Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1130

Cyber attacks in cloud computing: modelling multi-stage attacks using probability density curves

Cyber attacks in cloud computing: modelling multi-stage attacks using probability density curves

Aaron Zimba, Victoria Chama

Статья научная

Cyber attacks in cloud computing more often than not tend to exploit vulnerabilities and weaknesses found in the underlying structural components of the cloud. Such vulnerabilities and weaknesses have drawn interest from various attack profiles ranging from script kiddies to APTs. Regardless of the attack profile, cyber attackers have come to leverage the interdependencies exhibited amongst these vulnerabilities by chaining exploits together to effectuate complex interlinked attack paths. Such chaining of vulnerabilities in cloud components results in multi-stage attacks where the attacker traverses different segments of the cloud residing in different layers to reach the target. In this paper, we partition the cloud into three different layers to show how multi-stage attacks on Confidentiality, Integrity and Availability (CIA) interleave with the SaaS, PaaS and IaaS cloud computing service models. Further, we generate multi-stage attack paths based on the vulnerabilities exhibited in the components across the partitioned cloud layers. Furthermore, we model the constituents of multi-stage attack events as discrete random Bernoulli variables to characterize the attack path pursued by a given attack profile. We generate probability density curves of the associated resultant attack paths to infer on the nature of the attack and recommend a hierarchical security mitigation process based on the nature of the attack nodes.

Бесплатно

Cyber security and analysis of cyber-crime laws to restrict cyber crime in Pakistan

Cyber security and analysis of cyber-crime laws to restrict cyber crime in Pakistan

Qamar Atta Ul Haq

Статья научная

This research report analyses the plebeian interest and tension hostility between privacy and cyber security in Pakistan. I explore the areas threaten by hackers in means of ATM card hacks and social data sniffing. It explores the challenges for Cyber security belongs to privacy and data protection.

Бесплатно

D2D Communication Using Distributive Deep Learning with Coot Bird Optimization Algorithm

D2D Communication Using Distributive Deep Learning with Coot Bird Optimization Algorithm

Nethravathi H.M., Akhila S., Vinayakumar Ravi

Статья научная

D2D (Device-to-device) communication has a major role in communication technology with resource and power allocation being a major attribute of the network. The existing method for D2D communication has several problems like slow convergence, low accuracy, etc. To overcome these, a D2D communication using distributed deep learning with a coot bird optimization algorithm has been proposed. In this work, D2D communication is combined with the Coot Bird Optimization algorithm to enhance the performance of distributed deep learning. Reducing the interference of eNB with the use of deep learning can achieve near-optimal throughput. Distributed deep learning trains the devices as a group and it works independently to reduce the training time of the devices. This model confirms the independent resource allocation with optimized power value and the least Bit Error Rate for D2D communication while sustaining the quality of services. The model is finally trained and tested successfully and is found to work for power allocation with an accuracy of 99.34%, giving the best fitness of 80%, the worst fitness value of 46%, mean value of 6.76 and 0.55 STD value showing better performance compared to the existing works.

Бесплатно

DAPSK – OFDMA PON Based Heterogeneous Optical Network

DAPSK – OFDMA PON Based Heterogeneous Optical Network

Priyadharshini R., Geetha G.

Статья научная

The broadband access networks require suitable differential modulation techniques that can provide better performance in real-time fading channels. A heterogeneous optical access network adopting spectrally efficient DAPSK – Orthogonal Frequency Division Multiple (OFDMA) - Passive Optical Network (PON) is proposed and simulated. The performance of the proposed heterogeneous network is analyzed in terms of received Bit Error Rate (BER) and spectral efficiency. The results show that 64 DAPSK – OFDMA over the proposed architecture achieves a better spectral efficiency of about 1.062 bps/Hz than 64 QAM – OFDMA with less degradation in error performance.

Бесплатно

DDoS Attacks Detection in the Application Layer Using Three Level Machine Learning Classification Architecture

DDoS Attacks Detection in the Application Layer Using Three Level Machine Learning Classification Architecture

Bassam M. Kanber, Naglaa F. Noaman, Amr M. H. Saeed, Mansoor Malas

Статья научная

Distributed Denial of Service (DDoS) is an ever-changing type of attack in cybersecurity, especially with the growing demand for cloud and web services raising a never-ending challenge in the lucrative business. DDoS attacks disrupt users' access to the targeted online services leading to significant business loss. This article presents a three-level architecture for detecting DDoS attacks at the application layer. The first level is responsible for selecting the best features of the samples and classifying the traffic into either benign or malicious, then the second level consists of a hard voting classifier to identify the type of the DDoS source: UDP, TCP, or Mixed-based. Finally, the last level aligns the attack to the appropriate DDoS type. This approach is validated using the CIC-DDoS2019 dataset, and the time, accuracy score, and precision are used as the model performance metrics. Compared to the existing machine learning (ML) approaches, the proposed architecture reveals substantial improvements in both binary and multiclass classification of application-layer DDoS attacks.

Бесплатно

DNA-Genetic Encryption Technique

DNA-Genetic Encryption Technique

Hamdy M. Mousa

Статья научная

In this paper, we propose DNA-Genetic Encryption Technique (D-GET) in order to make the technique more secure and less predictable. In this technique, binaries any type of digital data and convert it to DNA sequencing, reshape, encrypt, crossover, mutate and then reshape. The main stages of D-GET are repeated three times or more. Transmit the encrypted data in text/image format file. In other side, the receiver uses the D-GET to decrypt the received data and reshape it to original format. This Technique also transforms the text into an image and vice versa to improve security and multiple key sequences to increase the degree of diffusion and confusion, which makes resulting cipher data difficult to decipher and makes to realize a perfect secrecy system. Experimental results demonstrate that proposed technique has multilayer protection stages against different attacks and higher level of security based on the multi-stages and genetic operations. Decrypted data are acceptable because of there is absolutely difference between it and secret data.

Бесплатно

DNS Pharming through PHP Injection: Attack Scenario and Investigation

DNS Pharming through PHP Injection: Attack Scenario and Investigation

Divya Rishi Sahu, Deepak Singh Tomar

Статья научная

With the increase in technology, Internet has provided set of tools and technologies which has enabled web programmers to develop effective websites. PHP is most widely used server side scripting language and more than twenty million of web sites are designed through PHP. It has used as a core script in Web Content Management System (WCMS), such as Joomla, WordPress, Drupal, SilverStripe etc. PHP has also security flaws due to the certain vulnerabilities such as PHP injection, remote file inclusion and unauthorized file creation. PHP injection is a variant of code injection attacks in which PHP script may be exploited to execute remote commands. The contribution of this paper is twofold: First, it presents a unifying view of PHP injection vulnerability, which causes alteration in the 'hosts file'; Second, It introduces an investigation process against alteration in 'hosts file' through PHP injection. This attack has been introduced as a type of DNS pharming. In this investigation process a chain of evidence has been created and an algebraic signature has been developed to detect explained attack.

Бесплатно

Data Sharing for Context-Sensitive Access Control Policy Evaluation and Enforcement

Data Sharing for Context-Sensitive Access Control Policy Evaluation and Enforcement

Hassan Rasheed

Статья научная

Context-awareness has long been an important building block in designing systems that vary their operating behavior based on an analysis of rapidly changing operating conditions. There is the need however to define context more formally so that context data-sharing can take place between systems and more complex interactions between connected systems can be developed. The area of computer security is examined in particular as an area where the representation and sharing of context data can lead to more effective policy enforcement. A framework is proposed for sharing data between assessment sensors and enforcement mechanisms in order to facilitate more accurate policy enforcement. A detailed performance analysis of the proposed system is offered along with conclusions on the feasibility of such systems.

Бесплатно

Data Traffic Modeling During Global Cyberattacks

Data Traffic Modeling During Global Cyberattacks

Volodymyr Mosorov, Andrzej Kosowski, Roman Kolodiy, Zenoviy Kharkhalis

Статья научная

The article analyses the possibilities and techniques of modeling global cyber-attacks on an internetwork of small countries. The authors study the Distributed Denial of Service (DDoS) attack against Estonian internetwork, which took place in 2007, in an open-source Nessi2 simulator environment, as DDoS appears to be the most common type of informational attack on resources used todeay. Such a modeling can be replicated with a certain degree of accuracy because the most of powerful attacks have been relatively well-documented. The article covers the most lifelike attack scenarios accomplished by sophisticated modeling of underlying traffic cases. Conclusions drawn from the simulation show that even large-scale DDoS attacks can be successfully modeled using limited resources only. Future research directions, motivated by the research, underlying this article, are highlighted at the end.

Бесплатно

Data mining based framework for effective intrusion detection using hybrid feature selection approach

Data mining based framework for effective intrusion detection using hybrid feature selection approach

B.A. Manjunatha, Prasanta Gogoi, M. T. Akkalappa

Статья научная

Building strong IDS is essential in today’s network traffic environment, feature reduction is one approach in constructing the effective IDS system by selecting the most relevant features in detecting most known and unknown attacks. In this work, proposing the hybrid feature selection method by combining Mutual Information and Linear Correlation Coefficient techniques (MI-LCC) in producing the most efficient and optimized feature subset. Support Vector Machine (SVM) classification technique being used in accurately classifying the traffic data into normal and malicious records. The proposed framework shall be evaluated with the standard benchmarked datasets including KDD-Cup-99, NSL-KDD, and UNSW-NB15 datasets. The test results, comparison analysis and reference graphs shows that the proposed feature selection model produces optimized and most important features set for classifier to achieve stated accuracy and less false positive rate compared with other similar techniques.

Бесплатно

Day-ahead Pricing Model for Smart Cloud using Time Dependent Pricing

Day-ahead Pricing Model for Smart Cloud using Time Dependent Pricing

Chetan Chawla, Inderveer Chana

Статья научная

Smart clouds allow every consumer and cloud service provider a two-way communication, thus enabling cloud service provider to generate a time dependent pricing model using a feedback loop. This model charges a consumer more in peak periods and less during off peak periods, which encourages consumers to reschedule their workload to less traffic (off-peak) periods. This helps service providers to practice a versatile pricing technique to increase their profits by covering off-peak demand and minimizing the provider's cost optimization problem. It also minimizes the execution time in setting these prices by Compromised Cost-Time Based (CCTB) scheduling. Shifting workload is a probabilistic function which tells consumers to shift their workload. This paper presents a model to calculate day-ahead prices. The proposed model dynamically adjusts the rewards or discounts based on consumer behavior in the past, and helps providers to maximize their revenue by shifting the consumers' workload.

Бесплатно

Deep Learning-based Resource Prediction and Mutated Leader Algorithm Enabled Load Balancing in Fog Computing

Deep Learning-based Resource Prediction and Mutated Leader Algorithm Enabled Load Balancing in Fog Computing

Shruthi G., Monica R. Mundada, S. Supreeth, Bryan Gardiner

Статья научная

Load balancing plays a major part in improving the performance of fog computing, which has become a requirement in fog layer for distributing all workload in equal manner amongst the current Virtual machines (VMs) in a segment. The distribution of load is a complicated process as it consists of numerous users in fog computing environment. Hence, an effectual technique called Mutated Leader Algorithm (MLA) is proposed for balancing load in fogging environment. Firstly, fog computing is initialized with fog layer, cloud layer and end user layer. Then, task is submitted from end user under fog layer with cluster of nodes. Afterwards, load balancing process is done in each cluster and the resources for each VM are predicted using Deep Residual Network (DRN). The load balancing is accomplished by allocating and reallocating the task from the users to the VMs in the cloud based on the resource constraints optimally using MLA. Here, the load balancing is needed for optimizing resources and objectives. Lastly, if VMs are overloaded and then the jobs are pulled from associated VM and allocated to under loaded VM. Thus the proposed MLA achieved minimum execution time is 1.472ns, cost is $69.448 and load is 0.0003% respectively.

Бесплатно

Deep learning approach on network intrusion detection system using NSL-KDD dataset

Deep learning approach on network intrusion detection system using NSL-KDD dataset

Sandeep Gurung, Mirnal Kanti Ghose, Aroj Subedi

Статья научная

The network infrastructure of any organization is always under constant threat to a variety of attacks; namely, break-ins, security breach or system misuse. The Network Intrusion Detection System (NIDS) employed in a network detects such penetration attacks and intrusions within a network. Known classes of attacks can be detected easily by performing pattern matching while the unknown attacks are harder to detect. An attempt has been made to design a system using a deep learning approach for intrusion detection that not only learns but also adjusts itself to the patterns not defined earlier. Sparse auto-encoder has been used for unsupervised feature learning. Logistic classifier is then utilized for classification on NSL-KDD dataset. The performance of the system has been measured with respect to accuracy, precision and recall and the results have been found to be very promising for future use and modifications.

Бесплатно

Defending of IP Spoofing by Ingress Filter in Extended-Inter Domain Packet Key Marking System

Defending of IP Spoofing by Ingress Filter in Extended-Inter Domain Packet Key Marking System

G.Velmayil, S.Pannirselvam

Статья научная

The significance of the DDoS problem and the increased occurrence and strength of attacks has led to the dawn of numerous prevention mechanisms. IP spoofing is most frequently used in denial-of-service attacks. In such attacks, the goal is to flood the victim with overwhelming amounts of traffic, and the attacker does not care about receiving responses to the attack packets. IP spoofing is one of the basic weaknesses in the Internet Protocol to launch the DDOS attack. Each prevention mechanism has some unique advantages and disadvantages over the others. The existing methods become ineffective due to a large number of filters required and they lack in information about where to place the filter. We propose Ingress filter in Extended Inter Domain Packet Key marking system .This paper comprises of two functional blocks namely, Key marking system and filtering blocks. In the marking block, each source is labeled with a key. The key is changed continuously for a certain period of time to provide secured system and is validated at border routers. In the filtering block, spoofed packets are filtered at the border router using Ingress filter to filter beyond periphery routers. The filter placement algorithm clearly put forwards the conditions under which the filter can operate accurately. The accuracy of the proposed systems is validated using Network Simulator (NS-2).

Бесплатно

Delay Tolerant Networks: An Analysis of Routing Protocols with ONE Simulator

Delay Tolerant Networks: An Analysis of Routing Protocols with ONE Simulator

Richa Thakur, K.L. Bansal

Статья научная

Delay/disruption Tolerant Networks (DTNs) provide connectivity in those networks which lack continuous connectivity or considerable delays like that of terrestrial mobile networks, military ad-hoc networks, sensor or planned network in space. They lack in an end-to-end path between Source and Destination resulting in long variable propagation delays. The Internet Protocols do not operate properly in these networks, thus raising a variety of new challenging problems in this area. The DTN effectively improves the network communications where the connectivity in the network is intermittent or is prone to disruptions. Routing in DTNs is challenging because of long and frequent time durations of non-connectivity. There are several routing approaches that have been proposed with strategies ranging from flooding to forwarding approaches. In this paper these protocols are analyzed based on the quantitative data gathered by simulating each protocol in ONE simulator environment. The performance is discussed and compared for different routing protocols and results are discussed for different performance metrics.

Бесплатно

Delay-sensitive Quality of Service Routing with Integrated Admission Control for Wireless Mesh Network

Delay-sensitive Quality of Service Routing with Integrated Admission Control for Wireless Mesh Network

Satish S. Bhojannawar, Shrinivas R. Managalwede, Carlos F. Cruzado

Статья научная

Wireless mesh networks (WMNs) extend and improve broadband Internet connectivity for the end-users roaming around the edges of the wired network. Amid the explosive escalation of users sharing multimedia content over the Internet, the WMNs need to support the effective implementation of various multimedia applications. The multimedia applications require assured quality of service (QoS) to fulfill the user requirements. The QoS routing in WMNs needs to guarantee the QoS requirements of multimedia applications. Admission control (AC) is the primary traffic control mechanism used to provide QoS provisioning. AC admits a new flow only if the QoS requirements of already admitted flows are not violated, even after the admission of a new flow. We propose a new QoS routing protocol integrated with AC called Delay-Sensitive QoS Routing with integrated Admission Control (DSQRAC) to control the admission of delay-sensitive flows. A delay-aware cross-layer routing metric is used to find the feasible path. DSQRAC is implemented using ad-hoc on-demand distance vector (AODV) routing protocol, where a delay-sensitive controlled flooding mechanism is used to forward the route request packets. In the proposed work, we adjust/reassign the channels to aid the QoS routing to increase the likelihood of accepting a new flow. The simulation results show that the performance of the proposed QoS routing protocol is better than the existing schemes.

Бесплатно

Deliberate Secure Grid Computing Blueprint Design in Indian Context

Deliberate Secure Grid Computing Blueprint Design in Indian Context

Sanjeev Puri, Harsh Dev

Статья научная

The novel concept of grid computing, clusters of computational power is constructed from a network of many small and widespread different computers servers or workstations into a single resource. We now proceed to translate the grid security problem into specific grid security requirements. The purpose of Grid technologies is to support the secure sharing and scalable coordinated use of diverse resources in dynamic, distributed VOs. We propose a secure blueprint design for grid systems that addresses requirements for single sign-on, interoperability with local policies of any grid city of India, with dynamically varying resource demands.

Бесплатно

Delivering a Secured Cloud Computing Architecture and Traditional IT Outsourcing Environment via Penetration Tools in Ghana

Delivering a Secured Cloud Computing Architecture and Traditional IT Outsourcing Environment via Penetration Tools in Ghana

Umar Sayibu, Frimpong Twum, Issah Baako

Статья научная

The decision to use either Cloud Computing (CC) applications or Traditional Information Technology Outsourcing (Traditional ITO) environments is a function of the security evaluations of these two options. Hackers are constantly nosing around websites and other computer networks for compromised computers that have some vulnerabilities to exploit them. Vulnerabilities in cloud computing and Traditional ITO environments are leading causes of recent data breaches. These breaches provide opportunities to hackers to attack and gain access to customer information such as credit cards and contact information, passwords, sending of malicious codes to website users or making users computer potential candidates of botnets and to hijack the sessions of authentic users to make unapproved purchases on their behalf. In this paper, security penetration tools have been employed to evaluate the security vulnerabilities of cloud-based solutions and Traditional ITO to discover possible vulnerabilities, their causes and mitigation strategies to securing web applications from the discovered vulnerabilities. Some web applications and a Traditional ITO network were ethically hacked to discover vulnerabilities in them. Analyses of the results obtained through the ZAP scan flagged Remote File Inclusion (RFI) alert were high priority alert. In all, RFI constitutes the most serious potential threat and it needs the fullest attention of CC service providers. Nmap disclosed opened ports in Traditional ITO Virtual Private Network which can make the server of the provider accessible to hackers leading to a considerable disclosure of information to unauthorized users.

Бесплатно

Design and Application of A New Hybrid Heuristic Algorithm for Flow Shop Scheduling

Design and Application of A New Hybrid Heuristic Algorithm for Flow Shop Scheduling

Fang Wang, Yun-qing Rao, Fang Wang, Yu Hou

Статья научная

A new heuristic algorithm was designed by combining with Johnson method, NEH method and characteristics of scheduling, and it was implemented on MATLAB. The efficiency of the new algorithm was tested through eight Car questions and two Hel questions of Benchmark problems, and the results revealed that the new heuristic algorithm was better than the other three heuristic algorithms. Further more; the application of this heuristic algorithm in the intelligent algorithm especially in the genetic algorithms (GA) was discussed. Two GAs were designed for Flow Shop question, and they had the same processes and the same parameters. The only difference is in the production of the initial population. One GA’s initial population is optimized by the new heuristic algorithm, and the other whose initial population is randomly generated entirely. Finally, through the test of eight Car questions, it is demonstrated that the heuristic algorithm can indeed improve efficiency and quality of genetic algorithm because the heuristic algorithm can improve the initial population of GA.

Бесплатно

Design and Development of Biometrics Secure Person Detection System for E-Passport using Cryptographic Security Protocols

Design and Development of Biometrics Secure Person Detection System for E-Passport using Cryptographic Security Protocols

V.K. Narendira Kumar, B. Srinivasan

Статья научная

The biometric passports are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. This IC chip is integrated into the cover of a passport, called a biometric passport. Biometric Passports have been introduced in many countries to improve the security in Inspection Systems and enhance procedures and systems that prevent identity and passport fraud. The electronic passport is the privacy and security risks that arise by embedding with biometric technology. The goal of the adoption of the biometric passport is not only to expedite processing at border crossings, but also to increase security. Policymakers have put their faith in the technological promise of biometric identification because absolute identification could eliminate mismatched computer records and stolen identities.

Бесплатно

Журнал