International Journal of Computer Network and Information Security @ijcnis
Статьи журнала - International Journal of Computer Network and Information Security
Все статьи: 1148

Статья научная
Peer to peer networks have become one of the most popular networking methods because of their flexibility and many use cases such as file sharing and distributed computations. Unstructured overlay peer to peer networks are one of key components of peer to peer systems that are considerable because of their low cost in network construction and maintenance. One of the main challenges in unstructured peer to peer overlay networks is the topology mismatch between overlay network and the underlying physical infrastructure. The root of this challenge is lack of awareness about peers in the network infrastructure during connection to and disconnection from overlay network, in addition to the neighbor selection mechanism in the overlay network. Different types of awareness of network infrastructure includes awareness of the location of internet service providers. Also awareness of proximity, geographical location and resources of peers. In this article we present a middleware which configures overlay network by using public measurements and the estimated delay among peers in order to have the most conformity with the topology of physical infrastructure. To evaluate the performance, our middleware is implemented on the top of Gnutella which is an unstructured overlay peer-to-peer network. Our simulations show that our middleware enhances the conformity of overlay network to the topology of physical network infrastructure. In addition, it improved the average throughput and the average delay.
Бесплатно

IEATH: Improved Energy Aware and Two Hop Multipath Routing Protocol in Wireless Sensor Networks
Статья научная
Wireless sensor networks in terms of energy sources are limited. Furthermore due to this type of network infrastructure wireless communications and channel errors not possible to reach the correct packet to the destination exists; hence the proposing algorithms to improve the quality of service in these networks and sending packets are very important. In this paper we proposed a reliable and energy aware packet delivery mechanism to ensure quality of service in wireless sensor networks. In our proposed algorithm to ensure that a packet of information sent to the destination, the multi-path Forwarding method is used; So that several copies of an information packet via separate routes are sent to the destination, also routing decisions in this way occurs by considering the remaining energy in the neighborhood of nodes that are located in two hop of sender node. Simulation results show that the rate of release of data packets reduced in this way and thus the reliability of packet is increased, also the energy efficiency of sensor nodes effectively improved. Therefore this algorithm increase overall lifetime in wireless sensor networks.
Бесплатно

IHBOT: An Intelligent and Hybrid Model for Investigation and Classification of IoT Botnet
Статья научная
The Internet of Things (IoT) is revolutionizing the technological market with exponential growth year wise. This revolution of IoT applications has also brought hackers and malware to gain remote access to IoT devices. The security of IoT systems has become more critical for consumers and businesses because of their inherent heterogenous design and open interfaces. Since the release of Mirai in 2016, IoT malware has gained an exponential growth rate. As IoT system and their infrastructure have become critical resources that triggers IoT malware injected by various shareholders in different settings. The enormous applications cause flooding of insecure packets and commands that fueled threats for IoT applications. IoT botnet is one of the most critical malwares that keeps evolving with the network traffic and may harm the privacy of IoT devices. In this work, we presented several sets of malware analysis mechanisms to understand the behavior of IoT malware. We devise an intelligent and hybrid model (IHBOT) that integrates the malware analysis and distinct machine learning algorithms for the identification and classification of the different IoT malware family based on network traffic. The clustering mechanism is also integrated with the proposed model for the identification of malware families based on similarity index. We have also applied YARA rules for the mitigation of IoT botnet traffic.
Бесплатно

Статья научная
The major IT developments lead to speed and mobility elevation of information access. One of them is using the website to share and gather information. Therefore, the mobility and information disclosure create a harmful vulnerability. Which is the leakage of information, whether organizational or sensitive information, such as bank accounts, phone number and many more. Security testing is necessarily needed on website usage. One of the website security testing method is penetration testing. Supporting framework that can be used in this method is OWASP Testing Guide Version 4. OTG Version 4 has 11 stages cover all aspects of website protection and security. Security testing is nicely done using tools / software. Tools with the concept of OSINT (Open Source Intelligence) are used to get better access and availability by using the characteristics of open source. The IT risk assessment analysis carried out by ISO 31000 framework and based on the results that have been obtained through penetration testing with OWASP framework. Significance & values of this research is finding the best and effective way to making IT risk management guidelines along with the combination of with OWASP & ISO 31000 framework, by doing website security assessment with penetration testing method based on OWASP framework to get the system vulnerabilities and analyze the risks that appears with the ISO 31000 framework. Also, the IT risk management guidelines consist of system improvement recommendations along with evaluation report which obtained from the collaboration analysis the OSINT concept, penetration testing methods, OWASP and ISO 31000 framework.
Бесплатно

Identification of compromised nodes in MANETs using machine learning technique
Статья научная
Mobile ad hoc networks (MANETs) are faced with various security challenges emanating from malicious attacks. Their dynamic nature make nodes more vulnerable to attacks from either malicious nodes or intruders since there is no fixed infrastructure resulting in each node acting as router to transmit data. Currently, several solutions have been proposed and implemented in different ways aimed at eliminating or reducing these malicious attacks. However, the attacks still persist. Therefore, this paper proposes an efficient security mechanism based on machine learning as a solution that detects and identifies malicious attacks in real-time basis by classifying packets data as either normal or abnormal. To achieve this, we conducted experiments using logistic regression (LR) and a support vector machine (SVM) to choose the best predictive model utilizing the Iris data set. The results obtained show that LR performed better than SVM with an accuracy of 100% detection rate. Thus, LR is better suited for the identification of malicious attacks in MANETs. Furthermore, we proposed and designed a framework to detect malicious attacks in real-time in MANETs based on packet behavior using the LR model and the components were presented. We believe that, if this framework is implemented in MANETs, it could go a long way to reduce the rate of attacks in the infrastructure less network.
Бесплатно

Identity Authentication and Context Privacy Preservation in Wireless Health Monitoring System
Статья научная
Privacy preservation is an important challenge for wireless health monitoring system. This paper analyses the privacy threat types based on the wireless health monitoring system architecture, and built the key system model for identity threat and context privacy preservation based on traffic analysis threat. To resist these threat , the integrated message encryption, identity authentication and traffic context privacy preservation, based on identity-based cryptography(IBC) and identity-based signature(IBS), is carried out at one time during the process of sending, receiving and accessing the patients’ health information. Extensive analysis demonstrates the effectiveness of the proposed scheme.
Бесплатно

Identity Verification Mechanism for Detecting Fake Profiles in Online Social Networks
Статья научная
Impersonating users' identity in Online Social Networks (OSNs) is one of the open dilemmas from security and privacy point of view. Scammers and adversaries seek to create set of fake profiles to carry out malicious behaviors and online social crimes in social media. Recognizing the identity of Fake Profiles is an urgent issue of concern to the attention of researchers. In this paper, we propose a detection technique called Fake Profile Recognizer (FPR) for verifying the identity of profiles, and detecting the fake profiles in OSNs. The detection method in our proposed technique is based on utilizing Regular Expression (RE) and Deterministic Finite Automaton (DFA) approaches. We evaluated our proposed detection technique on three datasets types of OSNs: Facebook, Google+, and Twitter. The results explored high Precision, Recall, accuracy, and low False Positive Rates (FPR) of detecting Fake Profiles in the three datasets.
Бесплатно

Image Encryption Using Chaotic Map and Block Chaining
Статья научная
In this paper, a new Chaotic Map with Block Chaining (CMBC) cryptosystem for image encryption is proposed. It is a simple block cipher based on logistic chaotic maps and cipher block chaining (CBC). The new system utilizes simplicity of implementation, high quality, and enhanced security by the combined properties of chaos and CBC cipher. Implementation of the proposed technique has been realized for experimental purposes, and tests have been carried out with detailed analysis, demonstrating its high security. Results confirm that the scheme is unbreakable with reference to many of the well-known attacks. Comparative study with other algorithms indicates the superiority of CMBC security with slight increase in encryption time.
Бесплатно

Image Encryption based on the RGB PIXEL Transposition and Shuffling
Статья научная
Privacy is one of the key issues information Security addresses. Through encryption one can prevent a third party from understanding raw data during signal transmission. The encryption methods for enhancing the security of digital contents has gained high significance in the current era of breach of security and misuse of the confidential information intercepted and misused by the unauthorized parties. This paper sets out to contribute to the general body of knowledge in the area of cryptography application and by developing a cipher algorithm for image encryption of m*n size by shuffling the RGB pixel values. The algorithm ultimately makes it possible for encryption and decryption of the images based on the RGB pixel. The algorithm was implemented using MATLAB.
Бесплатно

Image Hashing Through Spatio-triad Relationship
Статья научная
Authenticating the content of the digital image has profound influence in legal matters and in court rooms. Image forensics plays an important role towards it. Proposed approach helps to authenticate the original image by generating a content based image signature that is a unique fingerprint for the image. Our novel approach establishes spatio triad relationship among features and finds the centre of gravity or centroid of the same after indexing. Topology of the triad relationship for the content based low level feature descriptors is preserved through aggregation until single key feature is deduced which is a 128 bit signature hash value and represented in decimal form. Density of feature keypoints influences the centre of gravity which acts as a unique signature for the given image. Manipulated image cannot contribute to restore / regenerate the same signature. We have verified our authentication approach for standard benchmark image dataset like MICC-F220, Columbia Image Splicing Evaluation dataset and Image manipulation dataset from Friedrich Alexander University and have found satisfactory results for the same. Content based image signature obtained is used to verify authenticity of image and for retrieval of video from database. Content based image fingerprint generated can also be considered for embedding as a watermark.
Бесплатно

Image cryptography with matrix array symmetric key using chaos based approach
Статья научная
With the increase in use of digital technology, use of data items in the format of text, image and videos are also increases. To securely send this data, many users and smart applications have adapted the image encryption approach. But the existing concepts are based on general AES approach. There is need to securely send the data with the addition of some expert image encryption and key generation approach. In this paper, we are using Matrix Array Symmetric Key (MASK) for the key generation and Chaos based approach for the image encryption. The main function of MASK is to generate the key for the encryption and decryption. The encryption process involves the generation of key. We have considered the key of MASK-256 for the encryption having 16 rounds. Chaos based concept has been considered for the encryption of image. Here, permutation- substitution based chaos based approach has been adopted for the image encryption. Moreover, in this approach, we have adapted the concept of partial encryption of image pixels instead of complete encryption so that in case of arrack, intruder can be confused with the partial encrypted image. In this approach, different image samples having different sizes have been considered. Further, concept is evaluated based on the parameters of Information Entropy, Elapsed Time, Precision, Recall and F-Measure.
Бесплатно

Impact of Equalizer step size in Underwater Acoustic Communication Channel
Статья научная
The Underwater Acoustic Channel (UAC) is a time variant channel and its multipath effects create ISI. This is one of the most important obstacles in the UAC channel which reduces the transmission rate. To remove this obstacle, a proper filter has to be designed in the receiver section. In this article, optimal step size for equalizer is computed and compared the results with the known techniques namely Decision Feedback Equalizer with interleave division multiple access (DFE IDMA) and Cyclic Prefix - Orthogonal Frequency Division Multiplexing (CP-OFDM) Equalizer. Channels are modeled using ray tracing methods. The various factors considered are ambient noise, attenuation loss, bottom and surface loss. The overall path loss for channels is computed by summing up the attenuation loss, surface and bottom loss. Simulation results evident that for short range UAC channel, the BER in the order of 10-2 is achieved using proposed methodology with least Eb/No compared to standard DFE method.
Бесплатно

Impact of IPv4, IPv6 and dual stack interface over wireless networks
Статья научная
The entire networking society is tremendously moving towards the IPv6 addressing architecture leaving behind the IPv4 address space. This happens due to the tremendous growth of Internet usage over the networking. The government has mandated that all the devices would be IPv6 compatible as the delay in the deployment of IPv6 would result in the negative impact of future growth and global connectivity of the internet. In this paper we are dealing with the impact of different interfaces like IPv4 only, IPv6 only and Dual stack mechanism over wireless networks with varying PHY and MAC layer interface of 802.11 a/g and 802.11 b standards. The results are simulated over Qualnet 5.1 simulator with various parameters like throughput, delay, jitter and packet delivery ratio is been calculated.
Бесплатно

Impact of Model Mobility in Ad Hoc Routing Protocols
Статья научная
An Ad Hoc network is a temporary network without infrastructure, dynamically formed by mobile devices without turning to any existing centralized administration. To send packets to remote nodes, a node use other nodes as intermediate relays, and ask them to transmit its packets. For this purpose, a routing protocol is needed. Because mobile devices are used, the network topology is unpredictable and can change at any time. The objective of this paper is to know the effect of mobility on the performance of Ad Hoc routing protocols, based on multi simulations performed with Glomosim.
Бесплатно

Impact of Physical Layer Jamming on Wireless Sensor Networks with Shadowing and Multicasting
Статья научная
This paper analyzes the impact of a physical layer jamming on the performance of wireless sensor networks by performing exhaustive comparative simulations using multicasting and by employing varying intensity of shadowing (constant and log normal). Comprehensive result analysis reveals that jamming drastically degrades the legitimate traffic throughput in a network, and, the constant shadowing approach is a better fit for a static network, both, under static as well as mobile jammer environments, as compared to the log normal one. An improvement in sink-node packet delivery ratio by 15.02 % and 16.58 % was observed with static and mobile jammer environments respectively, under multicasting and constant shadowing mean of 8.0. Further, average sink-node packet delivery ratio with constant shadowing shows an improvement of 4.15% and 5.94%, using static and mobile jammer environment respectively, in comparison to the values obtained under log normal shadowing based network.
Бесплатно

Impact of Wireless Channel Model on 802.15.6 Standard Performance for Wireless Body Sensor Networks
Статья научная
Wireless Body Sensor Network (WBAN) is a set of wearable and implantable devices capable of measuring physiological parameters and monitoring patient with chronic disease where early diagnosis is highly demanded. Several models introduced the general characterization of WBAN devices path loss considering possible shadowing due to obstruction of the signal (by the human body or any other obstacles) as well as the different postures of the human body. This paper aims at reporting an overview of WBSNs technologies, particular applications, system architecture and channel modeling. Emphasis is given to the IEEE 802.15.6 standard which enables the development of WBAN for medical and non-medical applications. The standard's performance within a time based variation and log-distance path loss is presented based on various simulations.
Бесплатно

Статья научная
Data packets in Wireless Mesh Networks (WMNs) are routed across several nodes in a multi-hop fashion. The Quality of Service (QoS), seamless connectivity, reliability, and scalability of Wireless Mesh Networks are all significantly impacted by routing approaches. Routing protocols should enforce the fair utilization of resources i.e. bandwidth or channel among network nodes irrespective of their spatial location from the Gateway. The two-hop or multi-hop nodes in wireless mesh networks experience resource starvation due to the functioning of the MAC protocol and TCP/TP networking protocol. The Starvation issue has a significant impact on the QoS requirements of wireless mesh networks. It is known that using appropriate scheduling techniques in network planning substantially minimizes starvation. To reduce the starving of resources to the multi-hop network nodes, novel optimized routing algorithms have been proposed and implemented in this work. To address the starvation, a GA-based cross-layer optimized scheduling method that operates at the MAC and Network layers is implemented. A hybrid approach that combines the features of the Genetic Algorithm (GA) and Gravitational Search Algorithm (GSA) is also implemented to solve the local minimum problem in GA. Results show that the suggested optimization methods greatly improve the fairness performance of wireless mesh networks.
Бесплатно

Implementation of An Optimized and Pipelined Combinational Logic Rijndael S-Box on FPGA
Статья научная
In this paper, presents an optimized combinational logic based Rijndael S-Box implementation for the SubByte transformation(S-box) in the Advanced Encryption Standard (AES) algorithm on FPGA. S-box dominated the hardware complexity of the AES cryptographic module thus we implement its mathematic equations based on optimized and combinational logic circuits until dynamic power consumption reduced. The complete data path of the S-box algorithm is simulated as a net list of AND, OR, NOT and XOR logic gates, also for increase in speed and maximum operation frequency used 4-stage pipeline in proposed method. The proposed implemented combinational logic based S-box have been successfully synthesized and implemented using Xilinx ISE V7.1 and Virtex IV FPGA to target device Xc4vf100. Power is analized using Xilinx XPower analyzer and achieved power consumption is 29 mW in clock frequency of 100 MHz. The results from the Place and Route report indicate that maximum clock frequency is 209.617 MHz.
Бесплатно

Implementation of Enhanced Security Algorithms in Mobile Ad hoc Networks
Статья научная
Mobile Ad hoc Networks are wireless infrastructure less networks can beeasily formed or deployed due to its simple infrastructure. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. The main objective of this work is to enhance the performance of the network by securing the data and to minimize the malicious nodes which disturb the stream of the network. Securing data is a critical task which can be achieved by cryptographic algorithms and disturbance detection plays as a crucial ingredient in any comprehensive security solution to address the threats.Hence a Novel Cryptographic Algorithm with a new Disturbance Detection System (DDS) has been proposed for Mobile Adhoc Networks. This method prevents the outside attacks to obtain any information from any data exchange in network and also use promiscuous mode of working along with rating and collaborative decision making based on multiple threshold values.The proposed algorithm was implemented and simulated in the Glomosim and the result analysis proved that the performance of the network is increased.
Бесплатно

Implementation of GSM Based Security System with IOT Applications
Статья научная
An effective security system is designed and implemented through the application of embedded systems and the Internet of Things (IoT). The main goal of this work is to present the IoT system and modern technology systems / embedded intelligent networks. IoT is the technology of the future in contact machine / machine device / machine is possible thanks to the electronics, sensor technology, software and connectivity system to enable these items to collect and exchange data. Embedded system is a real-time mainframe structure on a particular task, an automatic or electrical system including, often within the limits of real-time raking as sensors, modules with microcontrollers, etc...This is integrated with sensor main server and GSM global system For mobile), it is able to send data and IP addresses through SMS message. This will facilitate the identification of the unknown person embedded in real-time in these devices. The video data are transferred to another back-end server via TCP (Transmission Control Protocol) of the device. This server collects data and provides HTTP Web. A browser is used to view data and can be remotely controlled. This type is giving an idea about the probability and effectiveness of the system, this thesis presents the results of the investigation into the security system and some realistic implementations.
Бесплатно