Thursday, February 28, 2019

ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
Kyle Dees, M.S.1 and Syed (SHAWON) Rahman, PH.D.2
1Information Assurance and Security, Capella University, Minneapolis, MN, USA
2Assistant Professor, University of Hawaii-Hilo, HI, USA and Adjunct Faculty, Capella University, Minneapolis, MN, USA

ABSTRACT

As a result of the increased dependency on obtaining information and connecting each computer together for ease of access/communication, organizations risk being attacked and losing private information through breaches or insecure business activities. To help protect organizations and their assets, companies need to develop a strong understanding of the risks imposed on their company and the security solutions designed to prevent/minimize vulnerabilities. To reduce the impact threats have on a network, organizations need to: design a defense layer system that provides multiple instances of protection to prevent unauthorized access to core information, implement a strong network hardware/intrusion prevention system, and create all-inclusive network/security policies that detail user rules and company rights. In order to enhance the overall security of a basic infrastructure, this paper will provide a detailed look into gathering the organizational requirements, designing and implementing a secure physical network layout, and selecting the standards needed to prevent unauthorized access.

KEYWORDS

Infrastructure Security, Real Estate, Network Design, Network Security, Unauthorized Access 




The International Journal of Network Security

Wednesday, February 27, 2019

THE EVOLUTION OF IDS SOLUTIONS IN WIRELESS AD-HOC NETWORKS TO WIRELESS MESH NETWORKS
Novarun Deb, Manali Chakraborty, Nabendu Chaki
Department of Computer Science & Engineering, University of Calcutta, India

ABSTRACT

The domain of wireless networks is inherently vulnerable to attacks due to the unreliable wireless medium. Such networks can be secured from intrusions using either prevention or detection schemes. This paper focuses its study on intrusion detection rather than prevention of attacks. As attackers keep on improvising too, an active prevention method alone cannot provide total security to the system. Here in lies the importance of intrusion detection systems (IDS) that are solely designed to detect intrusions in real time. Wireless networks are broadly classified into Wireless Ad-hoc Networks (WAHNs), Mobile Adhoc Networks (MANETs), Wireless Sensor Networks (WSNs) and the most recent Wireless Mesh Networks (WMNs). Several IDS solutions have been proposed for these networks. This paper is an extension to a survey of IDS solutions for MANETs and WMNs published earlier in the sense that the present survey offers a comparative insight of recent IDS solutions for all the sub domains of wireless networks.

KEYWORDS

Intrusion, Intrusion detection systems, trust, wireless ad-hoc networks, MANET, wireless mesh network, wireless sensor network. 

Sunday, February 24, 2019

AN OVERVIEW OF PENETRATION TESTING

AN OVERVIEW OF PENETRATION TESTING
1Aileen G. Bacudio, 1Xiaohong Yuan, 2Bei-Tseng Bill Chu, 1Monique Jones
1Dept. of Computer Science, North Carolina A&T State University, Greensboro, North Carolina, USA
2Dept. of Software and Information Systems, University of North Carolina at Charlotte,Charlotte, North Carolina, USA

ABSTRACT

Penetration testing is a series of activities undertaken to identify and exploit security vulnerabilities. It helps confirm the effectiveness or ineffectiveness of the security measures that have been implemented. This paper provides an overview of penetration testing. It discusses the benefits, the strategies and the methodology of conducting penetration testing. The methodology of penetration testing includes three phases: test preparation, test and test analysis. The test phase involves the following steps: information gathering, vulnerability analysis, and vulnerability exploit. This paper further illustrates how to apply this methodology to conduct penetration testing on two example web applications. 

KEYWORDS

Security Testing, Vulnerability Assessment, Penetration Testing, Web Application Penetration Testing 





Thursday, February 21, 2019

RATIONAL SECRET SHARING OVER AN ASYNCHRONOUS BROADCAST CHANNEL WITH INFORMATION THEORETIC SECURITY

RATIONAL SECRET SHARING OVER AN ASYNCHRONOUS BROADCAST CHANNEL WITH INFORMATION THEORETIC SECURITY
William K. Moses Jr. and C. Pandu Rangan
Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai, India

ABSTRACT

We consider the problem of rational secret sharing introduced by Halpern and Teague [1], where the players involved in secret sharing play only if it is to their advantage. This can be characterized in the form of preferences. Players would prefer to get the secret than to not get it and secondly with lesser preference, they would like as few other players to get the secret as possible. Several positive results have already been published to efficiently solve the problem of rational secret sharing but only a handful of papers have touched upon the use of an asynchronous broadcast channel. [2] used cryptographic primitives, [3] used an interactive dealer, and [4] used an honest minority of players in order to handle an asynchronous broadcast channel. 

KEYWORDS

Cryptographic Protocols, Rational Secret Sharing, Information Theoretic Security 


Tuesday, February 19, 2019

Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent

Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent
Chintan Bhatt1 , Asha Koshti2 ,Hemant Agrawal3 , Zakiya Malek4,Dr Bhushan Trivedi5
MCA Dept.,GLS Institute of Computer Technology, Ahmedabad, India

Abstract

This paper is a survey of the work, done for making an IDS fault tolerant.Architecture of IDS that uses mobile Agent provides higher scalability. Mobile Agent uses Platform for detecting Intrusions using filter Agent, co-relater agent, Interpreter agent and rule database. When server (IDS Monitor) goes down, other hosts based on priority takes Ownership. This architecture uses decentralized collection and analysis for identifying Intrusion. Rule sets are fed based on user-behaviour or application behavior. This paper suggests that intrusion detection system (IDS) must be fault tolerant; otherwise, the intruder may first subvert the IDS then attack the target system at will.

Keywords

Fault tolerance, Mobile Agent, Intrusion Detection System





Wednesday, February 13, 2019

BSK-WBSN: BIOMETRIC SYMMETRIC KEYS TO SECURE WIRELESS BODY SENSORS NETWORKS

BSK-WBSN: BIOMETRIC SYMMETRIC KEYS TO SECURE WIRELESS BODY SENSORS NETWORKS
Samira Mesmoudi and Mohammed Feham
STIC Laboratory, University of Tlemcen, Algeria

ABSTRACT

The Wireless Sensors Network (WSN) is an emergent technology resulting from progress of various fields. Many applications of networks WSN are born. One of the applications which have an operational effectiveness relates to the field of health and allows a medical remote support. Miniature wireless sensors, strategically placed on the human body, create a Wireless Body Sensor Network (WBSN) which allows supervising various essential biological signals (rate of heartbeat, pressure, etc). The sensitivity of medical information requires mechanisms of safety. This performance constitutes a challenge for WBSN because of their limitation in resources energy and data-processing. In this paper we propose a new approach to symmetric cryptographic key establishment, based on biometrics physiology. This approach takes into account WBSN constraints and its topology.

KEYWORDS

Wireless Body Sensor Network (WBSN), security, biometric key, authenticated symmetric key establishment, topology. 





Tuesday, February 12, 2019

A SURVEY ON OPTIMIZATION BASED SPECTRUM SENSING TECHNIQUES TO REDUCE ISI AND PAPR IN OFDM BASED COGNITIVE RADIO SYSTEM

A SURVEY ON OPTIMIZATION BASED SPECTRUM SENSING TECHNIQUES TO REDUCE ISI AND PAPR IN OFDM BASED COGNITIVE RADIO SYSTEM
1Mr.B.Maheswara Rao, 2 Dr.S.Baskar
1Research scholar,2Professor, Department of EEE, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology

ABSTRACT

Cognitive radio is emerging technologies in OFDM based wireless systems which are very important for spectrum sensing. By using cognitive radio (CR) high data can be transferred with low bit error rate. The key idea of OFDM is to split the total transmission bandwidth into the subcarriers which further reduce the intersymbol interference (ISI) and peak to average power ratio(PAPR) in the signal. There are many optimization based spectrum sensing techniques are existing for efficient sensing purpose but each has its own advantages and disadvantages. This leads to start the comprehensive study for reducing PAPR and ISI(Intersymbol interference) in terms of FPGA based partial configuration. In the first part of review OFDM characteristics of the signal has compared with several optimizations based ISI reduction techniques. The second part is to compare the various spectrum sensing techniques in cognitive radio engine and its application in FPGA.

KEYWORDS

Cognitive radio, Inter symbol interference (ISI), Spectrum sensing, OFDM 


Wednesday, February 6, 2019

PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON IMAN1 SUPER COMPUTER
Ahmad Bany Doumi and Mohammad Qatawneh
Department of Computer Science-King Abdullah II School for Information technology, University of Jordan, Amman-Jordan.

ABSTRACT

Distributed security is an evolving sub-domain of information and network security. Security applications play a serious role when data exchanging, different volumes of data should be transferred from one site to another safely and at high speed. In this paper, the parallel International Data Encryption Algorithm (IDEA) which is one of the security applications is implemented and evaluated in terms of running time, speedup, and efficiency. The parallel IDEA has been implemented using message passing interface (MPI) library, and the results have been conducted using IMAN1 Supercomputer, where a set of simulation runs carried out on different data sizes to define the best number of processor which can be used to manipulate these data sizes and to build a visualization about the processor number that can be used while the size of data increased. The experimental results show a good performance by reducing the running time, and increasing speed up of encryption and decryption processes for parallel IDEA when the number of processors ranges from 2 to 8 with achieved efficiency 97% to 83% respectively.

KEYWORDS

International Data Encryption Algorithm (IDEA); Plain text; Encrypted data; MPI. 






A MULTI-LAYER ARABIC TEXT STEGANOGRAPHIC METHOD BASED ON LETTER SHAPING

A MULTI-LAYER ARABIC TEXT STEGANOGRAPHIC METHOD BASED ON LETTER SHAPING
A.F. Al Azzawi
Department of Software Engineering, Philadelphia University,Amman, Jordan

ABSTRACT

Text documents are widely used, however, the text steganography is more difficult than other media because of a little redundant information. This paper presents a text steganography methodology appropriate for Arabic Unicode texts that do not use a normal sequential inserting process to overcome the security issues of the current approaches that are sensitive to steg-analysis. The Arabic Unicode text is kept within main unshaped letters, and the proposed method is used text file as cover text to hide a bit in each letter by reshaping the letters according to its position (beginning, middle, end of the word, or standalone), this hiding process is accomplished through multi-embedding layer where each layer contains all words with the same Tag detected using the POS tagger, and the embedding layers are selected randomly using the stego key to improve the security issues. The experimental result shows that the purposed method satisfied the hiding capacity requirements, improve security, and imperceptibility is better than currently developed approaches.

KEYWORDS

Arabic text, multi-layers, Unicode, hiding information, text steganography



Monday, February 4, 2019

International Journal of Network Security

A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK

A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
Rajinder Singh1  and Satish Kumar2
1Department of Computer Science and Applications, PUSSGRC Hoshiarpur, Punjab,India
2Department of Computer Science and Applications, PUSSGRC Hoshiarpur, Punjab,India

ABSTRACT

Nowadays Wireless local area networks (WLANs) are growing very rapidly. Due to the popularity of 802.11 networks, possibilities of various attacks to the wireless network have also increased. In this paper, a special type of attack De-Authentication/disassociation attack has been investigated. In a normal scenario, a wireless client or user sends a de-authentication frame when it wants to terminate the connection. These frames are in plain text and are not encrypted. These are not authenticated by the access point. Attackers take advantage of this, and spoof these packets and disable the communication between the connected client and access point. In this paper, an algorithm based on radio-tap header information is suggested to identify whether there is a De-Authentication attack on the client or not.

KEYWORDS

De-Authentication Attack, Kali Linux, Scapy, Python 




International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...