Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1188

Performance Analysis of Anti-Phishing Tools and Study of Classification Data Mining Algorithms for a Novel Anti-Phishing System

Performance Analysis of Anti-Phishing Tools and Study of Classification Data Mining Algorithms for a Novel Anti-Phishing System

Rajendra Gupta, Piyush Kumar Shukla

Статья научная

The term Phishing is a kind of spoofing website which is used for stealing sensitive and important information of the web user such as online banking passwords, credit card information and user's password etc. In the phishing attack, the attacker generates the warning message to the user about the security issues, ask for confidential information through phishing emails, ask to update the user's account information etc. Several experimental design considerations have been proposed earlier to countermeasure the phishing attack. The earlier systems are not giving more than 90 percentage successful results. In some cases, the system tool gives only 50-60 percentage successful result. In this paper, a novel algorithm is developed to check the performance of the anti-phishing system and compared the received data set with the data set of existing anti-phishing tools. The performance evaluation of novel anti-phishing system is studied with four different classification data mining algorithms which are Class Imbalance Problem (CIP), Rule based Classifier (Sequential Covering Algorithm (SCA)), Nearest Neighbour Classification (NNC), Bayesian Classifier (BC) on the data set of phishing and legitimate websites. The proposed system shows less error rate and better performance as compared to other existing system tools.

Бесплатно

Performance Analysis of Black Hole Attack in Vanet

Performance Analysis of Black Hole Attack in Vanet

Vimal Bibhu, Kumar Roshan, Kumar Balwant Singh, Dhirendra Kumar Singh

Статья научная

Black hole attack in Vehicular Ad Hoc Network is major problem related with the field of computer networking. In this paper we present the performance analysis of the black hole attack in Vehicular Ad Hoc Network. We elaborate the different types of attacks and their depth in ad hoc network. The performance metric is taken for the evaluation of attack which depends on a packet end to end delay, network throughput and network load. The delay, throughput and load are simulated by the help of OPNET 14.5 modeler. The simulation setup comprises of 30 Vehicular nodes moving with constant speed of 10 meter per second. The data rate of Vehicular nodes is 11 Mbps with default transmitting power of 0.005 watts. With On Demand Distance Vector Routing and Optimized Link State Routing the malicious node buffer size is lowered to a level which increase packet drops.

Бесплатно

Performance Analysis of Cluster-based Wireless Sensor Networks with Application Constraints

Performance Analysis of Cluster-based Wireless Sensor Networks with Application Constraints

Abdul Sattar Malik,Jingming Kuang,Jiakang Liu,Wang Chong

Статья научная

Clustering is an efficient techniques used to achieve the specific performance requirements of large scale wireless sensor networks. In this paper we have carried out the performance analysis of cluster-based wireless sensor networks for different communication patterns formed due to application constraints based upon LEACH protocol, which is among the most popular clustering protocols proposed for these types of networks. Simulation results based upon this protocol identify some important factors that induce unbalanced energy consumption among sensor nodes and hence affect the network lifetime. This highlights the need for an adaptive clustering protocol that can increase the network lifetime by further balancing the energy consumption among sensor nodes. Paper concludes with some recommendations for such protocol.

Бесплатно

Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain

Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain

Alexandr Kuznetsov, Inna Oleshko, Vladyslav Tymchenko, Konstantin Lisitsky, Mariia Rodinko, Andrii Kolhatin

Статья научная

A blockchain, or in other words a chain of transaction blocks, is a distributed database that maintains an ordered chain of blocks that reliably connect the information contained in them. Copies of chain blocks are usually stored on multiple computers and synchronized in accordance with the rules of building a chain of blocks, which provides secure and change-resistant storage of information. To build linked lists of blocks hashing is used. Hashing is a special cryptographic primitive that provides one-way, resistance to collisions and search for prototypes computation of hash value (hash or message digest). In this paper a comparative analysis of the performance of hashing algorithms that can be used in modern decentralized blockchain networks are conducted. Specifically, the hash performance on different desktop systems, the number of cycles per byte (Cycles/byte), the amount of hashed message per second (MB/s) and the hash rate (KHash/s) are investigated. The comparative analysis of different hashing algorithms allows us to choose the most suitable candidates for building decentralized systems type of blockchain.

Бесплатно

Performance Analysis of Improved Clustering Algorithm on Real and Synthetic Data

Performance Analysis of Improved Clustering Algorithm on Real and Synthetic Data

Anand Khandare, A. S. Alvi

Статья научная

Clustering is an important technique in data mining to partition the data objects into clusters. It is a way to generate groups from the data objects. Different data clustering methods or algorithms are discussed in the various literature. Some of these are efficient while some are inefficient for large data. The k-means, Partition Around Method (PAM) or k-medoids, hierarchical and DBSCAN are various clustering algorithms. The k-means algorithm is more popular than the other algorithms used to partition data into k clusters. For this algorithm, k should be provided explicitly. Also, initial means are taken randomly but this may generate clusters with poor quality. This paper is a study and implementation of an improved clustering algorithm which automatically predicts the value of k and uses a new technique to take initial means. The performance analysis of the improved algorithm and other algorithms by using real and dummy datasets is presented in this paper. To measure the performance of algorithms, this paper uses running time of algorithms and various cluster validity measures. Cluster validity measures include sum squared error, silhouette score, compactness, separation, Dunn index and DB index. Also, the k predicted by the improved algorithm is compared with optimal k suggested by elbow method. It is found that both values of k are almost similar. Most of the values of validity measures for the improved algorithm are found to be optimal.

Бесплатно

Performance Analysis of Inter-Satellite Optical Wireless Communication

Performance Analysis of Inter-Satellite Optical Wireless Communication

Vinod Kiran K, Sarath V S, Vikram Kumar, Ashok K Turuk, Santos K Das

Статья научная

The evolution of optical communications systems from long fibers to robust wireless system has led to the idea of connecting two satellites using an optical wireless link. The rapid developments in satellite communication point to the possibilities of satellite networks as a method for them to communicate with each other. The optical wireless communication (OWC) enables the information exchange between satellites at higher speed and also a satellite can act as a relay between two satellites or between a satellite and ground base station. Light signal of high frequency is used as a carrier for the optical link between satellites and lasers are commonly used as a source of light. One of the primary reasons for preferring OWC over RF link is high data rate with acceptable bit error rate (BER). The communication between two lower earth orbit (LEO) satellites is studied under this research work. The quality factor (Q-factor) or BER is used as a key metric to analyze the performance of the inter-satellite link (ISL). This work presents the performance enhancement of the system by using multiple antennas and advanced modulation techniques.

Бесплатно

Performance Analysis of Network Applications on IPv6 Cloud Connected Virtual Machine

Performance Analysis of Network Applications on IPv6 Cloud Connected Virtual Machine

Zeeshan Ashraf, Adnan Sohail, Muhammad Yousaf

Статья научная

The rapid growth of the Internet and a number of changes in the technology landscape have resulted to move traditional IPv4 networks to virtualized IPv6 networks. Reliable and fast delivery of network services with minimum hardware and lower cost are the main challenges for network operators in the modern technological era. Network operators are moving towards the virtual IPv6 networks. As IP protocol does not guarantee packet delivery, therefore, for reliable delivery of services like FTP, HTTP, and SMTP, the IP protocol is associated with TCP on the transport layer while audio/video live streaming, and real-time applications use UDP. QoS of video streaming and real-time applications are depended upon better network resources management and planning while QoE is dependent on network performance. Different sizes of the packet affect overall QoS. Optimum services can be achieved through the proper selection of routing protocol in the network. In this study, the performance of the IPv6 virtual machine connected to the large scale virtual IPv6 network through the cloud is measured and compared on the basis of the packet sizes of TCP and UDP. GNS3 network emulator and VMware have been used for testing and analyzing the performance of the IPv6 virtual network in terms of several parameters such as convergence, RTT, throughput, jitter, and packet loss. Results indicate that the EIGRPv6 routing protocol with the collaboration of BGPv4 delivers better performance through virtual network services over the cloud network.

Бесплатно

Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas

Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas

Yuan Li, Xing Luo

Статья научная

In this paper, a quality of service (QoS) multicast routing protocol in mobile ad hoc networks (MANETs) by using directional antennas has been presented. Many important applications, such as audio/video conferencing, require the quality of service guarantee. Directional antenna technology provides the capability for considerable increase in spatial reuse, which increases the efficiency of communication. This paper studies TDMA-based timeslot allocation and directional antennas, and presents an effective algorithm for calculating bandwidth of a multicast tree. We also propose a novel on-demand QoS multicasting routing algorithm in TDMA-based mobile ad hoc networks using directional antennas. The simulation result shows the performance of this QoS multicast routing algorithm in TDMA-based mobile ad hoc networks using directional antennas.

Бесплатно

Performance Analysis of Rectangular and circular Shape Building Deployment for an Indoor Visible Light Communication System

Performance Analysis of Rectangular and circular Shape Building Deployment for an Indoor Visible Light Communication System

Ram Sharma, A. Charan Kumari

Статья научная

The LED (Light emitting diode) based lighting systems are gaining popularity for its dual use i.e. for energy efficient lighting systems as well as for indoor optical wireless communication systems. Although, Visible light spectrum has the capability to provide very large system bandwidth (in THz), yet these systems have the limitation on account of limited modulation bandwidth. Besides, Visible light communication (VLC) systems also suffer due to multi-path propagation resulting in further depletion of system bandwidth due to pulse broadening. Therefore, one of the deployment objective of a visible light communication (VLC) system is to reduce the root mean square (RMS) delay parameter besides minimizing the number of LEDs. Hence, performance analysis of two geometrical shape structures mainly rectangular and circular models are explored for ubiquitous indoor coverage using hyper- heuristics evolutionary algorithm(HypEA) under spatial receiver mobility. Therefore, it is possible to achieve lower RMS delay spread and hence multi- fold increase in the overall system bandwidth without the use of complex system techniques like OFDM- MIMO etc.

Бесплатно

Performance Analysis of Route Discovery by Cross Layer Routing Protocol- RDCLRP

Performance Analysis of Route Discovery by Cross Layer Routing Protocol- RDCLRP

Mehajabeen Fatima, Roopam Gupta, T.K.Bandhopadhyay

Статья научная

Wired and wireless network is based on the TCP / IP architecture but it is not sufficient to cope with the dynamics of the MANET. Cross layer design can be an alternative architecture for MANET. Frequent route break is one of the major problems of mobile adhoc network (MANET). Path breaks due to less available battery power and mobility of nodes. Most of the battery power is consumed in flooding of control packets. A key challenge in the design of efficient routing protocol is to reduce link breakage and flooding of control packets. Route breakage can be reduced if the possibility of route breakage is predicted and a handoff is done without drop of data packets. If route breakage is reduced, the more battery power will be available with nodes. In turn it reduces the possibility of route breakage and the possibility of flooding. This is a cumulative effect. So a novel preemptive route repair algorithm is proposed named as RDCLRP- Route discovery by cross layer routing protocol to reduce frequency of control packet flooding and route breakage. Three variants of RDCLRP and their results are illustrated. In this paper, the impact of the number of nodes on performance of RDCLRP are investigated and analyzed. The results show 55.6% reduction in link breakage, 14.7% improvement in residual battery power and an average of 6.7% increase in throughput compared to basic AODV.

Бесплатно

Performance Analysis of VOIP over GRE Tunnel

Performance Analysis of VOIP over GRE Tunnel

Aria. Asadi Eskandar, Mahbubur. R. Syed, Bahareh. Zarei.M

Статья научная

Voice over IP (VoIP) is commonly known as phone service over the Internet. Any service using public IP network requires certain extent of security. Demand for security in VOIP technology is increasing. VPN is one of the commonly used methods to secure VOIP traffic. In this paper we simulated behavior of a VOIP communication while running over a GRE VPN Tunnel using OPNET Modeler 17.5. During the simulation, such performance parameters as: choice of voice signaling protocol, voice Codec, parameters arising from network QoS (in this study, homogenous vs. heterogeneous network environment) and type of VPN tunneling protocol, were examined. We evaluated performance of VOIP communications in homogenous and heterogeneous network environments, configured based on two different signaling protocols, namely H.323 and SIP. Also, G.711 and G.723 were configured and tested as the choice for voice Codecs. GRE was implemented as the tunneling protocol. Result analysis of this study indicated that GRE Tunnel didn't show a significant increase in such call quality of service (QoS) performance factors as: end-to-end delay, call setup time, or a decrease in call MOS value. Even though in a non-ideal (heterogeneous) network environment, call quality of service (QoS) performance factors shoed poor results; however, there was no significant evidence to suggest that GRE Tunnel is the root cause for such poor results.

Бесплатно

Performance Comparison and Evaluation of Different Multipath Routing Protocols Based on Various Scenario and Traffic Patterns for Mobile AD Hoc Networks

Performance Comparison and Evaluation of Different Multipath Routing Protocols Based on Various Scenario and Traffic Patterns for Mobile AD Hoc Networks

P.Periyasamy, E.Karthikeyan

Статья научная

A MANET is an interconnection of mobile devices by wireless links forming a dynamic topology without much physical network infrastructure such as routers, servers, access points/cables or centralized administration. The multipath routing protocols establish efficient communication within the network by discovering multiple routes between a pair of source and destination in order to have load balancing to satisfy Quality of Service (QoS) requirements. In this paper, the performance comparison and evaluation of the widely used multipath routing protocols such as AOMDV, OLSR and ZRP are carried out in terms of five scenario patterns such as RWM, RPGM, MGM, GMM, and PM in two different traffic patterns such as CBR and TCP using NS2 and Bonn Motion. These multipath routing protocols have been selected for simulation due to their edges over other protocols in various aspects.

Бесплатно

Performance Comparison of Single and Multiple Watermarking Techniques

Performance Comparison of Single and Multiple Watermarking Techniques

Mohananthini Natarajan, Yamuna Govindarajan

Статья научная

The present work compares single and multiple watermarking by using discrete wavelet transform and different embedding methods. The different embedding methods are additive, multiplicative and hybrid watermarking with importance on its robustness versus the imperceptibility of the watermark. The objective quality metrics are demonstrated that, the additive embedding method achieves superior performance against watermark attacks on multiple watermarking technique.

Бесплатно

Performance Evaluation and Comparison of Network Firewalls under DDoS Attack

Performance Evaluation and Comparison of Network Firewalls under DDoS Attack

Chirag Sheth, Rajesh Thakker

Статья научная

Network firewalls act as the first line of defense against unwanted and malicious traffic and also represent critical point of failure during DDoS attack. Predicting the overall firewall performance is crucial to network security administrators and designers in assessing the strength and effectiveness of network firewalls against DDoS attacks. In this paper, authors have made a humble attempt to study and compare DDoS performance of various types of firewalls in operation as on today. Analysis and detailed comparison is performed on open source packet filter (PF) firewall, Checkpoint SPLAT and Cisco ASA in a testing environment with laboratory generated DDoS traffic. It is attempted to identify various firewall DDoS performance parameters which can be considered during DDoS attack. Further, experiments are carried out to study effect of varying TCP Opening Timers on performance of stateful inspection firewall during Sync Flood attack. Also, in order to improve performance, intelligence is applied in PF firewall rulebase to mitigate DDoS.

Бесплатно

Performance Evaluation of AODV and GOD for Qos Aware Applications through Realistic Conditions in VANET

Performance Evaluation of AODV and GOD for Qos Aware Applications through Realistic Conditions in VANET

Richa Sharma, Jyoteesh Malhotra

Статья научная

VANET deployment in real world has become a living reality by the successful allotment of 5.9GHz to Dedicated Short Range Communication (DSRC) by WLAN technologies. Dynamically changing topology and establishment of reliable path between nodes with minimum bandwidth consumption and lesser routing overheads are the main aims of ad- hoc network routing. To exploit effective and reliable communication among vehicles routing is a major factor which needs to be investigated. This paper intends to evaluate the performance of AODV and GOD routing protocols in city scenario under different application types and different fading environment using IEEE 802.11b MAC standard. Simulations are performed using NCTUns 6.0 (National Chung Tung University Network Simulator) and found that AODV performance is better in fading channel even if we increase rician factor. Also the performance of GOD is better in ideal fading (AWGN) channel, although the performance of routing protocols vary from one scenario to other and application traffic.

Бесплатно

Performance Evaluation of AODV under Blackhole Attack

Performance Evaluation of AODV under Blackhole Attack

Tarunpreet Bhatia, A.K. Verma

Статья научная

Mobile Adhoc NETwork (MANET) consists of mobile nodes that can move freely and route packets without aid of centralized infrastructure. Dynamic changing topology, limited battery power and lack of centralized trusted authority make it vulnerable to several attacks and lot of research is being carried out in the field of security by discovering attacks, evaluating the damage caused to the network and developing solutions to combat such attacks. This paper simulates one of the most malicious behaviors known as blackhole attack. The blackhole node creates forged reply, advertising valid and fresh route to destination and thereafter drops data packets maliciously. The analysis guides us to the various performance parameters such as throughput, packet delivery fraction, normalized routing load and number of dropped packets evaluated over different scenarios.

Бесплатно

Performance Evaluation of Authentication-Encryption and Confidentiality Block Cipher Modes of Operation on Digital Image

Performance Evaluation of Authentication-Encryption and Confidentiality Block Cipher Modes of Operation on Digital Image

Narges Mehran, Mohammad Reza Khayyambashi

Статья научная

Recently, security of digital images has attracted significant attention. This paper evaluates the performance of authentication-encryption and confidentiality block cipher modes of operation, on digital image. Authentication-encryption scheme, such as Offset Code Book (OCB) mode, offers both privacy and authenticity; that is to say, this scheme provides data authenticity without increasing the cost of encryption. The performance of this mode is compared with other confidentiality modes of operation, such as the fast counter (CTR) mode that just encrypts the image without verification. Various statistical methods, such as correlation coefficient, Number of Pixels Change Rate (NPCR), and Unified Average Changing Intensity (UACI) are utilized to analyze the efficiency of different modes. Results show that the model based on OCB scheme, by both AES and Serpent algorithms, exhibits good performance on a digital image compared to the models based on other modes. OCB-AES based scheme, associated with its own authentication, has considerable speed in comparison with other confidentiality modes.

Бесплатно

Performance Evaluation of Distributed Protocols Using Different Levels of Heterogeneity Models in Wireless Sensor Networks

Performance Evaluation of Distributed Protocols Using Different Levels of Heterogeneity Models in Wireless Sensor Networks

Samayveer Singh, Satish Chand, Bijendra Kumar

Статья научная

Most of the protocols for enhancing the lifetime of wireless sensor networks (WSNs) are of a homogeneous nature in which all sensors have equal amount of energy level. In this paper, we study the effect of heterogeneity on the homogeneous protocols. The ALBPS and ADEEPS are the two important homogeneous protocols. We incorporate heterogeneity to these protocols, which consists of 2-level, 3-level and multi-level heterogeneity. We simulate and compare the performance of the ALBPS and ADEEPS protocols in homogeneous and heterogeneous environment. The simulation results indicate that heterogeneous protocols prolong the network lifetime as compared to the homogeneous protocols. Furthermore, as the level of heterogeneity increases, the lifetime of the network also increases.

Бесплатно

Performance Evaluation of Face Recognition system by Concatenation of Spatial and Transformation Domain Features

Performance Evaluation of Face Recognition system by Concatenation of Spatial and Transformation Domain Features

Raveendra K., Ravi J.

Статья научная

Face biometric system is one of the successful applications of image processing. Person recognition using face is the challenging task since it involves identifying the 3D object from 2D object. The feature extraction plays a very important role in face recognition. Extraction of features both in spatial as well as frequency domain has more advantages than the features obtained from single domain alone. The proposed work achieves spatial domain feature extraction using Asymmetric Region Local Binary Pattern (ARLBP) and frequency domain feature extraction using Fast Discrete Curvelet Transform (FDCT). The obtained features are fused by concatenation and compared with trained set of features using different distance metrics and Support Vector Machine (SVM) classifier. The experiment is conducted for different face databases. It is shown that the proposed work yields 95.48% accuracy for FERET, 92.18% for L-space k, 76.55% for JAFFE and 81.44% for NIR database using SVM classifier. The results show that the proposed system provides better recognition rate for SVM classifier when compare to the other distance matrices. Further, the work is also compared with existing work for performance evaluation.

Бесплатно

Performance Evaluation of IPv4/IPv6 Transition Mechanisms

Performance Evaluation of IPv4/IPv6 Transition Mechanisms

Adira Quintero, Francisco Sans, Eric Gamess

Статья научная

The exhaustion of IPv4 addresses has forced the deployment of the new version of the Internet Protocol (IPv6). However, the migration to the new protocol is done gradually and with the due care for many reasons that include: cost, inclusion of support for IPv6 in existing applications, training of technical staff, lack of web content available over IPv6 from important providers, and obsolete devices not anymore supported by manufacturers. For those reasons, many transition mechanisms have been proposed, each one to fill distinct requirements, with different operational theory and availability according to the network environment. A performance evaluation of these mechanisms can help network administrators and researchers in their selection of the best transition technology for their environment. In this paper, we present a performance comparison of some transition mechanisms such as ISATAP, 6to4, and NAT64 in real testbeds with Debian, Windows 7, Windows 8, and Windows 10. For NAT64, two different tools were tested: TAYGA and Jool. We measure the OWD and the throughput for UDP and TCP for every mechanism, for both Ethernet and Fast Ethernet technologies. From this research, we can conclude that all the modern operating systems for PCs already have good support for IPv6, and a very similar network performance. Also, we can infer from our work that in controlled environments, native IPv4 has the best performance, closely followed by native IPv6. The difference is essentially due to the length of the IP header (20 bytes in IPv4 and 40 bytes in IPv6). The tunneling solutions chosen for this research (ISATAP and 6to4) have a similar performance, which is the lowest of the studied technologies, because of the additional IPv4 header in the tunnel.

Бесплатно

Журнал