Friday, August 31, 2018

A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NETWORKS

A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NETWORKS
Mohammed Mana1, Mohammed Feham1, and Boucif Amar Bensaber2
STIC Lab., Department of telecommunications, University of Tlemcen, Tlemcen,Algeria
2Laboratoire de mathématiques et informatique appliquées LAMIA, Université du Québec à Trois-Rivières C.P. 500 Trois-Rivières, Québec, Canada G9A 5H7

ABSTRACT

Location privacy is one of the major security problems in a Wireless Body Area Networks (WBANs). An eavesdropper can keep track of the place and time devices are communicating. To make things even worse, the attacker does not have to be physically close to the communicating devices, he can use a device with a stronger antenna. The unique hardware address of a mobile device can often be linked to the identity of the user operating the device. This represents a violation of the user’s privacy. The user should decide when his/her location is revealed and when not. In this paper, we first categorize the type of eavesdroppers for WBANs, and then we propose a new scheme to provide the location privacy in Wireless Body Area Networks (WBANs).

KEYWORDS

Wireless Body Area Networks, location privacy, Eavesdroppers, attack games.


Wednesday, August 29, 2018

ANALYSIS OF WEB LOGS AND WEB USER IN WEB MINING

ANALYSIS OF WEB LOGS AND WEB USER IN WEB MINING
L.K. Joshila Grace1, V.Maheswari2, Dhinaharan Nagamalai3
1Research Scholar, Department of Computer Science and Engineering, Sathyabama University,Chennai,India
2 Professor and Head,Department of Computer Applications, Sathyabama University,Chennai,India
3Wireilla Net Solutions PTY Ltd, Australia

ABSTRACT

Log files contain information about User Name, IP Address, Time Stamp, Access Request, number of Bytes Transferred, Result Status, URL that Referred and User Agent. The log files are maintained by the web servers. By analysing these log files gives a neat idea about the user. This paper gives a detailed discussion about these log files, their formats, their creation, access procedures, their uses, various algorithms used and the additional parameters that can be used in the log files which in turn gives way to an effective mining. It also provides the idea of creating an extended log file and learning the user behaviour.

KEYWORDS

Web Log file, Web usage mining, Web servers, Log data, Log Level directive.

Tuesday, August 28, 2018

Failure of A Mix Network

Failure of A Mix Network
Kun Peng
Institute for Infocomm Research

Abstract

A mix network by Wikstrom fails in correctness, provable privacy and soundness. Its claimed advantages in security and efficiency are compromised. The analysis in this paper illustrates that although the first two failures may be fixed by modifying the shuffling protocol, the last one is too serious to fix at a tolerable cost. Especially, an attack is proposed to show how easily soundness of the shuffling scheme can be compromised. Moreover, the most surprising discovery in this paper is that it is formally illustrated that in practice it is impossible to fix soundness of the shuffling scheme by Wikstrom.


Monday, August 27, 2018

Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil and Gas Sector

Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil and Gas Sector
Iwendi, C. O. Allen, A. R.
Communication & Optical Engineering Research Group, University of Aberdeen, Scotland, UK

Abstract

Wireless sensor networks (WSN) is tending towards becoming a complete solution in communication protocols, embedded systems and low-power implementations. However, the resource constraints which includes, limited communication range, limited energy, limited computing power, limited bandwidth and the fear of intruders have limited the WSN applications. Since lightweight computational nodes that are currently being used in WSN pose particular challenge for many security applications, the whole research therefore, is the investigation of new security techniques and appropriate implementation for WSN nodes, including various trade-offs such as implementation complexity, power dissipation, security flexibility and scalability. The goal of this research is to develop a network that has efficient and flexible key distribution scheme secured enough to prevent algorithmic complexity and denial of service attacks as well as the network able to conserve energy. A review of previous research to date in the area of security for WSNs was carried out and proposals are made based on security schemes that gather data in an energy-efficient mechanism through secured pre-allocation of keys, faster clustering routing algorithm and dynamic based rekeying implementation.

Keywords

Blom, Judy Array, Clustering Routing, Niger-Delta 

International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
                   --- UGC Listed, ERA Indexed----
      ISSN 0974 - 9330 (Online); 0975 - 2307(Print)
Scope & Topics
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Topics of Interest include, but are not limited to, the following:
·        Network and WirelessNetwork Security
·        Mobile, Ad Hoc and Sensor Network Security
·        Peer-to-Peer NetworkSecurity
·     Database and SystemSecurity
·        Intrusion Detection andPrevention
·        Internet Security &Applications
·        Security & NetworkManagement
·        E-mail security, Spam,Phishing, E-mail fraud
·        Virus, worms, Trojan Protection
·        Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
·        Ubiquitous Computing Security
·        Web 2.0 security
·        Cryptographic protocols
·        Performance Evaluations of Protocols & Security Application 
 Paper submission
Authors are invited to submit papers for this journal through e-mail ijnsa@airccse.org  Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
·        Submission Deadline    :September 01, 2018
·        Notification                  : October 01, 2018
·        Final Manuscript Due   : October 09, 2018
·        Publication Date           : Determined by the Editor-in-Chief
For other details please

Friday, August 24, 2018

A HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESS

A HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESS
Nasser Ghadiri1,Ahmad Baraani-Dastjerdi2,*,Nasser Ghasem-Aghaee3,Mohammad A. Nematbakhsh4
1Department of Computer Engineering, University of Isfahan, Isfahan, Iran
2Department of Computer Engineering, University of Isfahan, Isfahan, Iran
3Department of Computer Engineering, University of Isfahan, Isfahan, Iran
4Department of Computer Engineering, University of Isfahan, Isfahan, Iran

ABSTRACT

The emerging need for qualitative approaches in context-aware information processing calls for proper modelling of context information and efficient handling of its inherent uncertainty resulted from human interpretation and usage. Many of the current approaches to context-awareness either lack a solid theoretical basis for modelling or ignore important requirements such as modularity, high-order uncertainty management and group-based context-awareness. Therefore, their real-world application and extendibility remains limited. In this paper, we present f-Context as a service-based contextawareness framework, based on language-action perspective (LAP) theory for modelling. Then we identify some of the complex, informational parts of context which contain high-order uncertainties due to differences between members of the group in defining them. An agent-based perceptual computerarchitecture is proposed for implementing f-Context that uses computing with words (CWW) for handling uncertainty. The feasibility of f-Context is analyzed using a realistic scenario involving a group of mobile users. We believe that the proposed approach can open the door to future research on context-awareness by offering a theoretical foundation based on human communication, and a service-based layered architecture which exploits CWW for context-aware, group-based and platform-independent access to information systems.

KEYWORDS

Language-Action Perspective, Uncertainty; Computing with Words; Spatial reasoning; Agent-based systems; Pragmatic web; Community consensus; Location-dependent social networks 

AN OVERVIEW OF THE SECURITY CONCERNS IN ENTERPRISE CLOUD COMPUTING

AN OVERVIEW OF THE SECURITY CONCERNS IN ENTERPRISE CLOUD COMPUTING
Anthony Bisong1 and Syed (Shawon) M. Rahman2
1Ph.D. Student, Capella University 225 South 6th Street, 9th Floor Minneapolis, MN 55402, USA
2Assistant Professor of Computer Science, University of Hawaii-Hilo, Hilo, HI, USA

Abstract

Deploying cloud computing in an enterprise infrastructure bring significant security concerns. Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats, vulnerabilities, and possible countermeasures. We believe enterprise should analyze the company/organization security risks, threats, and available countermeasures before adopting this technology. In this paper, we have discussed security risks and concerns in cloud computing and enlightened steps that an enterprise can take to reduce security risks and protect their resources. We have also explained cloud computing strengths/benefits, weaknesses, and applicable areas in information risk management


Thursday, August 23, 2018

COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALGORITHM FOR VOIP

COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALGORITHM FOR VOIP
Suardinata1, Kamalrulnizam bin Abu Bakar 2 and Nimitr Suanmali3
1Department of Computer System and Communication, Faculty of Computer Science & Information Systems, University Teknologi Malaysia, Johor Bahru, Malaysia
2&3Department of Computer System and Communication, Faculty of Computer Science &Information Systems, University Teknologi Malaysia, Johor Bahru, Malaysia

ABSTRACT

The transmission of voice over IP networks can generate network congestion due to weak supervision of the traffic incoming packet, queuing and scheduling. This congestion negatively affects the Quality of Service (QoS) such as delay, packet drop and packet loss. Packet delay effects will affect the other QoS such as: unstable voice packet delivery, packet jitter, packet loss and echo. Priority Queuing (PQ) algorithm is a more popular technique used in the VoIP network to reduce delays. In operation, the PQ is to use the method of sorting algorithms, search and route planning to classify packets on the router. Thus, this packet classifying method can result in repetition of the process. And this recursive loop leads to the next queue starved. In this paper, to solving problems, there are three phases namely queuing phase, classifying phase and scheduling phase. The PQ algorithm technique is based on the priority. It will be applied to the fuzzy inference system to classify the queuing incoming packet (voice, video and text);  that can reduce recursive loop and starvation. After the incoming packet is classified, the packet will be sent to the packet buffering. In addition, to justify the research objective of the PQ improved algorithm will be compared against the algorithm existing PQ, which is found in the literature using metrics such as delay, packets drop and packet losses. This paper described about different execution long process in Priority (PQ) and our algorithm. Our Algorithm is to simplify process execution Algorithm that can cause starvation occurs in PQ algorithm.

KEYWORDS

QoS, VoIP, Fuzzy logic, and Delay 

Wednesday, August 22, 2018

VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES AND VIRTUALIZATION OPTIONS

VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES AND VIRTUALIZATION OPTIONS
Ishtiaq Ali1 and Natarajan Meghanathan2
1, 2Jackson State University, 1400 Lynch St, Jackson, MS, USA

ABSTRACT

The interest in virtualization has been growing rapidly in the IT industry because of inherent benefits like better resource utilization and ease of system manageability. The experimentation and use of virtualization as well as the simultaneous deployment of virtual software are increasingly getting popular and in use by educational institutions for research and teaching. This paper stresses on the potential advantages associated with virtualization and the use of virtual machines for scenarios, which cannot be easily implemented and/or studied in a traditional academic network environment, but need to be explored and experimented by students to meet the raising needs and knowledge-base demanded by the IT industry. In this context, we discuss various aspects of virtualization – starting from the working principle of virtual machines, installation procedure for a virtual guest operating system on a physical host operating system, virtualization options and a performance study measuring the throughput obtained on a network of virtual machines and physical host machines. In addition, the paper extensively evaluates the use of virtual machines and virtual networks in an academic environment and also specifically discusses sample projects on network security, which may not be feasible enough to be conducted in a physical network of personal computers; but could be conducted only using virtual machines.

KEYWORDS

Network Virtualization, Performance Measurement, VMware, Virtual Machines

Thursday, August 16, 2018

ZERO DATA REMNANCE PROOF IN CLOUD STORAGE

ZERO DATA REMNANCE PROOF IN CLOUD STORAGE 
Mithun Paul and Ashutosh Saxena1
1 Security and Privacy Group, SETLabs Infosys Technologies Ltd, Hyderabad

ABSTRACT

In a cloud environment where Storage is offered as a service, a client stores his data with a provider and pays as per the usage. Once the contract ends, the client, as the data owner, may like to see, due to privacy reasons and otherwise that the data is properly shredded in the provider storage. In this paper we propose a scheme for Zero Data Remnance Proof (ZDRP) – a comprehensive proof given by the cloud data storage provider as regards to zero data remnance post the SLA period. In absence of such shredding the provider can consume the data to his benefit without coming in legal framework. The proof of data destruction can be achieved together by clauses in the SLA and a comprehensive destruction-verifier algorithm. The implementation of this can be achieved by appropriate modification of the data updation mechanisms provided by open source cloud providers.

KEYWORDS

Data Shredding, Cloud, Privacy 

IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY

IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY
Shreelekshmi R1, Wilscy M2 and C E Veni Madhavan3
1Department of Computer Science & Engineering, College of Engineering, Trivandrum,India
2Department of Computer Science, University of Kerala, Trivandrum, India
3Department of Computer Science & Automation, Indian Institute of Science,Bangalore, India

ABSTRACT

We propose a simple method for increasing the reliability of detection of LSB replacement steganography. RS Steganalysis Method (RSM), Sample Pair Method (SPM), and Least Square Method (LSM) are three of the most reliable steganalysis methods in the literature for LSB replacement steganography on digital images in spatial domain. However all these methods are prone to error. We propose a simple method to identify images which give very accurate results and images which give highly inaccurate results by these methods. The novelty of our method is that it does not require any knowledge about the cover images as the image classification is done based on certain statistical properties of the image, which are invariant with embedding. Thus it helps the steganalyst in attaching a level of confidence to the estimation he makes and thereby increasing the reliability of steganalysis of
digital images. It also helps to choose between images for more secure LSB replacement steganography.

KEYWORDS

LSB replacement steganography, steganalysis, confidence level, reliability

Tuesday, August 14, 2018

ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN

ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN
Muraleedharan N and Arun Parmar
Centre for Development of Advanced Computing (C-DAC) Electronics City, Bangalore, India

ABSTRACT

Attackers perform port scan to find reachability, liveness and running services in a system or network. Current day scanning tools provide different scanning options and capable of evading various security tools like firewall, IDS and IPS. So in order to detect and prevent attacks in the early stages, an accurate detection of scanning activity in real time is very much essential. In this paper we present a flow based protocol behaviour analysis system to detect TCP based slow and fast scan. This system provides scalable, accurate and generic solution to TCP based scanning by means of automatic behaviour analysis of the network traffic. Detection capability of proposed system is compared with SNORT and result proves the high detection rate of the system over SNORT.

KEYWORDS

Scan detection, Flow, IPFIX, Anomaly, Entropy

Monday, August 13, 2018

EFFECTIVE VOICE CALLS ADMISSION FOR AUTHORIZED USER IN INTER VOIP NETWORK

EFFECTIVE VOICE CALLS ADMISSION FOR AUTHORIZED USER IN INTER VOIP NETWORK
Subashri T1, Vaidehi V2
1,2Department of Electronics, MIT Campus, Anna University, Chennai-44

ABSTRACT

IP based voice transmission technology is a flexible, simpler and a cost effective implementation of voice transmission. It provides a real convergence of various networks. This voice transmission technology does not support a quality that is equivalent to digitized voice, which is available in the existing PSTN networks. In addition to this, data network vulnerabilities affect the VOIP service causing a drop in the utilization of voice communication. In this paper, the quality of service for voice calls is ensured with the integration of CAC mechanism with the bandwidth link utilization which makes an estimation of the demanded bandwidth. In terms of security, prevention of ARP cache poisoning attack is achieved by use of the signed MAC address response in local area networks. It makes the network confident that the admitted user is an authorized user and also it verifies that only the authorized users’ information is exchanged over the local area network. Also an approach that makes it difficult for the hacker’s to hack the data exchanged over the quality channel has been proposed.

KEYWORDS

Bandwidth link utilization, CACA, LU-CAC, MAC addresses Hash value. 

Friday, August 10, 2018

A FORMAL VERIFICATION FRAMEWORK FOR SECURITY POLICY MANAGEMENT IN MOBILE IP BASED WLAN

A FORMAL VERIFICATION FRAMEWORK FOR SECURITY POLICY MANAGEMENT IN MOBILE IP BASED WLAN
Soumya Maity1 , P Bera1 , S K Ghosh1 , Pallab Dasgupta2
1School of Information Technology,Indian Institute of Technology, Kharagpur, India
2Department of Computer Science and Engineering,Indian Institute of Technology, Kharagpur, India

ABSTRACT

The continuous advancement of wireless technologies especially for enterprise Wireless local area networks (LANs), demands well defined security mechanisms with appropriate architectural support to overcome various security loopholes. Implementing security policies on the basis of Role based Access Control (RBAC) models is an emerging field of research in WLAN security. However, verifying the correctness of the implemented policies over the distributed network devices with changes in topology, remains unexplored in the aforesaid domain. The enforcement of organizational security policies in WLANs require protection over the network resources from unauthorized access. Hence, it is required to ensure correct distribution of access control rules to the network access points conforming to the security policy. In WLAN security policy management, the standard IP based access control mechanisms are not sufficient to meet the organizational requirements due to its dynamic topology characteristics. In an enterprise network environments, the role-based access control (RBAC) mechanisms can be deployed to strengthen the security perimeter over the network resources. Further, there is a need to model the time and location dependent access constraints. In this paper, we propose a WLAN security management system supported by a formal spatio-temporal RBAC (STRBAC) model and a Boolean satisfiability (SAT) based verification framework. The concept of mobile IP has been used to ensure fixed layer 3 address mapping for the mobile hosts in a dynamic scenario. The system stems from logical partitioning of the WLAN topology into various security policy zones. It includes a Global Policy Server (GPS) that formalises the organisational access policies and determines the high level policy configurations for different policy zones; a Central Authentication & Role Server (CARS) which authenticates the users (or nodes) and the access points (AP) in various zones and also assigns appropriate roles to the users. Every host has to register their unique MAC address to a Central Authentication and Role Server(CARS). Each policy zone consists of an Wireless Policy Zone Controller (WPZCon) that coordinates with a dedicated Local Role Server (LRS) to extract the low level access configurations corresponding to the zone access router. We also propose a formal spatio-temporal RBAC (STRBAC) model to represent the global security policies formally and a SAT based verification framework to verify the access configurations

KEYWORDS

WLAN, Security Policy, Verification, Mobile IP 

Thursday, August 9, 2018

EMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGES

EMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGES
Muhammad Ibrahim Channa1 and Kazi M. Ahmed2
1Information and Communication Technologies, Asian Institute of Technology,Thailand
2Telecommunications, Asian Institute of Technology, Thailand

ABSTRACT

The natural or man-made disaster demands an efficient communication and coordination among first responders to save life and other community resources. Normally, the traditional communication infrastructures such as landline or cellular networks are damaged and don’t provide adequate communication services to first responders for exchanging emergency related information. Wireless ad hoc networks such as mobile ad hoc networks, wireless sensor networks and wireless mesh networks are the promising alternatives in such type of situations. The security requirements for emergency response communications include privacy, data integrity, authentication, key management, access control and availability. Various ad hoc communication frameworks have been proposed for emergency response situations. The majority of the proposed frameworks don’t provide adequate security services for reliable and secure information exchange. This paper presents a survey of the proposed emergency response communication frameworks and the potential security services required by them to provide reliable and secure information exchange during emergency situations.

KEYWORDS

Emergency response communication, Mobile ad hoc networks, Wireless sensor networks, Wireless mesh networks, Security, Reliability. 

Friday, August 3, 2018

Lightweight C&C based botnet detection using Aho-Corasick NFA

Lightweight C&C based botnet detection using Aho-Corasick NFA
Udhayan J1, Anitha R2 and Hamsapriya T3
1Department of Information Technology, Karunya University, Coimbatore, India
2Department of Mathematics and Computer Applications, PSG College of Technology,Coimbatore, India
3Department of Information Technology, PSG College of Technology, Coimbatore,India

ABSTRACT

Botnet distinguishes itself from the previous malware by having the characteristics of a C&C channel, using which a Botmaster can control the constituents of the botnet. Even though protocols like IRC, HTTP and DNS are exploited to incorporate C&C channels, previous analysis have shown that the majority of the botnets are usually based on IRC. Consequently in this paper the Aho-Corasick NFA based detection is proposed to detect the C&C instructions which is exchanged in IRC run botnets. However the ability to detect botnet is limited to the existing bot commands. Therefore a counting process which analyses every IRC messages is introduced to detect the existence of malicious codes. This detection method and various existing methods have been evaluated using real-world network traces. The results show that the proposed C&C Instruction based IRC detection method can  detect real-world botnets with high accuracy.

KEYWORDS

Botnet; IRC, C&C, Flow based detection, Behaviour based detection, Signature based Detection 

Thursday, August 2, 2018

A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks

A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks 
Emmanouil A. Panaousis, George Drew, Grant P. Millar, Tipu A. Ramrekha and Christos Politis
Wireless Multimedia & Networking (WMN) Research Group Kingston University London, United Kingdom

ABSTRACT

Contemporary personal computing devices are increasingly required to be portable and mobile enabling user’s wireless access, to wired network infrastructures and services. This approach to mobile computing and communication is only appropriate in situations where a coherent infrastructure is available. There are many situations where these requirements are not fulfilled such as; developing nations, rural areas, natural disasters, and military conflicts to name but a few. A practical solution is to use mobile devices interconnected via a wireless medium to form a network, known as a Mobile Ad-hoc Network (MANET), and provide the services normally found in wired networks. Security in MANETs is an issue of paramount importance due to the wireless nature of the communication links. Additionally due to the lack of central administration security issues are different from conventional networks. For the purposes of this article we have used the “WMN testbed” to enable secure routing in MANETs. The use of cryptography is an efficient proven way of securing data in communications, but some cryptographic algorithms are not as efficient as others and require more processing power, which is detrimental to MANETs. In this article we have assessed different cryptographic approaches to securing the OLSR (Optimised Link State Routing) protocol to provide a basis for research. We conclude the paper with a series of performance evaluation results regarding different cryptographic and hashing schemes. Our findings clearly show that the most efficient combination of algorithms used for authentication and encryption are SHA-1 (Secure Hash Algorithm-1) and AES (Advanced Encryption Standard) respectively. Using this combination over their counterparts will lead to a considerable reduction in processing time and delay on the network, creating an efficient transaction moving towards satisfying resource constraints and security requirements.

KEYWORDS

Mobile Ad-hoc Network, Routing, Security

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...