Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1066

A comprehensive review of congestion control techniques in M2M and cellular networks

A comprehensive review of congestion control techniques in M2M and cellular networks

Chidanandan V., Arun Raj Kumar P.

Статья научная

Long Term Evolution (LTE) emerges as the promising communication technology for data and voice service in Human to Human Communication (H2H). Currently, LTE network also includes Machine to Machine (M2M) communication. Combining the legacy systems and evolving Machine type devices, increases the access rate to a particular base station leading to congestion in Access network. Congestion in Random Access Network (RAN) that occurs during the Random Access Process affects the performance of H2H communication. The objective of the paper is to analyze the existing congestion control techniques and to provide a comprehensive summary on classified poll and event based mechanisms.

Бесплатно

A critical appraisal on password based authentication

A critical appraisal on password based authentication

Amanpreet A. Kaur, Khurram K. Mustafa

Статья научная

There is no doubt that, even after the development of many other authentication schemes, passwords remain one of the most popular means of authentication. A review in the field of password based authentication is addressed, by introducing and analyzing different schemes of authentication, respective advantages and disadvantages, and probable causes of the ‘very disconnect’ between user and password mechanisms. The evolution of passwords and how they have deep-rooted in our life is remarkable. This paper addresses the gap between the user and industry perspectives of password authentication, the state of art of password authentication and how the most investigated topic in password authentication changed over time. The author’s tries to distinguish password based authentication into two levels ‘User Centric Design Level’ and the ‘Machine Centric Protocol Level’ under one framework. The paper concludes with the special section covering the ways in which password based authentication system can be strengthened on the issues which are currently holding-in the password based authentication.

Бесплатно

A fault-tolerant improved OLSR protocol using k-Connected m-Dominating set

A fault-tolerant improved OLSR protocol using k-Connected m-Dominating set

Vinayagam P. S.

Статья научная

The inherent properties of ad hoc networks such as limited energy, short transmission range and absence of routers along with node mobility, node failures and link failures make routing a challenging task. In order to facilitate routing, virtual backbone has been proposed as a viable solution in the literature. Optimize Link State Routing (OLSR) protocol, a proactive routing protocol, uses Multipoint Relay (MPR) set to construct virtual backbone. Prior research has, however, identified various issues with the MPR selection scheme that needs improvement. One of the alternatives that could be used to construct virtual backbone is Connected Dominating Set (CDS). Although CDS generates a smaller virtual backbone, its 1-connected 1-domination nature may render a virtual backbone obsolete in case of networks which witness frequent node mobility, node failures and link failures. To overcome this, k-Connected m-Dominating CDS (kmCDS) could be used to construct fault- tolerant virtual backbone structure. In this direction, the present paper proposes a Fault-Tolerant Improved Optimized Link State Routing (FT-IOLSR) protocol that uses kmCDS to form fault-tolerant virtual backbone, effectively replacing the MPR set of OLSR protocol. Simulations are carried out to assess the performance of the FT-IOLSR protocol in relation to the OLSR protocol, with respect to various node speed and pause time combinations, and varying network size. The results show that the FT-IOLSR protocol is better in terms of packet delivery ratio under varying mobility and varying network size. Also it has been observed that, with increase in k-connectivity and m-domination factor, there is improvement in the performance of the protocol.

Бесплатно

A feed-forward and pattern recognition ANN model for network intrusion detection

A feed-forward and pattern recognition ANN model for network intrusion detection

Ahmed Iqbal, Shabib Aftab

Статья научная

Network security is an essential element in the day-to-day IT operations of nearly every organization in business. Securing a computer network means considering the threats and vulnerabilities and arrange the countermeasures. Network security threats are increasing rapidly and making wireless network and internet services unreliable and insecure. Intrusion Detection System plays a protective role in shielding a network from potential intrusions. In this research paper, Feed Forward Neural Network and Pattern Recognition Neural Network are designed and tested for the detection of various attacks by using modified KDD Cup99 dataset. In our proposed models, Bayesian Regularization and Scaled Conjugate Gradient, training functions are used to train the Artificial Neural Networks. Various performance measures such as Accuracy, MCC, R-squared, MSE, DR, FAR and AROC are used to evaluate the performance of proposed Neural Network Models. The results have shown that both the models have outperformed each other in different performance measures on different attack detections.

Бесплатно

A lightweight Data Exchange Format for Mobile Transactions

A lightweight Data Exchange Format for Mobile Transactions

M.C. Mohammed Shameer, P.P. Abdul Haleem, Yazik K. Puthenpediyakkal

Статья научная

XML and JSON are commonly used data exchange formats that are widely in use in wireless networking environments. The verbose and redundant nature of XML documents incurs huge transportation overheads in data communications. JSON is a data format that reduces the document size; but its scope is confined to text and numeric data. Also due to the reasons such as lack of schema and limited interoperability features, JSON is more suitable for web based applications, compared to wireless or mobile environments. Since the literature reports serious concerns about the performance of existing data exchange formats in resource constraint networks, there is scope for a lightweight data exchange mechanism. This paper introduces a new lightweight, schema aware data exchange format for data representation and interchange. The proposed format, called LXML, is schema aware and non-binary format based on the XML standards and has the potential to be an alternative format for XML and JSON in a wireless environment. Experimental findings indicate that LXML is a less verbose and efficient data exchange format and its performance is found to be better than the existing non binary data exchange formats.

Бесплатно

A mobile application of augmented reality for aircraft maintenance of fan cowl door opening

A mobile application of augmented reality for aircraft maintenance of fan cowl door opening

Sei Wei Yong, Aun Naa Sung

Статья научная

Maintenance error such as failure of fan cowl door opening is one of the causes of aircraft accidents. In this research, we aim to develop an augmented reality application that allows the animation of each maintenance procedure of fan cowl door opening to be superimposed on the fan cowl door of aircraft. The marker detectability of the augmented reality application is checked based on different camera angles and distances. Hence, by using the developed application, the aircraft maintenance technician can interpret the information of the fan cowl door opening procedure in the form of texts, three-dimensional models and animations.

Бесплатно

A multi QoS genetic-based adaptive routing in wireless mesh networks with pareto solutions

A multi QoS genetic-based adaptive routing in wireless mesh networks with pareto solutions

Ibraheem Kasim Ibraheem, Alyaa Abdul-Hussain Al-Hussainy

Статья научная

Wireless Mesh Networks(WMN) is an active research topic for wireless networks designers and researchers. Routing has been studied in the last two decades in the field of optimization due to various applications in WMN. In this paper, Adaptive Genetic Algorithm (AGA) for identifying the shortest path in WMN satisfying multi- QoS measure is introduced. The proposed algorithm is adaptive in the sense that it uses various selection methods during the reproduction process and the one with the best multi- QoS measure is adopted in that generation. The multi-objective QoS measure defined as the combination of the minimum number of hops, minimum delay, and maximum bandwidth. The multi-objective optimization has been formulated and solved using weighted sum approach with Pareto optimal solution techniques. The simulation experiments have been carried out in MATLAB environment with a wireless network modeled as weighted graph of fifty nodes and node coverage equals to 200 meter, and the outcomes demonstrated that the proposed AGA performs well and finds the shortest route of the WMN proficiently, rapidly, and adapts to the dynamic nature of the wireless network and satisfying all of the constraints and objective measures imposed on the networks.

Бесплатно

A multi-agent system-based method of detecting DDoS attacks

A multi-agent system-based method of detecting DDoS attacks

Xin Zhang, Ying Zhang, Raees Altaf, Xin Feng

Статья научная

Distributed denial of service attacks are the acts aiming at the exhaustion of the limited service resources within a target host and leading to the rejection of the valid user service request. During a DDoS attack, the target host is attacked by multiple, coordinated attack programs, often with disastrous results. Therefore, the effective detection, identification, treatment, and prevention of DDoS attacks are of great significance. Based on the research of DDoS attack principles, features and methods, combined with the possible scenarios of DDoS attacks, a Multi-Agent System-based DDoS attack detection method is proposed in this paper to implement DDoS attack detection for high-load communication scenarios. In this paper, we take the multi-layer communication protocols into consideration to carry out categorizing and analyzing DDoS attacks. Especially given the high-load communication scenarios, we make an effort to exploring a possible DDoS attack detection method with employing a target-driven multi-agent modeling methodology to detect DDoS attacks relying on considering the inherent characteristics of DDoS attacks. According to the experiments verification, the proposed DDoS attack detection method plays a better detection performance and is less relevant with the data unit granularity. Meanwhile, the method can effectively detect the target attacks after the sample training. The detection scheme based on the agent technology can reasonably perform the pre-set behaviors and with good scalability to meet the follow-further requirements of designing and implementing the prototype software.

Бесплатно

A new Immunity Intrusion Detection Model Based on Genetic Algorithm and Vaccine Mechanism

A new Immunity Intrusion Detection Model Based on Genetic Algorithm and Vaccine Mechanism

Jing Xiao-Pei, Wang Hou-Xiang

Статья научная

After analyzing the characteristics of Immunity Intrusion Detection System, by utilizing prominent characteristics of genetic algorithm and vaccine mechanism, a new hybird immunity intrusion detection model based on genetic algorithm and vaccine mechanism was established. The modeling process is described in detail, such as feature extraction of vaccine, genetic operates to memory detectors and the improvement for detection method. Via application vaccine mechanism into intrusion detection system, the new model has the function of misuse detection and anomaly detection simultaneously. In order to improve the detection matching efficiency, we also present a novel matching algorithm RBNDM. Finally, we evaluated our model using the KDD Cup 1999 Data set. The experiments show that this model can increase the true positive rate of the IDS.

Бесплатно

A new approach for data hiding based on pixel pairs and chaotic map

A new approach for data hiding based on pixel pairs and chaotic map

Sengul Dogan

Статья научная

In this paper, a new data hiding algorithm based on pixel pairs using chaotic map is proposed. Data hiding scheme is created by applying modulo function to pixel pairs. In here, pseudo random number generator (PRNG) is obtained from chaotic maps. The PRNG is very important for this algorithm since the data hiding coefficients are chosen by PRNG. For example, if the coefficient is 0, subtraction operator is used between pixel pairs. If coefficient is 1, summary operator is used for selected pixel pairs. The proposed algorithm is evaluated by embedding different sized secret data into different test images. This method is compared with the determined studies in the literature and the obtained results is evaluated. In this study, special rules are also defined to pixels which have boundary values for resolve overflow/underflow problem. Minimal changes are performed to reach the desired value of the pixel values. According to the results obtained, the proposed algorithm has high visual quality, good running time, secure and high payload capacity.

Бесплатно

A new classification based model for malicious PE files detection

A new classification based model for malicious PE files detection

Imad Abdessadki, Saiida Lazaar

Статья научная

Malware presents a major threat to the security of computer systems, smart devices, and applications. It can also endanger sensitive data by modifying or destroying them. Thus, electronic exchanges through different communicating entities can be compromised. However, currently used signature-based methods cannot provide accurate detection of zero-day attacks, polymorphic and metamorphic programs which have the ability to change their code during propagation. In order to solve this issue, static and dynamic malware analysis is being used along with machine learning algorithms for malware detection and classification. Machine learning methods play an important role in automated malware detection. Several approaches have been applied to classify and to detect malware. The most challenging task is selecting a rele-vant set of features from a large dataset so that the classification model can be built in less time with higher accuracy. The purpose of this work is firstly to make a general review on the existing classification and detection methods, and secondly to develop an automated system to detect malicious Portable Executable files based on their headers with low performance and more efficiency. Experimental results will be presented for the best classifier selected in this study, namely Random Forest; accuracy and time performance will be discussed.

Бесплатно

A novel approach to thwart security attacks on mobile pattern authentication systems

A novel approach to thwart security attacks on mobile pattern authentication systems

Bh Padma, GVS Raj Kumar

Статья научная

Providing security to mobile devices by means of password authentication using robust cryptographic techniques is vitally important today, because they protect sensitive data. Especially for pattern locking systems of Android, there is a lack of security awareness in the people about various pre-computation attacks such as dictionary attacks, rainbow tables and brute-forcing. Hash functions such as SHA-1 are not secure for pattern authentication, because they suffer from dictionary attacks. The latest OS versions of Android such as Marshmallow make use of salted hash functions for pattern locks, but they do need additional hardware support such as TEE (Trusted Execution Environment) and a Gatekeeper function. If random salts are used for pattern passwords, they are also vulnerable, because the stored salt may be compromised and consequently the passwords can be speculated using brute-forcing. To avoid such a security breaches on pattern passwords, many methodologies have been proposed so far such as an elliptic curve based salt generation techniques. But security is never easy to obtain 100%. The attacker may perform brute-forcing successfully on pattern password hashes by gaining some information about the application. Brute-forcing becomes harder always by using longer salts and passwords and by stretching the execution time of hash generation. Therefore the current research addresses these difficulties and finds a solution to these problems by extending the existing salt generation scheme, by generating a dynamic 128-bit pepper (or a long salt) value for SHA-1 hashes to avoid such attacks without using an added hardware, for mobile computers using elliptic curves. The current scheme employs genetic algorithms to generate the pepper and finally makes brute-forcing even harder for the cryptanalysts. A comparison of this new hashing technique, with the existing techniques such as SHA-1 and salted SHA-1 with respect to brute-force analysis, Strict Avalanche Criterion and execution times is also presented in this paper.

Бесплатно

A novel infrared (IR) based sensor system for human presence detection in targeted locations

A novel infrared (IR) based sensor system for human presence detection in targeted locations

Kakelli Anil Kumar, Omkar Dhadge

Статья научная

Human presence detection is a continuously sought of an issue by the scientific community. Visual camera-based technologies have emerged recently with low cost and easy usage. However, these technologies have been increased the user privacy issues. Hence it is highly essential to design a human detection system without compromising the user privacy, comfort, cost and easy deployment. The pyroelectric infrared (PIR) based sensor systems are introduced however this technology is incapable to detect the presence of stationary human because it can detect the fluctuating signals only. In this paper, we have proposed a novel infrared (IR) based sensor system to detect the human presence either mobile or immobile in targeted locations with high accuracy. The proposed infrared (IR) sensor is designed to sense the heat radiation emitted by the human body, it detects the human presence accurately in targeted locations. The proposed IR based sensor system has successfully deployed in a targeted location and tested successfully for detecting the human presence and also other objects.

Бесплатно

A novel scheme for isolation of distributed denial of service attack in VANETs

A novel scheme for isolation of distributed denial of service attack in VANETs

Palak Shandil, Rakesh Kumar

Статья научная

A network in which the vehicular nodes are free to join or leave the network is known as vehicular ad hoc network (VANET). Either vehicle to vehicle or vehicle to infrastructure types of communication is performed in this decentralized type of network. The identification and elimination of Distributed-Denial of Service (DDoS) attacks from VANETs is the major objective of this research. The nodes that can flood victim nodes with large numbers of rough packets are chosen by the malicious nodes in this kind of attack. Identifying such malicious nodes from the network is an important research objective to be achieved. The technique which is proposed in this research is based on the two step verification. In the two steps verification technique, when the network performance is reduced to threshold value then the traffic is monitored that which node is sending data on such high rate. NS2 simulator is used to implement the proposed technique. With respect to various performance parameters, the proposed technique is analyzed. A comparative evaluation of results achieved from proposed and existing techniques is also done to conclude the level of improvement achieved.

Бесплатно

A passive approach for detecting image splicing using deep learning and haar wavelet transform

A passive approach for detecting image splicing using deep learning and haar wavelet transform

Eman I. Abd El-Latif, Ahmed Taha, Hala H. Zayed

Статья научная

Passive image forgery detection has attracted many researchers in the recent years. Image manipulation becomes easier than before because of the fast development of digital image editing software. Image splicing is one of the most widespread methods for tampering images. Research on detection of image splicing still carries great challenges. In this paper, an algorithm based on deep learning approach and wavelet transform is proposed to detect the spliced image. In the deep learning approach, Convolution Neural Network (CNN) is employed to automatically extract features from the spliced image. CNN is applied and then Haar Wavelet Transform (HWT) is used. Support Vector Machine (SVM) is used later for classification. Additional experiments are performed. That is, Discrete Cosine Transform (DCT) replaces HWT and then Principle Component Analysis (PCA) is applied. The proposed algorithm is evaluated on a publicly available image splicing datasets (CASIA v1.0 and CASIA v2.0). It achieves high accuracy while using a relatively low dimension feature vector. Our results demonstrate that the proposed algorithm is effective and accomplishes better performance for detecting the spliced image.

Бесплатно

A privacy-aware dynamic authentication scheme for IoT enabled business services

A privacy-aware dynamic authentication scheme for IoT enabled business services

Nitin Singh Chauhan, Ashutosh Saxena, JVR Murthy

Статья научная

Tech-savvy users are striving to bring automation and digitization in their lifestyle to make life more comfortable and efficient; Internet of Things (IoT) is an enabler in this direction. Technology advancements and new business opportunities are rapidly changing the IoT adoption landscape, and thereby security and privacy concerns have also started raising and realizing. The increasing number of IP enabled electronic devices, enormous data generation, and communication traffic have enhanced the attack surface for security and privacy violators. Many security attack scenarios are the result of poor identification and authentication mechanisms of communicating entities. In this paper, we present a secure scheme to perform a business transaction initiated by a smart device in the IoT environment. Scheme performs dynamic authentication of a business transaction while ensuring the privacy of the associated user(s). This scheme relies on Message Authentication Code (MAC) and dynamic key generation method to achieve a secure workflow. In this paper, we present a pluggable Roaming Smart Meters (RSM) concept to demonstrate the applicability of the proposed authentication scheme.

Бесплатно

A programmable and managed software defined network

A programmable and managed software defined network

Priyesh Kumar, Rajnarayan Dutta, Rakesh Dagdi, Kavitha Sooda, Archana Naik

Статья научная

Software Defined Networking is a paradigm-shifting technology in the field of computer networking. It empowers network administrators by giving them the ability to manage the network services through abstraction of the low-level network functionalities. This technology simplifies networking and makes it programmable. This paper presents an implementation of this new paradigm of networking, which can replace the currently existing legacy networking infrastructure to provide more control over the network, perform a better analysis of the network operation and hence program the network according to the needs of the network administrator. This implementation also empowers the network administrators to provide Quality of Service to its users that are connected to the network and uses the services of the network. Therefore, it benefits both the network administrator and the users. Also, the ping latency in the network is reduced by 5-10%, and the number of packets in is reduced by 60-70% in the solution developed depending on the size of the network.

Бесплатно

A public opinion classification algorithm based on micro-blog text sentiment intensity: Design and implementation

A public opinion classification algorithm based on micro-blog text sentiment intensity: Design and implementation

Xin Mingjun, Wu Hanxiang, Li Weimin, Niu Zhihua

Статья научная

On the features of short content and nearly real-time broadcasting velocity of micro-blog information, our lab constructed a public opinion corpus named MPO Corpus. Then, based on the analysis of the status of the network public opinion, it proposes an approach to calculate the sentiment intensity from three levels on words, sentences and documents respectively in this paper. Furthermore, on the basis of the MPO Corpus and HowNet Knowledge-base and sentiment analysis set, the feature words’ semantic information is brought into the traditional vector space model to represent micro-blog documents. At the same time, the documents are classified by the subjects and sentiment intensity. Therefore, the experiment result indicates that the proposed method improves the efficiency and accuracy of the micro-blog content classification,the public opinion characteristics analysis and supervision in this paper. Thus, it provides a better technical support for content auditing and public opinion monitoring for micro-blog platform.

Бесплатно

A solution for water factories in Vietnam using automatic meter reading technology

A solution for water factories in Vietnam using automatic meter reading technology

Vu Chien Thang

Статья научная

A solution for water factories in Vietnam using automatic meter reading technology is proposed in this paper. The water meters and water quality meters for water factories in Vietnam have been designed and prototyped. Water meters differ from conventional meters in that they record the water consumption and communicate that information back to the water suppliers for monitoring and billing without the need for manual readings. Water quality meters monitor multiple parameters relating to water quality such as pH, electro-conductivity, temperature, etc., and transmit these parameters to a server via GPRS network. Therefore, customers and water suppliers can monitor the water consumption, water quality parameters from anywhere via the Internet. This project has been conducted in a water factory located in Thai Nguyen Province, Vietnam. The results have shown that the consideration of this solution has been operated well in the real condition in Vietnam.

Бесплатно

A solution to secure personal data when Aadhaar is linked with DigiLocker

A solution to secure personal data when Aadhaar is linked with DigiLocker

Vinay Kumar, Arpana Chaturvedi, Meenu Dave

Статья научная

With spread of digitalization in India, the government initiated many welfare schemes for citizens as a part of e-governance. To ensure security, it is made mandatory to link Aadhaar card of beneficiaries with different schemes. The government also proposed to link UIDAI with DigiLocker to lead India towards the paperless economy. Due to this, worries related to security concern arise. Once UIDAI connected with DigiLocker, a resident can share personal data with other agencies. It generates enormous amount of Data and it may cause misuse of personal data. It is very important to keep data secure with controlled and authenticated access. It is a challenge to manage and secure this amount of data. In this paper, we propose a framework and model to secure personal data using proper authentication process. Availability of the documents should be verified by the owner and post verification, the document should be accessible for the limited time. Failing which revalidation is required.

Бесплатно

Журнал