International Journal of Computer Network and Information Security @ijcnis
Статьи журнала - International Journal of Computer Network and Information Security
Все статьи: 1130

Performance Analysis of Improved Clustering Algorithm on Real and Synthetic Data
Статья научная
Clustering is an important technique in data mining to partition the data objects into clusters. It is a way to generate groups from the data objects. Different data clustering methods or algorithms are discussed in the various literature. Some of these are efficient while some are inefficient for large data. The k-means, Partition Around Method (PAM) or k-medoids, hierarchical and DBSCAN are various clustering algorithms. The k-means algorithm is more popular than the other algorithms used to partition data into k clusters. For this algorithm, k should be provided explicitly. Also, initial means are taken randomly but this may generate clusters with poor quality. This paper is a study and implementation of an improved clustering algorithm which automatically predicts the value of k and uses a new technique to take initial means. The performance analysis of the improved algorithm and other algorithms by using real and dummy datasets is presented in this paper. To measure the performance of algorithms, this paper uses running time of algorithms and various cluster validity measures. Cluster validity measures include sum squared error, silhouette score, compactness, separation, Dunn index and DB index. Also, the k predicted by the improved algorithm is compared with optimal k suggested by elbow method. It is found that both values of k are almost similar. Most of the values of validity measures for the improved algorithm are found to be optimal.
Бесплатно

Performance Analysis of Inter-Satellite Optical Wireless Communication
Статья научная
The evolution of optical communications systems from long fibers to robust wireless system has led to the idea of connecting two satellites using an optical wireless link. The rapid developments in satellite communication point to the possibilities of satellite networks as a method for them to communicate with each other. The optical wireless communication (OWC) enables the information exchange between satellites at higher speed and also a satellite can act as a relay between two satellites or between a satellite and ground base station. Light signal of high frequency is used as a carrier for the optical link between satellites and lasers are commonly used as a source of light. One of the primary reasons for preferring OWC over RF link is high data rate with acceptable bit error rate (BER). The communication between two lower earth orbit (LEO) satellites is studied under this research work. The quality factor (Q-factor) or BER is used as a key metric to analyze the performance of the inter-satellite link (ISL). This work presents the performance enhancement of the system by using multiple antennas and advanced modulation techniques.
Бесплатно

Performance Analysis of Network Applications on IPv6 Cloud Connected Virtual Machine
Статья научная
The rapid growth of the Internet and a number of changes in the technology landscape have resulted to move traditional IPv4 networks to virtualized IPv6 networks. Reliable and fast delivery of network services with minimum hardware and lower cost are the main challenges for network operators in the modern technological era. Network operators are moving towards the virtual IPv6 networks. As IP protocol does not guarantee packet delivery, therefore, for reliable delivery of services like FTP, HTTP, and SMTP, the IP protocol is associated with TCP on the transport layer while audio/video live streaming, and real-time applications use UDP. QoS of video streaming and real-time applications are depended upon better network resources management and planning while QoE is dependent on network performance. Different sizes of the packet affect overall QoS. Optimum services can be achieved through the proper selection of routing protocol in the network. In this study, the performance of the IPv6 virtual machine connected to the large scale virtual IPv6 network through the cloud is measured and compared on the basis of the packet sizes of TCP and UDP. GNS3 network emulator and VMware have been used for testing and analyzing the performance of the IPv6 virtual network in terms of several parameters such as convergence, RTT, throughput, jitter, and packet loss. Results indicate that the EIGRPv6 routing protocol with the collaboration of BGPv4 delivers better performance through virtual network services over the cloud network.
Бесплатно

Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas
Статья научная
In this paper, a quality of service (QoS) multicast routing protocol in mobile ad hoc networks (MANETs) by using directional antennas has been presented. Many important applications, such as audio/video conferencing, require the quality of service guarantee. Directional antenna technology provides the capability for considerable increase in spatial reuse, which increases the efficiency of communication. This paper studies TDMA-based timeslot allocation and directional antennas, and presents an effective algorithm for calculating bandwidth of a multicast tree. We also propose a novel on-demand QoS multicasting routing algorithm in TDMA-based mobile ad hoc networks using directional antennas. The simulation result shows the performance of this QoS multicast routing algorithm in TDMA-based mobile ad hoc networks using directional antennas.
Бесплатно

Статья научная
The LED (Light emitting diode) based lighting systems are gaining popularity for its dual use i.e. for energy efficient lighting systems as well as for indoor optical wireless communication systems. Although, Visible light spectrum has the capability to provide very large system bandwidth (in THz), yet these systems have the limitation on account of limited modulation bandwidth. Besides, Visible light communication (VLC) systems also suffer due to multi-path propagation resulting in further depletion of system bandwidth due to pulse broadening. Therefore, one of the deployment objective of a visible light communication (VLC) system is to reduce the root mean square (RMS) delay parameter besides minimizing the number of LEDs. Hence, performance analysis of two geometrical shape structures mainly rectangular and circular models are explored for ubiquitous indoor coverage using hyper- heuristics evolutionary algorithm(HypEA) under spatial receiver mobility. Therefore, it is possible to achieve lower RMS delay spread and hence multi- fold increase in the overall system bandwidth without the use of complex system techniques like OFDM- MIMO etc.
Бесплатно

Performance Analysis of Route Discovery by Cross Layer Routing Protocol- RDCLRP
Статья научная
Wired and wireless network is based on the TCP / IP architecture but it is not sufficient to cope with the dynamics of the MANET. Cross layer design can be an alternative architecture for MANET. Frequent route break is one of the major problems of mobile adhoc network (MANET). Path breaks due to less available battery power and mobility of nodes. Most of the battery power is consumed in flooding of control packets. A key challenge in the design of efficient routing protocol is to reduce link breakage and flooding of control packets. Route breakage can be reduced if the possibility of route breakage is predicted and a handoff is done without drop of data packets. If route breakage is reduced, the more battery power will be available with nodes. In turn it reduces the possibility of route breakage and the possibility of flooding. This is a cumulative effect. So a novel preemptive route repair algorithm is proposed named as RDCLRP- Route discovery by cross layer routing protocol to reduce frequency of control packet flooding and route breakage. Three variants of RDCLRP and their results are illustrated. In this paper, the impact of the number of nodes on performance of RDCLRP are investigated and analyzed. The results show 55.6% reduction in link breakage, 14.7% improvement in residual battery power and an average of 6.7% increase in throughput compared to basic AODV.
Бесплатно

Performance Analysis of VOIP over GRE Tunnel
Статья научная
Voice over IP (VoIP) is commonly known as phone service over the Internet. Any service using public IP network requires certain extent of security. Demand for security in VOIP technology is increasing. VPN is one of the commonly used methods to secure VOIP traffic. In this paper we simulated behavior of a VOIP communication while running over a GRE VPN Tunnel using OPNET Modeler 17.5. During the simulation, such performance parameters as: choice of voice signaling protocol, voice Codec, parameters arising from network QoS (in this study, homogenous vs. heterogeneous network environment) and type of VPN tunneling protocol, were examined. We evaluated performance of VOIP communications in homogenous and heterogeneous network environments, configured based on two different signaling protocols, namely H.323 and SIP. Also, G.711 and G.723 were configured and tested as the choice for voice Codecs. GRE was implemented as the tunneling protocol. Result analysis of this study indicated that GRE Tunnel didn't show a significant increase in such call quality of service (QoS) performance factors as: end-to-end delay, call setup time, or a decrease in call MOS value. Even though in a non-ideal (heterogeneous) network environment, call quality of service (QoS) performance factors shoed poor results; however, there was no significant evidence to suggest that GRE Tunnel is the root cause for such poor results.
Бесплатно

Статья научная
A MANET is an interconnection of mobile devices by wireless links forming a dynamic topology without much physical network infrastructure such as routers, servers, access points/cables or centralized administration. The multipath routing protocols establish efficient communication within the network by discovering multiple routes between a pair of source and destination in order to have load balancing to satisfy Quality of Service (QoS) requirements. In this paper, the performance comparison and evaluation of the widely used multipath routing protocols such as AOMDV, OLSR and ZRP are carried out in terms of five scenario patterns such as RWM, RPGM, MGM, GMM, and PM in two different traffic patterns such as CBR and TCP using NS2 and Bonn Motion. These multipath routing protocols have been selected for simulation due to their edges over other protocols in various aspects.
Бесплатно

Performance Comparison of Single and Multiple Watermarking Techniques
Статья научная
The present work compares single and multiple watermarking by using discrete wavelet transform and different embedding methods. The different embedding methods are additive, multiplicative and hybrid watermarking with importance on its robustness versus the imperceptibility of the watermark. The objective quality metrics are demonstrated that, the additive embedding method achieves superior performance against watermark attacks on multiple watermarking technique.
Бесплатно

Performance Evaluation and Comparison of Network Firewalls under DDoS Attack
Статья научная
Network firewalls act as the first line of defense against unwanted and malicious traffic and also represent critical point of failure during DDoS attack. Predicting the overall firewall performance is crucial to network security administrators and designers in assessing the strength and effectiveness of network firewalls against DDoS attacks. In this paper, authors have made a humble attempt to study and compare DDoS performance of various types of firewalls in operation as on today. Analysis and detailed comparison is performed on open source packet filter (PF) firewall, Checkpoint SPLAT and Cisco ASA in a testing environment with laboratory generated DDoS traffic. It is attempted to identify various firewall DDoS performance parameters which can be considered during DDoS attack. Further, experiments are carried out to study effect of varying TCP Opening Timers on performance of stateful inspection firewall during Sync Flood attack. Also, in order to improve performance, intelligence is applied in PF firewall rulebase to mitigate DDoS.
Бесплатно

Статья научная
VANET deployment in real world has become a living reality by the successful allotment of 5.9GHz to Dedicated Short Range Communication (DSRC) by WLAN technologies. Dynamically changing topology and establishment of reliable path between nodes with minimum bandwidth consumption and lesser routing overheads are the main aims of ad- hoc network routing. To exploit effective and reliable communication among vehicles routing is a major factor which needs to be investigated. This paper intends to evaluate the performance of AODV and GOD routing protocols in city scenario under different application types and different fading environment using IEEE 802.11b MAC standard. Simulations are performed using NCTUns 6.0 (National Chung Tung University Network Simulator) and found that AODV performance is better in fading channel even if we increase rician factor. Also the performance of GOD is better in ideal fading (AWGN) channel, although the performance of routing protocols vary from one scenario to other and application traffic.
Бесплатно

Performance Evaluation of AODV under Blackhole Attack
Статья научная
Mobile Adhoc NETwork (MANET) consists of mobile nodes that can move freely and route packets without aid of centralized infrastructure. Dynamic changing topology, limited battery power and lack of centralized trusted authority make it vulnerable to several attacks and lot of research is being carried out in the field of security by discovering attacks, evaluating the damage caused to the network and developing solutions to combat such attacks. This paper simulates one of the most malicious behaviors known as blackhole attack. The blackhole node creates forged reply, advertising valid and fresh route to destination and thereafter drops data packets maliciously. The analysis guides us to the various performance parameters such as throughput, packet delivery fraction, normalized routing load and number of dropped packets evaluated over different scenarios.
Бесплатно

Статья научная
Recently, security of digital images has attracted significant attention. This paper evaluates the performance of authentication-encryption and confidentiality block cipher modes of operation, on digital image. Authentication-encryption scheme, such as Offset Code Book (OCB) mode, offers both privacy and authenticity; that is to say, this scheme provides data authenticity without increasing the cost of encryption. The performance of this mode is compared with other confidentiality modes of operation, such as the fast counter (CTR) mode that just encrypts the image without verification. Various statistical methods, such as correlation coefficient, Number of Pixels Change Rate (NPCR), and Unified Average Changing Intensity (UACI) are utilized to analyze the efficiency of different modes. Results show that the model based on OCB scheme, by both AES and Serpent algorithms, exhibits good performance on a digital image compared to the models based on other modes. OCB-AES based scheme, associated with its own authentication, has considerable speed in comparison with other confidentiality modes.
Бесплатно

Статья научная
Most of the protocols for enhancing the lifetime of wireless sensor networks (WSNs) are of a homogeneous nature in which all sensors have equal amount of energy level. In this paper, we study the effect of heterogeneity on the homogeneous protocols. The ALBPS and ADEEPS are the two important homogeneous protocols. We incorporate heterogeneity to these protocols, which consists of 2-level, 3-level and multi-level heterogeneity. We simulate and compare the performance of the ALBPS and ADEEPS protocols in homogeneous and heterogeneous environment. The simulation results indicate that heterogeneous protocols prolong the network lifetime as compared to the homogeneous protocols. Furthermore, as the level of heterogeneity increases, the lifetime of the network also increases.
Бесплатно

Статья научная
Face biometric system is one of the successful applications of image processing. Person recognition using face is the challenging task since it involves identifying the 3D object from 2D object. The feature extraction plays a very important role in face recognition. Extraction of features both in spatial as well as frequency domain has more advantages than the features obtained from single domain alone. The proposed work achieves spatial domain feature extraction using Asymmetric Region Local Binary Pattern (ARLBP) and frequency domain feature extraction using Fast Discrete Curvelet Transform (FDCT). The obtained features are fused by concatenation and compared with trained set of features using different distance metrics and Support Vector Machine (SVM) classifier. The experiment is conducted for different face databases. It is shown that the proposed work yields 95.48% accuracy for FERET, 92.18% for L-space k, 76.55% for JAFFE and 81.44% for NIR database using SVM classifier. The results show that the proposed system provides better recognition rate for SVM classifier when compare to the other distance matrices. Further, the work is also compared with existing work for performance evaluation.
Бесплатно

Performance Evaluation of IPv4/IPv6 Transition Mechanisms
Статья научная
The exhaustion of IPv4 addresses has forced the deployment of the new version of the Internet Protocol (IPv6). However, the migration to the new protocol is done gradually and with the due care for many reasons that include: cost, inclusion of support for IPv6 in existing applications, training of technical staff, lack of web content available over IPv6 from important providers, and obsolete devices not anymore supported by manufacturers. For those reasons, many transition mechanisms have been proposed, each one to fill distinct requirements, with different operational theory and availability according to the network environment. A performance evaluation of these mechanisms can help network administrators and researchers in their selection of the best transition technology for their environment. In this paper, we present a performance comparison of some transition mechanisms such as ISATAP, 6to4, and NAT64 in real testbeds with Debian, Windows 7, Windows 8, and Windows 10. For NAT64, two different tools were tested: TAYGA and Jool. We measure the OWD and the throughput for UDP and TCP for every mechanism, for both Ethernet and Fast Ethernet technologies. From this research, we can conclude that all the modern operating systems for PCs already have good support for IPv6, and a very similar network performance. Also, we can infer from our work that in controlled environments, native IPv4 has the best performance, closely followed by native IPv6. The difference is essentially due to the length of the IP header (20 bytes in IPv4 and 40 bytes in IPv6). The tunneling solutions chosen for this research (ISATAP and 6to4) have a similar performance, which is the lowest of the studied technologies, because of the additional IPv4 header in the tunnel.
Бесплатно

Performance Evaluation of Machine Learning-based Robocalls Detection Models in Telephony Networks
Статья научная
Many techniques have been proposed to detect and prevent spam over Internet telephony. Human spam calls can be detected more accurately with these techniques. However, robocalls, a type of voice spammer whose calling patterns are similar to those of legitimate users, cannot be detected as effectively. This paper proposes a model for robocall detection using a machine learning approach. Voice data recordings were collected and the relevant features for study were selected. The selected features were then used to formulate six (6) detection models. The formulated models were simulated and evaluated using some performance metrics to ascertain the model with the best performance. The C4.5 decision tree algorithm gave the best evaluation result with an accuracy of 99.15%, a sensitivity of 0.991%, a false alarm rate of 0.009%, and a precision of 0.992%. As a result, it was concluded that this approach can be used to detect and filter both machine-initiated and human-initiated spam calls.
Бесплатно

Performance Evaluation of Power Aware VM Consolidation using Live Migration
Статья научная
Power Efficiency is the efficient use of power and is a crucial come forth in cloud computing environment. Green Computing is nothing but is a cloud computing with efficient use of power and green refers to make the environment friendly to the user by saving heat and power. Data centre power efficiency in cloud environment will be reduced when virtualization is used as contrary to physical resource deployment to book adequate to grant all application requests. Nevertheless, in any case of the resource provisioning approximation, occasion remains in the way in which they are made attainable and workload is scheduled. The objective of this research work is therefore to pack workload into servers, selected as a function of their cost to operate, to achieve (or as close to) the utmost endorsed employment in a cost-efficient manner, avoiding occurrences where devices are under-utilized and management cost is acquired inefficiently. This work has enhanced the existing work by introducing the dynamic wake up calls either to shut down the active servers or restart the passive server. The wakeup calls has been initiated dynamically. The overall objective is to decrease the response time of users which will be increased during wakeup time in existing research work.
Бесплатно

Performance Evaluation of Routing Protocols in Vehicular Networks
Статья научная
Vehicular Ad hoc Networks is promising research area to improve traffic safety by developing an intelligent inter-vehicle communication system. Routing of data in a vehicular ad hoc network is a challenging task due to the high dynamics of such a network. This paper presents a performance study of routing protocols in various network environment (Urban, Highway) based on metrics such as throughput, packet delivery ratio and average end-to-end delay. For the implementation purpose we have used network simulator-2 (NS-2) and VanetMobisim.
Бесплатно

Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption
Статья научная
With the ever increasing volume of information over wireless medium, security has assumed an important dimension. The security of transmitted data over a wireless channel aims at protecting the data from unauthorized intrusion. Wireless network security is achieved using cryptographic primitives. Some properties that give encryption mechanism their cryptographic strength also make them very sensitive to channel error as well. Therefore, security for data transmission over wireless channel results in throughput loss. Tradeoff between security and throughput is always a major concern in wireless networks. In this paper, a Link Adaptive Encryption scheme is evaluated that adapts to channel variations and enhances the security level of WLANs without making any compromise with the network performance. Numerical results obtained through simulation for link adaptive encryption scheme are compared with the fixed block length encryption technique operating in Cipher Block Chaining (CBC) mode of operation. Optimal block length is also computed, which is assumed to be the effective strength of the cipher. It has been observed that security attained with link adaptive scheme operating in CBC mode is a better solution for security and throughput tradeoff.
Бесплатно