastructure less feature of Mobile Ad-hoc network (MANET) has made it a potential networking solution to be used in major applications ranging natural disaster management, vehicular communication, industrial communication etc. Though, being a dominating mobile communication system, exceedingly high network topology and mobility pattern in MANETs make it trivial to achieve Quality of Service (QoS) delivery, particularly for event-driven (mission-critical) communication. With this motivation, in this research paper a robust QoS Oriented Cross-Synch Routing Protocol for Event Driven, Mission-Critical Communication named Q-CSRPM has been developed for MANET. The proposed Q-CSRPM routing protocol exploits cross-layer routing architecture by applying network layer, MAC layer and physical layer information of IEEE 802.11 standard to perform optimal best forwarding node selection and reliable path formation. Q-CSRPM protocol performed proactive node management, service differentiation based data prioritization and resource scheduling, and dynamic buffer assessment based congestion detection at the network layer, dynamic link quality estimation and packet velocity estimation at the MAC layer, and PHY switching control at the physical layer of the protocol stack. Q-CSRPM applies dynamic link quality, congestion probability and packet velocity of a node for best forwarding node selection to form forwarding path. The node information sharing across the layers of rotocol stack enables optimal BFN selection and routing control. It strengthened Q-CSRPM to exhibit 98.2% and 93% of packet delivery ratio for real time data and non-real time data respectively. A minimum of 2% deadline miss ratio was observed.

Бесплатно

Quality Evaluation of Mobile Networks Using VoIP Applications: A Case Study with Skype and LINE based-on Stationary Tests in Bangkok

Quality Evaluation of Mobile Networks Using VoIP Applications: A Case Study with Skype and LINE based-on Stationary Tests in Bangkok

Pongpisit Wuttidittachotti, Therdpong Daengsi

Статья научная

This paper presents the performance evaluation of 3G mobile networks for one kind of multimedia application called Voice over IP (VoIP) within Bangkok, the capital city of Thailand, using Line and Skype, two popular VoIP applications. This study used evaluation of voice quality provided by both applications. The tests have been conducted using stationary scenarios over 5 major 3G mobile networks, served by 5 operators, within 14 universities in the inner city of Bangkok in order to gather data of degraded speech files. Then, the data was measured using Perceptual Evaluation of Speech Quality (PESQ) to find Mean Opinion Score (MOS) before analyzing with ANOVA and T-test, which are statistical tools, so that the discussion and conclusion can be eventually derived.

Бесплатно

RSUs Deployment Using Parallel Scheduling

RSUs Deployment Using Parallel Scheduling

Ramneek kaur

Статья научная

Advancement in software, hardware and communication technologies have led to the development of design and implementation of different types of networks that are deployed in various environments. One such network that has gained a lot of interest in the last few decades is the Vehicular Ad-Hoc Network (VANET). VANET has become an active area of research, development and standardization because it has remarkable potential to improve vehicle and road safety, traffic management, and also provide comfort to both drivers and passengers. Roadside units (RSUs) are a vital component of Vehicular ad hoc network (VANET). Mainly, the density and location of RSUs decides the success of a VANET. But, the sky-high deployment costs of the RSUs make it impossible to deploy a large number of RSUs on the specific area or road. Thus, there rises a need to optimally deploy a restricted number of RSUs in a given region in order to achieve maximum performance. This paper presents a new TDB based RSUs deployment algorithm with a goal of attaining high efficiency and cover maximum area. Matlab platform is used to assess the performance of the proposed algorithm using several performance metrics.

Бесплатно

Ranking Grid-sites based on their Reliability for Successfully Executing Jobs of Given Durations

Ranking Grid-sites based on their Reliability for Successfully Executing Jobs of Given Durations

Farrukh Nadeem

Статья научная

Today's Grids include resources (referred as Grid-site s) from different domains including dedicated production resources, resources from university labs, and even P2P en¬vironments. Grid high level services, like schedulers, resource managers, etc. need to know the reliability of the available Grid-sites to select the most suitable from them. Modeling reliability of a Grid-site for successful execution of a job requires prediction of Grid-site availability for the given duration of job execution as well as possibility of successful execution of the job. Predicting Grid-site availability is complex due to different availability patterns, resource sharing policies implemented by resource owners, nature of domain the resource belongs to (e.g. P2P etc.), and its maintenance etc. To give a solution, we model reliability of Grid-site in terms of prediction of its availability and possibility of job success. Our availability predictions incorporate past patterns of the Grid-site availability using pattern recognition methods. To estimate possibility of job success, we consider historical traces of job execution. The experiments conducted on a trace of real Grid demonstrate the effectiveness of our approach for ranking Grid-sites based on their reliability for executing jobs successfully.

Бесплатно

Журнал