International Journal of Computer Network and Information Security @ijcnis
Статьи журнала - International Journal of Computer Network and Information Security
Все статьи: 1148

Статья научная
Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols use cryptographic algorithms to secure data and ensure security goals such as Data Confidentiality and Integrity in networking. They are used along with other protocols such as HTTP, SMTP, etc. in applications such as web browsing, electronic mail, and VoIP. The existing versions of the protocols as well as the cryptographic algorithms they use have vulnerabilities and is not resistant towards Man-In-The- Middle (MITM) attacks. Exploiting these vulnerabilities, several attacks have been launched on SSL/TLS such as session hijacking, version degradation, heart bleed, Berserk etc. This paper is a comprehensive analysis of the vulnerabilities in the protocol, attacks launched by exploiting the vulnerabilities and techniques to mitigate the flaws in protocols. A novel taxonomy of the attacks against SSL/TLS has been proposed in this paper.
Бесплатно

TempR: Application of Stricture Dependent Intelligent Classifier for Fast Flux Domain Detection
Статья научная
Fast-flux service networks (FFSN) helps the cyber-criminals to hide the servers used for malicious activities behind a wall of proxies (bots). It provides the reliability and detection evasion to a malicious server. FFSN use a large pool of IP addresses for proxies. Detection of FFSN is difficult as few benign technologies like Content distribution networks and round robin DNS have similar working characteristics. Many approaches have been proposed to detect FFSN and fast flux domains. However, due to dynamic behavior of FFSN, these techniques suffer from a significant number of false positives. In this paper, we present a Temporal and Real time detections based approach (TempR) to detect fast flux domains. The features of fast flux domains and benign domains have been collected and classified using intelligent classifiers. Our technique illustrates 96.99% detection accuracy with the recent behavior of fast flux domains.
Бесплатно

Ternary Tree Based Group Key Agreement for Cognitive Radio MANETs
Статья научная
This paper presents an efficient contributory group key agreement protocol for secure communication between the lightweight small devices in cognitive radio mobile ad hoc networks. A Ternary tree based Group ECDH.2 (TGECDH.2) protocol that uses a batch rekeying algorithm during membership change is proposed in this paper. This ternary tree is a balanced key tree in which appropriate insertion point is selected for the joining members during rekeying operation. TGECDH.2 combines the computational efficiency of ECDH protocol and the communication efficiency of GDH.2 protocol. From the performance analysis, it is inferred that the TGECDH.2 outperforms an existing ternary tree based protocol. Hence, it is best suited for the resource constrained mobile devices such as notebooks, laptops, sensors, etc. in cognitive radio mobile ad hoc networks.
Бесплатно

Text Steganography Using Quantum Approach in Regional Language with Revised SSCE
Статья научная
In this contribution we present a work of text steganography. Maintain the security of the secret information has been a great challenge in our day to day life. Sender can send messages habitually through a communication channel like Internet, draws the attention of third parties, hackers and crackers, perhaps causing attempts to break and expose the unusual messages. Steganography is a talented province which is used for secured data transmission over any public media. Extensive amount of research work has been established by different researchers on steganography. In this paper, a text steganography procedure has been designed with the help of a Regional language of India i.e. Gujarati language. Here the quantum approach also incorporates for increasing the security level. A Revised SSCE code (SSCE - Secret Steganography Code for Embedding) has been implemented in this work to upgrade the level of security. Text steganography together with Revised SSCE code & quantum approach based on the use of two specific and two special characters in Gujarati language and mapping technique of quantum gate truth table have been used.
Бесплатно

Textual Manipulation for SQL Injection Attacks
Статья научная
SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNORT open source. We also conducted an extensive comparison study of some relevant papers.
Бесплатно

The AODV extension protocol named AODV_SPB
Статья научная
An unbalanced traffic load distribution leads to a degradation of network performance; most of nodes in the network are heavily loaded, resulting in a large queue, a high packet delay, and high energy consumption. The optimization of load balancing to avoid congestion has been the subject of many researches in recent years. Many authors have proposed different solutions to anticipate the failure of route in Manets by adding a function that predicts the failure of the links to distribute the traffic load on all nodes of the network. In this paper we propose an extension to the AODV-balanced protocol named AODV_SPB 《ad hoc on demand distance vector with stable path, less congested with load balancing》, which looks for a stable and less overloaded path .A comparative study is done under the NS2 simulator with AODV and AODV-SPB. This last protocol shows its effectiveness with respect to the two protocols cited in terms of; overload, delivery rates of packets and the average of delay with 4 simulation scenarios.
Бесплатно

Статья научная
Elections are believed to be the key pillars of democracy and voting is one of the electoral processes that ensure the sustenance of democracy in any civil society. In this paper, we developed an electronic voting system, which will eliminate rigging and manipulation of results to its barest minimum, this problem is mostly associated with the manual system of voting. The implementation of electronic voting system in Nigeria will boost the integrity of INEC and the result they produce. The programs used to develop this system are PHP, MySQL, Java Query, CSS and HTML. These packages make the Graphic Interface User friendly enough for even those with little or no computer knowledge.
Бесплатно

The Mathematical Model for Research of the UAV Longitudinal Moving
Статья научная
The paper presents one of the perspective directions of the development to modern aviation, which is connected with designing and producing unmanned aerial vehicles (UAV) of various functionalities for applying in both military and civilian spheres. The syntheses of UAV control systems, regardless of their type and purpose presumes creation of adequate mathematical models, first of all adequate aerodynamic mathematical models. In the paper results that forms and justify the aerodynamic mathematical model and as well as the results of building a general mathematical model of the longitudinal movement of the perspective UAV are presented. Also factors that forms the mathematical model on given aerodynamic, geometric, mass and inertial data for a hypothetical perspective altitude long-range UAV are submitted. Assessment of the impact of these data on the dynamic, temporal, and logarithmic frequency response UAV also has been given in this paper.
Бесплатно

Статья научная
We described the placing of the mobile agents in a dynamic environment. It formed a dynamic environment for a complex of dynamically changing mobile agents. We described a two-level system of connections at the global and local levels of interaction. Such a scheme allows you to support the survivability of a dynamic environment. We presented the model of placement of mobile agents in a dynamic environment, which forms the basis of the trajectory of interaction between mobile agents, enabling us to combine the dynamic environment into a unified dynamic environment. The proposed method for mobile agents parameters restoring in a unified dynamic environment, taking into account the similarity coefficients, allows restore 80% parameters of an inaccessible mobile agent. This indicates the high efficiency of the objects description in the form of a unified dynamic environment in order to maintain its integrity.
Бесплатно

The New Block Cipher Design (Tigris Cipher)
Статья научная
In the present paper we have proposed a new variant of AES cipher with high level of security and an elegant construction called TIGRIS cipher. The TIGRIS name has been derived from one of the two famous rivers in Iraq. The proposed TIGRIS cipher is a revision for the proposed Euphrates cipher which has already been published. It has been designed with a good coherent structure that is based on solid algebraic and well mathematical opinions. The proposed cipher uses the SPN structure and what is known by the Galois Field GF (28). It is an iterated cipher that has a conservative design which is easily implemented on both hardware and software. It operates with block size of 128-bits and with three variable key lengths of 128-bits, 192-bits and 256-bits in addition to sixteen rounds or multiples of four rounds. The proposed cipher works with good invertible operations' stages and a compact duplicated ciphering key. The Tigris cipher construction strategy includes the adoption of construction a new S-box with high non-linearity that uses the same routines of the AES-S-box stage but with different modular arithmetic of irreducible polynomial and different affine matrix in addition to the distinct constant vector. The second and the third layers of the proposed model are based on the shifting concept for the confusion and diffusion process with reversible operations. The last layer of the proposed model is the key addition layer that is responsible for the expanding and generating the ciphering key by two directions those of row and column expansion, which are associated with two constant vectors of golden ratio and base nature algorithm as a fixed word to eliminate any weak or semi-weak ciphering key.
Бесплатно

Статья научная
There is suggested a method for the trust level establishment to the nodes of distributed computer systems (DCS) taken into account the dynamics of the information value changing and with the in-time records of the security incidents from the nodes. The proposed method of the DCS nodes rating establishment allows adaptively and during the DCS functioning to determine a safety configuration of resources (nodes) for the information processing in the DCS. Also, there is described the specifics of the implementation of the mechanisms for the nodes trust level establishment.
Бесплатно

The Research of Unconditionally Secure Authentication Code For Multi-Source Network Coding
Статья научная
In a network system, network coding allows intermediate nodes to encode the received messages before forwarding them, thus network coding is vulnerable to pollution attacks. Besides, the attacks are amplified by the network coding process with the result that the whole network maybe polluted. In this paper, we proposed a novel unconditionally secure authentication code for multi-source network coding, which is robust against pollution attacks. For the authentication scheme based on theoretic strength, it is robust against those attackers that have unlimited computational resources, and the intermediate nodes therein can verify the integrity and origin of the encoded messages received without having to decode them, and the receiver nodes can check them out and discard the messages that fail the verification. By this way, the pollution is canceled out before reaching the destinations.
Бесплатно

The Scalability and Stability Analysis of KLEACH Routing Protocol in Wireless Sensor Networks
Статья научная
The scalability and stability in wireless sensor networks (WSNs) are considering as an important issue due to the large numbers of nodes and consequently their node density and deployment. While the network size increase, the need of scalable and efficient routing protocols is indispensable. Moreover, sensor nodes have to be alive to guarantee the network operation for the period which the first node died doesn't appear. This period, named network stability region, is ameliorated by many techniques. In fact, the balancing energy consumption and clustering method are among those techniques. In this paper, we present the scalability and stability analysis of the routing protocol LEACH based on K-means clustering algorithm (KLEACH). Accordingly, the simulation results of the performance metrics verify the efficiency and the scalability of KLEACH protocol compared to LEACH.
Бесплатно

The Security of Blockchain-based Electronic Health Record: A Systematic Review
Статья научная
The healthcare industry makes rampant strides in sharing electronic health records with upgraded efficiency and delivery. Electronic health records comprise personal and sensitive information of patients that are confidential. The current security mechanism in cloud computing to store and share electronic health records results in data breaches. In the recent era, blockchain is introduced in storing and accessing electronic health records. Blockchain is utilized for numerous applications in the healthcare industry, such as remote patient tracking, biomedical research, collaborative decision making and patient-centric data sharing with multiple healthcare providers. In all circumstances, blockchain guarantees immutability, data privacy, data integrity, transparency, interoperability, and user privacy that are strictly required to access electronic health records. This review paper provides a systematic study of the security of blockchain-based electronic health records. Moreover, based on thematic content analysis of various research literature, this paper provides open challenges in the blockchain-based electronic health record.
Бесплатно

The energy-saving modification program of lighting equipment based on the economic evaluation
Статья научная
Considering many lighting energy-saving modification programs have the phenomenon of diseconomy; this paper takes into account economic evaluation to solve this problem. The optimal program of total energy-saving benefit will be found under the limited investment according to economic evaluation of the price, life span and power consumption of lighting equipments. Firstly, the benefit ratio will be used to evaluate on the necessity of modification, and get the order. If the biggest benefit ratio exists in different equipments simultaneously, the better one will be selected in terms of relative payback period of investment. And on the basis, the relative remaining time is innovatively introduced into economic evaluation to determine the locations of modification. Then an example from a factory can prove that the program is workable.
Бесплатно

The method of hidden terminal transmission of network attack signatures
Статья научная
This article is proposes a new approach to the transmission of signatures of network attacks onto a remote Internet resource. The problem is that the known protocols that are used for transfer data and control actions from an administrative resource to a network agents are poorly protected. Even in case of use of cryptographic mechanisms for organization of secure connections, it is possible to form behavioral patterns of interactions such as "administrative resource - network agents." Such templates allow to predict the actions taken in accordance with the security policy in order to maintain the required level of functionality of a remote Internet resource. Thus, it is necessary to develop a new protocol for the transfer of designated information, based on information technology, which level out the existence of opportunities for the formation of behavioral patterns of network interactions. As such technology, it is proposed to use a set of means of network interaction and some methods of hidden (steganographic) data transmission in information and telecommunication networks.
Бесплатно

Threat Modelling and Detection Using Semantic Network for Improving Social Media Safety
Статья научная
Social media provides a free space to users to post their information, opinions, feelings, etc. Also, it allows users to easily and simultaneously communicate with each other. As a result, threat detection in social media is critical for ensuring the user’s safety and preventing suspicious activities such as criminal behavior, hate speech, ethnic conflicts and terrorist plots. These suspicious activities have a negative impact on the community’s life and cause tension and social unrest among individuals in both inside and outside of cyberspace. Furthermore, with the recent popularity of social networking sites, the number of discussions containing threats is increasing, causing fear in various parties, whether at the individual or state level. Moreover, these social networking service providers do not have complete control over the content that users post. In this paper, we propose to design a threat detection model on Twitter using a semantic network. To achieve this aim, we designed a threat semantic network, named, ThrNet that will be integrated in our proposed threat detection model called, DetThr. We compared the performance of our model (DetThr) with a set of well-known Machine Learning algorithms. Results show that the DetThr model achieves an accuracy of 76% better than Machine Learning algorithms. It works well with an error rate of forecasting threatening tweet messages as non-threatening (false negatives) is about 29%, while the error rate of forecasting non-threatening tweet messages as threatening (false positives) is about 19%.
Бесплатно

Threshold Based Kernel Level HTTP Filter (TBHF) for DDoS Mitigation
Статья научная
HTTP flooding attack has a unique feature of interrupting application level services rather than depleting the network resources as in any other flooding attacks. Bombarding of HTTP GET requests to a target results in Denial of Service (DoS) of the web server. Usage of shortened Uniform Resource Locator (URL) is one of the best ways to unknowingly trap users for their participation in HTTP GET flooding attack. The existing solutions for HTTP attacks are based on browser level cache maintenance, CAPTCHA technique, and usage of Access Control Lists (ACL). Such techniques fail to prevent dynamic URL based HTTP attacks. To come up with a solution for the prevention of such kind of HTTP flooding attack, a real time HTTP GET flooding attack was generated using d0z-me, a malicious URL shortener tool. When user clicked the shortened URL, it was found that the user intended web page was displayed in the web browser. But simultaneously, an avalanche of HTTP GET requests were generated at the backdrop to the web server based on the scripts downloaded from the attacker. Since HTTP GET request traffic are part of any genuine internet traffic, it becomes difficult for the firewall to detect such kind of attacks. This motivated us to propose a Threshold Based Kernel Level HTTP Filter (TBHF), which would prevent internet users from taking part in such kind of Distributed Denial of Service (DDoS) attacks unknowingly. Windows Filtering Platform (WFP), which is an Application Programming Interface (API), was used to develop TBHF. The proposed solution was tested by installing TBHF on a victim machine and generating the DDoS attack. It was observed that the TBHF completely prevented the user from participating in DDoS attack by filtering out the malicious HTTP GET requests while allowing other genuine HTTP GET requests generated from that system
Бесплатно

Through the diversity of bandwidth-related metrics, estimation techniques and tools: an overview
Статья научная
The knowledge of bandwidth in communi - cation networks can be useful in various applications. Some popular examples are validation of service level agreements, traffic engineering and capacity planning support, detection of congested or underutilized links, optimization of network route selection, dynamic server selection for downloads and visualizing network topologies, to name just a few. Following these various motivations, a variety of bandwidth estimation techniques and tools have been proposed in the last decade and still, several new ones are currently being introduced. They all show a wide spectrum of different assumptions, characteristics, advantages and limitations. In this paper, the bandwidth estimation literature is reviewed, with focus on introducing four specific bandwidth-related metrics including capacity, available bandwidth, achievable throughput and bulk transfer capacity (BTC); describing the main characteristics, strengths and weaknesses of major bandwidth estimation techniques as well as classifying the respective tool implementations. Also, the fundamental challenges, practical issues and difficulties faced by designing and implementing bandwidth estimation techniques are addressed.
Бесплатно

Time Window Management for Alert Correlation using Context Information and Classification
Статья научная
Alert correlation is a process that analyzes the alerts produced by one or more intrusion detection systems and provides a more succinct and high-level view of occurring or attempted intrusions. Several alert correlation systems use pairwise alert correlation in which each new alert is checked with a number of previously received alerts to find its possible correlations with them. An alert selection policy defines the way in which this checking is done. There are different alert selection policies such as select all, window-based random selection and random directed selection. The most important drawback of all these policies is their high computational costs. In this paper a new selection policy which is named Enhanced Random Directed Time Window (ERDTW) is introduced. It uses a limited time window with a number of sliding time slots, and selects alerts from this time window for checking with current alert. ERDTW classifies time slots to Relevant and Irrelevant slots based on the information gathered during previous correlations. More alerts are selected randomly from relevant slots, and less or no alerts are selected from irrelevant slots. ERDTW is evaluated by using DARPA2000 and netforensicshoneynet data. The results are compared with other selection policies. For LLDoS1.0 and LLDoS2.0 execution times are decreased 60 and 50 percent respectively in comparing with select all policy. While the completeness, soundness and false correlation rate for ERDTW are comparable with other more time consuming policies. For larger datasets like netforensicshoneynet, performance improvement is more considerable while the accuracy is the same.
Бесплатно