Статьи журнала - International Journal of Computer Network and Information Security
Все статьи: 1110
Performance Evaluation of Machine Learning-based Robocalls Detection Models in Telephony Networks
Статья научная
Many techniques have been proposed to detect and prevent spam over Internet telephony. Human spam calls can be detected more accurately with these techniques. However, robocalls, a type of voice spammer whose calling patterns are similar to those of legitimate users, cannot be detected as effectively. This paper proposes a model for robocall detection using a machine learning approach. Voice data recordings were collected and the relevant features for study were selected. The selected features were then used to formulate six (6) detection models. The formulated models were simulated and evaluated using some performance metrics to ascertain the model with the best performance. The C4.5 decision tree algorithm gave the best evaluation result with an accuracy of 99.15%, a sensitivity of 0.991%, a false alarm rate of 0.009%, and a precision of 0.992%. As a result, it was concluded that this approach can be used to detect and filter both machine-initiated and human-initiated spam calls.
Бесплатно
Performance Evaluation of Power Aware VM Consolidation using Live Migration
Статья научная
Power Efficiency is the efficient use of power and is a crucial come forth in cloud computing environment. Green Computing is nothing but is a cloud computing with efficient use of power and green refers to make the environment friendly to the user by saving heat and power. Data centre power efficiency in cloud environment will be reduced when virtualization is used as contrary to physical resource deployment to book adequate to grant all application requests. Nevertheless, in any case of the resource provisioning approximation, occasion remains in the way in which they are made attainable and workload is scheduled. The objective of this research work is therefore to pack workload into servers, selected as a function of their cost to operate, to achieve (or as close to) the utmost endorsed employment in a cost-efficient manner, avoiding occurrences where devices are under-utilized and management cost is acquired inefficiently. This work has enhanced the existing work by introducing the dynamic wake up calls either to shut down the active servers or restart the passive server. The wakeup calls has been initiated dynamically. The overall objective is to decrease the response time of users which will be increased during wakeup time in existing research work.
Бесплатно
Performance Evaluation of Routing Protocols in Vehicular Networks
Статья научная
Vehicular Ad hoc Networks is promising research area to improve traffic safety by developing an intelligent inter-vehicle communication system. Routing of data in a vehicular ad hoc network is a challenging task due to the high dynamics of such a network. This paper presents a performance study of routing protocols in various network environment (Urban, Highway) based on metrics such as throughput, packet delivery ratio and average end-to-end delay. For the implementation purpose we have used network simulator-2 (NS-2) and VanetMobisim.
Бесплатно
Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption
Статья научная
With the ever increasing volume of information over wireless medium, security has assumed an important dimension. The security of transmitted data over a wireless channel aims at protecting the data from unauthorized intrusion. Wireless network security is achieved using cryptographic primitives. Some properties that give encryption mechanism their cryptographic strength also make them very sensitive to channel error as well. Therefore, security for data transmission over wireless channel results in throughput loss. Tradeoff between security and throughput is always a major concern in wireless networks. In this paper, a Link Adaptive Encryption scheme is evaluated that adapts to channel variations and enhances the security level of WLANs without making any compromise with the network performance. Numerical results obtained through simulation for link adaptive encryption scheme are compared with the fixed block length encryption technique operating in Cipher Block Chaining (CBC) mode of operation. Optimal block length is also computed, which is assumed to be the effective strength of the cipher. It has been observed that security attained with link adaptive scheme operating in CBC mode is a better solution for security and throughput tradeoff.
Бесплатно
Статья научная
The IEEE 802.15.4 standard is considered as the most notorious MAC layer for wireless sensor networks (WSNs) in both centralized and distributed context. For instance, in multi hop environment, the beaconless IEEE 802.15.4 is used. Several works evaluated the performance of the beaconless IEEE 802.15.4 in terms of average delay, average energy consumption, throughput etc. But, none of the existing studies derived accurate energy consumption bounds of this MAC layer. In this paper, our contribution is twofold. We first propose a comprehensive energy consumption analysis of the unslotted CSMA/CA algorithm. The results are validated through simulation. Then, we exploit our analysis to propose a cross layer routing scheme that enhances the native PEGASIS protocol. Our scheme called Average Energy Enhanced PEGASIS (AE2-PEGASIS) considers the average energy consumption at the MAC layer when constructing the routes to the sink.
Бесплатно
Performance Improvement of Cache Management In Cluster Based MANET
Статья научная
Caching is one of the most effective techniques used to improve the data access performance in wireless networks. Accessing data from a remote server imposes high latency and power consumption through forwarding nodes that guide the requests to the server and send data back to the clients. In addition, accessing data may be unreliable or even impossible due to erroneous wireless links and frequently disconnections. Due to the nature of MANET and its high frequent topology changes, and also small cache size and constrained power supply in mobile nodes, the management of the cache would be a challenge. To maintain the MANET’s stability and scalability, clustering is considered as an effective approach. In this paper an efficient cache management method is proposed for the Cluster Based Mobile Ad-hoc NETwork (C-B-MANET). The performance of the method is evaluated in terms of packet delivery ratio, latency and overhead metrics.
Бесплатно
Performance Measures of Tele-Protection System Based on Networked Microwave Radio Link
Статья научная
The purpose of paper is to compute reliability of Digital Tele-Protection System employing Digital Microwave Radio Link. In this paper, the whole Tele-Protection system is divided into six subsystems. The first subsystem is digital relaying equipment. Second subsystem is the tale-protection signaling equipment where the timing to sample line power currents is synchronized. Both relaying and Tele-Protection signaling equipments, are now assemble three-phase current data, sampled at 600 Hz for 50 Hz EHV systems and some control data into a 90 bit frame format at a transmission rate of 54 Kb/s. A frame consists of a frame synchronization field and some information fields including a cycle’s redundancy check field. The third subsystem, Tele-Protection signed multiplexing equipment generates a super frame by multiplexing the seven, 54 Kb/s Tele-Protection signals into a 1.544 Mb/s stage using multi-point sampling technique to minimize the delay time variation and send them to the subsystem four, which is radio equipment, from here the data is transmitted with the help of the channel (subsystem 5) to the repeater station (subsystem 6). The subsystem six is used to remove the noise and to improve the power of the data. In this paper, we have taken standby digital relaying equipment and that can be online through an imperfect switching device. Also parallel redundant Tele-Protection signaling equipment is taken to improve system’s overall performance.
Бесплатно
Performance Study of Spread Spectrum Systems with Hard Limiters
Статья научная
Use of spread spectrum systems in telecommunications is studied. It is shown that spread spectrum techniques can substantially enhance noise and interference immunity in the currently deployed information transmission networks. Primitive polynomials are proposed to obtain respective spreading codes. A spreading code consisting of 1023 chips is synthesized and its characteristics are studied. It is deduced that powerful interferences can exceed dynamic range of the receiving part of the system and, as a result, deteriorate information transmission. To overcome this problem, utilization of limiters is proposed, in which limitation level equals that of the internal noise of the receiving part. Computer simulation is employed to test the performance of the proposed solution. Performance of the spread spectrum system for information transfer is studied both without the limiter and with the limiter. Research results show that, for binary modulation, performance of the system with limitation and without limitation is nearly identical while limiters can substantially reduce requirements for the dynamic range. Compared to the existing approaches, it is proposed to use the synthesized spreading coding sequence with the limitation technique in practical implementations of those telecommunication networks, in which noise immunity and transmission concealment are required, such as in unmanned aerial vehicles. This can replace currently used approaches, such as frequency hopping, transmission power adjustment and antenna pattern changes.
Бесплатно
Статья научная
In this paper we have designed Agent based intrusion detection system (ABIDS) where agents will travel between connected client systems from server in a client-server network. The agent will collect information from client systems through data collecting agents. It will then categorize and associate data in the form of report, and send the same to server. Intrusion detection system (IDS) will support runtime addition of new ability to agents. We have illustrated the design of ABIDS and show the performance of ABIDS with various classification techniques that could produce good results. The motive of the work is to examine the best performance of ABIDS among various classification techniques for huge data. Moreover sophisticated NSL KDD dataset are used during experiments for more sensible assessment than the novel KDD 99 dataset.
Бесплатно
Статья научная
One of the most complex environment for the data transmission is the underwater channel. It suffers frequency selective deep fading with serious multi path time delay. The channel also has limited bandwidth. In this paper, the effect of Least Code Weight – Minimum Hamming Distance (LCW-MHD) polynomial code is studied using Viterbi Decoding Algorithm for the shallow Underwater Acoustic Communication (UAC) channel. Two different channels with the range of 100 and 1000 meters are considered for simulation purpose and the channel is designed using Ray Tracing algorithm. For data and image transmission in the channel, three different code rate of 1/2, 1/3 and 1/4 are considered and corresponding Bit Error Rate (BER) are evaluated. Result showed that the BER is least for the LCG-MHD polynomial code.
Бесплатно
Performance comparison of steganography techniques
Статья научная
Confidentiality calls for substantial research and development in network security and data communication. Several techniques have been proposed for the past decades to ensure secure and confidential transmission of data. Steganography is a significant method of hiding data in another media, such that it is physically and virtually invisible. It is used primarily to ensure secure communication in an indiscernible fashion so that the hidden information is not discovered at any stage. The goal is to hide the presence of secret information rather than the contents of information to avoid breaching of data confidentiality. This paper is an effort to bring about a comparison of some of the recent techniques used for steganography on the basis of embedding capacity and Peak signal to noise ratio (PSNR), Universal image quality index (UIQI), Number of pixel change rate (NPCR) and correlation. The performance metrics undertaken are robustness, security analysis and perceptual quality. The techniques were implemented in MATLAB 2013a v 8.1.0.604.
Бесплатно
Performance evaluation of AODV, DSDV, OLSR routing protocols using NS-3 simulator
Статья научная
Today, Due to mobility wireless network have a heavy demand especially for wireless Ad-Hoc network. In Ad-Hoc network a group of wireless mobile nodes cooperate with each other by routing of packets. So it is necessary to design a wireless network which gives the best performance by suitable protocol selection and path routing. The selection of protocol should be suitable in terms of data integrity as well as data delivery. Hence performance evaluation of protocol is a major issue before selection of a routing protocol. In this paper our aim is to analyse the performance matrices including end to end delay, jitter, packet loss and packet delivery fraction of multi hop network by simulation. Performance evaluation of wireless ad hoc network routing protocols specially Ad-hoc On Demand Distance Vector (AODV), Optimized Link State Routing (OLSR), Destination Sequenced Distance Vector (DSDV) have been completed using NS-3 Simulator. After simulation we have found that OLSR routing protocol gives the best result comparison to AODV and DSDV in large and dense network.
Бесплатно
Performance evaluation of MAC protocols with multi-sink for mobile UWSNs
Статья научная
Currently, Underwater Wireless Sensor Network (UWSN) is one of modern science and have attached many researchers especially how interesting with Wireless Sensor Network (WSN). A mobile node in UWSN is one of the powerful mechanisms, it can be used for many aquatic applications such as Surveillance for wildlife, Pollution control, Military applications, etc. UWSN is different from the terrestrial network in terms of using acoustic waves as a communication medium. Due limitation of bandwidth, high latency, and long propagation delay of acoustic waves, many proper MAC protocols that work efficiently in Static UWSN are not suitable for the mobile network. In this article two MAC protocols appropriate for mobile underwater network Broadcast as Direct access and geo-routing aware MAC protocol (GOAL) as Handshaking are evaluated, in both static and mobile nodes with respect to throughput, energy consumption, and delay. Then the effect of using Multi-Sink on the performance is shown, the evaluation is done based on AquaSim simulator, Aqua3D Animator, and AWK programming language have been used to extract the results. As a result, the performance has been improved by using multi-Sink with two types of MAC address, and for all the metrics.
Бесплатно
Статья научная
Satellite networking is different from wired or wireless networks. The behavior and the performance of TCP/IP in normal wireless network as well as in wired network are different from one another. The TCP/IP protocol was not designed to perform well over high-latency or noisy channels so its performance over satellite networks are totally different. Each satellite networks/constellations have different properties. The deployment height, motion, direction, link capacity – all differ from one satellite constellations to another. So, certainly the behavior of TCP/IP will considerably differ from one satellite constellations than another. The Performance of three different TCP Congestion algorithms, Vegas, Reno and Bic are taken for evaluation on the simulated satellite network Iridium and the performance of the three algorithms under the satellites constellation is measured using suitable metrics. It is observed that, irrespective of the high end to end delay, the behavior of TCP/IP under Satellite network is somewhat resembling a high latency wired network. TCP under satellite network is not like that of a mobile ADHOC network. The observation resulted that the overall performance of Vegas was good in Iridium constellations. These reasons should be explored for designing a better congestion control algorithm exclusively for Satellite Networks.
Бесплатно
Pre-Processing of University Webserver Log Files for Intrusion Detection
Статья научная
Web Server log files can reveal lots of interesting patterns when analyzed. The results obtained can be used in various applications, one of which is detecting intrusions on the web. For good quality of data and usable results, there is the need for data preprocessing. In this research, different stages of data preprocessing were carried out on web server log files obtained over a period of five months. The stages are Data Conversion, Session Identification, Data Cleaning and Data Discretization. Data Discretization was carried out in two phases to take care of data with continuous attributes. Some comparisons were carried out on the discretized data. The paper shows that with each preprocessing step, the data becomes clearer and more usable. At the final stage, the data presented offers a wide range of opportunities for further research. Therefore, preprocessing web server log files provides a standard processing platform for adequate research using web server logs. This method is also useful in monitoring and studying web usage pattern in a particular domain. Though the research covers webserver log obtained from a University domain, and thus, reveals the pattern of web access within a university environment, it can also be applied in e-commerce and any other terrain.
Бесплатно
Pre-quarantine Approach for Defense against Propagation of Malicious Objects in Networks
Статья научная
This paper revisits malicious object propagation in networks using epidemic theory in such a manner that it proposes the (Pre-quarantining) of nodes in networks. This is a concept that is known by experience to be a standard disease control procedure that involves screening and quarantining of immigrants to a population. As preliminary investigation we propose the Q-SEIRS model and the more advanced Q-SEIRS-V model for malicious objects' spread in networks. This Pre-quarantine concept addresses and implements the "assume guilty till proven innocent" slogan of the cyber world by providing a mechanism for pre-screening, isolation and treatment for incoming infected nodes. The treated nodes from the pre-quarantine compartment are sent to the recovered compartment while the free nodes join the network population. The paper also derived the reproduction number, equilibria, as well as local stability of the proposed model. Numerical methods are employed to solve the system of equations and MATLAB is used to simulate the system so as to visualize the dynamical behavior of the models. It is seen that pre-screening/pre-quarantining improves the recovery rate in relative terms.
Бесплатно
Predict Link Failure in AODV Protocol to provide Quality of Service in MANET
Статья научная
Quality of Service (QoS) in Ad hoc networks (MANETs) and more precisely in routing is the subject of several studies with the aim of providing better solutions for new applications requiring high throughput and very low delay. The objective of this work is to enhance the AODV (Ad hoc On Demand Distance Vector) routing strategy in maintenance phase, to improve QoS. It aims to add a mechanism able to predict link failure in use based on signal strength which is able to determine if the quality of link will be improved (i.e. stable) or more bad (i.e. probability of failure) in order to allow us not only to make the link management more robust but to anticipate on link breaking and improve QoS. When signal quality is declining due to neighbor node remoteness, a discovery of a part of road rescue with two hops will be established and it will be used when disconnection happens. Simulations under Network Simulator (Ns2) were conducted to measure traffic control, packets delivery and lost ratio in original protocol and modified version which are presented in this paper.
Бесплатно
Predicting Intrusion in a Network Traffic Using Variance of Neighboring Object’s Distance
Статья научная
Activities in network traffic can be broadly classified into two categories: normal and malicious. Malicious activities are harmful and their detection is necessary for security reasons. The intrusion detection process monitors network traffic to identify malicious activities in the system. Any algorithm that divides objects into two categories, such as good or bad, is a binary class predictor or binary classifier. In this paper, we utilized the Nearest Neighbor Distance Variance (NNDV) classifier for the prediction of intrusion. NNDV is a binary class predictor and uses the concept of variance on the distance between objects. We used KDD CUP 99 dataset to evaluate the NNDV and compared the predictive accuracy of NNDV with that of the KNN or K Nearest Neighbor classifier. KNN is an efficient general purpose classifier, but we only considered its binary aspect. The results are quite satisfactory to show that NNDV is comparable to KNN. Many times, the performance of NNDV is better than KNN. We experimented with normalized and unnormalized data for NNDV and found that the accuracy results are generally better for normalized data. We also compared the accuracy results of different cross validation techniques such as 2 fold, 5 fold, 10 fold, and leave one out on the NNDV for the KDD CUP 99 dataset. Cross validation results can be helpful in determining the parameters of the algorithm.
Бесплатно
Prediction of Intermittent Failure by Presage Debacle Model in Network on Chip
Статья научная
With the emergence of deep sub-micron technology, the reliability issues in on-chip interconnect has enormously increased. This includes single event upsets, like soft errors, and hard faults which are rapidly becoming important factors to be considered. Aggressive technology scaling renders these architectures vulnerable to system performance, intermittent failure, capacitive crosstalk, and power dissipation problem. To improve the performance of the area and power consumption along with bandwidth, throughput and latency, a Buffer Potency Power Gating Technique is carried out to predict the Intermittent Failure by Presage Debacle Model in Network on Chip. In the Presage Debacle Model, the links present in the application-specific topology are provided with real application traffic to assist in prediction of the intermittent failure. By predicting the failure, the output of the model provides the power dissipated over the connection of the application link. Then the crosstalk noise in the topology is reduced by the Adaption of Simulated Annealing (SA) based Particle Swarm Optimization (PSO) congruence algorithm. The optimization congruence algorithm assigns each task in the application software to each node in the topology to determine the network's optimal output. It continuously changes the task park position in the topology system and reduces the crosstalk of the NoC. Consecutively, the area and power consumption are minimized by Buffer Potency Power Gating Technique. Buffer efficiency is increased and the power-gating is a practical way to mitigate NoC power control schemes properly and effectively without any loss in performance. Thus the prediction of intermittent failure is obtained by utilizing NoC to improve the performance of area and power consumption.
Бесплатно
Preventive Aspect of Black Hole Attack in Mobile AD HOC Network
Статья научная
Mobile ad hoc network is infrastructure less type of network. In this paper we present the prevention mechanism for black hole in mobile ad hoc network. The routing algorithms are analyzed and discrete properties of routing protocols are defined. The discrete properties support in distributed routing efficiently. The protocol is distributed and not dependent upon the centralized controlling node. Important features of Ad hoc on demand vector routing (AODV) are inherited and new mechanism is combined with it to get the multipath routing protocol for Mobile ad hoc network (MANET) to prevent the black hole attack. When the routing path is discovered and entered into the routing table, the next step is taken by combined protocol to search the new path with certain time interval. The old entered path is refreshed into the routing table. The simulation is taken on 50 moving nodes in the area of 1000 x 1000 square meter and the maximum speed of nodes are 5m/sec. The result is calculated for throughput verses number of black hole nodes with pause time of 0 sec. to 40 sec., 120 sec. and 160 sec. when the threshold value is 1.0.
Бесплатно