Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1148

Interconnect network on chip topology in multi-core processors: a comparative study

Interconnect network on chip topology in multi-core processors: a comparative study

Manju Khari, Raghvendra Kumar, Dac-Nhuong Le, Jyotir Moy Chatterjee

Статья научная

A variety of technologies in recent years have been developed in designing on-chip networks with the multicore system. In this endeavor, network interfaces mainly differ in the way a network physically connects to a multicore system along with the data path. Semantic substances of communication for a multicore system are transmitted as data packets. Thus, whenever a communication is made from a network, it is first segmented into sub-packets and then into fixed-length bits for flow control digits. To measure required space, energy & latency overheads for the implementation of various interconnection topologies we will be using multi2sim simulator tool that will act as research bed to experiment various tradeoffs between performance and power, and between performance and area requires analysis for further possible optimizations.

Бесплатно

Interference effect of ACL’s and SCO’s IEEE 802.15 transmission on IEEE 802.11 performance

Interference effect of ACL’s and SCO’s IEEE 802.15 transmission on IEEE 802.11 performance

Adhi Rizal, Susilawati

Статья научная

This study aims to investigate the effect of Bluetooth on WLAN 802.11 performance. In contrast to other studies, we distinguish bluetooth into two mechanisms, namely Asynchronous Connectionless (ACL) and Synchronous Connection-Oriented (SCO). Various scenarios (with range variation between the sender node and the access point (AP) and also the presence of ACL or SCO transmission as interference) was designed to conduct experiment. In general, experiment was conducted with two nodes that act as sender and receiver node that connected through internet. In addition, to determine the effect of bluetooth on WLAN performance we use several test parameters, which are received signal strength indication (RSSI), signal to noise ratio (SNR), upstream and downstream, jitter, and packet loss rate (PLR). The study revealed the both ACL and SCO did not significantly affect WLAN performance, because they can only reduce the performance based on certain parameters and scenarios. But when they were compared, SCO has worst effect on WLAN performance, particularly on upstream, jitter, and PLR.

Бесплатно

Internet of Things: A Review on Technologies, Architecture, Challenges, Applications, Future Trends

Internet of Things: A Review on Technologies, Architecture, Challenges, Applications, Future Trends

Jaideep Kaur, Kamaljit Kaur

Статья научная

World Wide Web (1990's) and Mobile Internet (the 2000's) had consequential corroborated the way how people communicate. However, with evolution in technology, the cataclysm of Internet has stepped into a new phase-Internet of Things. Internet of Things, a prominent paradigm in the field of IT having a nominal intervention of humans allowing diverse things to communicate with each other, anticipate, sight, and perceive surroundings. IoT exploits RFID tags, NFC, sensors, smart bands, and wired or wireless communication technologies to build smart surroundings, smart Homes, quick-witted intelligence in medical care, ease of Transport, and more. This paper introduces IoT with emphasis on its driver technologies and system architecture. In addition to application layer protocols, we focus on identifying various issues and application areas of IoT as well as future research trends in the field of IoT. We have also highlighted how big data is associated with Internet of Things.

Бесплатно

Internet of things for the prevention of black hole using fingerprint authentication and genetic algorithm optimization

Internet of things for the prevention of black hole using fingerprint authentication and genetic algorithm optimization

Pooja Chandel, Rakesh Kumar

Статья научная

The Internet is a communication network where two or more than two users communicate and exchange the data. Black hole attack is a security threat in which a malicious node drops some or all of the packets. The proposed framework implements a biometric authentication system into the communication network to verify the user and to save the user from any internal or external threat. The main objective is to integrate the biometric security with the communication network. The attack is supposed to be a Black hole which has been considered as a smart attack. Feature extraction of Fingerprint dataset will be done using minutiae extractor. This will extract ridge endings and ridge bifurcation from the thinned image. Genetic algorithm is usedto reduce the features to useful pool. If the user is authentic only then prevention mechanism against black hole is applied. Genetic Algorithm is used to find out black hole node based on the fitness function. Proposed model’s performance is evaluated using various metrics like delay, throughput, energy consumption and packet delivery ratio.

Бесплатно

Interoperability Framework for Vehicular Connectivity in Advanced Heterogeneous Vehicular Network

Interoperability Framework for Vehicular Connectivity in Advanced Heterogeneous Vehicular Network

Saied M. Abd El-atty, Konstantinos Lizos

Статья научная

Advanced heterogeneous vehicular network (AHVN) is a promising architecture for providing vehicular services in the next generation of vehicular networks. AHVN is an integrated architecture between vehicular ad hoc networks and existing cellular wireless networks. In this work, we propose a Multihop vehicular connectivity model in V2V system, which depends on the physical characteristics of the roadways and false hop initiation connectivity. Then, we determine the failure probability of vehicular connectivity in V2V system. Based on interoperability utility, we employ the failure connectivity probability as a handover criterion to communicate with V2R networks. Subsequently, we propose an efficient medium access control (MAC) method based on collaborative codes for resource management in AHVN. As a result, we determine the failure access probability by employing a Markov chain model. The analysis of the proposed MAC in terms of transmission capacity, delay and access failure probability is driven. The numerical and simulation results demonstrate the effectiveness of the proposed framework.

Бесплатно

Intrusion Detection Based on Normal Traffic Specifications

Intrusion Detection Based on Normal Traffic Specifications

Zeinab Heidarian, Naser Movahedinia, Neda Moghim, Payam Mahdinia

Статья научная

As intrusion detection techniques based on malicious traffic signature are unable to detect unknown attacks, the methods derived from characterizing the behavior of the normal traffic are appropriate in case of detecting unseen intrusions. Based on such a technique, one class Support Vector Machine (SVM) is employed in this research to learn http regular traffic characteristics for anomaly detection. First, suitable features are extracted from the normal and abnormal http traffic; then the system is trained by the normal traffic samples. To detect anomaly, the actual traffic (including normal and abnormal packets) is compared to the deduced normal traffic. An anomaly alert is generated if any deviation from the regular traffic model is inferred. Examining the performance of the proposed algorithm using ISCX data set has delivered high accuracy of 89.25% and low false positive of 8.60% in detecting attacks on port 80. In this research, online step speed has reached to 77 times faster than CPU using GPU for feature extraction and OpenMp for parallel processing of packets.

Бесплатно

Intrusion Detection System Using Ensemble of Rule Learners and First Search Algorithm as Feature Selectors

Intrusion Detection System Using Ensemble of Rule Learners and First Search Algorithm as Feature Selectors

D. P. Gaikwad

Статья научная

Recently, the use of Internet is increased for digital communication to share a lot of sensitive information between computers and mobile devices. For secure communication, data or information must be protected from adversaries. There are many methods of safeties like encryption, firewalls and access control. Intrusion detection system is mainly used to detect internal attacks in organization. Machine leaning techniques are mostly used to implement intrusion detection system. Ensemble method of machine learning gives high accuracy in which moderately accurate classifiers are combined. Ensemble classifier also provides less false positive rates. In this paper, a novel ensemble classifier using rule combination method has proposed for intrusion detection system. Ensemble classifier is designed using three rule learners as base classifiers. The benefits and feasibility of the proposed ensemble classifier have demonstrated by means of KDD’98 datasets. The main novelty of the proposed approach is based on three rule learner combination using rule of combination method of ensemble and feature selector. These three base classifiers are separately trained and combined using average probabilities rule combination. Base classifier’s accuracies have compared with the proposed ensemble classifier. Best First search algorithm has used to select relevant features from training dataset. This algorithm also helped to reduce dimension of training and testing dataset which benefits in reduction of training time. Several comparative experiments are conducted for evaluating performances of classifiers in term of accuracy and false positive rates. Experimental results show that the proposed ensemble classifier provide significant improvement of accuracy compared to individual classifiers with less positive rates.

Бесплатно

Intrusion Detection System to Overcome a Novel Form of Replay Attack (Data Replay) in Wireless Sensor Networks

Intrusion Detection System to Overcome a Novel Form of Replay Attack (Data Replay) in Wireless Sensor Networks

Yasmine Medjadba, Somia Sahraoui

Статья научная

Wireless Sensor Networks (WSNs) are widely and successfully employed in various application domains. They are easily deployed to collect valuable information and monitor potential environmental phenomena. However, the special nature of WSNs as well as their severe constraints and resource limitations make them vulnerable to various types of threats. Replay attack, is one example. According to this attack, the adversary intercepts and replays several times the same (old) message leading either to missed alerts or to false alerts. Many solutions have been proposed to mitigate message replay attack. However, all these solutions are of cryptographic natures and consider only external attacks exercising a trivial scenario of replay attack. In fact, the attacker could be a lot smarter, and in this case, it replays only the data field in the message while keeping the remaining fields updated. This novel form of replay attack is much more dangerous and difficult to be detected. We call this attack variant by data replay attack. As sensor nodes may be easily captured and compromised, the worst scenario occurs if data replay attack is performed by an internal intruder. In this paper we propose an efficient intrusion detection framework to overcome data replay attack in WSNs. The proposed intrusion detection system is named DR-IDS (Data Replay Intrusion Detection System). The performance evaluations performed under NS2 simulator show that the proposed solution is sufficiently robust.

Бесплатно

Intrusion Detection with Multi-Connected Representation

Intrusion Detection with Multi-Connected Representation

Abdelkader Khobzaoui, Abderrahmane Yousfate

Статья научная

Recently, considerable attention has been given to data mining techniques to improve the performance of intrusion detection systems (IDS). This has led to the application of various classification and clustering techniques for the purpose of intrusion detection. Most of them assume that behaviors, both normal and intrusions, are represented implicitly by connected classes. We state that such assumption isn't evident and is a source of the low detection rate and false alarm. This paper proposes a suitable method able to reach high detection rate and overcomes the disadvantages of conventional approaches which consider that behaviors must be closed to connected representation only. The main strategy of the proposed method is to segment sufficiently each behavior representation by connected subsets called natural classes which are used, with a suitable metric, as tools to build the expected classifier. The results show that the proposed model has many qualities compared to conventional models; especially regarding those have used DARPA data set for testing the effectiveness of their methods. The proposed model provides decreased rates both for false negative rates and for false positives.

Бесплатно

Intrusion detection using machine learning and feature selection

Intrusion detection using machine learning and feature selection

Prachi, Heena Malhotra, Prabha Sharma

Статья научная

Intrusion Detection is one of the most common approaches used in detecting malicious activities in any network by analyzing its traffic. Machine Learning (ML) algorithms help to study the high dimensional network traffic and identify abnormal flow in traffic with high accuracy. It is crucial to integrate machine learning algorithms with dimensionality reduction to decrease the underlying complexity of processing of huge datasets and detect intrusions within real-time. This paper evaluates 10 most popular ML algorithms on NSL-KDD dataset. Thereafter, the ranking of these algorithms is done to identify best performing ML algorithm on the basis of their performance on several parameters such as specificity, sensitivity, accuracy etc. After analyzing the top 4 algorithms, it becomes evident that they consume a lot of time while model building. Therefore, feature selection is applied to detect intrusions in as little time as possible without compromising accuracy. Experimental results clearly demonstrate that which algorithm works best with/without feature selection/reduction technique in terms of achieving high accuracy while minimizing the time taken in building the model.

Бесплатно

Investigating and analyzing bitcoin blockchain protocol using wireshark

Investigating and analyzing bitcoin blockchain protocol using wireshark

Auqib Hamid Lone, Roohie Naaz Mir

Статья научная

A bitcoin node needs to download the full block contents of the entire blockchain, before actually being able to send and receive transactions on bitcoin broadcast network, except simple payment verification clients which require only block headers and bloom filters to sync with others peers available on the network. Transactions/Blocks pass through a complex process at sender and receiver than it apparently looks to be. During transmission transactions/blocks are broken down into smaller chunks of data so that they can be carried on the wire. These chunks are given appropriate headers, encapsulated and then passed through several layers to reach the destination. In this paper we captured Bitcoin packets using Wireshark and deeply investigated and analyzed them. We investigated how bitcoin transaction/block messages work and what values and parameters are considered during this whole process.

Бесплатно

Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms

Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms

M. Anand Kumar, S.Karthikeyan

Статья научная

The growth rate of the internet exceeds than any other technology which is measured by users and bandwidth. Internet has been growing at a rapid rate since its conception, on a curve geometric and sometimes exponential. Today, the Internet is moving exponentially in three different directions such as size, processing power, and software sophistication making it the fastest growing technology humankind has ever created. With the rapid growth of internet, there is need to protect the sensitive data from unauthorized access. Cryptography plays a vital role in the field of network security. Currently many encryption algorithms are available to secure the data but these algorithms consume lot of computing resources such as battery and CPU time. This paper mainly focuses on two commonly used symmetric encryption algorithms such as Blowfish and Rejindael. These algorithms are compared and performance is evaluated. Experimental results are given to demonstrate the performance of these algorithms.

Бесплатно

Investigating the Feasibility of Elementary Cellular Automata based Scrambling for Image Encryption"

Investigating the Feasibility of Elementary Cellular Automata based Scrambling for Image Encryption"

M. Mohammed Ibrahim, R. Venkatesan, Kavikumar Jacob

Статья научная

This research investigates the performance of various one-dimensional cellular automata rules, namely Rule 30, Rule 150, Rule 184, Rule 105 and Rule 110, for image encryption. The proposed algorithm technique combines these CA rules to generate pseudo-random sequences for image scrambling. The effectiveness of the proposed method is evaluated using various performance metrics, including NPCR, correlation coefficient and information entropy. The results demonstrate which rule provides the best encryption performance, achieving high levels of security and resistance to statistical attacks. However, the computational complexity of the proposed method is relatively high, which may limit its practicality for real-time image encryption applications.

Бесплатно

Investigation of LEACH Protocol and its Successors in WSN

Investigation of LEACH Protocol and its Successors in WSN

Er. Kiranpreet kaur, Er. Ridhi Kapoor

Статья научная

Sensor nodes present in WSN plays its crucial role in sensing, processing and communicating data in brutal conditions. Power source like battery is required by these nodes for energy, which got sucked out in the processes like aggregation, compression and communication of sensed data. Extensive flaws seen now days are energy source constraints. After deploying nodes in nasty environment, worthwhile a battery is not rehabilitate. Therefore, proliferate usage of energy to enhance network lifetime is main issue. To clear up this trouble various clustering techniques are popularized. In clustering, sensor nodes group together to generate small clusters and CH is elected for aggregating data coming from cluster members. For large networks, hierarchical clustering model is applicable to assemble data at every cluster and transmit that processed data to the base station. This phase out repetitious data to be communicated which further curtail energy consumption. Various LEACH protocols are discussed in this review to enhance network lifetime.

Бесплатно

Investigations of Cellular Automata Linear Rules for Edge Detection

Investigations of Cellular Automata Linear Rules for Edge Detection

Fasel Qadir, Khan K. A.

Статья научная

Edge detection of images is one of the basic and most significant operations in image processing and is used for object background separation, 3-D interpretation of a 2-D image, and pre-processing in image understanding and recognition algorithms. In this paper we investigate cellular automata linear rules for edge detection and based on this investigation we have classified the rules into no edge detection rules, strong edge detection rules and weak edge detection rules. Finally, we show the comparative analysis of the proposed technique with already defined techniques for edge detection and the results show desirable performance.

Бесплатно

IoT: application protocols and security

IoT: application protocols and security

Derek Johnson, Mohammed Ketel

Статья научная

The Internet of Things (IoT) commands an ever-growing population of devices across the nation and abroad. The development of privacy concerns and security goals have not kept pace with the demand for new advances in IoT. We will discuss how the IoT currently functions and why the security in this field is important as the technology grows into every device we touch. This paper will also reference current security implementations and how they expect to cover this growing consumer demand for instant data on many devices at once. With IoT devices using less power and smaller processors, there is major discussion in the computing world on what methods succeed. As standard encryption methods are simply too much for small, low power devices to handle; IoT specific security methods should be highlighted.

Бесплатно

Joint Decoding Technique for Collision Resolution in Non-orthogonal Multiple Access Environment

Joint Decoding Technique for Collision Resolution in Non-orthogonal Multiple Access Environment

Suprith P.G., Mohammed Riyaz Ahmed, Mithileysh Sathiyanarayanan

Статья научная

Multiple access technologies have grown hand in hand from the first generation to the 5th Generation (5G) with both performance and quality improvement. Non-Orthogonal Multiple Access (NOMA) is the recent multiple access technology adopted in the 5G communication technology. Capacity requirements of wireless networks have grown to a large extent with the penetration of ultra-high-definition video transmission, Internet of Things (IoT), and virtual reality applications taking ground in the recent future. This paper develops the Physical Layer Network Coding (PNC) for collision resolution in a NOMA environment with two users. Traditionally NOMA uses Successive Interference Cancellation (SIC) for collision resolution. While additionally a decoding algorithm is added along with SIC to improve the performance of the collision resolution. MATLAB-based simulation is developed on the NOMA environment with two users using Viterbi coding, Low-Density Parity Check (LDPC), and Turbo coding. Performance parameters of Bit Error Rate (BER) and throughput are compared for these three algorithms. It is observed that the Turbo coding performed better among these three algorithms both in the BER and throughput. The BER obtained from the SIC- Turbo is found to be performing well with an increase of about 14% from the ordinary SIC implementation. The performance of the collision resolution has increased by 13% to 14% when joint decoding techniques are used and thus increasing the throughput of the NOMA paradigm.

Бесплатно

K-MLP Based Classifier for Discernment of Gratuitous Mails using N-Gram Filtration

K-MLP Based Classifier for Discernment of Gratuitous Mails using N-Gram Filtration

Harjot Kaur, Er. Prince Verma

Статья научная

Electronic spam is a highly concerning phenomenon over the internet affecting various organisations like Google, Yahoo etc. Email spam causes several serious problems like high utilisation of memory space, financial loss, degradation of computation speed and power, and several threats to authenticated account holders. Email spam allows the spammers to deceit as a legitimate account holder of the organisations to fraud money and other useful information from the victims. It is necessary to control the spreading of spam and to develop an effective and efficient mechanism for defence. In this research, we proposed an efficient method for characterising spam emails using both supervised and unsupervised approaches by boosting the algorithm's performance. This study refined a supervised approach, MLP using a fast and efficient unsupervised approach, K-Means for the detection of spam emails by selecting best features using N-Gram technique. The proposed system shows high accuracy with a low error rate in contrast to the existing technique. The system also shows a reduction in vague information when MLP was combined with K-Means algorithm for selecting initial clusters. N-Gram produces 100 best features from the group of data. Finally, the results are demonstrated and the output of the proposed technique is examined in contrast to the existing technique.

Бесплатно

KED - A Symmetric Key Algorithm for Secured Information Exchange Using Modulo 69

KED - A Symmetric Key Algorithm for Secured Information Exchange Using Modulo 69

Janailin Warjri, E. George Dharma Prakash Raj

Статья научная

Exchange of data over the internet is increasing day by day. Security is the main issue in communication over a network. Protection must be given against intruders. Hence Cryptography plays a vital role in providing security. There are two basic types of cryptography: Symmetric Key and Asymmetric Key. Symmetric Key uses same or single key for encryption and decryption whereas Asymmetric Key uses separate keys for encryption and decryption. The most commonly used are the Symmetric Key algorithms. The strength of these algorithms is based on the difficulty to break the original messages. In this paper, a new Symmetric Key algorithm called as KED (Key Encryption Decryption) using modulo69 is proposed. Here not only alphabets and numbers are used, but special characters have also been included. Two keys are used in which one is a natural number which is relatively prime to 69 and finding the inverse modulo69 of it and the other key is a random number generated by the proposed key generation method. The proposed algorithm is used for Encryption and Decryption.

Бесплатно

LCDT-M: Log-Cluster DDoS Tree Mitigation Framework Using SDN in the Cloud Environment

LCDT-M: Log-Cluster DDoS Tree Mitigation Framework Using SDN in the Cloud Environment

Jeba Praba. J., R. Sridaran

Статья научная

In the cloud computing platform, DDoS (Distributed Denial-of-service) attacks are one of the most commonly occurring attacks. Research studies on DDoS mitigation rarely considered the data shift problem in real-time implementation. Concurrently, existing studies have attempted to perform DDoS attack detection. Nevertheless, they have been deficient regarding the detection rate. Hence, the proposed study proposes a novel DDoS mitigation scheme using LCDT-M (Log-Cluster DDoS Tree Mitigation) framework for the hybrid cloud environment. LCDT-M detects and mitigates DDoS attacks in the Software-Defined Network (SDN) based cloud environment. The LCDT-M comprises three algorithms: GFS (Greedy Feature Selection), TLMC (Two Log Mean Clustering), and DM (Detection-Mitigation) based on DT (Decision Tree) to optimize the detection of DDoS attacks along with mitigation in SDN. The study simulated the defined cloud environment and considered the data shift problem during the real-time implementation. As a result, the proposed architecture achieved an accuracy of about 99.83%, confirming its superior performance.

Бесплатно

Журнал