Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1110

Enhancement of Capacity, Detectability and Distortion of BMP, GIF and JPEG images with Distributed Steganography

Enhancement of Capacity, Detectability and Distortion of BMP, GIF and JPEG images with Distributed Steganography

Istteffanny I. Araujo, Hassan Kazemian

Статья научная

The advance of Big Data and Internet growth has driven the need for more abundant storage to hold and share data. People are sending more messages to one another and paying attention to the aspects of privacy and security as opposed to previous decades. One of the types of files that are widely shared and instantaneous available over the web are images. They can become available as soon as a shot is taken and keep this closely related to the owner; it is not easy. It has been proposed here to use Steganography to embed information of the author, image description, license of usage and any other secrete information related to it. Thinking of this, an analysis of the best file types, considering capacity, detectability, and distortion was necessary to determine the best solution to tackle current algorithm weaknesses. The performance of BMP, GIF, and JPEG initialises the process of addressing current weaknesses of Steganographic algorithms. The main weaknesses are capacity, detectability and distortion to secure copyright images. Distributed Steganography technique also plays a crucial part in this experiment. It enhances all the file formats analysed. It provided better capacity and less detectability and distortion, especially with BMP. BMP has found to be the better image file format. The unique combination of Distributed Steganography and the use of the best file format approach to address the weaknesses of previous algorithms, especially increasing the capacity. It will undoubtedly be beneficial for the day to day user of social media image creators and artists looking to protect their work with copyright.

Бесплатно

Enhancement of Security and Privacy in Biometric Passport Inspection System Using Face, Fingerprint, and Iris Recognition

Enhancement of Security and Privacy in Biometric Passport Inspection System Using Face, Fingerprint, and Iris Recognition

V.K. NARENDIRA KUMAR, B. SRINIVASAN

Статья научная

The biometric passports are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. Biometric Passports have been introduced in many countries to improve the security in Inspection Systems and enhance procedures and systems that prevent identity and passport fraud. The deployment of biometric technologies, countries need to test and evaluate its systems since the International Civil Aviation Organization (ICAO) provides the guidelines, but the implementation is up to each issuing country. The paper also provides a cryptographic security analysis of the e-passport using face fingerprint, and iris biometric that are intended to provide improved security in protecting biometric information of the e-passport bearer.

Бесплатно

Enhancing Data Security and Access Control in Cloud Environment using Modified Attribute Based Encryption Mechanism

Enhancing Data Security and Access Control in Cloud Environment using Modified Attribute Based Encryption Mechanism

Apurva R. Naik, Lalit B. Damahe

Статья научная

Social networking and growing popularity of cloud services have made everyone to communicate each other in an easiest way. File sharing and distribution are the frequently used services provided by cloud service providers, although these facilities reduce cost of data sharing but at the same time data security and access control is the major problem. Many renowned service providers have faced the challenges to secure data and provide better access control, and we know once the data is leaked we cannot recover the data loss. Thus in order to ensure better security we need for focus on the two major problems, and those are access control and encryption policy. Cipher text policy attribute based encryption is the most effective solution for access control in real time scenarios where owner can actually decide the access rights for the end-user, but it comes with key escrow problem. We are proposing our modified escrow-free key issuing protocol to solve the problem of key escrow and our Modified Attribute Based Encryption scheme to achieve all security requirements to get a robust and secure system. Further we evaluate our model on the basis of results and lastly we conclude the paper.

Бесплатно

Enhancing Hash Function Selection Techniques Based on Message Contents

Enhancing Hash Function Selection Techniques Based on Message Contents

Ali Saeed, Muhammad Khalil Shahid

Статья научная

In Hash based Security systems two major factors that are mostly relied upon are Strong Hash function and the selection procedure of the hash function from a given pool. This paper aims at exploiting maximum available resources a message possesses, intrinsically, that can accommodate greater number of hash functions references. It provides a simple, low cost- easy to implement technique that will be able to make systems available with random hash functions’ selection ability. With the given technique the security level will be enhanced along with greater availability of hash functions. The truly variable nature of contents of messages can be exploited in order to secure messages beyond measure. In case of a single communication stint, if one hash function is compromised the next hash function for next block will be selected truly randomly and cannot be predicted. A summary of already in use techniques is also discussed in order to prove the proposition distinct and practicable. In proposed technique it is proven that it has ability to accommodate greater number of hash functions. Further, the hash function selection methodology has been provisioned with a technique to be message-dependent; the security cannot be compromised owing to truly randomness of the selection procedure.

Бесплатно

Enhancing QoS Through Dynamic and Fare AP Selection in a Wireless LAN

Enhancing QoS Through Dynamic and Fare AP Selection in a Wireless LAN

Fakhar Uddin Ahmed, Shikhar Kumar Sarma

Статья научная

The IEEE 802.11 WLAN is primarily used for web browsing which belongs to the category of non-real time application. But the demand of real time applications like VOIP and video conferencing has become very much common to such WLAN. With IEEE 802.11e Mac protocol it is possible to improve the QoS for both real and non-real time traffic by service differentiation. To ensure efficient utilization of the radio resources and enhanced QoS the load imbalance should be resolved among APs from different BSSs. In large scale WLAN inter AP communication mechanism can be employed along side the current admission controller under EDCA. Beside service differentiation inter AP differentiation based QoS management can lead to efficient utilization of radio resources by moving STAs from heavily laded to a less loaded AP and ensure better QoS for all types of traffics. In this paper we propose a dynamic and fair AP selection mechanism to improve the QoS in a WLAN. The simulations have been carried out with NSv2.34.

Бесплатно

Enhancing Quality of Service in Heterogeneous Wireless Network using EDLAS

Enhancing Quality of Service in Heterogeneous Wireless Network using EDLAS

Divya, Suman

Статья научная

The transmission through different interfaces of the different wireless network is a challenging issue. This paper presents an enhanced dynamic link aggregation scheme (EDLAS), an enhanced technique for the transmission of data through different interfaces present in different wireless networks. The proposed technique uses the existing sequential and parallel DLAS technique by using the fuzzy. The fuzzy system decides whether to transfer data by using sequential or the parallel DLAS depending upon the number of the chunks, user mobility, the number of users, chunk size. The work is implemented using the MATLAB. The simulation results generated using the MATLAB shows the effectiveness of the technique with increased throughput with same residual battery power.

Бесплатно

Enhancing Software Reliability against Soft-Error using Minimum Redundancy on Critical Data

Enhancing Software Reliability against Soft-Error using Minimum Redundancy on Critical Data

Saeid A. Keshtgar, Bahman B. Arasteh

Статья научная

Nowadays, software systems play remarkable roles in human life and software has become an indispensable aspect of modern society. Hence, regarding the high significance of software, establishing and maintaining software reliability is considered to be an essential issue so that error occurrence, failure and disaster can be prevented. Thus, the magnitude of errors in a program should be detected and identified and software reliability should be measured and investigated so as to prevent the spread of error. In line with this purpose, different methods have been proposed in the literature on software reliability; however, the majority of the proposed methods are inefficient and undesirable due to their high overhead, vulnerability, excessive redundancy and high data replication. The method introduced in this paper identifies vulnerable data of the program and uses class diagram and the proposed formula. Also, by applying minimum redundancy and duplication on 70% of the critical data of the program, the proposed method protects the program data. The evaluation of the operation of the propose method on program indicated that it can improve reliability, reduce efficiency overhead, redundancy and complexity.

Бесплатно

Enhancing the Capacity of Stratospheric Cellular Networks Using Adaptive Array Techniques

Enhancing the Capacity of Stratospheric Cellular Networks Using Adaptive Array Techniques

Sultan Aljahdali

Статья научная

In this paper, the capacity of stratospheric cellular communications is improved by optimizing the amplitude feeding of the concentric rings array (CRA). The weighting profile of this array is chosen to be a cosine function raised to some power to control the beam pattern used in the cellular coverage. The power of this function is optimized to reduce the resulted sidelobe levels which increase the carrier-to-interference ratio (CIR) within the cells. It is found that increasing the power of the cosine function will reduce the sidelobe levels especially at lower number of elements in the innermost ring with a minor increase in beamwidth. For an innermost ring of 3 elements in a 10 rings CRA, a sidelobe level of 45 dB can be obtained below the mainlobe level. The simulation results show that a CIR of up to 38dB can be achieved and a minimum of 28dB at the cell borders is guaranteed with a 0.95 coverage ratio.

Бесплатно

Enhancing the Discrete Particle Swarm Optimization based Workflow Grid Scheduling using Hierarchical Structure

Enhancing the Discrete Particle Swarm Optimization based Workflow Grid Scheduling using Hierarchical Structure

Ritu Garg, Awadhesh Kumar Singh

Статья научная

The problem of scheduling dependent tasks (DAG) is an important version of scheduling, to efficiently exploit the computational capabilities of grid systems. The problem of scheduling tasks of a graph onto a set of different machines is an NP Complete problem. As a result, a number of heuristic and meta-heuristic approaches are used over the years due to their ability of providing high quality solutions with reasonable computation time. Discrete Particle Swarm Optimization is one such meta-heuristic used for solving the discrete problem of grid scheduling, but this method converge to sub optimal solutions due to premature convergence. To deal with premature convergence, in this paper we proposed the design and implementation of hierarchical discrete particle swarm optimization (H-DPSO) for dependent task scheduling in grid environment. In H-DPSO particles are arranged in dynamic hierarchy where good particles lying above in hierarchy are having larger influence on the swarm. We consider the bi-objective version of problem to minimize makespan and total cost simultaneously as the optimization criteria. The H-DPSO based scheduler was evaluated under different application task graphs. Simulation analysis manifests that H-DPSO based scheduling is highly viable and effective approach for grid computing.

Бесплатно

Enhancing the QoS of IoT networks with lightweight security protocol using Contiki OS

Enhancing the QoS of IoT networks with lightweight security protocol using Contiki OS

Haytham Qushtom, Khalid Rabaya’h

Статья научная

The Internet of Things (IoT) is advancing to prevail the application of the Internet, with the vision to connect everything around us. The deployment of IoT is advancing at a very fast pace, and relying on modified versions of the TCP/IP protocol suits. This rapid growth of the field is leaving a number of critical issues unresolved. Among the most critical issues are the quality of service and security of the delivered data. This research is set to tackle these issues through proposing a data delivery scheme that improves the quality of service (QoS) of classified data. The proposed solution relies on differentiating the priority of the delivered data, and to give preferences to secured and user-defined high priority traffic. The proposed solution denoted as Secured Traffic Priority Differentiation (STPD), is made to support any application, and is implemented at the Medium Access Control (MAC) sub layer. The proposed solution was tested in a virtual environment that simulates real scenarios using the Contiki operating system, using the Cooja simulator. The simulation results demonstrated a significant improvement of the proposed solution over the Carrier Sense Multiple Access Collision Avoidance, (CSMA/CA), by at 20%. The proposed solution worked to improve the channel utilization, data reliability, decreased latency of high priority traffic, and low priority traffic as well.

Бесплатно

Enhancing the Security in Cryptosystems Based on Magic Rectangle

Enhancing the Security in Cryptosystems Based on Magic Rectangle

Mani. K, Viswambari. M

Статья научная

The security of any cryptosystems is based on the way in which it produces different ciphertext for the same plaintext. Normally, various block cipher modes viz., CBC, OFC, etc., are used in producing different ciphertext for the same plaintext but it is a time consuming process. Instead of using block cipher, a different encoding method for the plaintext is proposed in this paper using magic rectangle. The advantage of using the encoding scheme is different numerals is used in encoding each characters of a plaintext. Thus instead of considering the ASCII encoding for a character to be encrypted, the numeral which occurs at the position which corresponds to the ASCII value of the character is taken from the magic rectangle. Further, different numerals from magic rectangles for the same character are produced by considering the magic sum, starting number and template of magic rectangle. Once the magic rectangles are created, the numerals which occur in the magic rectangles are considered for the encoding of the plaintext character which is then used for encryption in the cryptosystems like RSA, ElGamal. The proposed work provides an additional layer of security to any public key cryptosystems. As this model is acting as a wrapper to any public key cryptosystems, it ensures enhanced security. The proposed methodology is implemented with different processors 1, 2, 4, 8 and 16 in a simulated environment using Maui scheduler which employs back filling philosophy.

Бесплатно

Ensem_SLDR: Classification of Cybercrime using Ensemble Learning Technique

Ensem_SLDR: Classification of Cybercrime using Ensemble Learning Technique

Hemakshi Pandey, Riya Goyal, Deepali Virmani, Charu Gupta

Статья научная

With the advancement of technology, cybercrimes are surging at an alarming rate as miscreants pour into the world's modern reliance on the virtual platform. Due to the accumulation of an enormous quantity of cybercrime data, there is huge potential to analyze and segregate the data with the help of Machine Learning. The focus of this research is to construct a model, Ensem_SLDR which can predict the relevant sections of IT Act 2000 from the compliant text/subjects with the aid of Natural Language Processing, Machine Learning, and Ensemble Learning methods. The objective of this paper is to implement a robust technique to categorize cybercrime into two sections, 66 and 67 of IT Act 2000 with high precision using ensemble learning technique. In the proposed methodology, Bag of Words approach is applied for performing feature engineering where these features are given as input to the hybrid model Ensem_SLDR. The proposed model is implemented with the help of model stacking, comprising Support Vector Machine (SVM), Logistic Regression, Decision Tree, and Random Forest and gave better performance by having 96.55 % accuracy, which is higher and reliable than the past models implemented using a single learning algorithm and some of the existing hybrid models. Ensemble learning techniques enhance model performance and robustness. This research is beneficial for cyber-crime cells in India, which have a repository of detailed information on cybercrime including complaints and investigations. Hence, there is a need for model and automation systems empowered by artificial intelligence technologies for the analysis of cybercrime and their classification of its sections.

Бесплатно

Ensemble Learning Approach for Classification of Network Intrusion Detection in IoT Environment

Ensemble Learning Approach for Classification of Network Intrusion Detection in IoT Environment

Priya R. Maidamwar, Prasad P. Lokulwar, Kailash Kumar

Статья научная

Over the last two years,the number of cyberattacks has grown significantly, paralleling the emergence of new attack types as intruder’s skill sets have improved. It is possible to attack other devices on a botnet and launch a man-in-the-middle attack with an IOT device that is present in the home network. As time passes, an ever-increasing number of devices are added to a network. Such devices will be destroyed completely if one or both of them are disconnected from a network. Detection of intrusions in a network becomes more difficult because of this. In most cases, manual detection and intervention is ineffective or impossible. Consequently, it's vital that numerous types of network threats can be better identified with less computational complexity and time spent on processing. Numerous studies have already taken place, and specific attacks are being examined. In order to quickly detect an attack, an IDS uses a well-trained classification model. In this study, multi-layer perceptron classifier along with random forest is used to examine the accuracy, precision, recall and f-score of IDS. IoT environment-based intrusion related benchmark datasets UNSWNB-15 and N_BaIoT are utilized in the experiment. Both of these datasets are relatively newer than other datasets, which represents the latest attack. Additionally, ensembles of different tree sizes and grid search algorithms are employed to determine the best classifier learning parameters. The research experiment's outcomes demonstrate the effectiveness of the IDS model using random forest over the multi-layer perceptron neural network model since it outperforms comparable ensembles analyzed in the literature in terms of K-fold cross validation techniques.

Бесплатно

Ensemble feature selection and classification of internet traffic using XGBoost classifier

Ensemble feature selection and classification of internet traffic using XGBoost classifier

N. Manju, B. S. Harish, V. Prajwal

Статья научная

Identification and classification of internet traffic is most important in network management to ensure Quality of Service (QoS). However, existing machine learning models tend to produce unsatisfactory results when applied with imbalanced datasets involving multiple classes. There are two reasons for this: the models have a bias towards classes which have more samples and they also tend to predict only the majority class data as features of the minority class are often treated as noise and therefore ignored. Thus, there is a high probability of misclassification of the minority class compared with the majority class. Therefore, in this paper, we are proposing an ensemble feature selection based on the tree approach and ensemble classification model using XGboost to enhance the performance of classification. The proposed model achieves better classification accuracy compared to other tree based classifiers.

Бесплатно

Ensure symmetrical traffic flow, to prevent the dropping of response packet by the firewall, on the active-active data centers

Ensure symmetrical traffic flow, to prevent the dropping of response packet by the firewall, on the active-active data centers

Irwan Piesessa, Benfano Soewito

Статья научная

This paper illustrates the problem in the Active-Active Data Centers of an organization, where response traffic from the destination server is dropped by the firewall because the initial traffic from the client departs from another firewall in different Data Center (asymmetric traffic). This problem can be solved by two proposed solutions, namely the implementation of the BGP Community attributes and OSPF over GRE tunnel. The case study also compares both proposed solutions in terms of recovery time, packet loss, ICMP response time and TCP three-way handshake time for HTTP connection.

Бесплатно

Error Detection & Correction in Wireless Sensor Networks By Using Residue Number Systems

Error Detection & Correction in Wireless Sensor Networks By Using Residue Number Systems

M. Roshanzadeh, S. Saqaeeyan

Статья научная

Wireless Sensor Networks have potential of significantly enhancing our ability to monitor and interact with our physical environment. Realizing a fault tolerant operation is critical to the success of WSNs. The integrity of data has tremendous effects on performance of any data acquisition system. Noise and other disturbances can often degrade the information or data acquired from these systems. Devising a fault-tolerant mechanism in wireless sensor networks is very important due to the construction and deployment characteristics of these low powered sensing devices. Moreover, due to the low computation and communication capabilities of the sensor nodes, the fault-tolerant mechanism should have a very low computation overhead. In this paper we focus our work on low complexity error detection technique which can be implemented with low data redundancy and efficient energy consuming in wireless sensor node by using of Residue Number Systems.

Бесплатно

Error prone transmission system to resist data loss in a wireless sensor network

Error prone transmission system to resist data loss in a wireless sensor network

Sunil Kumar, C. Rama Krishna, A. K. Solanki

Статья научная

Data losses in wireless sensor network (WSN) commonly occur due to diverse transmission errors such as hardware or software limitations, channel congestion, network coverage constraint and transmission delay. Another important cause for data loss is distinct security attacks caused by illegal interferences of illicit third parties. Apart from that data loss may occur due to some unforeseen causes too. A number of efforts have been made in WSN to control such types of data loss during the transmission process individually or along with various combinations. However, none of them are capable of addressing each of the mentioned cause of data loss in WSN environment. Henceforth, we have proposed an error resistant technique for WSN to address all of the mentioned causes for data loss. The proposed technique also offers a backup system for the accidental data losses. The experimental results shows that the proposed technique offers minimum data loss during the communication process by offering higher Signal to Noise Ratio (SNR) and low Information Loss compared to the other existing error control techniques. The time efficiency can also be justified by its high Throughput and complexity can be verified by measuring Cyclomatic Complexity.

Бесплатно

Establishing Inter Vehicle Wireless Communication in Vanet and Preventing It from Hackers

Establishing Inter Vehicle Wireless Communication in Vanet and Preventing It from Hackers

M. Milton Joe, R.S. Shaji, K. Ashok Kumar

Статья научная

The entire humanity needs a vehicle to travel from one place to another. Obviously a new model vehicle is manufactured by the manufacturing companies to attract its customers every day. All the manufactured vehicles have different advantages, when compared with one another. In this case, we introduce another added advantage to the vehicle is establishing inter vehicle wireless communication in VANET and preventing it from the hackers. This type of inter vehicle wireless communication among vehicles that are moving faster on the road will lead safety and increase Quality of Service (QoS) to the passengers. The proposed wireless inter vehicle communication will allow vehicles to inter change messages from one vehicle to another vehicle with the help of network communication and prevents the communication from the hackers.

Бесплатно

Estimating the Video Registration Using Image Motions

Estimating the Video Registration Using Image Motions

N.Kannaiya Raja, K.Arulanandam, R.Radha krishnan, M.Nataraj

Статья научная

In this research, we consider the problems of registering multiple video sequences dynamic scenes which are not limited non rigid objects such as fireworks, blasting, high speed car moving taken from different vantage points. In this paper we propose a simple algorithm we can create different frames on particular videos moving for matching such complex scenes. Our algorithm does not require the cameras to be synchronized, and is not based on frame-by-frame or volume-by-volume registration. Instead, we model each video as the output of a linear dynamical system and transform the task of registering the video sequences to that of registering the parameters of the corresponding dynamical models. In this paper we use of a joint frame together to form distinct frame concurrently. The joint identification and the Jordan canonical form are not only applicable to the case of registering video sequences, but also to the entire genre of algorithms based on the dynamic texture model. We have also shown that out of all the possible choices for the method of identification and canonical form, the JID using JCF performs the best.

Бесплатно

Estimating the sample size for training intrusion detection systems

Estimating the sample size for training intrusion detection systems

Yasmen Wahba, Ehab ElSalamouny, Ghada ElTaweel

Статья научная

Intrusion detection systems (IDS) are gaining attention as network technologies are vastly growing. Most of the research in this field focuses on improving the performance of these systems through various feature selection techniques along with using ensembles of classifiers. An orthogonal problem is to estimate the proper sample sizes to train those classifiers. While this problem has been considered in other disciplines, mainly medical and biological, to study the relation between the sample size and the classifiers accuracy, it has not received a similar attention in the context of intrusion detection as far as we know. In this paper we focus on systems based on Na?ve Bayes classifiers and investigate the effect of the training sample size on the classification performance for the imbalanced NSL-KDD intrusion dataset. In order to estimate the appropriate sample size required to achieve a required classification performance, we constructed the learning curve of the classifier for individual classes in the dataset. For this construction we performed nonlinear least squares curve fitting using two different power law models. Results showed that while the shifted power law outperforms the power law model in terms of fitting performance, it exhibited a poor prediction performance. The power law, on the other hand, showed a significantly better prediction performance for larger sample sizes.

Бесплатно

Журнал