Friday, May 31, 2019

DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME

DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
Narendra K Pareek
University Computer Centre, Vigyan Bhawan, M L Sukhadia University, Udaipur-313001, India.

ABSTRACT

In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the substitution process of the scheme, image is divided into blocks and subsequently into color components. Each color component is modified by performing bitwise operation which depends on secret key as well as a few most significant bits of its previous and next color component. Three rounds are taken to complete substitution process. To make cipher more robust, a feedback mechanism is also applied by modifying used secret key after encrypting each block. Further, resultant image is partitioned into several key based dynamic sub-images. Each sub-image passes through the scrambling process where pixels of sub-image are reshuffled within itself by using a generated magic square matrix. Five rounds are taken for scrambling process. The propose scheme is simple, fast and sensitive to the secret key. Due to high order of substitution and permutation, common attacks like linear and differential cryptanalysis are infeasible. The experimental results show that the proposed encryption technique is efficient and has high security features.

KEYWORDS

Encryption, Secret key, Substitution, Scrambling, Security, Image cipher. 




Thursday, May 30, 2019

CLOUD COMPUTING SECURITY IN BUSINESS INFORMATION SYSTEMS

CLOUD COMPUTING SECURITY IN BUSINESS INFORMATION SYSTEMS
Sasko Ristov, Marjan Gusev and Magdalena Kostoska
Faculty of Information Sciences and Computer Engineering, Ss. Cyril and Methodius University, Skopje, Macedonia

ABSTRACT

Cloud computing providers‘ and customers‘ services are not only exposed to existing security risks, but, due to multi-tenancy, outsourcing the application and data, and virtualization, they are exposed to the emergent, as well. Therefore, both the cloud providers and customers must establish information security system and trustworthiness each other, as well as end users. In this paper we analyze main international and industrial standards targeting information security and their conformity with cloud computing security challenges. We evaluate that almost all main cloud service providers (CSPs) are ISO 27001:2005 certified, at minimum. As a result, we propose an extension to the ISO 27001:2005 standard with new control objective about virtualization, to retain generic, regardless of company’s type, size and nature, that is, to be applicable for cloud systems, as well, where virtualization is its baseline. We also define a quantitative metric and evaluate the importance factor of ISO 27001:2005 control objectives if customer services are hosted on-premise or in cloud. The conclusion is that obtaining the ISO 27001:2005 certificate (or if already obtained) will further improve CSP and CC information security systems, and introduce mutual trust in cloud services but will not cover all relevant issues. In this paper we also continue our efforts in business continuity detriments cloud computing produces, and propose some solutions that mitigate the risks.

KEYWORDS

Business Information Security, Cloud Computing, Security Assessment, Security Standards 




Wednesday, May 29, 2019

A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF FALSE POSITIVES IN IDS

A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF FALSE POSITIVES IN IDS
G. JACOB VICTOR1, Dr. M SREENIVASA RAO, 2Dr. V. CH. VENKAIAH3
1Director, SERP, RD Department, Hermitage Complex, Hill Fort Road, Hyderabad 
2Director, School of Information Technology, JNTU, Hyderabad -85
3Professor, CRRao AIMS & CS, UoH Campus, Hyderabad – 46

ABSTRACT

IT assets connected on internetwill encounter alien protocols and few parameters of protocol process are exposed as vulnerabilities. Intrusion Detection Systems (IDS) are installed to alerton suspicious traffic or activity. IDS issuesfalse positives alerts, if any behavior construe for partial attack pattern or the IDS lacks environment knowledge. Continuous monitoring of alerts to evolve whether, an alert is false positive or not is a major concern. In this paper we present design of an external module to IDS,to identify false positive alertsbased on anomaly based adaptive learning model. The novel feature of this design is that the system updates behavior profile of assets and environment with adaptive learning process.A mixture model is used for behavior modeling from reference data. The design of the detection and learning process are based on normal behavior and of environment. The anomaly alert identification algorithm isbuiltonSparse Markov Transducers (SMT) based probability.The total process is presented using real-time data. The Experimental results are validated and presentedwith reference to lab environment.

KEYWORDS

Anomaly, Common Vulnerability Exposure (CVE),IT policy, True positives, False Positives 



Monday, May 27, 2019

MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO THE SENDER MAIL SERVER

MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO THE SENDER MAIL SERVER
Alireza Nemaney Pour1 , Raheleh Kholghi2 and Soheil Behnam Roudsari2
1Dept. of Software Technology Engineering, Islamic Azad University of Abhar, Iran
2Dept. of IT Engineering, Sharif University of Technology, Kish Island, Iran

ABSTRACT

Unsolicited Bulk Emails (also known as Spam) are undesirable emails sent to massive number of users. Spam emails consume the network resources and cause lots of security uncertainties. As we studied, the location where the spam filter operates in is an important parameter to preserve network resources. Although there are many different methods to block spam emails, most of program developers only intend to block spam emails from being delivered to their clients. In this paper, we will introduce a new and efficient approach to prevent spam emails from being transferred. The result shows that if we focus on developing a filtering method for spams emails in the sender mail server rather than the receiver mail server, we can detect the spam emails in the shortest time consequently to avoid wasting network resources.

KEYWORDS

Anti-spams, Receiver mail server, Sender mail server, Spam Email 




Friday, May 24, 2019

CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK

CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
Djallel Eddine Boubiche1 and Azeddine Bilami2
LaSTIC Laboratory, Department of Computer Sciences, UHL Batna, ALGERIA

ABSTRACT

The wireless sensor networks (WSN) are particularly vulnerable to various attacks at different layers of the protocol stack. Many intrusion detection system (IDS) have been proposed to secure WSNs. But all these systems operate in a single layer of the OSI model, or do not consider the interaction and collaboration between these layers. Consequently these systems are mostly inefficient and would drain out the WSN. In this paper we propose a new intrusion detection system based on cross layer interaction between the network, Mac and physical layers. Indeed we have addressed the problem of intrusion detection in a different way in which the concept of cross layer is widely used leading to the birth of a new type of IDS. We have experimentally evaluated our system using the NS simulator to demonstrate its effectiveness in detecting different types of attacks at multiple layers of the OSI model. 

KEYWORDS

Wireless sensor networks, Cross layer architecture, intrusion detection system, WSN security.





Wednesday, May 22, 2019

LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS

LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
Shaik Sahil Babu#1, Arnab Raha#2, M.K. Naskar#3
#Department of Electronics and Telecommunication Engineering, Jadavpur University, Kolkata – 700 032, West Bengal, India

ABSTRACT

In Wireless Sensor Networks (WSNs), all the nodes selected for packet routing must be trustworthy, and at the same time energetic too. Smooth conservation of nodes energies and the trust levels, are an important issues in WSN because they directly affects the life span and reliability of the nodes as well as the entire network. The energy utilization at every node must be very smooth and at the same time, packets should be forwarded via trusted nodes only. In this paper, we propose an Energy Efficient Link State Routing Protocol (EELSRP) using the potential nodes selected by applying the fuzzy logic on the trust and residual energy levels. This routing protocol finds the best route by balancing the nodesresidual energies and trust levels, and protects the WSN against routing attacks by eliminating the untrusted nodes before the creation of route.

KEYWORDS

Wireless Sensor Network (WSN); Fuzzy Logic; Geometric Mean (GM); Direct Trust; Indirect Trust; Route Trust (RT); Base Station (BS); Benevolent Node; Packet Latency. 




Monday, May 20, 2019

A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS

A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
Yasir Arfat Malkani, Dan Chalmers, Ian Wakeman and Lachhman Das Dhomeja
School of Informatics, University of Sussex, Brighton, UK

ABSTRACT

Recently secure device pairing has had significant attention from a wide community of academic as well as industrial researchers and a plethora of schemes and protocols have been proposed, which use various forms of out-of-band exchange to form an association between two unassociated devices. These protocols and schemes have different strengths and weaknesses – often in hardware requirements, strength against various attacks or usability in particular scenarios. From ordinary user’s point of view, the problem then becomes which to choose or which is the best possible scheme in a particular scenario. We advocate that in a world of modern heterogeneous devices and requirements, there is a need for mechanisms that allow automated selection of the best protocols without requiring the user to have an in-depth knowledge of the minutiae of the underlying technologies. Towards this, the main argument forming the basis of this research work is that the integration of a discovery mechanism and several pairing schemes into a single system is more efficient from a usability point of view as well as security point of view in terms of dynamic choice of pairing schemes. In pursuit of this, we have proposed a generic system for secure device pairing by demonstration of physical proximity. The contributions presented in this paper include the design and prototype implementation of the proposed framework along with a novel Co-Location protocol.

KEYWORDS

Device Association, Security, Authentication, Physical Proximity, Device Discovery 




Friday, May 17, 2019

THE COORDINATE RATIOS AS A TOOL TO ANALYZE THE INTRUSION BASED ON BUŽEK-HILLERY QUANTUM COPYING MACHINE

THE COORDINATE RATIOS AS A TOOL TO ANALYZE THE INTRUSION BASED ON BUŽEK-HILLERY QUANTUM COPYING MACHINE
Besma Othmani1, Mohsen Machhout1, Houcine Mejri1,2, Hafedh Belmabrouk1, Rached Tourki1
1Laboratoire d’Electronique et Micro Electronique Faculté des Sciences de Monastir, 5000 Monastir, Tunisia
2Unité de Mathématiques Appliquées et Physique Mathématique, Ecole Préparatoire aux Académies Mélitaires Avenue Maréchal Tito 4029 Sousse, Tunisia

ABSTRACT

 The intrusion based on Bužek-Hillery universal quantum copying machine (UQCM) is investigated. A major problem to the eavesdropper Eve is how to choose the intrusion parameters required by the copying machine in order to take out the maximum of information on the transmitted qubits while making her intrusion as discrete as possible. The present paper attempts to investigate the equatorial and isotropic cloning by means of coordinate ratios. The degree of intrusion is evaluated by means of the ratios of the receiver (Bob) coordinates and the eavesdropper (Eve) coordinates to the sender (Alice) coordinates in the Bloch sphere. The fidelity has been usually used as a criterion to analyze the intrusion. More especially, this fidelity can achieve the value 0.85 for equatorial qubits by using Bužek-Hillery 1→2 machine. Our goal is to study the behavior of these ratios as a function of the intrusion parameters. As has been found, the coordinate ratios of both the receiver and the eavesdropper achieve an optimal value higher than 2/3, in contrast to the isotropic cloning. This can favor the eavesdropping when using equatorial qubits. For isotropic cloning, the maximal intrusion is reached when the coordinate ratios are equal. The optimal values of the intrusion parameters are then evaluated.

KEYWORDS

Eavesdropping, intrusion, quantum copying machines, isotropic cloning, equatorial cloning, coordinate ratios, fidelity



Tuesday, May 14, 2019

A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND CORRECT MISBEHAVIOUR IN ROUTING

A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND CORRECT MISBEHAVIOUR IN ROUTING
G. S. Mamatha
Department of Information Science and Engineering, R. V. College of Engineering, Bangalore, India

Abstract

The emerging mobile technology has brought revolutionized changes in the computer era. One such technology of networking is Mobile Ad hoc Networks (MANETS), where the mobility and infrastructure less of the nodes takes predominant roles. These features make MANETS more vulnerable to attacks. As the research continues several aspects can be explored in this area. At the very first it can be the problem of how to make the cross layer detection of attacks more efficient and work well. Since every layer in the network deals with different type of attacks, a possible viewpoint to those attack scenarios can be presented so that it can be extended in the later part. It becomes necessary to figure out the security solution architecture if there are different detection results generated by different layers. Secondly, there should be a measure of the network metrics to show increased performance. The paper presents such a defensive mechanism cross layered architecture which strives to identify and correct misbehaviour in MANETS especially with respect to routing layer. The evaluation of the proposed solution is also given with results obtained to show the performance of the network. 

KEYWORDS

Cross Layer Detection, MANETS, Security, Attacks, TODV 



Friday, May 10, 2019

A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS

A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
Raghav V. Sampangi1, Saurabh Dey2, Shalini R. Urs3 and Srinivas Sampalli1
1Faculty of Computer Science, Dalhousie University, Halifax, Nova Scotia, Canada
2Analytics Quotient, Bangalore, India
3International School of Information Management, University of Mysore, Mysore, India

ABSTRACT

Wireless Body Area Networks (WBANs) have gained a lot of research attention in recent years since they offer tremendous benefits for remote health monitoring and continuous, real-time patient care. However, as with any wireless communication, data security in WBANs is a challenging design issue. Since such networks consist of small sensors placed on the human body, they impose resource and computational restrictions, thereby making the use of sophisticated and advanced encryption algorithms infeasible. This calls for the design of algorithms with a robust key generation / management scheme, which are reasonably resource optimal. This paper presents a security suite for WBANs, comprised of IAMKeys, an independent and adaptive key management scheme for improving the security of WBANs, and KEMESIS, a key management scheme for security in inter-sensor communication. The novelty of these schemes lies in the use of a randomly generated key for encrypting each data frame that is generated independently at both the sender and the receiver, eliminating the need for any key exchange. The simplicity of the encryption scheme, combined with the adaptability in key management makes the schemes simple, yet secure. The proposed algorithms are validated by performance analysis. 

KEYWORDS

Body area networks, body area network security, wireless network security, key management, encryption 




Wednesday, May 8, 2019

A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Security

A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Security
Minal Moharir1 and Dr A V Suresh
1Department of Information Science & Engineering, R V College of Engineering, Bangalore, India
2R V College of Engineering,Bangalore, India

ABSTRACT

The objective of the paper is to develop an proficient and economical method for Hard Disk Drive(HDD) Security. The task is implemented using Full Disk Encryption (FDE) with Advanced Encryption Standards(AES) for data security of Personal Computers(PCS) and Laptops . The focus of this work is to authenticate and protect the content of HDD from illegal use. The paper proposes a novel approach for protecting a HDD based on Partial Disk Encryption(PDE) which one of the flavour of FDE. The proposed method is labelled as DiskTrust. FDE encrypts entire content or a single volume on your disk. Symmetric key uses same key for encryption as well for decryption. DiskTrust uses these two technology to build cost effective solution for small scale applications. Finally, the applicability of these methodologies for HDD security will be evaluated on a set of data files with different key sizes. 

KEYWORDS

INFORMATION SECURITY, INTEGRITY, CONFIDENTIALITY, AUTHENTICATION, ENCRYPTION




Monday, May 6, 2019

Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks

Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks
Sridhar Subramanian1 and Baskaran Ramachandran2
1Department of Computer Applications, Easwari Engineering College, Chennai, India.
2Department of Computer Science & Engineering, CEG, Guindy, Anna University, Chennai, India.

ABSTRACT

A mobile ad-hoc network (MANET) is a peer-to-peer wireless network where nodes can communicate with each other without the use of infrastructure such as access points or base stations. These networks are self-configuring, capable of self-directed operation and hastily deployable. Nodes cooperate to provide connectivity, operates without centralized administration. Nodes are itinerant, topology can be very dynamic and nodes must be able to relay traffic since communicating nodes might be out of range. The dynamic nature of MANET makes network open to attacks and unreliability. Routing is always the most significant part for any networks. Each node should not only work for itself, but should be cooperative with other nodes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET. The Qos parameters like PDR, throughput and delay are affected directly due to such misbehaving nodes. We focus on trust management framework, which is intended to cope with misbehaviour problem of node and increase the performance of MANETs. A trust-based system can be used to track this misbehaving of nodes, spot them and isolate them from routing and provide reliability. In this paper a Trust Based Reliable AODV [TBRAODV] protocol is presented which implements a trust value for each node. For every node trust value is calculated and based trust value nodes are allowed to participate in routing or else identified to become a misbehaving node. This enhances reliability in AODV routing and results in increase of PDR, decrease in delay and throughput is maintained. This work is implemented and simulated on NS-2. Based on simulation results, the proposed protocol provides more consistent and reliable data transfer compared with general AODV, if there are misbehaving nodes in the MANET. 

KEYWORDS

Ad-hoc, AODV, TBRAODV, MANET, Trust, Misbehaving node, Qos 




Friday, May 3, 2019

DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc Network

DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc Network
Dr.G.Padmavathi1, Dr.P.Subashini2, and Ms.D.Devi Aruna3
1Professor and Head, Department of Computer Science,Avinashiligam University for Women, Coimbatore – 641 043
2Associate Professor, Department of Computer Science,Avinashilingam University for Women, Coimbatore – 641 043
3Project fellow, Department of Computer Science,Avinashiligam University for Women, Coimbatore – 641 043

ABSTRACT

The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the physical layer more prone to security attacks. The MANET physical layer is challenging to DoS attack and also some passive attacks. The physical layer protocol in MANETs is responsible for bit-level transmission between network nodes. The proposed model combines spread spectrum technology Direct Sequence Spread Spectrum (DSSS) with key management technique ISAKMP to defend against signal jamming denial-of-service attacks in physical layer of MANET.DSSS with ISAKMP is found to be a good security solution even with its known security problems. The simulation is done using network simulator qualnet 5.0 for different number of mobile nodes. The proposed model has shown improved results in terms of Average throughput, Average end to end delay, Average packet delivery ratio, and Average jitter. 

KEYWORDS

MANET, DSSS, ISAKMP, Denial of Service attack



Thursday, May 2, 2019

Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks

Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks 
Priyank Singhal  and Nataasha Raul
University of Mumbai , India

Abstract

Malicious software is abundant in a world of innumerable computer users, who are constantly faced withthese threats from various sources like the internet, local networks and portable drives. Malware is potentially low to high risk and can cause systems to function incorrectly, steal data and even crash. Malware may be executable or system library files in the form of viruses, worms, Trojans, all aimed at breaching the security of the system and compromising user privacy. Typically, anti-virus software is based on a signature definition system which keeps updating from the internet and thus keeping track of known viruses. While this may be sufficient for home-users, a security risk from a new virus could threaten an entire enterprise network. This paper proposes a new and more sophisticated antivirus engine that can not only scan files, but also build knowledge and detect files as potential viruses. This is done by extracting system API calls made by various normal and harmful executable, and using machine learning algorithms to classify and hence, rank files on a scale of security risk. While such a system is processor heavy, it is very effective when used centrally to protect an enterprise network which maybe more prone to such threats. 

Keywords: 

Malware detection, virus, data mining, Information gain, random forest, machinelearning, classification, enterprise, network, security.




Wednesday, May 1, 2019

RISKS AND REMEDIES IN E-LEARNING SYSTEM

RISKS AND REMEDIES IN E-LEARNING SYSTEM
Nikhilesh Barik1 and Dr. Sunil Karforma2
1Research Scholar, Department of Computer Science ,Burdwan University , West Bengal ,India
2 Reader and Head , Department of Computer Science ,Burdwan University , West Bengal ,India

ABSTRACT

One of the most effective applications of Information and Communication Technology (ICT) is the emergence of E-Learning. Considering the importance and need of E-Learning, recent years have seen a drastic change of learning methodologies in Higher Education. Undoubtedly ,the three main entities of E-Learning system can be considered as Student, Teacher & Controlling Authority and there will be different level, but a good E-Learning system needs total integrity among all entities in every level. Apart from integrity enforcement, security enforcement in the whole system is the other crucial way to organize the it. As internet is the backbone of the entire system which is inherently insecure , during transaction of message in E-Learning system, hackers attack by utilising different loopholes of technology. So different security measures are required to be imposed on the system. In this paper, emphasis is given on different risks called e-risks and their remedies called e-remedies to build trust in the minds of all participants of E-Learning system.

KEYWORDS

E-Learning, e-risks, e-remedies, E-Learning security



International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...