Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1110

Augmented Reality Mobile Application of Balinese Hindu Temples: DewataAR

Augmented Reality Mobile Application of Balinese Hindu Temples: DewataAR

Adi Ferliyanto Waruwu, I Putu Agung Bayupati, I Ketut Gede Darma Putra

Статья научная

Augmented reality is a visual technology which combines virtual objects into the real environment in real time. E-tourism in Bali needs to be optimized, so that information technology can help tourists and provide new experiences when traveling. Generally, tourists wish for gaining information in an attractive way about visiting tourism objects. Nowadays, mobile-based application programs that provide information about tourism objects in Bali are rarely found. Therefore, it is important to develop an application which provides information system about tourism objects, especially about the Tanah Lot temple. By implementing augmented reality technology, which grows rapidly all over the world, the application of DewataAR can show 3 dimensional objects, video, and audio information of the temples. The application works by scanning brochure of tourism object by using an Android smartphone or tablet, then it can display 3 dimensional objects, video, and audio information about those tourism objects. Hence, augmented reality can be alternative media for promoting tourism object attractively for tourists and also be able to develop tourism in Bali.

Бесплатно

Auto-Pattern Programmable Kernel Filter (Auto-PPKF) for Suppression of Bot Generated Traffic

Auto-Pattern Programmable Kernel Filter (Auto-PPKF) for Suppression of Bot Generated Traffic

Kritika Govind, S. Selvakumar

Статья научная

Bots usually vary from their other malicious counter parts by periodically reporting to the botmaster through regular exchange of messages. Our experiments on bot attack generation showed a continuous exchange of packets with similar content between the botmaster and the zombie machine at various time intervals. Though there were also genuine packets with similar content being sent out of the victim machine challenge was to differentiate between the two and pass only the genuine ones. In this paper, an algorithm namely Auto-Pattern Programmable Kernel Filter (Auto-PPKF), for automatic detection of patterns from packet payload for filtering out malicious packets generated by bots is proposed. The significant feature of our proposed Auto-PPKF algorithm is that, the malicious pattern is deduced at kernel level on the fly from packet payload. Traditional algorithms such as Boyer Moore, Knuth Morris Patt, and Naive Pattern search algorithms require the pattern to be identified available a priori. Currently, Longest Common Subsequence (LCS) algorithm stands as the most preferred algorithm for pattern matching. But the disadvantage is that common sequences can also exist in many genuine packets. Hence, the challenge lies in automatic detection of malicious patterns and filtering of the packets having such malicious patterns. This would not only put off the communication between the Botmaster and Zombie machine, but will also thus prevent user information from being sent to the botmaster.

Бесплатно

Auto-metric Graph Neural Network based Blockchain Technology for Secured Dynamic Optimal Routing in MANET

Auto-metric Graph Neural Network based Blockchain Technology for Secured Dynamic Optimal Routing in MANET

Francis H. Shajin, Muthusamy Palaniappan, P. Rajesh

Статья научная

Mobile ad hoc network (MANET) routing is a generous tactic used for allocating packets to the base station (BS). During the operations of routing, occurrence of malicious node embellishes the mobile ad hoc network operations. For that reason, a trusted distributed routing protocol is obliged that maintains the routing buttressing and the proficiency of mobile ad hoc network. To overcome these challenging issues, Auto-Metric Graph Neural Network based Blockchain technology is proposed in this manuscript for Secured Dynamic Optimal Routing in MANET (BC-SDOR-MANET-AGNN). The proposed approach is simulated in NS-2 tool. The proposed BC-SDOR-MANET-AGNN approach attains 76.26%, 65.57%, 42.9% minimal delay during 25% malicious routing environment, 73.06%, 63.82%, 38.84% less delay during 50% malicious routing environment when analyzed to the existing models, like enhanced hybrid secure multipath routing protocol for MANET (BC-SDOR-MANET-GAHC), an improved ad hoc on-demand distance vector routing security approach based on BC technology in MANET (BC-SDOR-MANET-AODV-MQS) and block chain-based better approach for the mobile ad-hoc networking protocol using ensemble algorithm (BC-SDOR-MANET-E-BATMAN) methods.

Бесплатно

Auto-metric Graph Neural Network for Attack Detection on IoT-based Smart Environment and Secure Data Transmission using Advanced Wild Horse Standard Encryption Method

Auto-metric Graph Neural Network for Attack Detection on IoT-based Smart Environment and Secure Data Transmission using Advanced Wild Horse Standard Encryption Method

Ranganath Yadawad, Umakant P. Kulkarni, Jafar A. Alzubi

Статья научная

Smart cities (SCs) are being constructed with the huge placement of the Internet of Things (IoT). Real-time enhancements to life quality based on comfort and efficiency. The key concerns in most SCs that immediately impact network performance are security and privacy. Numerous approaches are proposed for secure data transmission, but the current methods do not provide high accuracy and it provide high computational time. To resolve these problems, an Auto-metric Graph Neural Network for Attack Detection and Secure Data Transmission using Optimized Enhanced Identity-Based Encryption in IoT (AGNN-AWHSE-ST-IoT) is proposed. Primarily, the input data is taken from the NSL-KDD dataset. The input data is gathered with the aid of NSL-KDD is pre-processed using three steps, crisp data conversion, splitting, and normalization. Then the Pre-processed input is fed into the Colour Harmony Algorithm (CHA) based feature selection to select the important features. After feature selection, the preferred features are given to the AGNN classifier. After classifying, the data is given to Enhanced Identity-Based Encryption (EIBE), and it is optimized using Wild Horse Optimizer (WHO) for transmitting the data more safely. The outcomes of the normal data are displayed using the LCD monitor. The AGNN-AWHSE-ST-IoT method is implemented in PYTHON. The AGNN-AWHSE-ST-IoT method attains 8.888%, 13.953%, 19.512% higher accuracy, 2.105%, 6.593%, 8.988% higher cumulative accuracy, 54.285%, 54.285%, 52.941% lower encryption time, 8.2%, 3.3%, 6.9% lower decryption time, 11.627%, 10.344%, 6.666% higher security level and 60.869%, 70% and 64% lower computational time than the existing approaches such as SBAS-ST-IoT, BDN-GWMNN-ST-IoT and DNN-LSTM-ST-IoT respectively.

Бесплатно

Avoidance and Mitigation of All Packet Drop Attacks in MANET using Enhanced AODV with Cryptography

Avoidance and Mitigation of All Packet Drop Attacks in MANET using Enhanced AODV with Cryptography

Nitin Khanna

Статья научная

MANET is a decentralized network that has no infrastructure and nodes can communicate with each other by multi-hoping the messages. Due to this nature of MANET, it is prone to many security attacks in which packet drop attacks are very common. Various packet drop attacks like Blackhole attacks, Grayhole attack, Co-operative Blackhole attack, etc are the attacks that become a bottleneck in efficient routing and security in MANET. Various mechanisms are devised in past but none of them prove to be effective against all types of packet drop attacks. In this paper, a mechanism is formulated that enhances the AODV routing protocol with Trueness Level and Cryptography for effectively counter all types of packet drop attacks by mitigating them through avoidance and elimination of source of attack after detection. This mechanism is powered by efficient use of Cryptography in its natural form. This work is compared with published work Extended Data Routing Information mechanism against various parameters like Packet Delivery Ratio, Normalized Control Load, Accuracy and Reliability in the same environment and parameters in MATLAB 2013a.

Бесплатно

BDCC: Backpressure routing and dynamic prioritization for congestion control in WMSNs

BDCC: Backpressure routing and dynamic prioritization for congestion control in WMSNs

Akbar MAJIDI, Hamid MIRVAZIRI

Статья научная

Rapid technological advances and innovations in the area of autonomous systems push the researchers towards autonomous networked systems with emphasis on Wireless Multimedia Sensor Networks (WMSNs). In WMSN event-driven applications, it is critical to report the detected events in the area, resulting in sudden bursts of traffic due to occurrence of spatially-correlated or multiple events, causing loss of data. Also, nodes have very limited power due to hardware constraints. Packet losses and retransmissions resulting from congestion, cost precious energy and shorten the lifetime of sensor nodes. Till now, in WMSNs, Congestion control techniques are based on detection of congestion and recovery, but they cannot eliminate or prevent the occurrence of congestion. Collision is a symptom of congestion in the wireless channel and can result in a time-variant channel capacity. The method in the proposed algorithm is that the routing algorithms do not precalculate the routes and the next step is chosen dynamically. Decisions are made based on the congestion degree on neighbor nodes; each node sees its own queue backlog and neighbor's queue backlog and chooses its own degree and route based on the queue backlogs obtained from its neighbors. If there is two or more data with the same condition in the backpressure routing, we use service differentiation to prioritize packets. The results obtained from simulation test done by NS-2 simulator indicate that the proposed model is more innovative and presents better performance in compare with CCF and PCCP protocols.

Бесплатно

BER Analysis of Various Channel Equalization Schemes of a QO-STBC Encoded OFDM based MIMO CDMA System

BER Analysis of Various Channel Equalization Schemes of a QO-STBC Encoded OFDM based MIMO CDMA System

Husnul Ajra, Md. Zahid Hasan, Md. Shohidul Islam

Статья научная

Quasi Orthogonal Space Time Block Code (QO-STBC) can provide full-rate transmission and low decoding complexity. This paper deals with channel estimation for Quasi Orthogonal Space Time Block Code (QO-STBC) encoded Orthogonal Frequency Division Multiplexing (OFDM) based Multiple Input multiple Output (MIMO) Code Division Multiple Access (CDMA) system. Using the QO-STBC coding property, we analysis the weight performance that reduce the computational complexity of system. The design of channel estimation method is proposed by considering Minimum Mean Square Error (MMSE), Zero Forcing (ZF), and Singular Value Decomposition (SVD) that involves four transmit antennas and four receive antennas. Such filter facilitates the use of standard equalizer or decoder that has been designed to mitigate the Inter Symbol Interference (ISI) effect. In this paper analytical results show that the BER analysis of Minimum Mean Square Error (MMSE) algorithm using various modulation techniques outperforms as compared to other channel equalization techniques.

Бесплатно

BSHOA: Energy Efficient Task Scheduling in Cloud-fog Environment

BSHOA: Energy Efficient Task Scheduling in Cloud-fog Environment

Santhosh Kumar Medishetti, Ganesh Reddy Karri

Статья научная

Cloud-fog computing frameworks are innovative frameworks that have been designed to improve the present Internet of Things (IoT) infrastructures. The major limitation for IoT applications is the availability of ongoing energy sources for fog computing servers because transmitting the enormous amount of data generated by IoT devices will increase network bandwidth overhead and slow down the responsive time. Therefore, in this paper, the Butterfly Spotted Hyena Optimization algorithm (BSHOA) is proposed to find an alternative energy-aware task scheduling technique for IoT requests in a cloud-fog environment. In this hybrid BSHOA algorithm, the Butterfly optimization algorithm (BOA) is combined with Spotted Hyena Optimization (SHO) to enhance the global and local search behavior of BOA in the process of finding the optimal solution for the problem under consideration. To show the applicability and efficiency of the presented BSHOA approach, experiments will be done on real workloads taken from the Parallel Workload Archive comprising NASA Ames iPSC/860 and HP2CN (High-Performance Computing Center North) workloads. The investigation findings indicate that BSHOA has a strong capacity for dealing with the task scheduling issue and outperforms other approaches in terms of performance parameters including throughput, energy usage, and makespan time.

Бесплатно

Battering Keyloggers and Screen Recording Software by Fabricating Passwords

Battering Keyloggers and Screen Recording Software by Fabricating Passwords

Nairit Adhikary, Rohit Shrivastava, Ashwani Kumar, Sunil Kumar Verma, Monark Bag, Vrijendra Singh

Статья научная

The keyloggers are covert security threat to the privacy and identity of users. The attackers are exploring different techniques of keylogging using hardware keyloggers, software keyloggers and screen capturing software to steal the user sensitive data. The Incognizance of the user is imposing greater risk. To overcome this problem, we have proposed a model. In this model solution to Keylogger and Screen Recording Software has been proposed by using the concept of fabricated password on untrusted machine. It deceives the untrusted system's key logging and video capturing software. The concept used here is "WYSINT What You See Is Not True". The main feature of this model is that it has a hardware recognition to retrieve the key .This key is required by the Temporary Filter layer (TFL) as an intermediary to change into the trusted password after bypassing all the capturing techniques and returning the original password to the required website.

Бесплатно

Bilayer Beams and Relay Sharing based OFDMA Cellular Architecture

Bilayer Beams and Relay Sharing based OFDMA Cellular Architecture

Yanxiong Pan, Hui Han, Sihai Zhang, Wuyang Zhou

Статья научная

Over the past decade, researchers have been putting a lot of energy on co-channel interference suppression in the forthcoming fourth generation (4G) wireless networks. Existing approaches to interference suppression are mainly based on signal processing, cooperative communication or coordination techniques. Though good performance has been attained already, a more complex receiver is needed, and there is still room for improvement through other ways. Considering spatial frequency reuse, which provides an easier way to cope with the co-channel interference, this paper proposed a bilayer beams and relay sharing based (BBRS) OFDMA cellular architecture and corresponding frequency planning scheme. The main features of the novel architecture are as follows. Firstly, the base station (BS) uses two beams, one composed of six wide beams providing coverage to mobile stations (MSs) that access to the BS, and the other composed of six narrow beams communicating with fixed relay stations (FRSs). Secondly, in the corresponding frequency planning scheme, soft frequency reuse is considered on all FRSs further. System-level simulation results demonstrate that better coverage performance is obtained and the mean data rate of MSs near the cell edge is improved significantly. The BBRS cellular architecture provides a practical method to interference suppression in 4G networks since a better tradeoff between performance and complexity is achieved.

Бесплатно

Biometric Passport Validation Scheme using Radio Frequency Identification

Biometric Passport Validation Scheme using Radio Frequency Identification

V.K. Narendira Kumar, B. Srinivasan

Статья научная

Biometric passports issued nowadays have an embedded RFID chip that carries digitally signed biometric information. This RIFD chip is integrated into the cover of a passport, called a biometric passport. Electronic passports as it is sometimes called, represents a bold initiative in the deployment of two new technologies: RIFD and biometrics such as face, fingerprints, palm prints and iris. The electronic passport is the privacy and security risks that arise by embedding RFID technology. The goal of the adoption of the biometric passport is not only to expedite processing at border crossings, but also to increase security. Policymakers have put their faith in the technological promise of biometric identification because absolute identification could eliminate mismatched computer records and stolen identities.

Бесплатно

Biometric based Security Solutions for MANET: A Review

Biometric based Security Solutions for MANET: A Review

Ajay Jangra, Shivi Goel

Статья научная

Mobile ad hoc networks are self organizing, infrastructure-less, low power networks, design to deploy bandwidth-shared radio channel communication and to work under vulnerable environment. Security is primary concern in MANETs and in order to achieve high security (confidentiality, integrity, authentication, availability and non repudiation), several techniques have been explored in which biometrics with cryptography or intrusion detection has gained a momentum in recent years. This paper critically reviews and investigates the present biometric based security models works for MANETs, and along with security challenges and direction of further research are proposed.

Бесплатно

Blactr: A Technique to Revoke the Misbehaving Users with TTP

Blactr: A Technique to Revoke the Misbehaving Users with TTP

H.Jayasree, A. Damodaram

Статья научная

Anonymous credential systems permit the users to authenticate themselves in a privacy-preserving way. An anonymous credential system is of major practical relevance because it is the best means of providing privacy for users. In this paper, we propose a technique known as Blacklistable Anonymous Credentials with Trust Reputation (BLACTR) for revoking misbehaving users with Trusted Third Party (TTP). The technique uses both Certifying Authority (CA) review as well as other user reviews in order to blacklist a user making use of the fuzzy and rule matched to check if the person is to be blacklisted or not. The proposed technique performed well when compared to BLAC and BLACR.

Бесплатно

Blind payment protocol for payment channel networks

Blind payment protocol for payment channel networks

Zhengbing Hu, Ivan Dychka, Mykola Onai, Yuri Zhykin

Статья научная

One of the most important problems of modern cryptocurrency networks is the problem of scaling: advanced cryptocurrencies like Bitcoin can handle around 5 transactions per second. One of the most promising solutions to this problem are second layer payment protocols: payment networks implemented on top of base cryptocurrency network layer, based on the idea of delaying publication of intermediate transactions and using base network only as a finalization layer. Such networks consist of entities that interact with the cryptocurrency system via a payment channel protocol, and can send, receive and forward payments. This paper describes a formal actor-based model of payment channel network and uses it to formulate a modified payment protocol that can be executed in the network without requiring any information about its topology and thus can hide information about financial relations between nodes.

Бесплатно

Block Based Symmetry Key Visual Cryptography

Block Based Symmetry Key Visual Cryptography

Satyendra Nath Mandal, Subhankar Dutta, Ritam Sarkar

Статья научная

Visual cryptography is a method for protecting image-based secrets that has a computation-free decoding process. In this technique, numbers of shares have been generated from one image. The shares are sent through any channel to the receiver and the receiver can again produce original image by stacking all the shares in proper order. But, this method wastes a lot of bandwidth of the network. The techniques of generating shares have been used in several existing methods which are not unique. The different methods have been used in different types of images like binary, gray and color images. In this paper, a block based symmetry key visual cryptography algorithm has been proposed to convert image in encrypted form and decrypt the encrypted image into original form. The symmetric key has been generated from a real number. The encryption and decryption algorithm have been designed based on symmetry key. The algorithm with key has been used to encrypt image into single share and decrypt the single share into original image. The real number has been used to form the key may be predefined or may be sent by secure channel to the receiver. The proposed algorithm can be applied to any type images i.e. binary, gray scale and color images. A comparison has been made of the proposed algorithm with different existing algorithms like Ceaser cipher, transpose of matrix, bit comp, and transposition cipher based on the performance. The pixels distributed in original and share images have also been tested. Finally, it has shown that breaking of security level of proposed algorithm i.e. to guess the real number is huge time consuming.

Бесплатно

Block chain: cryptographic method in fourth industrial revolution

Block chain: cryptographic method in fourth industrial revolution

Raihana Syahirah Abdullah, Faizal M.A.

Статья научная

This paper has reviewed the blockchain domain that suits with the current Industrial Revolution (Industry 4.0) uses cryptographic method blockchain. The implementation of this new cryptographic method in Industry 4.0 is currently being used widely as it eases the process of financial transaction and other process that have been as issue related with cyber security. The collection of review papers shows that the blockchain technology has high potential to grow wider not just in financial technology services and manufacturing industry but also in public sector, health care and even media industry. The papers elaborate how the blockchain able to be applied in different fields of technology in order make a secure and more protected services without entrusted the third party to avoid vulnerability to be attacked and misused. Nevertheless, the applications of the blockchain in various field helps in making the industry revolution.

Бесплатно

Blocking Fraud, Advertising, or Campaign-Related Calls with a Blockchain-based Mobile App

Blocking Fraud, Advertising, or Campaign-Related Calls with a Blockchain-based Mobile App

Remzi Gürfidan, Şerafettin Atmaca

Статья научная

The use of a person's cell phone to commit fraud is known as cell phone fraud. Such scams are usually carried out through fake phone calls or text messages. The victim receives a call from a cell phone scammer, usually claiming to have an emergency or a legal problem. The purpose of the scam is usually to convince the victim to provide personal or financial information. This may include private information such as social security numbers, bank account details or credit card information. In addition, users are often subjected to unsolicited calls for marketing and information gathering initiatives such as campaigns, advertisements and surveys. In this study, a smartphone application built on the blockchain is created to stop these nuisance actions. Transaction times and performance tests have been rigorously performed according to the difficulty levels of the blockchain structure.

Бесплатно

Blocking of SQL Injection Attacks by Comparing Static and Dynamic Queries

Blocking of SQL Injection Attacks by Comparing Static and Dynamic Queries

Jaskanwal Minhas, Raman Kumar

Статья научная

Due to internet expansion web applications have now become a part of everyday life. As a result a number of incidents which exploit web application vulnerabilities are increasing. A large number of these incidents are SQL Injection attacks which are a serious security threat to databases which contain sensitive information, the leakage of which cause a large amount of loss. SQL Injection Attacks occur when an intruder changes the query structure by inserting any malicious input. There are a number of methods available to detect and prevent SQL Injection Attacks. But these are too complex to use. This paper proposes a very simple, effective and time saving technique to detect SQLIAs which uses combined static and dynamic analysis and also defines an attack other than existing classification of SQLIAs.

Бесплатно

Buffering Strategies in Optical Packet Switching

Buffering Strategies in Optical Packet Switching

Chitra Sharma, Akhilesh Kumar Yadav

Статья научная

Optical packet switching is one of promising technology for the next generation high speed data transfer. In OPS contention among the packets is a major problem, to counteract the problem deflection and buffering of contending packets is proposed. In this paper, a six node network is considered and usability of both deflection routing and buffering of packets is discussed. The results are obtained through simulations, in terms of packet loss probability and average delay. This has been found that in general buffering of contending packets is better option in comparison to deflection. However, in case of load balancing, deflection routing is desirable as some packets take alternative routes to reach its destination. Load balancing scheme reduces the packet loss rate at contending node but it increases the total delay.

Бесплатно

C2DF: High Rate DDOS filtering method in Cloud Computing

C2DF: High Rate DDOS filtering method in Cloud Computing

Pourya Shamsolmoali, M.Afshar Alam, Ranjit Biswas

Статья научная

Distributed Denial of Service (DDOS) attacks have become one of the main threats in cloud environment. A DDOS attack can make large scale of damages to resources and access of the resources to genuine cloud users. Old-established defending system cannot be easily applied in cloud computing due to their relatively low competence and wide storage. In this paper we offered a data mining and neural network technique, trained to detect and filter DDOS attacks. For the simulation experiments we used KDD Cup dataset and our lab datasets. Our proposed model requires small storage and ability of fast detection. The obtained results indicate that our model has the ability to detect and filter most type of TCP attacks. Detection accuracy was the metric used to evaluate the performance of our proposed model. From the simulation results, it is visible that our algorithms achieve high detection accuracy (97%) with fewer false alarms.

Бесплатно

Журнал