Friday, March 29, 2019

AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
K.Kuppusamy1 and S.Malathi2
1Department of Computer Science &Engineering, Alagappa University, Karaikudi
2Research Scholar, Manonmaniam Sundaranar University, Tirunelvelli 

ABSTRACT

With the tremendous growth of internet services, websites are becoming indispensable. When the number of users gets increased accessing the websites, the performance of the server gets down. Due to much burden on the server, the response time gets delayed. When the process becomes slow, the ratio of the users accessing to the site also goes down. Apart from this, it may also happen due to the attack of Hackers. We have implemented a special kind of technique to recognize the attack carried out by the hackers and block them from using the site. This is termed as Denial of Service and thus is carried out among the web users and is commonly referred to as Distributed Denial of Service (DDoS). To improve server performance and deny the accessibility permissions to the hackers are proposed in this paper. 

KEYWORDS

Websites, Attack, Hacker, DDoS 



Thursday, March 28, 2019

Enhanced OneTime Pad Cipher with MoreArithmetic and Logical Operations with Flexible Key Generation Algorithm

Enhanced OneTime Pad Cipher with MoreArithmetic and Logical Operations with Flexible Key Generation Algorithm
S.G.Srikantaswamy1 and Dr.H.D.Phaneendra2
1Research scholar, CSE, National Institute of Engineering, Mysore, Karnataka, India
2Professor and Research Guide, CSE, NIE, Mysore, Karnataka, India

ABSTRACT

The process of exchanging information is called Communication. The basic Communication system involves transmitter, receiver and the channel. The data transmitted by the sender reaches receiver through the channel. The unauthorized parties (cracker,hacker, eavesdropper, or attacker) should not be able to access the information at the channel. Therefore transmitting data securely from the sender to the receiver is a very important aspect. A cryptographic system is unconditionally secure if the cipher text produced by the system does not contain enough information to determine uniquely the corresponding plaintext, no matter how much cipher text is available. A cryptographic system is said to be computationally secure if the cost of breaking the cipher exceeds the value of the encrypted information and the time required to break the cipher exceeds the useful lifetime of the content. One time pad system can be called as unconditionally secure algorithm, if the keys (pad) usedare truly random in nature. In this paper, we are demonstrating that one-time pad can be used as an efficient encryption scheme by involving arithmetic and logical operations. Here we proposed a new key generation technique, to generate a key of any length just by providing a seed value, to encrypt the message. The problem generating key value has been solved by the use of key generation algorithm.

KEYWORDS

Cipher, Plaintext, Cipher text,Confusion,Diffusion,Encryption,Decryption,Eavesdropper, Cryptanalysis.

Wednesday, March 27, 2019

TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
M. Tariq Banday
P. G. Department of Electronics and Instrumentation Technology University of Kashmir, Srinagar - 6, India

ABSTRACT

E-mail has emerged as the most important application on Internet for communication of messages, delivery of documents and carrying out of transactions and is used not only from computers but many other electronic gadgets like mobile phones. Over a period of year’s e-mail protocols have been secured through several security extensions and producers, however, cybercriminals continue to misuse it for illegitimate purposes by sending spam, phishing e-mails, distributing child pornography, and hate emails besides propagating viruses, worms, hoaxes and Trojan horses. Further, Internet infrastructure misuse through denial of service, waste of storage space and computational resources are costing every Internet user directly or indirectly. It is thus essential to identify and eliminate users and machines misusing e-mail service. E-mail forensic analysis is used to study the source and content of e-mail message as evidence, identifying the actual sender, recipient and date and time it was sent, etc. to collect credible evidence to bring criminals to justice. This paper is an attempt to illustrate e-mail architecture from forensics perspective. It describes roles and responsibilities of different e-mail actors and components, itemizes meta-data contained in e-mail headers, and lists protocols and ports used in it. It further describes various tools and techniques currently employed to carry out forensic investigation of an e-mail message.

KEYWORDS

E-mail Forensics; E-mail Headers; E-mail Security; Header Analysis; E-mail Architecture 



Monday, March 25, 2019

EXPERIMENTING WITH THE NOVEL APPROACHES IN TEXT STEGANOGRAPHY

EXPERIMENTING WITH THE NOVEL APPROACHES IN TEXT STEGANOGRAPHY
Shraddha Dulera1, Devesh Jinwala1 and Aroop Dasgupta2
1Department of Computer Engineering, S V National Institute of Technology, Surat,India
2Bhaskaracharya Institute for Space Applications and Geo-Informatics, Gandhinagar,India

ABSTRACT

As is commonly known, the steganographic algorithms employ images, audio, video or text files as the medium to ensure hidden exchange of information between multiple contenders to protect the data from the prying eyes. However, using text as the target medium is relatively difficult as compared to the other target media, because of the lack of available redundant information in a text file. In this paper, in the backdrop of the limitations in the prevalent text based steganographic approaches, we propose simple, yet novel approaches that overcome the same. Our approaches are based on combining the random character sequence and feature coding methods to hide a character. We also analytically evaluate the approaches based on metrics viz. hiding strength, time overhead and memory overhead entailed. As compared to other methods, we believe the approaches proposed impart increased randomness and thus aid higher security at lower overhead.

KEYWORDS

Steganography, Text Steganography, Feature coding 



Thursday, March 21, 2019

Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm

Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm
Debasis Das1, Rajiv Misra2
Department of Computer Science and Engineering, Indian Institute of Technology, Patna-800013, Bihar , India.

ABSTRACT

Cellular Automata(CA) is a discrete computing model which provides simple, flexible and efficient platform for simulating complicated systems and performing complex computation based on the neighborhoods information. CA consists of two components 1) a set of cells and 2) a set of rules . Programmable Cellular Automata(PCA) employs some control signals on a Cellular Automata(CA) structure. Programmable Cellular Automata were successfully applied for simulation of biological systems, physical systems and recently to design parallel and distributed algorithms for solving task density and synchronization problems. In this paper PCA is applied to develop cryptography algorithms. This paper deals with the cryptography for a parallel AES encryption algorithm based on programmable cellular automata. This proposed algorithm based on symmetric key systems.

KEYWORDS

CA, PCA, Cryptography, AES, Symmetric Key. 




Wednesday, March 20, 2019

EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANET

EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANET
Mina Rahbari1 and Mohammad Ali Jabreil Jamali2
1Department of Computer Science, Shabestar Branch, Islamic Azad University, Shabestar, Iran
2Department of Computer Science, Shabestar Branch, Islamic Azad University, Shabestar, Iran

ABSTRACT

Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.

KEYWORDS

VANET, Sybil attack, Cryptography, Certification Authority 


Tuesday, March 19, 2019

BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS

BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
Maheswara Rao Valluri
Department of Information Technology, Salalah College of Technology P.O.Box No:608, PC 211, Salalah, Sultanate of Oman

ABSTRACT

A blind signature scheme is a cryptographic protocol to obtain a valid signature for a message from a signer such that signer’s view of the protocol can’t be linked to the resulting message signature pair.This paper presents blind signature scheme using Chebyshev polynomials. The security of the given scheme depends upon the intractability of the integer factorization problem and discrete logarithms of Chebyshev polynomials.

KEYWORDS

Blind signature, Chebyshev Polynomials, Digital signature, RSA, &Security 


Saturday, March 16, 2019

USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS
Sreelatha Malempati1 and Shashi Mogalla2
1Dept. of Computer Science & Engineering R.V.R. & J.C. College of Engineering Chowdavaram, Guntur, A.P
2Dept. of Computer Science & System Engineering Andhra University College of Engineering Visakhapatnam, A.P.

ABSTRACT

Information security is necessary for any organization. Intrusion prevention is the basic level of security which requires user authentication. User can be authenticated to a machine by passwords. Traditional textual passwords are vulnerable to many attacks. Graphical passwords are introduced as alternatives to textual passwords to overcome these problems. This paper introduces native language passwords for authentication. Native language character set consists of characters with single or multiple strokes. User can select one (or more) character(s) for his password. The shape and strokes of the characters are used for authentication.

KEYWORDS

Shape based authentication, Textual Password, Native language password, Intrusion prevention 



Thursday, March 14, 2019

SCHEME OF ENCRYPTION FOR BLOCK CIPHERS AND MULTI CODE GENERATION BASED ON SECRET KEY

SCHEME OF ENCRYPTION FOR BLOCK CIPHERS AND MULTI CODE GENERATION BASED ON SECRET KEY
P. Anuradha Kameswari*, R. Chaya Kumari and L. Praveen Kumar
Department of Mathematics, Andhra University, Visakhapatnam - 530003, Andhra Pradesh, India

ABSTRACT

In this paper we propose a scheme of encryption for Block ciphers in N-alphabet, where every member of any m-block of plain text is enciphered by different permutations which are generated by the help of a secret key word. Further we extend this method to multicode encryption using the fact that encrypting each member differently is the basis of multicode encryption.

KEY WORDS 

Encryption, Block cipher, Multicode encryption 

Tuesday, March 12, 2019

SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND REED MULLER CODES FOR WIRELESS SENSOR NETWORKS

SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND REED MULLER CODES FOR WIRELESS SENSOR NETWORKS
Pinaki Sarkar*1, Amrita Saha2 , Samiran Bag3
1Department of Mathematics, Jadavpur University, Kolkata-700032, INDIA
2CSE Department, IIT Bombay, Mumbai-400076, INDIA
3Applied Statistics Unit, Indian Statistical Institute, Kolkata-700108, INDIA

ABSTRACT

Resource constraints of the nodes make security protocols difficult to implement. Thus key management is an important area of research in Wireless Sensor Networks (WSN). Key predistribution (kpd) which involves preloading keys in sensor nodes, has been considered as the best solution for key management when sensor nodes are battery powered and have to work unattended. This paper proposes a method to fix some loophole in an existing key predistribution scheme thereby enhancing the security of messages exchanged within a WSN. Here we use a model based on Reed Muller Codes to establish connectivity keys between sensor nodes. The model is then utilized to securely establish communication keys and exchange messages in a WSN designed on basis of two schemes using transversal designs for key predistribution. The combination of the key predistribution scheme and the connectivity model gives rise to highly resilient communication model with same connectivity between nodes as the chosen key predistribution scheme.

KEYWORDS

Connectivity, Communication, Reed-Muller Codes, Transversal Designs, Security. 



Monday, March 11, 2019

STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION

STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
Rohitha Goonatilake1, Rafic Bachnak1, and Susantha Herath2
1Department of Engineering, Mathematics, and Physics Texas A&M International University, TX 78041, USA
2Department of Information Systems, St. Cloud State University, MN 56301, USA

ABSTRACT

In the study of network intrusion, much attention has been drawn to on-time detection of intrusion to safeguard public and private interest and to capture the law-breakers. Even though various methods have been found in literature, some situations warrant us to determine intrusions of network in real-time to prevent further undue harm to the computer network as and when they occur. This approach helps detect the intrusion and has a greater potential to apprehend the law-breaker. The purpose of this article is to formulate a method to this effect that is based on the statistical quality control techniques widely used in the manufacturing and production processes.

KEYWORDS

Anomalies, control charts, false alarm, intrusion, network system, and quality control 



Thursday, March 7, 2019

SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS

SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
Praveen Likhar, Ravi Shankar Yadav and Keshava Rao M
Centre for Artificial Intelligence and Robotics (CAIR), Defence Research and Development Organisation (DRDO), Bangalore-93, India

ABSTRACT

Like most advances, wireless LAN poses both opportunities and risks. The evolution of wireless networking in recent years has raised many serious security issues. These security issues are of great concern for this technology as it is being subjected to numerous attacks. Because of the free-space radio transmission in wireless networks, eavesdropping becomes easy and consequently a security breach may result in unauthorized access, information theft, interference and service degradation. Virtual Private Networks (VPNs) have emerged as an important solution to security threats surrounding the use of public networks for private communications. While VPNs for wired line networks have matured in both research and commercial environments, the design and deployment of VPNs for WLAN is still an evolving field. This paper presents an approach to secure IEEE 802.11g WLAN using OpenVPN, a transport layer VPN solution and its impact on performance of IEEE 802.11g WLAN.

KEYWORDS

WLAN, IEEE 802.11g, VPN, Performance evaluation, Security. 






Wednesday, March 6, 2019

ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
Himanshu Gupta1 and Vinod Kumar Sharma2
1Senior Faculty Member,Amity Institute of Information Technology, Amity University Campus,India.
2Professor & Dean, Faculty of Technology,Gurukula Kangri Vishwavidyalaya,India

ABSTRACT

Security of electronic transaction over insecure communication channel is a challenging task that includes many critical areas as secure communication channel, strong data encryption technique and trusted third party to maintain the electronic database. The conventional methods of encryption in Secure Electronic Transaction can only maintain the data security. The confidential information of customer could be accessed by the unauthorized user for malicious purpose. Therefore, it is necessary to apply effective encryption methods to enhance data security as well as authentication of data communication. The multiple encryption technique provides sufficient security for electronic transactions over wireless network. In this research paper, the needs of multiple encryption technique in Secure Electronic Transaction are proposed to enhance the security of confidential data. This technique increases the data security in such a manner that unauthorized user can not access any part of information over wireless network as internet.

KEYWORDS

Secure Electronic Transaction ; Data Security; Multiple Encryption.



Friday, March 1, 2019

Implimentation of Cryptographic Algorithm for GSM and UMTS Systems

Implimentation of Cryptographic Algorithm for GSM and UMTS Systems
1Alpesh R. Sankaliya,2 V.Mishra and 3Abhilash Mandloi
Department of Electronics Sardar Vallabhbhai National Institute of Technology, Surat-395007 Gujarat, India

Abstract

Due to extremely high demand of mobile phones among people, over the years there has been a great demand for the support of various applications and security services. Cryptographic algorithms used by Mobile Subscribers to protect the privacy of their cellular voice and data communication. Ciphering provides the mean to regain control over privacy and authentication. A5/x are the encryption algorithms used in order to ensure privacy of conversations on mobile phones. A5/3 encryption algorithm used for 3G and GEA3 encryption algorithm used for GPRS. f8 is confidentiality algorithms developed by 3GPP used in UMTS System. The following paper is based on simulation of A5/3 and f8 algorithms. 

Keywords

Mobile security, Security, Cryptography , Stream Cipher, A5/3, f8





International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...