Friday, January 31, 2020

International Journal of Network Security & Its Applications (IJNSA) - Current Issue - January 2020, Volume 12, Number 1

International Journal of Network Security & Its Applications (IJNSA)
ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)
http://airccse.org/journal/ijnsa.html

Current Issue
January 2020, Volume 12, Number 1

A Survey on the Use of Data Clustering for Intrusion Detection System in Cybersecurity
Binita Bohara1, Jay Bhuyan1, Fan Wu1 and Junhua Ding2, 1Tuskegee University, USA and 2University of North Texas, USA

Self-organization and Autonomous Network Survey
Houneida SAKLY, Campus University of Mannouba, Tunisia

http://airccse.org/journal/jnsa20_current.html



Wednesday, January 29, 2020

SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OFDM SYSTEM WITH IMPLEMENTATION OF CONCATENATED ECB AND CFB CRYPTOGRAPHIC ALGORITHM

SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OFDM SYSTEM WITH IMPLEMENTATION OF CONCATENATED ECB AND CFB CRYPTOGRAPHIC ALGORITHM

Laila Naznin1,Shahrina Sultana1, M. Golam Rashed1 and Shaikh Enayet Ullah2
1Department of Information and Communication Engineering, University of Rajshahi, Rajshahi, Bangladesh
2Department of Applied Physics and Electronic Engineering, Rajshahi University, Rajshahi, Bangladesh

ABSTRACT

In this paper, we made a comprehensive performance evaluative study of a secured MIMO Orthogonal Frequency-Division Multiplexing wireless communication system with implementation of two pre channel equalization techniques such as Pre-Minimum Mean Square Error (Pre-MMSE) and Pre-Zero Forcing(Pre-ZF) under QPSK and QAM digital modulations. The simulated system deploys three channel coding techniques(1/2-rated Convolutional, CRC and BCH). In the present simulated system, text message transmission has been secured with concatenated implementation of Electronic Codebook (ECB) and Cipher Feedback(CFB) cryptographic algorithm. It is remarked from simulation results that the MIMO OFDM system outperforms with pre-ZF channel equalization,QAM digital modulation and BCH channel coding schemes under fading channels(AWGN and Raleigh).In Pre-MMSE/pre-ZF channel equalization scheme, the system shows comparatively worst performance in convolutional channel coding scheme with QAM/QPSK digital modulation. With increase in noise power as compared to signal power, the system is found to have shown performance deterioration.

KEYWORDS

MIMO-OFDM, Pre-MMSE, Pre-ZF, ECB and CFB cryptographic algorithm, Bit Error rate(BER), AWGN and Raleigh fading channels.




Wednesday, January 22, 2020

TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPEER NETWORK

TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPEER NETWORK

Prashant Kumar Singh1  A. K. Vatsa1 Reetu Sharma2 Priyanka Tyagi3
1Shobhit University, Meerut, UP, India.
2CERT, Meerut, UP, India,
3DVSIET, Meerut, UP, India,

Abstract

A intrusion provides an unauthorized access, damage or disruption of the network. The process can understand the characteristics and nature of an intruder. The paper presents the taxonomy consists of the specification of an intruder. Taxonomy provides the classification of intruder and provides mechanism for intruder detection. We found the algorithm for developing an intruder which can be attack at host system or network system. Here provide the mechanism for an intrusion by using the
system attribute and detection mechanism is based on knowledge and behavior of the system. Intrusiondetection mechanism using pattern based and threshold based mechanism for detecting an intruder. An intruder continuously monitored the network and host activities for detecting attack into the network and the task of intrusion-detection is also monitor the usage of such systems and detects the apparition of insecure states.

Keyword : 

Intruder, Taxonomy of attack, Intrusion detection, Intrusion Attacks, Peerto-peer network. 





Wednesday, January 15, 2020

A SIMPLE AND RELIABLE TOUCH SENSITIVE SECURITY SYSTEM

A SIMPLE AND RELIABLE TOUCH SENSITIVE SECURITY SYSTEM

Adamu Murtala Zungeru1 , Jonathan Gana Kolo2 and Ijarotimi Olumide3

1,2 School of Electrical and Electronic Engineering,
University of Nottingham, Jalan
Broga, 43500 Semenyih, Selangor Darul Ehsan,
Malaysia

3 Electrical and Electronic Engineering Technology,
Rufus Giwa Polytechnic, Owo, Ondo, Nigeria
ABSTRACT

This research focuses on detection of unauthorized access to residential and commercial buildings when the residents are far away from the access gate of the house. The system is a simple and reliable touch activated security system and uses sensor technology to revolutionize the standards of living. The system provides a best solution to most of the problems faced by house owners in their daily life. Due to its simple electroniccomponents nature, it is more adaptable and cost-effective. The system is divided into threeunits; the power supply unit which employs the use of both DC battery and mains supply to ensure constant power supply to the circuit, the trigger unit which is responsible for activating the alarm unit and designed to have much time and period and moderate sensitivity in order to reduce the rate of false alarm, and the alarm amplitude unit which main function is to produce amplitude alarm sound when triggered by the trigger unit with the aim of producing a large audible sound that can alert the entire neighborhood or scare an intruder away. The design of the system was achieved by considering some factors such as economy, availability of components and research materials, efficiency, compatibility and portability and also durability in the design process. The performance of the system after test met design specifications. This system works on the principle of touch sensor.The general operation of the system and performance is dependent on the presence of an intruder entering through the door and touching any part of the door. The overall system was constructed and tested and it work perfectly.
  
KEYWORDS

Touch Sensor, Automation,Control System, Security, Electronic Circuit, Maximum Power Transfer


















Monday, January 13, 2020

Call for Papers - International Journal of Network Security & Its Applications (IJNSA)


International Journal of Network Security & Its Applications (IJNSA)
ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)
                
Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following:

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojan Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

Paper submission

Authors are invited to submit papers for this journal through e-mail ijnsa@airccse.org or Submission System.  Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

·         Submission Deadline : January 18, 2020
·         Notification                  : February 18, 2020
·         Final Manuscript Due  : February 26, 2020
·         Publication Date          : Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us : ijnsa@airccse.org or ijnsa@aircconline.com

Submission System



Here you can reach us in social Medias


Thursday, January 9, 2020

13th International Conference on Security and its Applications (CNSA 2020)

March 28 ~ 29, 2020, Sydney, Australia
https://ccseit2020.org/cnsa/index.html

Call for Papers

13th International Conference on Security and its Applications (CNSA 2020) focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and counter measures and establishing new collaborations in these areas.

Important Dates

• Submission Deadline: January 12, 2020
• Authors Notification: February 10, 2020
• Registration & Camera-Ready Paper Due: February 10, 2020

Here's where you can reach us : cnsaconference@yahoo.com or cnsa@ccseit2020.org


Tuesday, January 7, 2020

6th International Conference on Cryptography and Information Security (CRIS 2020)



January 25 ~ 26, 2020, Zurich, Switzerland


Scope & Topics

6th International Conference on Cryptography and Information Security (CRIS 2020) provides a forum for researchers who address this issue and to present their work in a peer-reviewed forum. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in applied cryptography and Information security.

Topics of interest include, but are not limited to, the following:

  • Cryptographic Protocols
  • Cryptography and Coding
  • Untraceability
  • Privacy and Authentication
  • Key Management
  • Trust Management
  • Quantum Cryptography
  • Computational Intelligence in Security
  • Artificial Immune Systems
  • Biological and Evolutionary Computation
  • Intelligent Agents and Systems
  • Reinforcement and Unsupervised Learning
  • Autonomy-Oriented Computing
  • Co-evolutionary Algorithms
  • Fuzzy Systems
  • Biometric Security
  • Trust Models and Metrics
  • Regulation and Trust Mechanisms
  • Data Integrity
  • Models for Authentication, Trust and Authorization
  • Wireless Network Security
  • Information Hiding
  • E- Commerce
  • Data and System Integrity
  • Access Control and Intrusion Detection
  • Intrusion Detection and Vulnerability Assessment
  • Authentication and Non-repudiation
  • Identification and Authentication
  • Insider Threats and Countermeasures
  • Intrusion Detection & Prevention
  • Secure Cloud Computing
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Management
  • Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
  • Sensor and Mobile Ad Hoc Network Security
  • Service, Systems Design and QoS Network Security
  • Software Security
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Web Services
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems

Paper Submission

Authors are invited to submit papers through the conference Submission System by January 12, 2020 (Final Call).

Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).

Selected papers from CRIS 2020, after further revisions, will be published in the special issues of the following journals


Important Dates

·         Submission Deadline : January 12, 2020 (Final Call)
  • Authors Notification   : January 20, 2020
  • Registration & Camera-Ready Paper Due : January 21, 2020

Contact Us

Here's where you can reach us: cris@cosit2020.org or crissecretary@gmail.com

Submission System








Wednesday, January 1, 2020

A SURVEY ON WEB SPAM DETECTION METHODS: TAXONOMY

A SURVEY ON WEB SPAM DETECTION METHODS: TAXONOMY
Shekoofeh Ghiam1 and Alireza Nemaney Pour2
1Department of IT Engineering, Sharif University of Technology, International Campus, Kish Island, IRAN
2Dept. of Computer Software Technology Engineering, Islamic Azad University of Abhar, Iran

ABSTRACT

Web spam refers to some techniques, which try to manipulate search engine ranking algorithms in order to raise web page position in search engine results. In the best case, spammers encourage viewers to visit their sites, and provide undeserved advertisement gains to the page owner. In the worst case, they use malicious contents in their pages and try to install malware on the victim’s machine. Spammers use three kinds of spamming techniques to get higher score in ranking. These techniques are Link based techniques, hiding techniques and Content-based techniques. Existing spam pages cause distrust to search engine results. This not only wastes the time of visitors, but also wastes lots of search engine resources. Hence spam detection methods have been proposed as a solution for web spam in order to reduce negative effects of spam pages. Experimental results show that some of these techniques are working well and can find spam pages more accurate than the others. This paper classifies web spam techniques and the related detection methods.

KEYWORDS

Cloaking Detection, Hiding Techniques, Manipulating Search Engine, Redirection, Web Spam







International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...