Thursday, January 31, 2019

The International Journal of Network Security & Its Applications (IJNSA)


The International Journal of Network Security & Its Applications (IJNSA)
ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)

Current Issue January 2019, Volume 11, Number 1

Malware Detection Using Machine Learning Algorithms and Reverse Engineering of Android Java Code

Michal Kedziora, Paulina Gawin, Michal Szczepanik and Ireneusz Jozwiak, University of Science and Technology Wroclaw, Poland


A Light Weight Solution for Detecting De-Authentication Attack

Rajinder Singh and Satish Kumar, PUSSGRC Hoshiarpur, Punjab, India


Towards A Trusted Unmanned Aerial System Using Block Chain (BUAS) for the Protection of Critical Infrastructure

Ezedin Barka1, Chaker Abdelaziz Kerrache2, Hadjer Benkraouda1and khaled Shuaib1, 1United Arab Emirates University, UAE and 2University Of Ghardaia, Algeria


A Multi-Layer Arabic Text Steganographic Method Based on Letter Shaping

A.F. Al Azzawi, Philadelphia University, Jordan


Performance Evaluation of Parallel International A L Data Encryption Algorithm on IMAN1 Super Computer

Ahmad Bany Doumi and Mohammad Qatawneh, University of Jordan, Amman-Jordan


A Survey on Optimization Based Spectrum Sensing Techniques to Reduce ISI and PAPR In OFDM Based Cognitive Radio System

1B.Maheswara Rao, 2S.Baskar, 1Research scholar and 2Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, India


MALWARE DETECTION USING MACHINE LEARNING ALGORITHMS AND REVERSE ENGINEERING OF ANDROID JAVA CODE

MALWARE DETECTION USING MACHINE LEARNING ALGORITHMS AND REVERSE ENGINEERING OF ANDROID JAVA CODE
Michal Kedziora, Paulina Gawin, Michal Szczepanik and Ireneusz Jozwiak
Faculty of Computer Science and Management Wroclaw University of Science and Technology Wroclaw, Poland

ABSTRACT

This research paper is focused on the issue of mobile application malware detection by Reverse Engineering of Android java code and use of Machine Learning algorithms. The malicious software characteristics were identified based on a collected set of total number of 1958 applications (including 996 malware applications). During research a unique set of features was chosen, then three attribute selection algorithms and five classification algorithms (Random Forest, K Nearest Neighbors, SVM, Nave Bayes and Logistic Regression) were examined to choose algorithms that would provide the most effective rate of malware detection.

KEYWORDS

Malware Detection, Random Forest, Android, SVM, Naive Bayes, K-NN, Logistic Regression




Monday, January 28, 2019

A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS

A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
Hossein Jadidoleslamy
Department of Information Technology, Anzali International Branch, The University of Guilan, Rasht, Iran

ABSTRACT

Networks protection against different types of attacks is one of most important posed issue into the network and information security application domains. This problem on Wireless Sensor Networks (WSNs), in attention to their special properties, has more importance. Now, there are some of proposed architectures and guide lines to protect Wireless Sensor Networks (WSNs) against different types of intrusions; but any one of them do not has a comprehensive view to this problem and they are usually designed and implemented in single-purpose; but, the proposed design in this paper tries to has been a comprehensive view to this issue by presenting a complete and comprehensive Intrusion Detection Architecture (IDA). The main contribution of this architecture is its hierarchical structure; i.e., it is designed and applicable, in one or two levels, consistent to the application domain and its required security level. Focus of this paper is on the clustering WSNs, designing and deploying Cluster-based Intrusion Detection System (CIDS) on cluster-heads and Wireless Sensor Network wide level Intrusion Detection System (WSNIDS) on the central server. Suppositions of the WSN and Intrusion Detection Architecture (IDA) are: static and heterogeneous network, hierarchical and clustering structure, clusters' overlapping and using hierarchical routing protocol such as LEACH, but along with minor changes. Finally, the proposed idea has been verified by designing a questionnaire, representing it to some (about 50 people) experts and then, analyzing and evaluating its acquired results.

KEYWORDS

Wireless Sensor Network (WSN), Security, Routing, Intrusion Detection System (IDS), Attack, Detection, Response & Tracking. 






Tuesday, January 22, 2019

METHOD FOR REDUCING OF NOISE BY IMPROVING SIGNAL-TO-NOISE-RATIO IN WIRELESS LAN

METHOD FOR REDUCING OF NOISE BY IMPROVING SIGNAL-TO-NOISE-RATIO IN WIRELESS LAN
Dr.R.Seshadri 1 and Prof.N..Penchalaiah 2
1Prof & Director of university computer center, S.V.University, Tirupati, India
2Department of Computer Science Engineering, ASCET, Gudur, India

ABSTRACT

The signal to noise ratio (SNR) is one of the important measures for reducing the noise.A technique that uses a linear prediction error filter (LPEF) and an adaptive digital filter (ADF) to achieve noise reduction in a speech and image degraded by additive background noise is proposed. Since a speech signal can be represented as the stationary signal over a short interval of time, most of speech signal can be predicted by the LPEF. This estimation is performed by the ADF which is used as system identification. Noise reduction is achieved by subtracting the reconstructed noise from the speech degraded by additive background noise. Most of the MR image accelerating methods suffers from degradation of acquired images, which is often correlated with the degree of acceleration. However, Wideband MRI is a novel technique that transcends such flaws.In this paper we proposed LPEF and ADF for reducing the noise in speech and also we demonstrate that Wideband MRI is capable of obtaining images with identical quality as conventional MR images in terms of SNR in wireless LAN.





Friday, January 18, 2019

DDNFS: a Distributed Digital Notary File System

DDNFS: a Distributed Digital Notary File System
Alexander Zangerl
Bond University, School of Information Technology

Abstract

Safeguarding online communications using public key cryptography is a well-established practice today, but with the increasing reliance on “faceless”, solely online entities one of the core aspects of public key cryptography is becoming a substantial problem in practice: Who can we trust to introduce us to and vouch for some online party whose public key we see for the first time? Most existing certification models lack flexibility and have come under attack repeatedly in recent years[1, 2], and finding practical improvements has a high priority. We propose that the real-world concept of a notary or certifying witness can be adapted to today’s online environment quite easily, and that such a system when combined with peer-topeer technologies for defense in depth is a viable alternative to monolithic trust infrastructures. Instead of trusting assurances from a single party, integrity certifications (and data replication) can be provided among a group of independent parties in a peer-to-peer fashion. As the likelihood of all such assurance providers being subverted at the very same time is very much less than that of a single party, overall robustness is improved. This paper presents the design and the implementation of our prototype online notary system where independent computer notaries provide integrity certification and highly-available replicated storage, and discusses how this online notary system handles some common threat patterns.





Thursday, January 17, 2019

PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
Dhara Buch1 and Devesh Jinwala2
1Department of Computer Engineering, Government Engineering College,Rajkot,Gujarat
2Department of Computer Engineering, S. V. National Institute of Technology, Surat,Gujarat

ABSTRACT

Ubiquitous and pervasive applications, where the Wireless Sensor Networks are typically deployed, lead to the susceptibility to many kinds of security attacks. Sensors used for real time response capability also make it difficult to devise the resource intensive security protocols because of their limited battery, power, memory and processing capabilities. One of potent form of Denial of Service attacks is Wormhole attack that affects on the network layer. In this paper, the techniques dealing with wormhole attack are investigated and an approach for wormhole prevention is proposed. Our approach is based on the analysis of the two-hop neighbors forwarding Route Reply packet. To check the validity of the sender, a unique key between the individual sensor node and the base station is required to be generated by suitable scheme.

KEYWORDS

Wireless Sensor Network, Sensor Nodes, Base Station, Wormhole




Wednesday, January 9, 2019

SIMULATION OF THE COMBINED METHOD

SIMULATION OF THE COMBINED METHOD
Ilya Levin1 and Victor Yakovlev2
The Department of Information Security of Systems, State University of Telecommunication, St.Petersburg, Russia

ABSTRACT

DDoS attacks have become one of the most dangerous issues in the Internet today. Because of these attacks, legitimate users can not access the resources they need. In [1] authors proposed a combined method for tracing and blocking the sources of DDoS-attacks. The essence of the method is that each router marks the network packet that passes through it using a random hash function from the set. At the receiving side this information is stored and used to filter unwanted traffic and traceback the source of distributed attack. This article describes the simulation and its results of the combined method.

KEYWORDS

Traceback, DDoS-attacks, Attack path reconstruction






Tuesday, January 8, 2019

AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIENT HONEYPOTS IN PROTECTION OF END USERS

AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIENT HONEYPOTS IN PROTECTION OF END USERS
Masood Mansoori1 and Ray Hunt2
1, 2 Faculty of Computer Science and Software Engineering, University of Canterbury,Christchurch, New Zealand

ABSTRACT

End users are increasingly vulnerable to attacks directed at web browsers which make the most of popularity of today’s web services. While organizations deploy several layers of security to protect their systems and data against un authorised access, surveys reveal that a large fraction of end users do not utilize and/or are not familiar with any security tools. End users’ hesitation and unfamiliarity with security products contribute vastly to the number of online DDoS attacks, malware and Spam distribution. This work on progress paper proposes a design focused on the notion of increased participation of internet service providers in protecting end users. The proposed design takes advantage of three different detection tools to identify the maliciousness of a website content and alerts users through utilising Internet Content Adaptation Protocol (ICAP) by an In-Browser cross-platform messaging system. The system also incorporates the users’ online behaviour analysis to minimize the scanning intervals of malicious websites database by client honeypots. Findings from our proof of concept design and other research indicate that such a design can provide a reliable hybrid detection mechanism while introducing low delay time into user browsing experience.

KEYWORDS

Browser Vulnerability, Client Honeypot, ICAP 






Monday, January 7, 2019

Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS Attack

Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS Attack
Vikram Singh and Vatika
Department Of Computer Science and Engineering Chaudhary Devi Lal University, Sirsa-125055 Haryana (India)

Abstract

The wireless ad hoc network is particularly vulnerable to DOS attacks due to its features of open medium, dynamic changing topology, cooperative algorithms, decentralization of the protocols, and lack of a clear line of defense is a growing problem in networks today. In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DOS) are possible because of the inherent limitations of its routing protocols. In this paper we will secure the MANET from the DDOS attack. DDOS attacks are similar to DOS attacks but there is a difference between them and that is DDOS attacks involve breaking in to hundreds or thousands of machines, so for this reason, this attack called Distributed. Very often, systems that use for attack is a part of the networks and users of these systems don’t know about that, their systems used for attack to another systems. This kind of attack, consume more bandwidth and uses more sources in network. . In this work, we study the effect of one of the important attacks that called DDOS in MANET on most vulnerability protocol that named AODV. The product of this study is detection of DDOS attack by using AODV (adhoc on demand distance vector) protocol. Proposed scheme is distributed in nature it has the capability to prevent Distributed DOS (DDOS) as well..

Key words: 

distributed denial-of-service (DDoS), wireless ad hoc networks, adhoc on demand distance vector protocol(AODV),MANET(Mobile Adhoc Network).




Friday, January 4, 2019

ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION

ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
Shaik Rasool, G. Sridhar, K. Hemanth Kumar, P. Ravi Kumar
Dept. of Computer Science & Engg, S.C.E.T., Hyderabad, India

ABSTRACT

This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted in Internet. The encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel. With advanced technologies in computer hardware and software, these standards seem not to be as secure and fast as one would like. In this paper we propose a encryption technique which provides security to both the message and the secret key achieving confidentiality and authentication. The Symmetric algorithm used has two advantages over traditional schemes. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the security level is higher due to the inherent poly-alphabetic nature of the substitution mapping method used here, together with the translation and transposition operations performed in the algorithm. Asymmetric algorithm RSA is worldwide known for its high security. In this paper a detailed report of the process is presented and analysis is done comparing our proposed technique with familiar techniques

KEYWORDS

Cipher text, Encryption, Decryption, Substitution, Translation.






Wednesday, January 2, 2019

A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION

A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
Manabu Okamoto
Kanagawa Institute of Technology, Japan

ABSTRACT

Electronic voting is an important application for security protocols. Most existing voting schemes are designed for elections in which each voter has only one ballot. However, some elections permit voters to cast multiple ballots. In this paper, we present a new voting scheme in which each voter can have multiple ballots, and can vote for multiple candidates. The proposed scheme allows the voter to simply pick their candidates and post a single encrypted message. Anonymous distribution of secret information is used so that no one knows which information is being passed to whom.

KEYWORDS

Elecronic voting, Anonymity





International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...