Wednesday, December 28, 2016

A Bastion Mobileid-Based Authentication Technique (BMBAT)


Abdelmunem Abuhasan and Adwan Yasin

Department of Computer Science, Arab American University, Jenin, Palestine 

ABSTRACT

Despite their proven security breaches, text passwords have been dominating all other methods of human authentication over the web for tens of years, however, the frequent successful attacks that exploit the passwords vulnerable model raises the need to enhance web authentication security. This paper proposes BMBAT; a new authentication technique to replace passwords, that leverages the pervasive user mobile devices, QR codes and the strength of symmetric and asymmetric cryptography. In BMBAT, the user’s mobile device acts as a user identity prover and a verifier for the server; it employs a challenge-response model with a dual mode of encryption using AES and RSA keys to mutually authenticate the client to the server and vice-versa. BMBAT combats a set of attack vectors including phishing attacks, man in the middle attacks, eavesdropping and session hijacking. A prototype of BMBAT has been developed and evaluated; the evaluation results show that BMBAT is a feasible and competitive alternative to passwords.

KEYWORDS

Web Authentication, Mobile Authentication, phishing, User Identity, Password.



Thursday, December 8, 2016

A Mechanism for Early Detecting Ddos Attacks Based On M/G/R Ps Queue

Nguyen Hong Son
Department of Information and Communication Technology, Post and
Telecommunication Institute of Technology, Ho Chi Minh City, Viet Nam

ABSTRACT

When service system is under DDoS attacks, it is important to detect anomaly signature at starting time of attack for timely applying prevention solutions. However, early DDoS detection is difficult task because the velocity of DDoS attacks is very high. This paper proposes a DDoS attack detection method by modeling service system as M/G/R PS queue and calculating monitoring parameters based on the model in odder to early detect symptom of DDoS attacks. The proposed method is validated by experimental system and it gives good results.

KEYWORDS



DDoS, Detection, M/G/R Processor Sharing queue

Wednesday, December 7, 2016

Steganalysis Algorithm for PNG Images Based On Fuzzy Logic Technique


Jawaher alqahtani, Daniyal Alghazzawi 1and Li Cheng 2
1Department of Information Systems, King Adbulaziz University, Jeddah, Saudi Arabia
2Xinjiang Technical Institute of Physics & Chemistry, Chinese Academy of Sciences, China

ABSTRACT

Embedding a message in media files, also known as steganography, is a common approach to hide secret information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure, tools have been developed in order to detect hidden information form digital media such as text, image, audio or video files. However the efficiency and performance of previous approaches still have room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments.Finally we introduce our message detection system for PNG files based on LSB approach and present its usability in different case scenarios.

KEYWORDS

Steganography, Steganalysis, Artificial Intelligence, fuzzy logic.

Wednesday, September 21, 2016

A Novel Charging and Accounting Scheme In Mobile Ad-Hoc Networks



Inna Kofman1 and Nurul Huda2
1University of Duesseldorf, Department of Computer Science,
Duesseldorf, Germany
2Ted Rogers School of Information Technology Management,
Ryerson University, Toronto

ABSTRACT

Because of the lack of infrastructure in mobile ad hoc networks (MANETs), their proper functioning must rely on co-operations among mobile nodes. However, mobile nodes tend to save their own resources and may be reluctant to forward packets for other nodes. One approach to encourage co-operations among nodes is to reward nodes that forward data for others. Such an incentive-based scheme requires a charging and accounting framework to control and manage rewards and fines (collected from users committing infractions). In this paper, we propose a novel charging and accounting scheme for MANETs. We present a detailed description of the proposed scheme and demonstrate its effectiveness via formal proofs and simulation results [15]. We develop a theoretical game model that offers advice to network administrators about the allocation of resources for monitoring mobile nodes. The solution provides the optimal monitoring probability, which discourages nodes from cheating because the gain would be compensated by the penalty.

KEYWORDS
Mobile Ad-hoc Networks, Cooperation, Security, Game Theory, Inspection Game.


MORE.......

Intrusion Detection System Using Discrete Fourier Transform with Window Function



Yusuke Tsuge and HidemaTanaka
National Defense Academy of Japan
Hashirimizu 1-10-20 Yokosuka, Kanagawa Japan 239-8686,
ABSTRACT

An Intrusion Detection System (IDS) is counter measure against network attack. There are mainly two Types of detections; signature-based and anomaly-based. And there are two kinds of error; false negative and false positive. In development of IDS, establishment of a method to reduce such false is a major issue. In this paper; we propose a new anomaly-based detection method using Discrete Fourier Transform (DFT) with window function. In our method, we assume fluctuation of payload in ordinary sessions as random. On the other hand, we can see fluctuation in attack sessions have bias. From the view point of spectrum analysis based on such assumption, we can find out different characteristic in spectrum of attack sessions. Using the characteristic, we can detect attack sessions. Example detection against Kyoto2006+ dataset shows 12.0% of false positive at most, and 0.0% of false negative.

KEYWORDS
Intrusion Detection System, Discrete Fourier Transform, window function, Kyoto2006+ dataset

Wednesday, September 14, 2016

Trends Toward Real-Time Network Data Steganography



James Collins, Sos Agaian
The University of Texas at San Antonio, San Antonio, Texas, USA

Abstract

Network steganography has been a well-known covert data channeling method for over three decades. The basic set of techniques and implementation tools have not changed significantly since their introduction in the early 1980’s. In this paper, we review the predominant methods of classical network steganography, describing the detailed operations and resultant challenges involved in embedding data in the network transport domain. We also consider the various cyber threat vectors of network steganography and point out the major differences between classical network steganography and the widely known end-point multimedia embedding techniques, which focus exclusively on static data modification for data hiding. We then challenge the security community by introducing an entirely new network data hiding methodology, which we refer to as real-time network data steganography. Finally, we provide the groundwork for this fundamental change of covert network data embedding by introducing a system-level implementation for real-time network data operations that will open the path for even further advances in computer network security.

KEYWORDS

Network Steganography, Real-time Networking, TCP/IP Communications, Network Protocols

Tuesday, September 6, 2016

Authentication Using Trust To Detect Misbehaving Nodes In Mobile Ad Hoc Networks Using Q-Learning



S.Sivagurunathan1, K.Prathapchandran2 and A.Thirumavalavan3
1, 2 Department of Computer Science and Applications
Gandhigram Rural Institute-Deemed University, Gandhigram-624 302
Tamilnadu, India
3Department of Computer Science
Arignar Anna Government Arts College, Attur
Tamilnadu, India
ABSTRACT

Providing security in Mobile Ad Hoc Network is crucial problem due to its open shared wireless medium,multi-hop and dynamic nature, constrained resources, lack of administration and cooperation. Traditionally routing protocols are designed to cope with routing operation but in practice they may be affected by misbehaving nodes so that they try to disturb the normal routing operations by launching different attacks with the intention to minimize or collapse the overall network performance. Therefore detecting a trusted node means ensuring authentication and securing routing can be expected. In this article we have proposed a Trust and Q-learning based Security (TQS) model to detect the misbehaving nodes over Ad Hoc On Demand Distance-Vector (AODV) routing protocol. Here we avoid the misbehaving nodes by calculating an aggregated reward, based on the Q-learning mechanism by using their historical forwarding and responding behaviour by the way misbehaving nodes can be isolated.

KEYWORDS
Mobile Ad hoc Networks Security, Routing, AODV, Historical, Response, Trust, Authentication &
Q-Learning

Y-Hamiltonian Layers Broadcast Algorithm




Amnah El-Obaid1 and Nagham_Al-Madi2
1Department of Basic Science, Faculty of Science and Information Technology, Al-
Zaytoonah University of Jordan, Amman, Jordan
2Department of Computer Science, Faculty of Science and Information Technology, Al-
Zaytoonah University of Jordan, Amman, Jordan
ABSTRACT:

Anew approach to broadcast in wormhole routed three-dimensional networks is proposed. One of the most important process in communication and parallel computer is broadcast approach.. The approach of this case of Broadcasting is to send the message from one source to all destinations in the network which corresponds to one-to-all communication. Wormhole routing is a fundamental routing mechanism in modern parallel computers which is characterized with low communication latency. We show how to apply this approach to 3-D meshes. Wormhole routing is divided the packets into set of FLITS (flow control digits). The first Flit of the packet (Header Flit) is containing the destination address and all subsets flits will follow the routing way of the header Flit. In this paper, we consider an efficient algorithm for broadcasting on an all-port wormhole-routed 3D mesh with arbitrary size. We introduce an efficient algorithm, Y-Hamiltonian Layers Broadcast(Y-HLB). In this paper the behaviors of this algorithm were compared to the previous results, our paradigm reduces broadcast latency and is simpler. In this paper our simulation results show the average of our proposed algorithm over the other algorithms that presented.

KEYWORDS
Broadcasting communication, Wormhole routing, Hamiltonian model, 3-D mesh, Deadlock-free


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...