Thursday, November 29, 2018

AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH

AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
N.Radha1 and S.Karthikeyan2
1Department of Computer Science, Karpagam University,Tamil Nadu
2Department of Information Technology,College of Applied Sciences,Sohar, Sultanate of Oman

ABSTRACT

Biometric analysis for identifying verification is becoming a widespread reality. It is a very challenging and tedious task to develop a biometric template protection scheme which is anonymous, revocable and noninvertible while maintaining decent performance. Cancellable biometrics is one of the best methods used to resolve this problem. In this paper, a new method called as BioHashing which follows the technique of cancellable biometrics in the fingerprint domain is proposed. This proposed method does not require the re-alignment of fingerprints as all the minutiae are translated into a pre-defined two dimensional space based on a reference minutia. After that, the proposed Biohashing method is used to enforce the one-way property (non-invertibility) of the biometric template. The proposed approach is very much resistant to minor translation error and rotation distortion. An Equal Error Rates (EER) of less than 1% is achieved in this approach and performance of the approach is also significant.

KEYWORDS

Biohashing, Fingerprint Biometrics, Cancellable Biometrics, Non-Invertible Transformation



Sunday, November 25, 2018

GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001

GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001
Tolga MATARACIOGLU1 and Sevgi OZKAN2
1TUBITAK National Research Institute of Electronics and Cryptology (UEKAE),Department of Information Systems Security, 06700, Ankara, TURKEY
2Middle East Technical University, Informatics Institute,Department of Information Systems, 06531, Ankara, TURKEY

ABSTRACT

In this paper, after giving a brief definition of Information Security Management Systems (ISMS), ISO 27001, IT governance and COBIT, pros and cons of implementing only COBIT, implementing only IS0 27001 and implementing both COBIT and ISO 27001 together when governing information security in enterprises will be issued.

KEYWORDS

COBIT, ISO 27001, Information Security Management Systems (ISMS), PDCA, mapping, IT governance, framework, best practice, standard

Friday, November 23, 2018

OPTIMIZING AND ANALYSING THE EFFECTIVENESS OF SECURITY HARDENING MEASURES USING VARIOUS OPTIMIZATION TECHNIQUES AS WELL AS NETWORK MANAGEMENT MODELS GIVINGSPECIAL EMPHASIS TO ATTACK TREE MODEL

OPTIMIZING AND ANALYSING THE EFFECTIVENESS OF SECURITY HARDENING MEASURES USING VARIOUS OPTIMIZATION TECHNIQUES AS WELL AS NETWORK MANAGEMENT MODELS GIVINGSPECIAL EMPHASIS TO ATTACK TREE MODEL
Dr. Prabhat Kumar Vishwakarma
Department of Computer Science, University of Gondar, Ethiopia

ABSTRACT

To cope up the network security measures with the financial restrictions in the corporate world is still a challenge. At global scenario the tradeoff between the protection of IT infrastructure and the financial boundation for any organization using IT as valuable resource is quite essential. Every organization has different security needs and different budgets for coping with that therefore whether it has to look as single objective or as multiple objectives with fault tolerant feature is a critical issue. In the present paper an attempt has been taken to optimize and analyze the effectiveness of security hardening measures considering attack tree model as base. In short we can say that the main attention in the paper is-to rectify, to describe the notations of the attack tree model and to suggest a model which may be able to quantitatively specify the possible threats as well as cost of the security control while implementing the security hardening measures.

KEYWORDS

Security Management, Attack Tree, Objective Functions, Network Security, NSGAII. 


Tuesday, November 20, 2018

E-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHY

E-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHY
Hayam K. Al-Anie, Mohammad A. Alia and Adnan A. Hnaif
Faculty of Science and Information Technology – Al Zaytoonah University of Jordan, P.O.Box: 130 Amman (11733) Jordan

ABSTRACT

In this paper we propose a new secure E-Voting protocol based on public-key encryption cryptosystem. This protocol is summarized in three processes: firstly, access control process which involves the identification and authentication phases for the applied citizens. Secondly, the voting process which will be done by ciphering the voter information using public-key encryption cryptosystem (RSA), to be submitted over an insecure network to the specified government election server. Finally, the election server administrator will sort the final result by deciphering the received encrypted information using RSA private key. Actually, this E-Voting protocol is more efficient than others E-Voting protocols since the voter can vote from his/her own personal computer (PC) without any extra cost and effort. The RSA public-key encryption system ensures the security of the proposed protocol. However, to prevent a brute force attack, the choice of the key size becomes crucial.

KEYWORDS

E-Voting, Cryptography, RSA, System Access Control, and Public-Key.






Thursday, November 15, 2018

A NOVEL SCHEME FOR DEVIATION DETECTION IN ASYNCHRONOUS DISTRIBUTED PRICING

A NOVEL SCHEME FOR DEVIATION DETECTION IN ASYNCHRONOUS DISTRIBUTED PRICING
S.S. Prasad1, Rithika Baruah2 and Siddharth.A3
Department of Electronics & Communication Engineering, National Institute of Technology, Jamshedpur, India

ABSTRACT

Modelling resource allocation problems in the form of non-cooperative pricing games takes into account the difference between how much a given performance metric is valued and how much is paid for it. For the convergence of the sum of all users’ payoff to a global maximum, the determination of the utility function is essential. Although supermodularity conditions have been previously defined and determined to obtain suitable utility functions, different utilities have significantly varying performance characteristics under similar network parameters. In an ad-hoc framework, absence of a central authority leads to uncontrollability of unfairness. Users could misbehave by broadcasting high price coefficients to force other users to transmit at a lower power. This paper proposes an adaptation of the Asynchronous Distributed Pricing Algorithm with a Deviation Detection Block that re-aligns the deviated system back into the algorithm.

KEYWORDS

Game theory, asynchronous distributed pricing, distributed resource allocation, deviation detection





Wednesday, November 14, 2018

A NOVEL HEADER MATCHING ALGORITHM FOR INTRUSION DETECTION SYSTEMS

A NOVEL HEADER MATCHING ALGORITHM FOR INTRUSION DETECTION SYSTEMS
Mohammad A. Alia1, Adnan A. Hnaif1, Hayam K. Al-Anie1, Khulood AbuMaria1, Ahmed M. Manasrah2, M. Imran Sarwar3
1 Faculty of Science and Information Technology – Al Zaytoonah University of Jordan, P.O.Box: 130 Amman (11733) Jordan
2 Al Yarmouk University , Irbed( 21163) – Jordan
3National Advanced IPv6 - Universiti Sains Malaysia, 11800 Penang, Malaysia

ABSTRACT

The evolving necessity of the Internet increases the demand on the bandwidth. Therefore, this demand opens the doors for the hackers’ community to develop new methods and techniques to gain control over networking systems. Hence, the intrusion detection systems (IDS) are insufficient to prevent/detect unauthorized access the network. Network Intrusion Detection System (NIDS) is one example that still suffers from performance degradation due the increase of the link speed in today’s networks. In This paper we proposed a novel algorithm to detect the intruders, who’s trying to gain access to the network using the packets header parameters such as; source/destination address, source/destination port, and protocol without the need to inspect each packet content looking for signatures/patterns. However, the “Packet Header Matching” algorithm enhances the overall speed of the matching process between the incoming packet headers against the rule set. We ran the proposed algorithm to proof the proposed concept in coping with the traffic arrival speeds and the various bandwidth demands. The achieved results were of significant enhancement of the overall performance in terms of detection speed. 

KEYWORDS

Intrusion Detection System (IDS), Network Intrusion Detection System (NIDS), SNORT, Packet Detection and Packet Header Matching (PHM) 





Saturday, November 10, 2018

SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS

SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
Gurdev Singh1 Amit Sharma2 Manpreet Singh Lehal3
1Department of Computer Science and Engineering, Eternal University, Baru Sahib, Sirmour, HP (India)
2Department of Computer Science and Engineering, Eternal University, Baru Sahib, Sirmour, HP (India)
3Department of Computer Science and Engineering, Lyallpur Khalsa College, Jalandhar, Punjab (India)

ABSTRACT

Cloud computing is a new innovative model for enterprise in which information is permanently stored on the servers and also manage how and when different resources are allocate to the requested users. It provides distributed approach through which resources are allocated dynamically to the users without investing in the infrastructure or licensing the software’s on the client side. Using the cloud makes processing of information is more commodious but it also present them with new security problems about reliability.This phenomenon introduces serious problems regarding access mechanism to any information stored in the database and resources in the cloud. For the successful implementation of cloud computing it is necessary that we must know different areas where the security is needed. For this there should also governess strategy needed for secure communication between multi-clouds located in different geographical areas or in different countries. In this paper we discuss how to safely utilizing the benefit of cloud computing through the network where data security, provide authentication, integration, recovery, IP spoofing and Virtual Servers are the most captiousfields in the cloud. 

KEYWORDS

Cloud Computing, Data Security, Secure Servers, Secure Network





Friday, November 9, 2018

Cryptovirology: Virus Approach

Cryptovirology: Virus Approach
Shivale Saurabh Anandrao
Dept. of Computer Engineering, Vishwakarma Institute Of Information Technology, Pune-48, India

Abstract

Traditionally, "Cryptography" is a benediction to information processing and communications, it helps people to store information securely and the private communications over long distances. Cryptovirology is the study of applications of cryptography to build the malicious software. It is an investigation, how modern cryptographic tools and paradigms can be used to strengthen, develop and improve new malicious software attacks. Cryptovirology attacks have been categorized as : give malware enhanced privacy and be more robust against reverse-engineering, secondly give the attacker enhanced anonymity while communicating with deployed malware. This paper presents the idea of ``Cryptovirology'' which introduce a twist on how cryptography can also be used offensively. Being offensive means, it can be used to mount extortion based attacks that cause loss of access to information, loss of confidentiality, and information leakage, tasks which cryptography usually prevents. Also analyze threats and attacks that misuse of cryptography can cause when combined with fraudulent software (viruses, Trojans). Public-key cryptography is very essential for the attacks that based on cryptovirology. This paper also suggest some of the countermeasures, mechanisms to cope with and prevent such attacks. Even if the attackers actions on the host machine are being monitored, it still cannot be proven beyond reasonable doubt that he or she is the attacker; and it is an “originator-concealing attack”. Evidence should be collected from the “author’s own system which was used for the attack”. These attacks have implications on how the use of cryptographic tools and techniques should be audited and managed in general purpose computing environments, and imply that access to the cryptographic tools should be in well control of the system(such as API routines). The experimental virus would demonstrate how cryptographic packages can be packed into a small space, which may have independent existence. These are many powerful attacks, where the attacker can encrypt the victim’s data for ransom and release it after hostage. 

Keywords:

Malware, cryptovirology ,cryptovirus, cryptotrojan, electronic warfare threats, electronic espionage threats, evasive/ deniable/ untraceable attacks, password (information) snatching, public-key cryptography, kleptography, cryptanalysis,Gpcode.ak, Conficker, cryptoviral extortion. 

Wednesday, November 7, 2018

ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM

ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
Nenad Stojanovski1 and Marjan Gušev2
1 Makedonski Telekom AD, Orce Nikolov BB, 1000 Skopje, Macedonia
2 Faculty of Natural Sciences and Mathematics, Ss. Cyril and Methodius University, Arhimedova b.b., PO Box 162, 1000 Skopje, Macedonia

ABSTRACT

Classic firewall systems are built to filter traffic based on IP addresses, source and destination ports and protocol types. The modern networks have grown to a level where the possibility for users’ mobility is a must. In such networks, modern firewalls may introduce such complexity where administration can become very frustrating since it needs the intervention of a firewall administrator. The solution for this problem is an identity based firewall system. In this paper we will present a new
design of a firewall system that uses the user’s identity to filter the traffic. In the design phase we will define key points which have to be satisfied as a crucial milestone for the functioning of the whole Identity based firewall system.

KEYWORDS

Identity based firewalls, user identity, firewalls, network security, computer networks, firewall systems design




Friday, November 2, 2018

WAVELET THRESHOLDING APPROACH FOR IMAGE DENOISING

WAVELET THRESHOLDING APPROACH FOR IMAGE DENOISING
Pankaj Hedaoo1 and Swati S Godbole2
1Department of Electronics & Telecommunication Engineering, G. H. Raisoni College of Engineering, Nagpur, India.
2Department of Electronics & Telecommunication Engineering, G. H. Raisoni College of Engineering, Nagpur, India

ABSTRACT

The original image corrupted by Gaussian noise is a long established problem in signal or image processing .This noise is removed by using wavelet thresholding by focused on statistical modelling of wavelet coefficients and the optimal choice of thresholds called as image denoising . For the first part, threshold is driven in a Bayesian technique to use probabilistic model of the image wavelet coefficients that are dependent on the higher order moments of generalized Gaussian distribution (GGD) in image processing applications. The proposed threshold is very simple. Experimental results show that the proposed method is called BayesShrink, is typically within 5% of the MSE of the best soft-thresholding benchmark with the image. It outperforms Donoho and Johnston Sure Shrink.  The second part of the paper is attempt to claim on lossy compression can be used for image denoising .thus achieving the image compression & image denoising simultaneously. The parameter is choosing based on a criterion derived from Rissanen’s minimum description length (MDL) principle. Experiments show that this compression & denoise method does indeed remove noise significantly, especially for large noise power.

KEYWORDS

Image denoising, Wavelet Thresholding, Noise categories, Proposed Method.




Thursday, November 1, 2018

NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK

NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
Hichem Sedjelmaci1 and Mohamed Feham1
STIC Lab, Department of telecommunications, Abou Bakr Belkaid University, Tlemcen, Algeria

ABSTRACT

Wireless sensor network (WSN) is regularly deployed in unattended and hostile environments. The WSN is vulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. It is widely known, that the intrusion detection is one of the most efficient security mechanisms to protect the network against malicious attacks or unauthorized access. In this paper, we propose a hybrid intrusion detection system for clustered WSN. Our intrusion framework uses a combination between the Anomaly Detection based on support vector machine (SVM) and the Misuse Detection. Experiments results show that most of routing attacks can be detected with low false alarm.

KEYWORDS

Wireless Sensor Network, Hybrid Intrusion Detection System, Support Vector Machine (SVM), Classification Accuracy, False alarm




International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...