Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1121

Analysis of VoIP over Wired & Wireless Network with Implementation of QoS CBWFQ & 802.11e

Analysis of VoIP over Wired & Wireless Network with Implementation of QoS CBWFQ & 802.11e

Zahid Ali, Falak Naz, Javed, Muhammad Qurban, Muhammad Yasir, Shehroz Jehangir

Статья научная

In this paper, we analyzed VoIP data rates to minimize the bandwidth efficiently as per user demand and reduced the budget cost before implementing VoIP service at any wired and wireless network. To accomplish these results different clock rates were used to assign bandwidth administratively, CODEC schemes (G.711 and G.729) to minimized data rates and QoS (Quality of Service) such as CBWFQ and 802.11e to sustain the voice quality in congestion over the wired and wireless networks. PRTG Grapher and LAN Traffic Generator software were used to monitor a bandwidth and create congestion artificially between the link of communicating two setup LANs wired and wireless.

Бесплатно

Analysis of the SYN Flood DoS Attack

Analysis of the SYN Flood DoS Attack

Mitko Bogdanoski, Tomislav Shuminoski, Aleksandar Risteski

Статья научная

The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol) segments when SYN flag is ON, which gives space for a DoS (Denial of Service) attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment which are followed by are shown.

Бесплатно

Analyzing Multiple Routing Configuration

Analyzing Multiple Routing Configuration

Meenakshi Moza, Suresh Kumar

Статья научная

Internet plays a vital role in communication. Determination of internet capability is done by Routing protocol. After a network fails, routing protocols have very slow convergence rate, which is a grave problem and needs to be tackled. Multiple Routing Configuration (MRC) is a technique which helps IP networks to recover very quickly from link and node failures. In MRC, packet forwarding persists on an optional link as soon as a failure is detected and additional information is always contained in the routers. This paper discusses the effect of packet size on throughput, packet delivery ratio, packet loss and delay for various routing protocols like OSPF, OSPF with 1 and 2 link breakage and MRC.

Бесплатно

Analyzing progressive-BKZ lattice reduction algorithm

Analyzing progressive-BKZ lattice reduction algorithm

Md. Mokammel Haque, Mohammad Obaidur Rahman

Статья научная

BKZ and its variants are considered as the most efficient lattice reduction algorithms compensating both the quality and runtime. Progressive approach (gradually increasing block size) of this algorithm has been attempted in several works for better performance but actual analysis of this approach has never been reported. In this paper, we plot experimental evidence of its complexity over the direct approach. We see that a considerable time saving can be achieved if we use the output basis of the immediately reduced block as the input basis of the current block (with increased block size) successively. Then, we attempt to find pseudo-collision in SWIFFT hash function and show that a different set of parameters produces a special shape of Gram-Schmidt norms other than the predicted Geometric Series Assumptions (GSA) which the experiment suggests being more efficient.

Бесплатно

Analyzing the IPv6 Deployment Process in Palestine

Analyzing the IPv6 Deployment Process in Palestine

Yazan W. Abdalaziz, Ala Hamarsheh

Статья научная

This paper is to examine the IPv6 in Palestine and to examine where are Palestinian companies in the deployment process. Also, to examine if the infrastructure can withstand the transition to IPv6 or not. This study used quantitative research methods and collect the data through a survey from the Internet companies in Palestine as reported anonymously. Due to the lack of research related to the internet in Palestine, we saw that it is necessary to discover the internet companies and how much they achieved of the deployment process. The collected data have been analyzed and described using SPSS. The data analysis showed that one internet company representing 11% of the companies in Palestine did apply the transition process to IPv6, and the percentages have set a positive indicator for the transition process. It turns out that the other companies on their way to start deploying the IPv6.

Бесплатно

Anomaly Detection System in Secure Cloud Computing Environment

Anomaly Detection System in Secure Cloud Computing Environment

Zhengbing Hu, Sergiy Gnatyuk, Oksana Koval, Viktor Gnatyuk, Serhii Bondarovets

Статья научная

Continuous growth of using the information technologies in the modern world causes gradual accretion amounts of data that are circulating in information and telecommunication system. That creates an urgent need for the establishment of large-scale data storage and accumulation areas and generates many new threats that are not easy to detect. Task of accumulation and storing is solved by datacenters – tools, which are able to provide and automate any business process. For now, almost all service providers use quite promising technology of building datacenters – Cloud Computing, which has some advantages over its traditional opponents. Nevertheless, problem of the provider's data protection is so huge that risk to lose all your data in the "cloud" is almost constant. It causes the necessity of processing great amounts of data in real-time and quick notification of possible threats. Therefore, it is reasonable to implement in data centers' network an intellectual system, which will be able to process large datasets and detect possible breaches. Usual threat detection methods are based on signature methods, the main idea of which is comparing the incoming traffic with databases of known threats. However, such methods are becoming ineffective, when the threat is new and it has not been added to database yet. In that case, it is more preferable to use intellectual methods that are capable of tracking any unusual activity in specific system – anomaly detection methods. However, signature module will detect known threats faster, so it is logical to include it in the system too. Big Data methods and tools (e.g. distributed file system, parallel computing on many servers) will provide the speed of such system and allow to process data dynamically. This paper is aimed to demonstrate developed anomaly detection system in secure cloud computing environment, show its theoretical description and conduct appropriate simulation. The result demonstrate that the developed system provides the high percentage (>90%) of anomaly detection in secure cloud computing environment.

Бесплатно

Anomaly Detection in Network Traffic Using Selected Methods of Time Series Analysis

Anomaly Detection in Network Traffic Using Selected Methods of Time Series Analysis

Jarosław Bernacki, Grzegorz Kołaczek

Статья научная

In this paper a few methods for anomaly detection in computer networks with the use of time series methods are proposed. The special interest was put on Brown's exponential smoothing, seasonal decomposition, naive forecasting and Exponential Moving Average method. The validation of the anomaly detection methods has been performed using experimental data sets and statistical analysis which has shown that proposed methods can efficiently detect unusual situations in network traffic. This means that time series methods can be successfully used to model and predict a traffic in computer networks as well as to detect some unusual or unrequired events in network traffic.

Бесплатно

Anti-jamming and Power Minimization Interference Nulling in Uplink MIMO-NOMA Technique

Anti-jamming and Power Minimization Interference Nulling in Uplink MIMO-NOMA Technique

Suprith P.G., Mohammed Riyaz Ahmed, Mithileysh Sathiyanarayanan

Статья научная

Non-orthogonal Multiple Access (NOMA) provides use of the power domain to boost system efficiency in the spectrum. This letter explores the use of a new transceiver design and non-orthogonal multiple access (NOMA) for MIMO uplinks. The overall energy use can be reduced while still meeting individual rate requirements by utilizing a new NOMA implementation scheme with group interference cancellation. Jamming attacks can target NOMA communication. MIMO technology is used to implement anti-jamming regulations in NOMA systems. While subsequent interference cancellation utilized to get rid of between groups interference, interference nulling at the transmitters and equalizers at the jointly designed receivers for improved power system efficiency. Where the transmitter is side, interference nulling techniques have been developed. By using the above technique, the total power consumption (dBm) which it required which it is less when compare to traditional technique like orthogonal multiple access (OMA). The outcomes of the simulation show that, in comparison to both signal alignment NOMA and orthogonal multiple-use communication, the proposed NOMA scheme typically requires less power.

Бесплатно

Application of Artificial Neural Network for Clutter Rejection

Application of Artificial Neural Network for Clutter Rejection

Priyabrata Karmakar, Sourav Dhar, Mithun Chakraborty, Tirthankar Paul

Статья научная

This paper deals with application of Artificial Neural Network (ANN) for Radar Clutter rejection, function approximation method of supervised ANN is applied here using back propagation algorithm. The database used for training and testing the ANN has been collected from simulating a moving vehicle in MATALAB(version 7.9) to obtain the RCS values at range and cross-range profiles. This work is validated by comparing received signal after clutter rejection with the received signal in no clutter condition.

Бесплатно

Application of Attribute Based Access Control Model for Industrial Control Systems

Application of Attribute Based Access Control Model for Industrial Control Systems

Erkan Yalcinkaya, Antonio Maffei, Mauro Onori

Статья научная

The number of reported security vulnerabilities and incidents related to the industrial control systems (ICS) has increased recent years. As argued by several researchers, authorization issues and poor access control are key incident vectors. The majority of ICS are not designed security in mind and they usually lack strong and granular access control mechanisms. The attribute based access control (ABAC) model offers high authorization granularity, central administration of access policies with centrally consolidated and monitored logging properties. This research proposes to harness the ABAC model to address the present and future ICS access control challenges. The proposed solution is also implemented and rigorously tested to demonstrate the feasibility and viability of ABAC model for ICS.

Бесплатно

Application of Biometrics in Mobile Voting

Application of Biometrics in Mobile Voting

Donovan Gentles, Suresh Sankaranarayanan

Статья научная

Voting process in today's era is behind its time in respect of the usage of modern ICT. The voting process is being seen mostly as a manual and paper based one. This process can be overwhelming, time-consuming and prone to security breaches and electoral fraud. Over the years technology related systems were being developed to resolve some of the issues like electoral fraud, impersonation, double voting etc. One such system is Electronic based voting that has been actively used for voting in countries like India. However, these systems seem to be prone to electoral frauds and voters have to make tremendous effort to cast their ballots. There are still a few very important areas which have to be identified and addressed viz., the Security which involves a person be able to vote in a secure manner, the time spent for voting by voters, the efficiency in counting of votes and the cost involved in employing people towards monitoring the voting process. So taking these areas/issues into consideration we have now come with the biometrics authenticated mobile voting system, to start with for a country like Jamaica. The technology being proposed now is novel and the first of its kind proposed at present. It is proposed that using fingerprint supported biometric control information and encryption along with Secure Socket Layer i.e. SSL using VeriSign, would make the software involved in the voting process well secured. In addition tying the credentials to a mobile device will make the system even more robust. We have considered the mobile equipment for the present system development, a smart phone using Android 3.0 (Honeycomb). The details of the proposed development are presented in this paper.

Бесплатно

Application of CL multi-wavelet transform and DCT in Information Hiding Algorithm

Application of CL multi-wavelet transform and DCT in Information Hiding Algorithm

Tao ZHANG, Shuai REN

Статья научная

Taking advantage of a feature that allows theenergy of an image would gather and spread on four components (LL2, LH2, HL2 and HH2) in the sub image after first-order CL multi-wavelet transform, and Using the advantage of Discrete Cosine Transform in application of information hiding, propose an Information Hiding scheme based on CL multi-wavelet transform and Discrete Cosine Transform (abbreviated as CL-DCT). LL2 is embedded module of robust parameters (optimized code of Chebyshev scrambling and Hash value of embedding information). Embed hiding Information in LH2 and HL2 with RAID1 and fragile sign in HH2. Select a different range of DCT coefficients in LH2, HL2 and HH2. The embedding sequence of each bit plane is traversal according to Knight-tour rout. Experimental results indicate that the proposed scheme can increase invisibility and robustness separately by 5.24% and 28.33% averagely. In particular, the scheme has better ability against cutting attacks. The scheme has certain ability against steganalysis such as Higher Order Statistics based on wavelet coefficients. Moreover, the scheme has excellent sensitivity of image processing.

Бесплатно

Application of Combinatory Mechanism on RTOS UFS ACM for Risk Optimization

Application of Combinatory Mechanism on RTOS UFS ACM for Risk Optimization

Padma Lochan Pradhan

Статья научная

At this fastest growing of information age, there is a rapid change of business, resources and technology, mean while increasing the requirement of electronic commerce for the sophisticated societies in around the globe. During this process increasing the uncertainty, un order, un safe and un setup due to un authorize users, hackers is a great issue for down time of communication system. Our objective to determine and resolve these uncertainty problems to develop this proposed combinatory ACM to optimize the accessibilities of resources and maximize quality of services for all the time and every time to co-op with pervasive, ubiquitous & autonomy system. The relation, function, operation, maintaince and services are the vital role for all aspect of multiples societies, business and technologies in around the cloud. Meanwhile, it will be more accountable for performance, fault tolerance, throughput, benchmarking on any computational services for all the time. We have to make more simplification, unification and step by step normalization by applying permutation & combinations on UFS ACM mechanism on distributed object oriented system on multi-dimensional work culture. This access control mechanism is preventing, detecting, correcting, verification and validation of the UFS ACM in background process of RTOS.

Бесплатно

Application of Cosmos's law of Merge and Split for Data Encryption

Application of Cosmos's law of Merge and Split for Data Encryption

Sanjay Kr. Pal, Nupur Chakraborty

Статья научная

Sharing of data is always a crucial job in the world of data technology, where data are perceived as useful resources for generating significant information for taking notable decisions or for doing interpretation. On the basis of impact factor associated with the information, sharing and storage of data demands security. Sharing of large extent of textual sensitive data contained in a file needs a way of hidings their direct decipherment. Due to the size related restriction associated with steganography we always promote cryptography for sharing large amount of sensitive data. In this paper we have proposed an encryption technique with time complexity of O(1) that exploits the dynamic node fusion property of graph theory. We are applying the rule of cosmos which reveals that the entire cosmos relies on the conception of data hiding. Each time billions of particles merges to form a new structure and again splits, gets distributed and again follows the same process of hiding and disclosing the hidden truth in a cyclic manner. Following this logic we have proposed a dynamic layered encryption technique that will be completely able to resist the illicit actions of intruders with low computational efforts as well as it reduces the network load on packet transmission. In future with the successive increase in the processing power and requirements we can easily intensify the capacity of the proposed technique.

Бесплатно

Application of Erlang Formulae in Next Generation Networks

Application of Erlang Formulae in Next Generation Networks

Erik Chromy, Tibor Misuth, Adam Weber

Статья научная

The paper deals with the possibility of the Erlang B and Erlang C formula utilization in Next Generation Networks (NGN). Based on the common properties of synchronous and asynchronous networks it is possible the utilization of Erlang formulas also for asynchronous networks. It is possible to describe traffic in NGN networks by calculation of following parameters – loss, link utilization and bandwidth. The second part of this paper deals with the possibility of application of Erlang B formula in contact center. Contact center is one of the many examples of the NGN networks. By application of Erlang B formula in contact center environment it is possible to monitor following important parameters - number of agents, probability of call blocking, utilization of agents and mean number of calls in the system.

Бесплатно

Application of geo-location-based access control in an enterprise environment

Application of geo-location-based access control in an enterprise environment

Victor L. Yisa, Baba Meshach, Oluwafemi Osho, Anthony Sule

Статья научная

Unauthorized Access has been difficult to stop or prevent in the last few decades using username and password authentication only. For an individual, data breach might just be a simple case of espionage or the loss of private credentials, for an enterprise, this could mean the loss of billions of dollars. Preventing Unauthorized Access to Enterprise Systems Using a Location-based Logical Access Control proposes a framework that uses time and location in preventing and defending against data breaches. The framework was developed using Java with an Eclipse IDE. The database was designed using MySQL and locations were collected using Google Maps API. Users registered at different locations in a university campus were unable to access another’s account in the database because they were both outside the known location and tried to do this at off-work hours. Users were registered with username and password at specified locations. The users are then made to login from same and different locations with correct username and passwords. it was discovered that access to the database was only given when the username and password was correct and location was same as at registered or as allowed by an administrator. The system was found to protect against unauthorized access arising from stolen login credentials and unauthorized remote logins from malicious users.

Бесплатно

Artificial Intrusion Detection Techniques: A Survey

Artificial Intrusion Detection Techniques: A Survey

Ashutosh Gupta, Bhoopesh Singh Bhati, Vishal Jain

Статья научная

Networking has become the most integral part of our cyber society. Everyone wants to connect themselves with each other. With the advancement of network technology, we find this most vulnerable to breach and take information and once information reaches to the wrong hands it can do terrible things. During recent years, number of attacks on networks have been increased which drew the attention of many researchers on this field. There have been many researches on intrusion detection lately. Many methods have been devised which are really very useful but they can only detect the attacks which already took place. These methods will always fail whenever there is a foreign attack which is not famous or which is new to the networking world. In order to detect new intrusions in the network, researchers have devised artificial intelligence technique for Intrusion detection prevention system. In this paper we are going to cover what types evolutionary techniques have been devised and their significance and modification.

Бесплатно

Artificial Neural Network trained by Genetic Algorithm for Smart MIMO Channel Estimation for Downlink LTE-Advance System

Artificial Neural Network trained by Genetic Algorithm for Smart MIMO Channel Estimation for Downlink LTE-Advance System

Nirmalkumar S. Reshamwala, Pooja S. Suratia, Satish K. Shah

Статья научная

Long-Term Evolution (LTE) is the next generation of current mobile telecommunication networks. LTE has a ?at radio-network architecture and signi?cant increase in spectrum efficiency, throughput and user capacity. In this paper, performance analysis of robust channel estimators for Downlink Long Term Evolution-Advanced (DL LTE-A) system using three Artificial Neural Networks: Feed-forward neural network (FFNN), Cascade-forward neural network (CFNN) and Layered Recurrent Neural Network (LRN) are trained separately using Back-Propagation Algorithm and also ANN is trained by Genetic Algorithm (GA). The methods use the information got by the received reference symbols to estimate the total frequency response of the channel in two important phases. In the first phase, the proposed ANN based method learns to adapt to the channel variations, and in the second phase it estimates the channel matrix to improve performance of LTE. The performance of the estimation methods is evaluated by simulations in Vienna LTE-A DL Link Level Simulator in MATLAB software. Performance of the proposed channel estimator, ANN trained by Genetic Algorithm (ANN-GA) is compared with traditional Least Square (LS) algorithm and ANN based other estimator like Feed-forward neural network, Layered Recurrent Neural Network and Cascade-forward neural network for Closed Loop Spatial Multiplexing (CLSM)-Single User Multi-input Multi-output (MIMO-2×2 and 4×4) in terms of throughput. Simulation result shows proposed ANN-GA gives better performance than other ANN based estimations methods and LS.

Бесплатно

Artificially Augmented Training for Anomaly-based Network Intrusion Detection Systems

Artificially Augmented Training for Anomaly-based Network Intrusion Detection Systems

Chockalingam Karuppanchetty, William Edmonds, Sun-il Kim, Nnamdi Nwanze

Статья научная

Attacks on web servers are becoming increasingly prevalent; the resulting social and economic impact of successful attacks is also exacerbated by our dependency on web-based applications. There are many existing attack detection and prevention schemes, which must be carefully configured to ensure their efficacy. In this paper, we present a study challenges that arise in training network payload anomaly detection schemes that utilize collected network traffic for tuning and configuration. The advantage of anomaly-based intrusion detection is in its potential for detecting zero day attacks. These types of schemes, however, require extensive training to properly model the normal characteristics of the system being protected. Usually, training is done through the use of real data collected by monitoring the activity of the system. In practice, network operators or administrators may run into cases where they have limited availability of such data. This issue can arise due to the system being newly deployed (or heavily modified) or due to the content or behavior that leads to normal characterization having been changed. We show that artificially generated packet payloads can be used to effectively augment the training and tuning. We evaluate the method using real network traffic collected at a server site; We illustrate the problem at first (use of highly variable and unsuitable training data resulting in high false positives of 3.6∼10%), then show improvements using the augmented training method (false positives as low as 0.2%). We also measure the impact on network performance, and present a lookup based optimization that can be used to improve latency and throughput.

Бесплатно

Assessing vulnerability of mobile messaging apps to man-in-the-middle (MitM) attack

Assessing vulnerability of mobile messaging apps to man-in-the-middle (MitM) attack

Rishabh Dudheria

Статья научная

Mobile apps are gaining in popularity and are becoming an indispensable part of our digital lives. Several mobile apps (such as messaging apps) contain personal/private information of the users. Inevitably, the compromise of accounts associated with such sensitive apps can result in disastrous consequences for the end user. Recently, Password Reset Man-in-the-Middle (PRMitM) attack was proposed at the application level in which an attacker can take over a user’s web account while the user is trying to access/download resources from the attacker’s website. In this work, we adapt this attack so that it can be applied in the context of mobile messaging apps. Specifically, we analyze 20 popular mobile messaging apps for vulnerability to MitM attack, 10 of which support secure communication through end-to-end encryption. Based on our holistic analysis, we have identified 10 of the tested apps as being vulnerable to MitM attack and elaborated on the corresponding attack scenarios. On comparing the secure messaging apps to non-secure messaging apps for vulnerability to MitM attack, we found that an app’s features and design choices decide if it is susceptible to MitM attack irrespective of whether it provides end-to-end encryption or not. Further, we have proposed design improvements to increase the overall security of all mobile messaging apps against MitM attack.

Бесплатно

Журнал