Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1110

CBC and Interleaved CBC Implementations of PACTS Cryptographic Algorithm

CBC and Interleaved CBC Implementations of PACTS Cryptographic Algorithm

J. John Raybin Jose, E. George Dharma Prakash Raj

Статья научная

PACTS (Parallelized Adaptive Cipher with Transposition and Substitution) is a new class of Symmetric Cryptographic Algorithm designed using traditional techniques to efficiently utilize the parallel computing capabilities of the modern computing systems. It overcomes the performance inconsistencies prevalent in conventional cryptographic algorithms when they are implemented in different computing systems with different processing capabilities. The size of the key and the plain text blocks of PACTS are each 1024-bits. The adaptive nature of this algorithm is achieved by incorporating flexibility in the size of the key and plain text sub-blocks and the number of rounds. Level of Intra-packet parallelization, variety in grain size and the required security strength are achieved by suitably deciding the sub-block size. Flow of the algorithm is made dynamic by determining the execution steps at runtime using the value of the key. In spite of these advantages PACTS always produces the same cipher text block for a particular plain text block when the same key is used. CBC mode along with 2-way and 4 way Interleaved CBC modes are employed to overcome this problem. The performance of the PACTS in ECB, CBC and Interleaved CBC modes are analyzed with implementations in shared memory parallel computing environment using OpenMP, Java Threads and MPI.

Бесплатно

CEAACK – A Reduced Acknowledgment for Better Data Transmission for MANETs

CEAACK – A Reduced Acknowledgment for Better Data Transmission for MANETs

J.Sathiamoorthy, B.Ramakrishnan

Статья научная

fvA MANET is a set of mobile nodes which works in a dynamic changing network and it is capable of communicating with each other efficiently where all the nodes perform a dual role as that of a transmitter and a receiver. Hence MANETs do not use any centralized administration for communication due to this reason they are more vulnerable to attacks. So MANET uses special technique called EAACK, which uses special acknowledgment messages to avoid intruder communication. So due to this type of authentication, more acknowledgment messages are transferred in between two nodes, which increases delay in communication. Hence this drawback reduces system performance. In this paper we propose a new clustering technique in EAACK called CEAACK. Our proposed technique shows better performance when compare to the normal EAACK technique, which drastically reduces the number of acknowledgment packets during authentication process which achieves a good energy efficiency network and better data transmission. Further, this technique consumes low energy and in the process provides better efficiency in data transmission in MANETs.

Бесплатно

CSRF Vulnerabilities and Defensive Techniques

CSRF Vulnerabilities and Defensive Techniques

Rupali D. Kombade, B.B. Meshram

Статья научная

Web applications are now part of day to day life due to their user friendly environment as well as advancement of technology to provide internet facilities, but these web applications brought lot of threats with them and these threats are continuously growing, one of the these threat is Cross Site Request Forgery(CSRF). CSRF attack is immerged as serious threat to web applications which based on the vulnerabilities present in the normal request response pattern of HTTP protocol. It is difficult to detect and hence it is present in most of the existing web applications. CSRF attack occurs when a malicious web site causes a user’s web browser to perform an unwanted action on a trusted site. It is listed in OWASP’s top ten Web Application attacks list. In this survey paper we will study CSRF attack, CSRF vulnerabilities and its defensive measures. We have compared various defense mechanisms to analyse the best defense mechanism. This study will help us to build strong and robust CSRF protection mechanism.

Бесплатно

CUDA based Rabin-Karp Pattern Matching for Deep Packet Inspection on a Multicore GPU

CUDA based Rabin-Karp Pattern Matching for Deep Packet Inspection on a Multicore GPU

Jyotsna Sharma, Maninder Singh

Статья научная

This paper presents a study of the improvement in efficiency of the Rabin-Karp pattern-matching algorithm based Deep Packet Inspection. NVIDIA GPU is programmed with the NVIDIA's general purpose parallel computing architecture, CUDA, that leverages the parallel compute engine in NVIDIA GPUs to solve many complex computational problems in a more efficient way than on a CPU. The proposed CUDA based implementation on a multicore GPU outperforms the Intel quadcore processor and runs upto 14 times faster by executing the algorithm in parallel to search for the pattern from the text. The speedup may not sound exorbitant but nonetheless is significant, keeping in view that the experiments have been conducted on real data and not synthetic data and, optimal performance even with the huge increase in traffic was the main expectation, not just an improvement in speed with few test cases.

Бесплатно

CVSHR: Enchantment Cloud-based Video Streaming using the Heterogeneous Resource Allocation

CVSHR: Enchantment Cloud-based Video Streaming using the Heterogeneous Resource Allocation

Mohamed A. Elsharkawey, Hosam E. Refaat

Статья научная

The Video requests can be streamed in two forms. They are the live streaming and the on-demand streaming. Both of them should be adapted (I.e., transcoded) to fit the characteristics (e.g., spatial resolution, bit rate… and the supported formats) of client devices. Therefore, many streaming service providers are presented the cloud services to be utilized in the video transcoding. But, the introducing of the cloud services for video transcoding is encountered by the contradiction between the deploying cloud resources in a cost-ef?cient without any major influence on the quality of video streams. In order to address this problem, this paper presents an Enchantment Cloud-based Video Streaming using the Heterogeneous Resource Allocation (CVSHR) to transcode the video streams on cloud resources in an efficient manner with the QoS of the requested video stream. The system architecture is elastic and based on multiple heterogeneous clusters that provide a great flexible resource allocation and De-allocation strategy. This strategy aims to assign a suitable VM with adequate resources based on the GOPs characteristic. Also, it can reassign the unused resources. In addition, the number of VMs can be extended as the system necessity. Finally, The CVSHR is simulated and evaluated on truthful cloud resources and various workload circumstances.

Бесплатно

Can universally composable cryptographic protocols be practical?

Can universally composable cryptographic protocols be practical?

István Vajda

Статья научная

The Universal Composability (UC) framework provides provable security guaranties for harsh application environment, where we want to construct protocols which keep security guarantees even when they are concurrently composed with arbitrary number of arbitrary (even hostile) protocols. This is a very strong guarantee. The UC-framework inherently supports the modular design, which allows secure composition of arbitrary number of UC-secure components with an arbitrary protocol. In contrast, traditional analysis and design is a stand alone analysis where security of a single instance is considered, i.e. an instance which is not in potential interaction with any concurrent instances. Furthermore, a typical traditional analysis is informal, i.e. without a formal proof. In spite of these facts, beyond the task of key-exchange this technology have not really took the attention of the community of applied cryptography. From practitioner's point of view the UC-world may seem more or less an academic interest of theoretical cryptographers. Accordingly we take a pragmatic approach, where we concentrate on meaningful compromises between the assumed adversarial strength, ideality wishes and realization complexity while keeping provable security guarantees within the UC-framework. We believe that even modest but provable goals (especially, if tunable to application scenarios) are interesting if a wider penetration of the UC-technology is desired into the daily-practice of protocol applications.

Бесплатно

Cascade Forward Neural Networks-based Adaptive Model for Real-time Adaptive Learning of Stochastic Signal Power Datasets

Cascade Forward Neural Networks-based Adaptive Model for Real-time Adaptive Learning of Stochastic Signal Power Datasets

Odesanya Ituabhor, Joseph Isabona, Jangfa T. Zhimwang, Ikechi Risi

Статья научная

In this work, adaptive learning of a monitored real-time stochastic phenomenon over an operational LTE broadband radio network interface is proposed using cascade forward neural network (CFNN) model. The optimal architecture of the model has been implemented computationally in the input and hidden units by means of incremental search process. Particularly, we have applied the proposed adaptive-based cascaded forward neural network model for realistic learning of practical signal data taken from an operational LTE cellular network. The performance of the adaptive learning model is compared with a benchmark feedforward neural network model (FFNN) using a number of measured stochastic SINR datasets obtained over a period of three months at two indoors and outdoors locations of the LTE network. The results showed that proposed CFNN model provided the best adaptive learning performance (0.9310 RMSE; 0.8669 MSE; 0.5210 MAE; 0.9311 R), compared to the benchmark FFNN model (1.0566 RMSE; 1.1164 MSE; 0.5568 MAE; 0.9131 R) in the first studied outdoor location. Similar robust performances were attained for the proposed CFNN model in other locations, thus indicating that it is superior to FFNN model for adaptive learning of real-time stochastic phenomenon.

Бесплатно

Cascaded Machine Learning Approach with Data Augmentation for Intrusion Detection System

Cascaded Machine Learning Approach with Data Augmentation for Intrusion Detection System

Argha Chandra Dhar, Arna Roy, M.A.H. Akhand, Md. Abdus Samad Kamal, Kou Yamada

Статья научная

Cybersecurity has received significant attention globally, with the ever-continuing expansion of internet usage, due to growing trends and adverse impacts of cybercrimes, which include disrupting businesses, corrupting or altering sensitive data, stealing or exposing information, and illegally accessing a computer network. As a popular way, different kinds of firewalls, antivirus systems, and Intrusion Detection Systems (IDS) have been introduced to protect a network from such attacks. Recently, Machine Learning (ML), including Deep Learning (DL) based autonomous systems, have been state-of-the-art in cyber security, along with their drastic growth and superior performance. This study aims to develop a novel IDS system that gives more attention to classifying attack cases correctly and categorizes attacks into subclass levels by proposing a two-step process with a cascaded framework. The proposed framework recognizes the attacks using one ML model and classifies them into subclass levels using the other ML model in successive operations. The most challenging part is to train both models with unbalanced cases of attacks and non-attacks in the datasets, which is overcome by proposing a data augmentation technique. Precisely, limited attack samples of the dataset are augmented in the training set to learn the attack cases properly. Finally, the proposed framework is implemented with NN, the most popular ML model, and evaluated with the NSL-KDD dataset by conducting a rigorous analysis of each subclass emphasizing the major attack class. The proficiency of the proposed cascaded approach with data augmentation is compared with the other three models: the cascaded model without data augmentation and the standard single NN model with and without the data augmentation technique. Experimental results on the NSL-KDD dataset have revealed the proposed method as an effective IDS system and outperformed existing state-of-the-art ML models.

Бесплатно

Cascading of C4.5 Decision Tree and Support Vector Machine for Rule Based Intrusion Detection System

Cascading of C4.5 Decision Tree and Support Vector Machine for Rule Based Intrusion Detection System

Jashan Koshal, Monark Bag

Статья научная

Main reason for the attack being introduced to the system is because of popularity of the internet. Information security has now become a vital subject. Hence, there is an immediate need to recognize and detect the attacks. Intrusion Detection is defined as a method of diagnosing the attack and the sign of malicious activity in a computer network by evaluating the system continuously. The software that performs such task can be defined as Intrusion Detection Systems (IDS). System developed with the individual algorithms like classification, neural networks, clustering etc. gives good detection rate and less false alarm rate. Recent studies show that the cascading of multiple algorithm yields much better performance than the system developed with the single algorithm. Intrusion detection systems that uses single algorithm, the accuracy and detection rate were not up to mark. Rise in the false alarm rate was also encountered. Cascading of algorithm is performed to solve this problem. This paper represents two hybrid algorithms for developing the intrusion detection system. C4.5 decision tree and Support Vector Machine (SVM) are combined to maximize the accuracy, which is the advantage of C4.5 and diminish the wrong alarm rate which is the advantage of SVM. Results show the increase in the accuracy and detection rate and less false alarm rate.

Бесплатно

Cellular Automata based Encrypted ECG-hash Code Generation: An Application in Inter human Biometric Authentication System

Cellular Automata based Encrypted ECG-hash Code Generation: An Application in Inter human Biometric Authentication System

Subrata Nandi, Satyabrata Roy, Jayanti Dansana, Wahiba Ben Abdessalem Karaa, Ruben Ray, Shatadru Roy Chowdhury, Sayan Chakraborty, Nilanjan Dey

Статья научная

In this modern era, biometrics incorporate various mechanisms to recognize inimitable features of human beings by utilizing their biological and evident features. This paper proposes a novel technique for constructing a resilient and secure biometric recognition system. In this paper, an ECG-hash code of two distinct individuals has been formed by taking dot product of electrocardiogram (ECG) feature matrices of two persons located at two different sites at respective databases. The validity of the system increases as samples from both persons, between whom the transmission takes place, are essential. Besides, electrocardiogram is such a unique feature of an individual that could not be compromised at any circumstance as contradictory to other features like fingerprints, face recognition etc. Moreover, the ECG-hash code is encrypted using rule vector of cellular automata that gives better security in terms of randomness of generated cipher text.

Бесплатно

Centralized Relay Selection and Optical Filtering Based System Design for Reliable Free Space Optical Communication over Atmospheric Turbulence

Centralized Relay Selection and Optical Filtering Based System Design for Reliable Free Space Optical Communication over Atmospheric Turbulence

M. Mubasher Hassan, G. M. Rather

Статья научная

The need for much better data rate in support for the applications having the high speed has gathered the attention to the development of Free space Optical communication technology (FSO). But the widespread usage of this technology is restrained by the several ill effects caused by the atmosphere on the propagation of optical signals. In order to mitigate such problems in the FSO communication, relay assistance has been employed and this serves the alternative to the spatial diversity. Free space optical (FSO) communication is a cost-effective and high bandwidth access technique, which has been receiving attention to recent commercialization successes. FSO get affected by the weather turbulence and it leads to severe problems in the transmission channels. In this paper, we proposed the Centralized Relay selection and Optical Filtering (CROF) for processing the signals in the FSO system which overcomes the environmental challenges. Initially, an effective relay is selected with the centralized switch and stay algorithm. This algorithm selects suitable relay for serial path transmission. Here, the serial path is considered for signal transmission in a free path and the distributed Greedy algorithm with serial transmission is utilized to obtain more information. Then atmospheric turbulence induced scintillation noise presented at the signal is eliminated through modified Kalman filtering. Finally, the performance of the proposed FSO system is evaluated in MATLAB simulation platform and these evaluations are analyzed for different atmospheric conditions like fog, haze, rain and clear weather. The performance evaluation shows that the proposed algorithm outperforms the non-cooperative scheme and an existing relay selection protocol and reliable communication with improved SNR and BER is achieved.

Бесплатно

Challenges of Mobile Devices' Resources and in Communication Channels and their Solutions

Challenges of Mobile Devices' Resources and in Communication Channels and their Solutions

Rashid G. Alakbarov

Статья научная

The article is dedicated to the development of cloudlet based mobile cloud computing (MCC) to address the restrictions that occur in the resources of mobile devices (energy consumption, computing and memory resources, etc.) and the delays occurring in communication channels. The architecture offered in the article more efficiently ensures the demand of mobile devices for computing and storage and removes the latency that occur in the network. At the same time, the tasks related to energy saving and eliminating delays in communication channels by solving the problems that require complex computing and memory resources in the cloudlets located nearby the user were outlined in the article.

Бесплатно

Chaotic Genetic-fuzzy encryption technique

Chaotic Genetic-fuzzy encryption technique

Hamdy M. Mousa

Статья научная

As the result of increasing use of internet in daily communication and the importance of information security during data storage and transmission process, we propose iterative Chaotic Genetic-fuzzy Encryption Technique(C-GET) in order to enhance secured encryption technique and less predictable. In this technique,binarize any digital data type. The main encryption stages of C-GET are chaotic map functions, fuzzy logic and genetic operations. Mathematic operations and rotation are also included that increase encryption quality. Images are used for testing propose. For testing C-GET,digitalimagesareusedbecause they become an important resource of communication. The original and reconstructed data are identical. Experimental results show that C-GET technique has multilayer protection stages against various attacks and a powerful security based on the multi-stages, multiple parameters, fuzzy logic and genetic operations. Decrypted data is nearly randomness and has negligible correlation with secret data.

Бесплатно

Chaotic Map based Random Binary Key Sequence Generation

Chaotic Map based Random Binary Key Sequence Generation

Vishwas C.G.M., R. Sanjeev Kunte

Статья научная

Image encryption is an efficient mechanism by which digital images can be secured during transmission over communication in which key sequence generation plays a vital role. The proposed system consists of stages such as the generation of four chaotic maps, conversion of generated maps to binary vectors, rotation of Linear Feedback Shift Register (LFSR), and selection of generated binary chaotic key sequences from the generated key pool. The novelty of this implementation is to generate binary sequences by selecting from all four chaotic maps viz., Tent, Logistic, Henon, and Arnold Cat map (ACM). LFSR selects chaotic maps to produce random key sequences. Five primitive polynomials of degrees 5, 6, 7, and 8 are considered for the generation of key sequences. Each primitive polynomial generates 61 binary key sequences stored in a binary key pool. All 61 binary key sequences generated are submitted for the NIST and FIPS tests. Performance analysis is carried out of the generated binary key sequences. From the obtained results, it can be concluded that the binary key sequences are random and unpredictable and have a large key space based on the individual and combination of key sequences. Also, the generated binary key sequences can be efficiently utilized for the encryption of digital images.

Бесплатно

Classification of HHO-based Machine Learning Techniques for Clone Attack Detection in WSN

Classification of HHO-based Machine Learning Techniques for Clone Attack Detection in WSN

Ramesh Vatambeti, Vijay Kumar Damera, Karthikeyan H., Manohar M., Sharon Roji Priya C., M.S. Mekala

Статья научная

Thanks to recent technological advancements, low-cost sensors with dispensation and communication capabilities are now feasible. As an example, a Wireless Sensor Network (WSN) is a network in which the nodes are mobile computers that exchange data with one another over wireless connections rather than relying on a central server. These inexpensive sensor nodes are particularly vulnerable to a clone node or replication assault because of their limited processing power, memory, battery life, and absence of tamper-resistant hardware. Once an attacker compromises a sensor node, they can create many copies of it elsewhere in the network that share the same ID. This would give the attacker complete internal control of the network, allowing them to mimic the genuine nodes' behavior. This is why scientists are so intent on developing better clone assault detection procedures. This research proposes a machine learning based clone node detection (ML-CND) technique to identify clone nodes in wireless networks. The goal is to identify clones effectively enough to prevent cloning attacks from happening in the first place. Use a low-cost identity verification process to identify clones in specific locations as well as around the globe. Using the Optimized Extreme Learning Machine (OELM), with kernels of ELM ideally determined through the Horse Herd Metaheuristic Optimization Algorithm (HHO), this technique safeguards the network from node identity replicas. Using the node identity replicas, the most reliable transmission path may be selected. The procedure is meant to be used to retrieve data from a network node. The simulation result demonstrates the performance analysis of several factors, including sensitivity, specificity, recall, and detection.

Бесплатно

Classification via Clustering for Anonymization Data

Classification via Clustering for Anonymization Data

Sridhar Mandapati, Raveendra Babu Bhogapathi, M.V.P.C.Sekhara Rao

Статья научная

Due to the exponential growth of hardware technology particularly in the field of electronic data storage media and processing such data, has raised serious issues related in order to protect the individual privacy like ethical, philosophical and legal. Data mining techniques are employed to ensure the privacy. Privacy Preserving Data Mining (PPDM) techniques aim at protecting the sensitive data and mining results. In this study, the different Clustering techniques via classification with and without anonymization data using mining tool WEKA is presented. The aim of this study is to investigate the performance of different clustering methods for the diabetic data set and to compare the efficiency of privacy preserving mining. The accuracy of classification via clustering is evaluated using K-means, Expectation-Maximization (EM) and Density based clustering methods.

Бесплатно

Cloud-based framework for efficient storage of unstructured patient health records

Cloud-based framework for efficient storage of unstructured patient health records

Hanya M. Abdallah, Ahmed Taha, Mazen M. Selim

Статья научная

Recently, in healthcare sector, the data is steadily growing and becomes more vital. Most of this data is embedded in the medical record of the patient. In fact, Patient Health Records (PHRs) refer to those records that the patient can maintain, access and share among different specialists. Storing these PHRs to the cloud allow the patient to maintain and share them with different practitioners anywhere and anytime. However, he still suffers from some security and privacy issues. Hence, it is necessary to guarantee the security and privacy of this immense volume of patient's confidential data on the cloud. Anonymization and encryption are the two methods that can be adopted to ensure the security and privacy of PHRs on cloud. In this paper, a cloud-based framework for securing the storage and the retrieval of unstructured PHRs is proposed. This framework combines different encryption techniques to encrypt the different contents of the PHR, to compress medical images and to control the access to these records. In addition, the encrypted files are partitioned into a random number of files before being sent to the cloud storage server. These files are of variable number and variable size. When a user requests to access a PHR from the cloud, the proposed framework first controls access of this user before merging the partitioned files. The decryption of these files is performed on the client side not on the cloud using the secret key, which is owned by authorized user only. Finally, extensive analytical and experimental results are presented. It shows the security, scalability, and efficiency of the proposed framework.

Бесплатно

Cluster Head Selection and Optimal Multipath detection using Coral Reef Optimization in MANET Environment

Cluster Head Selection and Optimal Multipath detection using Coral Reef Optimization in MANET Environment

S.Venkatasubramanian, A. Suhasini, C.Vennila

Статья научная

Mobile Ad-hoc Network (MANET) data transfer between nodes in a multi-hop way offers a wide variety of applications. The dynamic feature of ad hoc network mobile nodes is primarily influenced by safety issues, which limit data forwarding rate in multipath routing. As a supplementary method to improve safe data delivery in a MANET, this paper propose and analyse the cluster head (CH) selection and optimum multipath scheme. The CHs are chosen based on the possibility values of each node in MANET, which are considered from the residual energy of each node. During the present phase, the total remaining node energy is used to calculate the mean energy of the entire network. The most likely nodes are picked as the CH, which gathers packets from the cluster members through multi-hop communication. The fundamental idea is to partition a top-secret communication into several shares and then forward the shares via numerous routes to the destination. The Coral Reef Optimization method is used in this work to perform optimum multipath routing. The thorough simulation findings validate the feasibility and efficacy of the suggested strategy in comparison to Butterfly optimization algorithm (BA), Whale Optimization algorithm (WOA) and BAT algorithm techniques.

Бесплатно

Cluster based routing protocols for IOT application

Cluster based routing protocols for IOT application

Anna Merine George, S.Y. Kulkarni, Vice Chancellor

Статья научная

Extending the battery lifetime and reducing the power consumption using ultra low power sensor nodes and energy harvesting systems is essential to realize 50 billion IOT devices. Development of efficient routing algorithm is a critical aspect for reducing energy consumption and enhancing network lifetime. Clustering is a key technique used to enhance network lifetime. The lifetime of a wireless sensor network for Daylight Artificial Light Integrated Scheme is enhanced using Self Organizing Map (SOM) based clustering algorithm. A simulation of cluster based routing protocols like LEACH (Low Energy Adaptive Clustering Hierarchy), Fuzzy based LEACH and ANFIS based LEACH is also carried out using MATLAB software.

Бесплатно

Clustering Method of Mobile Cloud Computing According to Technical Characteristics of Cloudlets

Clustering Method of Mobile Cloud Computing According to Technical Characteristics of Cloudlets

Rashid G. Alakberov

Статья научная

The rapid increase in the number of mobile phones and IoT devices connected to the network reduces the bandwidth of the Internet communication channel, and as a result, delays occur in the delivery of data processed in remote clouds. Edge computing systems (cloudlet, fog computing, etc.) are used to eliminate resource shortages, energy consumption, and communication channel delays in mobile devices. Edge computing systems place processing devices (computers) close to users. Cloudlet-based mobile cloud computing is widely used to reduce delays in communication channels and energy consumption in mobile devices. Selection of the most suitable cloudlet allowing users to run applications fast in cloud is still a considerable problem. This paper proposes a strategy for the selection of high-performance cloudlets providing fast solutions, considering the complexity of application (file type). It offers a method for cloudlet selection out of large number of cloudlets with different technical capabilities providing faster processing of user application. The timing of user applications in cloudlets with different technical capabilities (operating frequency, number of cores, volume of RAM, etc.) also varies. The proposed method provides faster solution for the user application. User applications are grouped by type of application, and a set of cloudlets are clustered by the number of groups. Clustering is performed first by the parameters corresponding to the operating frequency of the cloudlets, then by the number of cores and the volume of RAM. The proposed method reduces energy consumption of mobile devices by providing faster processing of applications. Thus, the proposed strategy provides an energy consumption reduction on mobile devices, faster processing of results and decrease of network delays.

Бесплатно

Журнал