International Journal of Computer Network and Information Security @ijcnis
Статьи журнала - International Journal of Computer Network and Information Security
Все статьи: 1201
Anti-jamming and Power Minimization Interference Nulling in Uplink MIMO-NOMA Technique
Статья научная
Non-orthogonal Multiple Access (NOMA) provides use of the power domain to boost system efficiency in the spectrum. This letter explores the use of a new transceiver design and non-orthogonal multiple access (NOMA) for MIMO uplinks. The overall energy use can be reduced while still meeting individual rate requirements by utilizing a new NOMA implementation scheme with group interference cancellation. Jamming attacks can target NOMA communication. MIMO technology is used to implement anti-jamming regulations in NOMA systems. While subsequent interference cancellation utilized to get rid of between groups interference, interference nulling at the transmitters and equalizers at the jointly designed receivers for improved power system efficiency. Where the transmitter is side, interference nulling techniques have been developed. By using the above technique, the total power consumption (dBm) which it required which it is less when compare to traditional technique like orthogonal multiple access (OMA). The outcomes of the simulation show that, in comparison to both signal alignment NOMA and orthogonal multiple-use communication, the proposed NOMA scheme typically requires less power.
Бесплатно
Application of Artificial Neural Network for Clutter Rejection
Статья научная
This paper deals with application of Artificial Neural Network (ANN) for Radar Clutter rejection, function approximation method of supervised ANN is applied here using back propagation algorithm. The database used for training and testing the ANN has been collected from simulating a moving vehicle in MATALAB(version 7.9) to obtain the RCS values at range and cross-range profiles. This work is validated by comparing received signal after clutter rejection with the received signal in no clutter condition.
Бесплатно
Application of Attribute Based Access Control Model for Industrial Control Systems
Статья научная
The number of reported security vulnerabilities and incidents related to the industrial control systems (ICS) has increased recent years. As argued by several researchers, authorization issues and poor access control are key incident vectors. The majority of ICS are not designed security in mind and they usually lack strong and granular access control mechanisms. The attribute based access control (ABAC) model offers high authorization granularity, central administration of access policies with centrally consolidated and monitored logging properties. This research proposes to harness the ABAC model to address the present and future ICS access control challenges. The proposed solution is also implemented and rigorously tested to demonstrate the feasibility and viability of ABAC model for ICS.
Бесплатно
Application of Biometrics in Mobile Voting
Статья научная
Voting process in today's era is behind its time in respect of the usage of modern ICT. The voting process is being seen mostly as a manual and paper based one. This process can be overwhelming, time-consuming and prone to security breaches and electoral fraud. Over the years technology related systems were being developed to resolve some of the issues like electoral fraud, impersonation, double voting etc. One such system is Electronic based voting that has been actively used for voting in countries like India. However, these systems seem to be prone to electoral frauds and voters have to make tremendous effort to cast their ballots. There are still a few very important areas which have to be identified and addressed viz., the Security which involves a person be able to vote in a secure manner, the time spent for voting by voters, the efficiency in counting of votes and the cost involved in employing people towards monitoring the voting process. So taking these areas/issues into consideration we have now come with the biometrics authenticated mobile voting system, to start with for a country like Jamaica. The technology being proposed now is novel and the first of its kind proposed at present. It is proposed that using fingerprint supported biometric control information and encryption along with Secure Socket Layer i.e. SSL using VeriSign, would make the software involved in the voting process well secured. In addition tying the credentials to a mobile device will make the system even more robust. We have considered the mobile equipment for the present system development, a smart phone using Android 3.0 (Honeycomb). The details of the proposed development are presented in this paper.
Бесплатно
Application of CL multi-wavelet transform and DCT in Information Hiding Algorithm
Статья научная
Taking advantage of a feature that allows theenergy of an image would gather and spread on four components (LL2, LH2, HL2 and HH2) in the sub image after first-order CL multi-wavelet transform, and Using the advantage of Discrete Cosine Transform in application of information hiding, propose an Information Hiding scheme based on CL multi-wavelet transform and Discrete Cosine Transform (abbreviated as CL-DCT). LL2 is embedded module of robust parameters (optimized code of Chebyshev scrambling and Hash value of embedding information). Embed hiding Information in LH2 and HL2 with RAID1 and fragile sign in HH2. Select a different range of DCT coefficients in LH2, HL2 and HH2. The embedding sequence of each bit plane is traversal according to Knight-tour rout. Experimental results indicate that the proposed scheme can increase invisibility and robustness separately by 5.24% and 28.33% averagely. In particular, the scheme has better ability against cutting attacks. The scheme has certain ability against steganalysis such as Higher Order Statistics based on wavelet coefficients. Moreover, the scheme has excellent sensitivity of image processing.
Бесплатно
Application of Combinatory Mechanism on RTOS UFS ACM for Risk Optimization
Статья научная
At this fastest growing of information age, there is a rapid change of business, resources and technology, mean while increasing the requirement of electronic commerce for the sophisticated societies in around the globe. During this process increasing the uncertainty, un order, un safe and un setup due to un authorize users, hackers is a great issue for down time of communication system. Our objective to determine and resolve these uncertainty problems to develop this proposed combinatory ACM to optimize the accessibilities of resources and maximize quality of services for all the time and every time to co-op with pervasive, ubiquitous & autonomy system. The relation, function, operation, maintaince and services are the vital role for all aspect of multiples societies, business and technologies in around the cloud. Meanwhile, it will be more accountable for performance, fault tolerance, throughput, benchmarking on any computational services for all the time. We have to make more simplification, unification and step by step normalization by applying permutation & combinations on UFS ACM mechanism on distributed object oriented system on multi-dimensional work culture. This access control mechanism is preventing, detecting, correcting, verification and validation of the UFS ACM in background process of RTOS.
Бесплатно
Application of Cosmos's law of Merge and Split for Data Encryption
Статья научная
Sharing of data is always a crucial job in the world of data technology, where data are perceived as useful resources for generating significant information for taking notable decisions or for doing interpretation. On the basis of impact factor associated with the information, sharing and storage of data demands security. Sharing of large extent of textual sensitive data contained in a file needs a way of hidings their direct decipherment. Due to the size related restriction associated with steganography we always promote cryptography for sharing large amount of sensitive data. In this paper we have proposed an encryption technique with time complexity of O(1) that exploits the dynamic node fusion property of graph theory. We are applying the rule of cosmos which reveals that the entire cosmos relies on the conception of data hiding. Each time billions of particles merges to form a new structure and again splits, gets distributed and again follows the same process of hiding and disclosing the hidden truth in a cyclic manner. Following this logic we have proposed a dynamic layered encryption technique that will be completely able to resist the illicit actions of intruders with low computational efforts as well as it reduces the network load on packet transmission. In future with the successive increase in the processing power and requirements we can easily intensify the capacity of the proposed technique.
Бесплатно
Application of Erlang Formulae in Next Generation Networks
Статья научная
The paper deals with the possibility of the Erlang B and Erlang C formula utilization in Next Generation Networks (NGN). Based on the common properties of synchronous and asynchronous networks it is possible the utilization of Erlang formulas also for asynchronous networks. It is possible to describe traffic in NGN networks by calculation of following parameters – loss, link utilization and bandwidth. The second part of this paper deals with the possibility of application of Erlang B formula in contact center. Contact center is one of the many examples of the NGN networks. By application of Erlang B formula in contact center environment it is possible to monitor following important parameters - number of agents, probability of call blocking, utilization of agents and mean number of calls in the system.
Бесплатно
Application of geo-location-based access control in an enterprise environment
Статья научная
Unauthorized Access has been difficult to stop or prevent in the last few decades using username and password authentication only. For an individual, data breach might just be a simple case of espionage or the loss of private credentials, for an enterprise, this could mean the loss of billions of dollars. Preventing Unauthorized Access to Enterprise Systems Using a Location-based Logical Access Control proposes a framework that uses time and location in preventing and defending against data breaches. The framework was developed using Java with an Eclipse IDE. The database was designed using MySQL and locations were collected using Google Maps API. Users registered at different locations in a university campus were unable to access another’s account in the database because they were both outside the known location and tried to do this at off-work hours. Users were registered with username and password at specified locations. The users are then made to login from same and different locations with correct username and passwords. it was discovered that access to the database was only given when the username and password was correct and location was same as at registered or as allowed by an administrator. The system was found to protect against unauthorized access arising from stolen login credentials and unauthorized remote logins from malicious users.
Бесплатно
Artificial Intrusion Detection Techniques: A Survey
Статья научная
Networking has become the most integral part of our cyber society. Everyone wants to connect themselves with each other. With the advancement of network technology, we find this most vulnerable to breach and take information and once information reaches to the wrong hands it can do terrible things. During recent years, number of attacks on networks have been increased which drew the attention of many researchers on this field. There have been many researches on intrusion detection lately. Many methods have been devised which are really very useful but they can only detect the attacks which already took place. These methods will always fail whenever there is a foreign attack which is not famous or which is new to the networking world. In order to detect new intrusions in the network, researchers have devised artificial intelligence technique for Intrusion detection prevention system. In this paper we are going to cover what types evolutionary techniques have been devised and their significance and modification.
Бесплатно
Статья научная
Long-Term Evolution (LTE) is the next generation of current mobile telecommunication networks. LTE has a ?at radio-network architecture and signi?cant increase in spectrum efficiency, throughput and user capacity. In this paper, performance analysis of robust channel estimators for Downlink Long Term Evolution-Advanced (DL LTE-A) system using three Artificial Neural Networks: Feed-forward neural network (FFNN), Cascade-forward neural network (CFNN) and Layered Recurrent Neural Network (LRN) are trained separately using Back-Propagation Algorithm and also ANN is trained by Genetic Algorithm (GA). The methods use the information got by the received reference symbols to estimate the total frequency response of the channel in two important phases. In the first phase, the proposed ANN based method learns to adapt to the channel variations, and in the second phase it estimates the channel matrix to improve performance of LTE. The performance of the estimation methods is evaluated by simulations in Vienna LTE-A DL Link Level Simulator in MATLAB software. Performance of the proposed channel estimator, ANN trained by Genetic Algorithm (ANN-GA) is compared with traditional Least Square (LS) algorithm and ANN based other estimator like Feed-forward neural network, Layered Recurrent Neural Network and Cascade-forward neural network for Closed Loop Spatial Multiplexing (CLSM)-Single User Multi-input Multi-output (MIMO-2×2 and 4×4) in terms of throughput. Simulation result shows proposed ANN-GA gives better performance than other ANN based estimations methods and LS.
Бесплатно
Artificially Augmented Training for Anomaly-based Network Intrusion Detection Systems
Статья научная
Attacks on web servers are becoming increasingly prevalent; the resulting social and economic impact of successful attacks is also exacerbated by our dependency on web-based applications. There are many existing attack detection and prevention schemes, which must be carefully configured to ensure their efficacy. In this paper, we present a study challenges that arise in training network payload anomaly detection schemes that utilize collected network traffic for tuning and configuration. The advantage of anomaly-based intrusion detection is in its potential for detecting zero day attacks. These types of schemes, however, require extensive training to properly model the normal characteristics of the system being protected. Usually, training is done through the use of real data collected by monitoring the activity of the system. In practice, network operators or administrators may run into cases where they have limited availability of such data. This issue can arise due to the system being newly deployed (or heavily modified) or due to the content or behavior that leads to normal characterization having been changed. We show that artificially generated packet payloads can be used to effectively augment the training and tuning. We evaluate the method using real network traffic collected at a server site; We illustrate the problem at first (use of highly variable and unsuitable training data resulting in high false positives of 3.6∼10%), then show improvements using the augmented training method (false positives as low as 0.2%). We also measure the impact on network performance, and present a lookup based optimization that can be used to improve latency and throughput.
Бесплатно
Статья научная
Military tasks constitute the most important and significant applications of WSNs. In military, Sensor node deployment increases activities, efficient operation, saves loss of life, and protects national sovereignty. Usually, the main difficulties in military missions are energy consumption and security in the network. Another major security issues are hacking or masquerade attack. To overcome the limitations, the proposed method modified DBSCAN with OSPREY optimization Algorithm (OOA) using hybrid classifier Long Short-Term Memory (LSTM) with Extreme Gradient Boosting (XGBOOST) to detect attack types in the WSN military sector for enhancing security. First, nodes are deployed and modified DBSCAN algorithm is used to cluster the nodes to reduce energy consumption. To select the cluster head optimally by using the OSPREY optimization Algorithm (OOA) based on small distance and high energy for transfer data between the base station and nodes. Hybrid LSTM-XGBOOST classifier utilized to learn the parameter and predict the four assault types such as scheduling, flooding, blackhole and grayhole assault. Classification and network metrics including Packet Delivery Ratio (PDR), Throughput, Average Residual Energy (ARE), Packet Loss Ratio (PLR), Accuracy and F1_score are used to evaluate the performance of the model. Performance results show that PDR of 94.12%, 3.2 Mbps throughput at 100 nodes, ARE of 8.94J, PLR of 5.88%, accuracy of 96.14%, and F1_score of 95.04% are achieved. Hence, the designed model for assault prediction types in WSN based on modified DBSCAN clustering with a hybrid classifier yields better results.
Бесплатно
Assessing vulnerability of mobile messaging apps to man-in-the-middle (MitM) attack
Статья научная
Mobile apps are gaining in popularity and are becoming an indispensable part of our digital lives. Several mobile apps (such as messaging apps) contain personal/private information of the users. Inevitably, the compromise of accounts associated with such sensitive apps can result in disastrous consequences for the end user. Recently, Password Reset Man-in-the-Middle (PRMitM) attack was proposed at the application level in which an attacker can take over a user’s web account while the user is trying to access/download resources from the attacker’s website. In this work, we adapt this attack so that it can be applied in the context of mobile messaging apps. Specifically, we analyze 20 popular mobile messaging apps for vulnerability to MitM attack, 10 of which support secure communication through end-to-end encryption. Based on our holistic analysis, we have identified 10 of the tested apps as being vulnerable to MitM attack and elaborated on the corresponding attack scenarios. On comparing the secure messaging apps to non-secure messaging apps for vulnerability to MitM attack, we found that an app’s features and design choices decide if it is susceptible to MitM attack irrespective of whether it provides end-to-end encryption or not. Further, we have proposed design improvements to increase the overall security of all mobile messaging apps against MitM attack.
Бесплатно
Статья научная
With the rapid development of mobile technologies, analyzing data generated by mobile devices is becoming increasingly important. A wide range of applications, from marketing to healthcare, require the development of effective methods for extracting valuable information from this data. This study is devoted to developing a methodology for assessing an individual's social capital based on the analysis of mobile communication data. To assess social capital, we propose a two-stage Cascade Model that combines the advantages of the Random Forest (RF) and Logistic Regression (LR) algorithms. In the first stage, RF is used to select the most significant features reflecting various aspects of social capital. In the second stage, LR is used to assess of social capital, taking into account nonlinear relationships between features. The results of the study open up new opportunities for studying social phenomena and can be used in as sociology, marketing, and urban planning.
Бесплатно
Asymptotic Stability Analysis of E-speed Start Congestion Control Protocol for TCP
Статья научная
All the proposed window based congestion control protocols use a single slow start algorithm. It has been shown in literature that slow start inefficiently utilizes bandwidth in a network with high bandwidth delay product (BDP). A multiple startup algorithm (E-speed start) was proposed in this work. E-speed start specifies a multiple selectable startup for Transmission Control Protocol (TCP). It is proposed that startup speed for TCP be selectable from n-arry startup algorithms. In E-speed start, a binary start was implemented based on a calculated value β which depends on the available bandwidth and other network conditions. A model for E-speed start was derived using utility maximization theory and the principle of decentralised solution. The model derived was shown to be stable by linear approximation, Laplace transform and by using the concept of Nyquist Stability criterion.
Бесплатно
Статья научная
Augmented Reality (AR) and Virtual Reality (VR) are innovative technologies that are experiencing a widespread recognition. These technologies possess the capability to transform and redefine our interactions with the surrounding environment. However, as these technologies spread, they also introduce new security challenges. In this paper, we discuss the security challenges posed by Augmented reality and Virtual Reality, and propose a Machine Learning-based approach to address these challenges. We also discuss how Machine Learning can be used to detect and prevent attacks in Augmented reality and Virtual Reality. By leveraging the power of Machine Learning algorithms, we aim to bolster the security defences of Augmented reality and Virtual Reality systems. To accomplish this, we have conducted a comprehensive evaluation of various Machine Learning algorithms, meticulously analysing their performance and efficacy in enhancing security. Our results show that Machine Learning can be an effective way to improve the security of Augmented reality and virtual reality systems.
Бесплатно
Статья научная
In order to ensure and enforce endpoint security, Network Access Control (NAC) is attracting considerable interest from the research community. Most NAC architectures are based on 802.1x, EAP (Extensible Authentication Protocol), EAPoL (EAP over LAN) 802.11i, 802.11w, and RADIUS (Remote Authentication Dial-In User Service) protocols. Unprotected management and control frames in some of above protocols lead to several attacks. Eliminating flaws completely in design of each protocol is a challenge. These flaws help malicious user and infected endpoint to intrude into the NAC architecture to make damage into it. Many researches have been carried out to address this issue. In this paper, we have made an attempt to explain attacks in above protocols and present a survey and analysis of different solution approaches proposed by researchers. The affect of vulnerability and attack of above protocols in NAC is also discussed. The finding of this review will provide useful insights into the vulnerabilities, attacks in above protocols, and their proposed solutions with issues, which may create a research scope for strengthening security in NAC.
Бесплатно
Audio Codecs in VoIPv6: A Performance Analysis
Статья научная
Audio communications in IP based networks have been revolutionized by the introduction of VoIP applications. High cost-efficiency has made VoIP to be the communication means in today’s world; and this trend is anticipated to be continued on an ongoing basis. The performance of VoIP significantly depends on the efficiency of the audio codecs used in any communication scenario which make the study on the performance issues of audio codecs in VoIP applications worth investigating. IPv6 is the new version of IP, which will gradually replace the current IPv4 as the transition from IPv4 to IPv6 is already in place. This demands the scrutiny of the audio codecs being used in IPv4 to be tested for their compatibility in IPv6 in terms of desired performance. This paper presents the study on the performance of selected audio codecs that are widely used in VoIPv4. G.711, G.729A and G.723.1 codecs were chosen for the study in VoIPv6 based scenarios presented in this paper. The selected audio codecs were applied in IPv6 based voice communication network scenarios to determine their performance efficiency by observing various QoS parameters. The study was done by means of simulation using OPNET.
Бесплатно
Augmented Reality Mobile Application of Balinese Hindu Temples: DewataAR
Статья научная
Augmented reality is a visual technology which combines virtual objects into the real environment in real time. E-tourism in Bali needs to be optimized, so that information technology can help tourists and provide new experiences when traveling. Generally, tourists wish for gaining information in an attractive way about visiting tourism objects. Nowadays, mobile-based application programs that provide information about tourism objects in Bali are rarely found. Therefore, it is important to develop an application which provides information system about tourism objects, especially about the Tanah Lot temple. By implementing augmented reality technology, which grows rapidly all over the world, the application of DewataAR can show 3 dimensional objects, video, and audio information of the temples. The application works by scanning brochure of tourism object by using an Android smartphone or tablet, then it can display 3 dimensional objects, video, and audio information about those tourism objects. Hence, augmented reality can be alternative media for promoting tourism object attractively for tourists and also be able to develop tourism in Bali.
Бесплатно