International Journal of Computer Network and Information Security @ijcnis
Статьи журнала - International Journal of Computer Network and Information Security
Все статьи: 1201
Study the One-bit Hard Combination Scheme on Cognitive Radio Users
Статья научная
This paper describes the performance of one-bit hard combination scheme of cooperative spectrum sensing for different number of cognitive radio users. We evaluate cooperative spectrum sensing by simulating OR rule as a hard combination data fusion rule. Energy detector is used to observe the presence of primary user (PU) signal. It improves the probability of detection by collaborating to detect PUs signal in cognitive radio (CR) system. Simulation result shows that the probability of missed detection is decreasing for both conventional hard combination and 1-bit hard combination scheme with OR rule correspondingly with increasing the probability of false alarm. It is shown that 1-bit scheme has much better performance than the conventional hard combination scheme. This is also shown that the probability of missed detection is decreased even though CR user is increased. Here missed detection probability is decreased when the number of user increases.
Бесплатно
Статья научная
The development of technology around us is going through a rapid and significant state that is almost causing a technological revolution, so one of the most important problems facing us in the current technological era is the management of warehouse data and the growth occurring in the volume of data that is dealt with on a daily basis, whether in terms of its storage or security, especially if the data is huge and large. Therefore, we developed a proposed model in our study that provides security in addition to storage/warehouse management. In our proposed model, the El-Gamal and GLUON functions address the security problem. In addition to supporting other security methods, such as GLUON, which is secure and fast, for encryption. Hybrid Blockchain technology is used in our proposed model to deal with the storage of this type of huge data, and also for the purpose of organizing warehouse storage. Data is exposed to intrusion or loss when using any traditional, centralized technology or when storing it in databases, so we chose the hybrid Blockchain to be an integrated fit with our proposed model, and also because it allows the distribution of data across public and private domains. Our proposed model, upon examination, shows that it effectively dealt with defending against attacks such as NotPetya, GoldenEye, WannaCry, Emotet, Trickbot, Conti, and DarkSide. In addition, the results of lightweight GLUON and El-Gamal showed that the performance analysis of our model was very successful, where the time it takes to create a block was between 0.01 ns and not more than 0.09 ns which is considered too fast for such a system that deals with a big data. As a result, we were able to gain an effective model for data repository control, security, performance, and management.
Бесплатно
Subcarrier and Power Allocation in OFDM-based Cognitive Radio Systems
Статья научная
For CR systems, where primary and CR users co-exist in adjacent bands, it is important to keep the interference introduced to the primary user (PU) band within a tolerable range. In this paper, we investigate the subcarrier and power allocation problem in CR systems, where primary and CR users co-exist in adjacent bands, while keeping the total interference introduced to the PU band below a certain threshold and the total power allocated to the CR users under a constraint. First, according to the different purposes of the resource allocation, several suboptimal subcarrier allocation algorithms are investigated, which are termed as Max-Rate, Min-Interference and Fair-Rate subcarrier allocation algorithm, separately. Further, for a given subcarrier allocation three suboptimal power allocation algorithms which have less complexity are proposed and compared to the optimal power allocation algorithm. Numerical results are obtained for the behaviors and performance of our proposed algorithms.
Бесплатно
Survey of Current Multipath Routing Protocols for Mobile AD Hoc Networks
Статья научная
A Mobile Ad hoc NETwork (MANET) is a wireless communication network with minimum physical infrastructure with diverse communication applications. Mobility and Multihopping are the main characteristics of MANET. Multipath routing protocols establish multiple routes between nodes. The construction of multiple routes should be done with minimum overhead and bandwidth consumption. The purpose of this article is to analyze the characteristics and functionality of various multipath routing protocols and to do the performance comparison between these multipath routing protocols to choose the best among them to use in large networks.
Бесплатно
Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks
Статья научная
The objective of this paper is to study the vulnerabilities of sensor networks, design, and implement new approaches for routing attack. As one of the cornerstones of network infrastructure, routing systems are facing more threats than ever; they are vulnerable by nature and challenging to protect. We present a new attack, Swarm Flooding Attack, against Directed Diffusion based WSNs, which targets the consumption of sensors computational resources, such as bandwidth, disk space, or processor time. Two variants of swarm attack have been introduced: Bee and Ant. Both approaches are inspired from the natural swarming difference between bees and ants. In all cases, the strategy used to mount an attack is the same. An attack consists of a set of malicious user queries represented by interests that are inserted into the network. However, the two forms of attack vary in the synchronization aspects among attackers. These types of attacks are hard to defend against as illustrated. For each of the proposed attack models, we present analysis, simulation, and experimental measurements. We show that the system achieves maximal damage on system performance represented by many metrics.
Бесплатно
Symmetric Key Encryption using Iterated Fractal Functions
Статья научная
With the advancement in the network transmission media, need for secure data communication is strongly felt. Recently fractal based cryptosystem has become a topic of active research in computer network system because of its chaotic behavior. The proposed method utilizes the intrinsic relationship between Mandelbrot function and Julia function to develop a non-transitional key cryptosystem. The process starts with the formation of public key using superior Mandelbrot set with the help of few global as well as secret parameters on both sides. After exchanging public keys, both parties will generate their own private key using superior Julia set which will be same on both sides. The method is also implemented for Ishikawa iterated fractal function and subsequently carried out detailed analysis for both functions. The given cryptosystem utilizing two different iteration methods and improve the performance by increasing the encryption key up to 128 bits. As per experimental result and performance analysis, the key has large key space, high key sensitivity due to chaotic nature and efficient execution time which helps to achieve a secure communication network environment for data transmission.
Бесплатно
Synthesis of the Structure of a Computer System Functioning in Residual Classes
Статья научная
An important task of designing complex computer systems is to ensure high reliability. Many authors investigate this problem and solve it in various ways. Most known methods are based on the use of natural or artificially introduced redundancy. This redundancy can be used passively and/or actively with (or without) restructuring of the computer system. This article explores new technologies for improving fault tolerance through the use of natural and artificially introduced redundancy of the applied number system. We consider a non-positional number system in residual classes and use the following properties: independence, equality, and small capacity of residues that define a non-positional code structure. This allows you to: parallelize arithmetic calculations at the level of decomposition of the remainders of numbers; implement spatial spacing of data elements with the possibility of their subsequent asynchronous independent processing; perform tabular execution of arithmetic operations of the base set and polynomial functions with single-cycle sampling of the result of a modular operation. Using specific examples, we present the calculation and comparative analysis of the reliability of computer systems. The conducted studies have shown that the use of non-positional code structures in the system of residual classes provides high reliability. In addition, with an increase in the bit grid of computing devices, the efficiency of using the system of residual classes increases. Our studies show that in order to increase reliability, it is advisable to reserve small nodes and blocks of a complex system, since the failure rate of individual elements is always less than the failure rate of the entire computer system.
Бесплатно
SysProp: A Web-based Data Backup, Synchronization and System Administration
Статья научная
From the inception of computer based computing, preventing data loss or data corruption is considered as one of the difficult challenges. In early days, data reliability had been increased by replicating data in multiple disks, which were attached with the same system and later located inside the same network. Later, to avoid potential risk of single point of failure, the replicated data storage has been separated from the network from which the data has been originated. Thus, following the concept of peer-to-peer (P2P) networking, P2P storage system has been designed, where data has been replicated inside multiple remote peers’ redundant storages. With the advent of Cloud computing, a similar but more reliable Cloud-based storage system has been developed. Note that Cloud storages are expensive for small and medium enterprises. Moreover, users are often reluctant to store their sensitive data inside a third-party’s network that they do now own or control. In this paper, we design, develop and deploy a storage system that we named SysProp. Two widely used tools—Web applications and UNIX daemon—have been incorporated in the development process of SysProp. Our goal is to congregate benefits of different storage systems (e.g., networked, P2P and Cloud storages) in a single application. SysProp provides a remotely accessible, Web-based interface, where users have full control over their data and data is being transferred in encrypted form. Moreover, for data backup, a powerful UNIX tool, rsync has been used that synchronize data by transferring only the updated portion. Finally, SysProp is a successful demonstration of the concept that UNIX daemons can be remotely executed and controlled over the Web. Hence, this concept might be exploited to build many system administrative applications.
Бесплатно
System Design of a Trusted SoC and Detailed Analysis of its Secure State Transitions
Статья научная
According to the relevant criterion and principle for designing and evaluating various trusted computing chips, we have proposed a new trusted SoC chip, and have given the implementation of its basic functional modules. In detail, we have discussed the design of the trusted SoC security architecture and the main module functional modules such as microprocessor, cryptographic function module, security management module, input/output interface, along with the most important memory management unit. Moreover, we have discussed reliability of relevant parameters and transfer strategy for trusted root in chip development and application, together with the simulation and validation of corresponding functions. At last, we point out that one of the most important further research directions is the trusted measurement of dynamic data and software running in security environment.
Бесплатно
System Monitoring Addon Analysis in System Load Simulation
Статья научная
The complexity of interconnected devices requires constant real-time monitoring, as failure of one part can have catastrophic consequences for the entire system. Computer-information monitoring tools enable us to always be one step ahead of potential problems that may occur in a monitored network environment, whether it is a human-caused configuration or simply an element has failed or stopped working. Not only can they report potential problems, but they can also solve the problem itself. For example, if an element needs increased resources at a given time, the tool itself can recognize it and automatically increase the resource needs of that element. By setting up a monitoring system in a virtual environment, the results can be seen and through their analysis will bring an optimal solution when it comes to what agent to use. This paper presents analysis of how network monitoring agent is responding in cases when there is increased use of shared resources. Knowing this can help in choosing what agent should be used in any given environment, and with that more resources will be saved. This leads to better utilization of resources which is an important in mid-size and big setup of computer monitoring systems.
Бесплатно
Targeted Attacks Detection and Security Intruders Identification in the Cyber Space
Статья научная
The number of new cybersecurity threats and opportunities is increasing over time, as well as the amount of information that is generated, processed, stored and transmitted using ICTs. Particularly sensitive are the objects of critical infrastructure of the state, which include the mining industry, transport, telecommunications, the banking system, etc. From these positions, the development of systems for detecting attacks and identifying intruders (including the critical infrastructure of the state) is an important and relevant scientific task, which determined the tasks of this article. The paper identifies the main factors influencing the choice of the most effective method for calculating the importance coefficients to increase the objectivity and simplicity of expert assessment of security events in cyberspace. Also, a methodology for conducting an experimental study was developed, in which the goals and objectives of the experiment, input and output parameters, the hypothesis and research criteria, the sufficiency of experimental objects and the sequence of necessary actions were determined. The conducted experimental study confirmed the adequacy of the models proposed in the work, as well as the ability of the method and system created on their basis to detect targeted attacks and identify intruders in cyberspace at an early stage, which is not included in the functionality of modern intrusion detection and prevention systems.
Бесплатно
Task Assignment for Heterogeneous Computing Problems using Improved Iterated Greedy Algorithm
Статья научная
The problem of task assignment is one of the most fundamental among combinatorial optimization problems. Solving the Task Assignment Problem is very important for many real time and computational scenarios where a lot of small tasks need to be solved by multiple processors simultaneously. A classic problem that confronts computer scientists across the globe pertaining to the effective assignment of tasks to the various processors of the system due to the intractability of the task assignment problem for more than 3 processors. Several Algorithms and methodologies have been proposed to solve the Task Assignment Problem, most of which use Graph Partitioning and Graph Matching Techniques. Significant research has also been carried out in solving the Task Assignment Problem in a parallel environment. Here we propose a modified version of iterated greedy algorithm that capitalizes on the efficacy of the Parallel Processing paradigm, minimizing the various costs along with the duration of convergence. The central notion of the algorithm is to enhance the quality of assignment in every iteration, utilizing the values from the preceding iterations and at the same time assigning these smaller computations to internal processors (i.e. parallel processing) to hasten the computation. On implementation, the algorithm was tested using Message Passing Interface (MPI) and the results show the effectiveness of the said algorithm.
Бесплатно
Статья научная
Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols use cryptographic algorithms to secure data and ensure security goals such as Data Confidentiality and Integrity in networking. They are used along with other protocols such as HTTP, SMTP, etc. in applications such as web browsing, electronic mail, and VoIP. The existing versions of the protocols as well as the cryptographic algorithms they use have vulnerabilities and is not resistant towards Man-In-The- Middle (MITM) attacks. Exploiting these vulnerabilities, several attacks have been launched on SSL/TLS such as session hijacking, version degradation, heart bleed, Berserk etc. This paper is a comprehensive analysis of the vulnerabilities in the protocol, attacks launched by exploiting the vulnerabilities and techniques to mitigate the flaws in protocols. A novel taxonomy of the attacks against SSL/TLS has been proposed in this paper.
Бесплатно
TempR: Application of Stricture Dependent Intelligent Classifier for Fast Flux Domain Detection
Статья научная
Fast-flux service networks (FFSN) helps the cyber-criminals to hide the servers used for malicious activities behind a wall of proxies (bots). It provides the reliability and detection evasion to a malicious server. FFSN use a large pool of IP addresses for proxies. Detection of FFSN is difficult as few benign technologies like Content distribution networks and round robin DNS have similar working characteristics. Many approaches have been proposed to detect FFSN and fast flux domains. However, due to dynamic behavior of FFSN, these techniques suffer from a significant number of false positives. In this paper, we present a Temporal and Real time detections based approach (TempR) to detect fast flux domains. The features of fast flux domains and benign domains have been collected and classified using intelligent classifiers. Our technique illustrates 96.99% detection accuracy with the recent behavior of fast flux domains.
Бесплатно
Ternary Tree Based Group Key Agreement for Cognitive Radio MANETs
Статья научная
This paper presents an efficient contributory group key agreement protocol for secure communication between the lightweight small devices in cognitive radio mobile ad hoc networks. A Ternary tree based Group ECDH.2 (TGECDH.2) protocol that uses a batch rekeying algorithm during membership change is proposed in this paper. This ternary tree is a balanced key tree in which appropriate insertion point is selected for the joining members during rekeying operation. TGECDH.2 combines the computational efficiency of ECDH protocol and the communication efficiency of GDH.2 protocol. From the performance analysis, it is inferred that the TGECDH.2 outperforms an existing ternary tree based protocol. Hence, it is best suited for the resource constrained mobile devices such as notebooks, laptops, sensors, etc. in cognitive radio mobile ad hoc networks.
Бесплатно
Text Steganography Using Quantum Approach in Regional Language with Revised SSCE
Статья научная
In this contribution we present a work of text steganography. Maintain the security of the secret information has been a great challenge in our day to day life. Sender can send messages habitually through a communication channel like Internet, draws the attention of third parties, hackers and crackers, perhaps causing attempts to break and expose the unusual messages. Steganography is a talented province which is used for secured data transmission over any public media. Extensive amount of research work has been established by different researchers on steganography. In this paper, a text steganography procedure has been designed with the help of a Regional language of India i.e. Gujarati language. Here the quantum approach also incorporates for increasing the security level. A Revised SSCE code (SSCE - Secret Steganography Code for Embedding) has been implemented in this work to upgrade the level of security. Text steganography together with Revised SSCE code & quantum approach based on the use of two specific and two special characters in Gujarati language and mapping technique of quantum gate truth table have been used.
Бесплатно
Textual Manipulation for SQL Injection Attacks
Статья научная
SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNORT open source. We also conducted an extensive comparison study of some relevant papers.
Бесплатно
The AODV extension protocol named AODV_SPB
Статья научная
An unbalanced traffic load distribution leads to a degradation of network performance; most of nodes in the network are heavily loaded, resulting in a large queue, a high packet delay, and high energy consumption. The optimization of load balancing to avoid congestion has been the subject of many researches in recent years. Many authors have proposed different solutions to anticipate the failure of route in Manets by adding a function that predicts the failure of the links to distribute the traffic load on all nodes of the network. In this paper we propose an extension to the AODV-balanced protocol named AODV_SPB 《ad hoc on demand distance vector with stable path, less congested with load balancing》, which looks for a stable and less overloaded path .A comparative study is done under the NS2 simulator with AODV and AODV-SPB. This last protocol shows its effectiveness with respect to the two protocols cited in terms of; overload, delivery rates of packets and the average of delay with 4 simulation scenarios.
Бесплатно
Статья научная
Elections are believed to be the key pillars of democracy and voting is one of the electoral processes that ensure the sustenance of democracy in any civil society. In this paper, we developed an electronic voting system, which will eliminate rigging and manipulation of results to its barest minimum, this problem is mostly associated with the manual system of voting. The implementation of electronic voting system in Nigeria will boost the integrity of INEC and the result they produce. The programs used to develop this system are PHP, MySQL, Java Query, CSS and HTML. These packages make the Graphic Interface User friendly enough for even those with little or no computer knowledge.
Бесплатно
The Mathematical Model for Research of the UAV Longitudinal Moving
Статья научная
The paper presents one of the perspective directions of the development to modern aviation, which is connected with designing and producing unmanned aerial vehicles (UAV) of various functionalities for applying in both military and civilian spheres. The syntheses of UAV control systems, regardless of their type and purpose presumes creation of adequate mathematical models, first of all adequate aerodynamic mathematical models. In the paper results that forms and justify the aerodynamic mathematical model and as well as the results of building a general mathematical model of the longitudinal movement of the perspective UAV are presented. Also factors that forms the mathematical model on given aerodynamic, geometric, mass and inertial data for a hypothetical perspective altitude long-range UAV are submitted. Assessment of the impact of these data on the dynamic, temporal, and logarithmic frequency response UAV also has been given in this paper.
Бесплатно