International Journal of Computer Network and Information Security @ijcnis
Статьи журнала - International Journal of Computer Network and Information Security
Все статьи: 1148

Security, Privacy and Trust Challenges in Cloud Computing and Solutions
Статья научная
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing recently emerged as a promising solution to information technology (IT) management. IT managers look to cloud computing as a means to maintain a flexible and scalable IT infrastructure that enables business agility. As much as the technological benefits, cloud computing also has risks involved. In this paper Cloud Computing security challenges will be discussed and proposed many new recommendations to increase security and trust also maintaining privacy.
Бесплатно

Selection of Next Generation Anti-Virus against Virus Attacks in Networks Using AHP
Статья научная
Defending against virus attacks in network is a vital part of network security. With the rapid evolution of viruses, its defense mechanism has also been evolved over the years. But given the diversity and complexity of virus propagation and its attack behavior, no defense mechanism is equipped fully to protect the network from such attacks. Several antiviruses are available in the market. But none can give full proof solution to malicious attacks in communication networks. In this paper we present a mechanism to measure and compare the relative ability of antivirus against various kinds of viruses. We construct a hierarchical structure for different virus defense mechanism. Using Analytical Hierarchy Process (AHP) we construct a pair wise comparison matrix and find the value of corresponding Eigen vectors; we then apply the theory of AHP to calculate weight of each defense index. We validated our technique with an example. Our method can provide a strong reference to design an optimal network security solution.
Бесплатно

Selective Video Encryption Using the Cross Coupling of One-dimensional Logistic Maps
Статья научная
H.264 videos have been the most shared type of video format in recent times and hence its security is a major issue. The techniques presented in the recent times incur complex computations. The major research objective is to design an efficient Chaotic Selective Video Encryption (CSVE) technique which can result in a better visual degradation of the encrypted video with less computational complexity. In the proposed work, in order to secure the H.264 videos, two one-dimensional logistic maps are cross coupled in the chaotic encryption technique which uses a lookup table for data conversion. The technique is evaluated using different performance metrics like Peak Signal to Noise Ratio (PSNR), entropy, statistical analysis etc along with the traditional logistic map. The work is compared with some recent techniques in terms of PSNR and was found out that the proposed technique has better encryption effect.
Бесплатно

Self Organized Replica Overlay Scheme for P2P Networks
Статья научная
Peer-to-Peer (P2P) systems are widely used for data sharing applications in an autonomous and decentralized mode. P2P systems are suitable for large-scale distributed environments in which nodes can share resources other than data such as computing power, memory and network bandwidth. Some of important parameters that affect the performance of P2P systems are peer availability, data availability, network overhead, overlay structure, churn rate, and data access time. In this paper a self organized replica overlay scheme "Improved Hierarchical Quorum Consensus" (IHQC) for P2P systems is proposed. This scheme organizes replicas in a Self Organized Hierarchical Logical Structure (SOHLS) that has special properties. The scheme improves performance of the system by reducing search time to form read/write quorums, reducing probability of accessing stale data, improving degree of intersection among consecutive quorums and reducing network overhead. This scheme is highly fault tolerant (tolerate up to faults) due to replication of data and inherits the best property of Read-One-Write-All (ROWA) protocol in a dynamic environment of P2P network. The architecture for IHQC is also proposed for implementing the scheme that supports improved performance of P2P systems. This scheme also maximizes the degree of intersection set of read and write quorums; hence, having higher probability to get updated data as compared to all other schemes. The mathematical correctness of the scheme is also presented in the paper. The results of simulation study of the proposed scheme also support and verify its better performance than Random and Hierarchical Quorum Scheme.
Бесплатно

Статья научная
Vehicle ad hoc networks, or VANETs, are highly mobile wireless networks created to help with traffic monitoring and vehicular safety. Security risks are the main problems in VANET. To handle the security threats and to increase the performance of VANETs, this paper proposes an enhanced trust based aggregate model. In the proposed system, a novel adaptive nodal attack detection approach - entropy-based SVM with linear regression addresses the trust factor with kernel density estimation generating the trustiness value thereby classifying the malicious nodes against the trusted nodes in VANETs. Defending the VANETs is through a novel reliance node estimation approach - Bayesian self-healing AIS with Pearson correlation coefficient aggregate model isolating the malicious node thereby the RSU cluster communication getting secure. Furthermore, even a reliable node may be exploited to deliver harmful messages and requires the authority of both the data and the source node to be carried out by the onboard units of the vehicles getting the reports of incident. DoS attacks (Denial of Service) disrupting the usual functioning of the network leads to inaccessible network to its intended users thereby endangering human lives. The proposed system is explicitly defending the VANET against DoS attacks as it predicts the attack without compromising the performance of the VANET handling nodes with various features and functions based on evaluating the maliciousness of attacking nodes accurately and isolating the intrusion. Furthermore, the performance evaluations prove the effectiveness of the proposed work with increased detection rate by 97%, reduced energy consumption by 39% and reduced latency by 25% compared to the existing studies.
Бесплатно

Semi-Distributed Coordinative Switch Beamforming with Power Scheduling
Статья научная
Beam cooperative scheduling of a downlink transmission is an important technique to improve the spectrum efficiency in next generation mobile networks. This paper focuses on switched beams (the emission angles of the beams are fixed) and proposes a joint beam-power coordinative scheduling algorithm among neighbor sectors in the downlink of mobile systems. Each sector coordinates the applied order and transmitted power of the beams with adjacent interfering sector, so as to reduce inter-sector interference and maximize throughputs. The scheduling problem is modeled as a constrained optimization problem and solved by our proposed iterative approach. Computer simulation shows that the proposed approach significantly outperform the existing round robin beam servicing approach and the approach that applies only beam cooperative scheduling.
Бесплатно

Semi-Physical Simulation of RR/S Attitude Algorithm Based on Non-Holonomic IMU
Статья научная
Rolling Rocket/Shell (RR/S) can effectively overcome the impact point error caused by the asymmetry of aerodynamic appearance and mass eccentricity .etc. The spatial attitude of RR/S in the process of flight must be studied for that RR/S realizes the guidance control and improves the falling point precision. This paper introduces a semi physical simulation of RR/S attitude algorithm based on non-holonomic Inertial Measurement Unit (IMU) which is composed of 3 orthogonal import rate gyroscopes. It adopts the 902E-1 two-axis turntable to simulate the spatial attitude of RR/S, and uses the non-holonomic IMU, which is fixed on the turntable by ensuring the axes of them to be aimed, to measure the 3-axis angular rate motion of the turntable. By setting the motion condition of the turntable, we can get the 3-axis angular rate data of the IMU and the 3-axis angular position data of the turntable. The attitude algorithm simulation of IMU adopts the four-sample rotation vector algorithm based on MTLAB/Simulink. The simulation results show that the semi-physical simulation method can model the spatial attitude of RR/S truly and provide exact and real-time attitude information of RR/S which is rolling in the two-axis complex movement condition.
Бесплатно

Semifragile Watermarking Schemes for Image Authentication- A Survey
Статья научная
Digital images are very easy to manipulate, store, publish and secondary creation this juggle will lead to serious consequence in some applications such as military image, medical image. So, integrity of digital image must be authenticated. Tools that help us establish the authenticity and integrity of digital media are thus essential and can prove vital whenever questions are raised about the origin of an image and its content. To project authenticity of images semi fragile watermarking is very concerned by researchers because of its important function in content authentication. Semifragile watermarking aim to monitor contents of images not its representations. In present paper various semi fragile water marking algorithm are studied using some image quality matrices, insertion methods used, verification method . Finally some observations are given based on literature survey of algorithms and techniques of semifragile watermarking techniques
Бесплатно

Sensitive Data Identification and Security Assurance in Cloud and IoT based Networks
Статья научная
Sensitive data identification is a vital strategy in any distributed system. However, in the case of non-appropriate utilization of the system, sensitive data security can be at risk. Therefore, sensitive data identification and its security validation are mandatory. The paper primarily focuses on novel sensitive data recognition methodologies. Further, the sensitivity score of the attributes distinguishes non-sensitive attributes, and domain expert plays an important role in this process. The designing of the security assurance Algo and their corresponding decision tables make the system more robust and reliable. The result section is validated with the help of graphical representation, which clearly makes the authenticity of the research work. In summary, the authors may say that the sensitive data identification and security assurance of the proposed system is automated and work optimally in a cloud-based system.
Бесплатно

Sentiment Analysis CSAM Model to Discover Pertinent Conversations in Twitter Microblogs
Статья научная
In recent years, the most exploited sources of information such as Facebook, Instagram, LinkedIn and Twitter have been considered to be the main sources of misinformation. The presence of false information in these social networks has a very negative impact on the opinions and the way of thinking of Internet users. To solve this problem of misinformation, several techniques have been used and the most popular is the sentiment analysis. This technique, which consists in exploring opinions on corpora of texts, has become an essential topic in this field. In this article, we propose a new approach, called Conversational Sentiment Analysis Model (CSAM), allowing, from a text written on a subject through messages exchanged between different users, called a conversation, to find the passages describing feelings, emotions, opinions and attitudes. This approach is based on: (i) the conditional probability in order to analyse sentiments of different conversation items in Twitter microblog, which are characterized by small sizes, the presence of emoticons and emojis, (ii) the aggregation of conversation items using the uncertainty theory to evaluate the general sentiment of conversation. We conducted a series of experiments based on the standard Semeval2019 datasets, using three standard and different packages, namely a library for sentiment analysis TextBlob, a dictionary, a sentiment reasoner Flair and an integration-based framework for the Vader NLP task. We evaluated our model with two dataset SemEval 2019 and ScenarioSA, the analysis of the results, which we obtained at the end of this experimental study, confirms the feasibility of our model as well as its performance in terms of precision, recall and F-measurement.
Бесплатно

Server-Side Encrypting and Digital Signature Platform with Biometric Authorization
Статья научная
The most important shortcomings of solutions based on public key infrastructure and digital signatures are: costs, ambiguous laws, and nuisance of daily use. The purpose of this article is to discuss the motivation and benefits, as well as a presentation of concepts, high-level architecture, and demonstration of the operation of bioPKI; i.e., a server-side encryption and digital signature platform with biometric authorization. The usefulness of even the most advanced platform of any type is negligible if convenient and easy-to-implement mechanisms are not provided to integrate this solution with external systems and applications. Thus, the possibility of integrating the bioPKI platform with applications and systems supporting PKCS#11 or CryptoAPI CSP is discussed.
Бесплатно

Статья научная
Mobile Ad-Hoc networks (MANETs) can be classified as Decentralized, Independent and Self- Organizing dynamic networks of intellectual movable nodes. In such networks, devices are connected by provisional wireless links. Dynamic topology imposes challenges in developing an efficient routing protocol, for enabling successful communication between mobile devices. Based on the nature of working, proactive & reactive protocols are the two broadly classified categories of routing protocols. This paper presents, relative experimental analysis of proactive routing protocols viz., Optimized Link State Routing Protocol (OLSR) and its variant (Kenji Yamada et al., 2010) with Cooperative Multi-Point Relay (MPR) Selection. To compare OLSR and its variant protocol, the Network Simulator- 2.35 is used to carry out numerous simulations, on arbitrary scenarios, by varying the number of network nodes & mobility of nodes. As per the simulation outcomes, the OLSR with a cooperative MPR selection has outperformed the traditional OLSR protocol in static scenarios or when the network load has been varied. On the contrary, the traditional OLSR protocol has performed better in mobile scenarios. But, as demonstrated from various experimentations, it exhibits higher Routing Overheads as compared to its variant protocol. Further, on the basis of simulation results, efforts can be made in the direction of performance optimization of OLSR and its variant protocol, to improve its performance in highly mobile scenarios as well, keeping in view other performance metrics.
Бесплатно

Single Sign-On in Cloud Federation using CloudSim
Статья научная
Single Sign-On (SSO) is an authentication mechanism in which a Cloud Service Consumer (CSC) needs to be authenticated only once while accessing vari-ous services from multiple service providers, or when accessing multiple services from the same service provid-er. In the case of Cloud Federation, the consumers can get services from various Cloud Service Providers (CSPs) who are members of the federation, and SSO can be used to verify the legitimate users without requiring them to get authenticated with each service provider separately. CloudSim is a popular tool used for simulating various cloud computing scenarios. As of now, the simulator lacks effective user authentication and authorization methods with it. In this paper, we discuss the design and implementation of SSO mechanism in the Cloud Federa-tion scenario using the CloudSim toolkit. We have used the Fully Hashed Menezes-Qu-Vanstone (FHMQV) pro-tocol for the key exchange and the Symmetric Key En-cryption technique AES-128 for encrypting the identity tokens. We give the workflow model for the proposed approach of SSO in the Cloud Federation and also, the execution time taken in the simulation for various Single Sign-On scenarios where the number of SSO required varies are also shown.
Бесплатно

Social Engineering: I-E based Model of Human Weakness for Attack and Defense Investigations
Статья научная
Social engineering is the attack aimed to manipulate dupe to divulge sensitive information or take actions to help the adversary bypass the secure perimeter in front of the information-related resources so that the attacking goals can be completed. Though there are a number of security tools, such as firewalls and intrusion detection systems which are used to protect machines from being attacked, widely accepted mechanism to prevent dupe from fraud is lacking. However, the human element is often the weakest link of an information security chain, especially, in a human-centered environment. In this paper, we reveal that the human psychological weaknesses result in the main vulnerabilities that can be exploited by social engineering attacks. Also, we capture two essential levels, internal characteristics of human nature and external circumstance influences, to explore the root cause of the human weaknesses. We unveil that the internal characteristics of human nature can be converted into weaknesses by external circumstance influences. So, we propose the I-E based model of human weakness for social engineering investigation. Based on this model, we analyzed the vulnerabilities exploited by different techniques of social engineering, and also, we conclude several defense approaches to fix the human weaknesses. This work can help the security researchers to gain insights into social engineering from a different perspective, and in particular, enhance the current and future research on social engineering defense mechanisms.
Бесплатно

Social Networking for Botnet Command and Control
Статья научная
A botnet is a group of compromised computers—often a large group—under the command and control of a malicious botmaster. Botnets can be used for a wide variety of malicious attacks, including spamming, distributed denial of service, and identity theft. Botnets are generally recognized as a serious threat on the Internet. This paper discusses SocialNetworkingBot, a botnet we have developed that uses Twitter for command and control. In SocialNetworkingBot, the botmaster tweets commands that are acted on by the individual bots. We discuss the functionality and implementation of SocialNetworkingBot, as well as a small-scale experiment that we have conducted. The botnet presented here is intended to serve as a proof of concept and a platform to facilitate further research.
Бесплатно

Software Activation Using Multithreading
Статья научная
Software activation is an anti-piracy technology designed to verify that software products have been legitimately licensed. Activation should be quick and simple while simultaneously being secure and protecting customer privacy. The most common form of software activation is for the user to enter a legitimate product serial number. However, software activation based on serial numbers appears to be weak, since cracks for many programs are readily available on the Internet. Users can employ such cracks to bypass software activation. Serial number verification logic usually executes sequentially in a single thread. Such an approach is relatively easy to break since attackers can trace the code to understand how the logic works. In this paper, we develop a practical multi-threaded verification design. Our results show that by proper use of multi-threading, the amount of traceable code in a debugger can be reduced to a low percentage of the total and the traceable code in each run can differ as well. This makes it significantly more difficult for an attacker to reverse engineer the code as a means of bypassing a security check. Finally, we attempt to quantify the increased effort needed to break our verification logic.
Бесплатно

Статья научная
Quality is a consequential factor for the software product. During the software development at most care was taken at each step for the quality product. Development process generally embedded with several qualitative and quantitative techniques. The characteristics of final software product should reach all the standards. Reliability is a paramount element which quantifications the probability that a software product could able to work afore it authentically fails to perform its intended functionality. Software testing is paramount phase where gargantuan resources were consumed. Over around fifty percent of cost was consumed during this testing phase, that is why testing was performed in disciplined environment. Software product release time is considered to be crucial subject at which the software product testing was stopped and it could be release into market, such that the software product should have quality and reliability. In this paper we have investigated the concept of software testing effort dependent software reliability growth models by considering the exponentiated-gompertz function as testing effort function to determine the release time of the software. Thus, constructed testing effort dependent models was computed on three authentic time datasets. Parameter estimation is done through least square estimation and metrics like Mean square Error (MSE) and Absolute Error (AE) are utilized for model comparison. The proposed testing effort dependent model performance was better than the rest of the models.
Бесплатно

Spam Reduction by using E-mail History and Authentication (SREHA)
Статья научная
Spam messages are today one of the most serious threats to users of E-mail messages. There are several ways to prevent and detect spam message, the most important way is filtering spam. Sometimes Filtering fails to discover some spam messages or even fails in the classification of non-spam messages as a spam messages. In this paper, we suggest a new effective method that reduces the spam messages by integrating prevention and detection techniques in one scheme. The reduction achieved by considering history and user authentication. This method based on issuing a certificate to each reliable user during the process of Email account Creation. The certificate used by Email servers to discard or forward ingoing or outgoing Emails. Each Server has to maintain white, gray and blacklist according to Email classification spam or ham, which determined by the user or by the contents examination of the message in terms of empty or contained only links without any text or by searching for a specific keywords in the subject and in the content. We believe that there are no bad or good E–mails forever, so the proposed model dynamically allows the transition of E-mail from one state to another state based on the number of received spam and ham messages.
Бесплатно

Статья научная
In the presented paper it is investigated the influence of the subjective perception of the objectively existing security values upon the security measures and indicators in the framework of the subjective entropy maximum principle. The subjective analysis theory entropy paradigm makes it possible to consider the security system based upon dynamic parameters as an active system governed by an individual (active element of the managerial system) with the help of her/his individual subjective preferences optimal distributions obtained in conditions of the available situation multi-alternativeness and those achievable alternatives presence, as well as the active system active element’s individual subjective preferences uncertainty. The described approach takes into account the simple two-alternative security situation in regards with the objectively existing effectiveness functions, related to security measures, in the view of a controlled parameter and a combination of it with its rate as the ratio. It is obtained the expressions for the objective functional extremal functions of the effectiveness and preferences, mathematically explicitly visualizing the security situation and allowing taking a good choice. The ideas of the required proper governing, managing, and control methods choice optimization with respect to only 2 alternative objective effectiveness functions arguments might be simple; nevertheless, increasing the number of parameters and further complication of the problem setting will not change the principle of the problem solution. This study is rather comparative. The significance and value of the study becomes clear in comparison with the theoretical results in the entropy paradigm field. Herein the solution obtained in the explicit view based upon the integral form objective functional. Such kind of dynamic optimization was not modeled in the background works.
Бесплатно

Split-Network in Wireless Sensor Network:Attack and Countermeasures
Статья научная
Wireless Sensor Network usually is deployed open environment to collect some sensitive information and has special features of its own are different from traditional network, which is vulnerable to internal and external attacks. Whole network can be split up into many separate subnets which cannot communicate with each other because some vital sensor nodes are attacked. This paper proposed an effective countermeasure based on ARMA prediction model and frequency hopping to react against split-network attack. ARMA model is used to evaluate the behavior of sensor nodes. Frequency hopping makes the communication frequency of the network escape from attack frequency. Then wireless sensor network is integrated into single network from split-network. Simulation results show the proposed countermeasure significantly reduces the success rate of split-network attack and increases the lifetime of network.
Бесплатно