International Journal of Computer Networks and Communications Security

Volume 2, Issue 9, September 2014




A Dynamic Flooding Attack Detection System Based on Different Classification Techniques and Using SNMP MIB Data

Pages: 279-284 (6) | [Full Text] PDF (299 KB)
Shiraz University of Technology, Department of Computer Engineering & IT, Shiraz, Iran

Currently, the amount of exchanged data in network has increased dramatically and consequently, detection of malicious data is an important issue for network’s users and administrators. DoS and DDoS attacks have always taken consideration of attackers and researchers, and distinguishing them from normal packet is difficult. Therefore, using data mining techniques along traditional mechanism such as firewall, improves the performance of intrusion detection systems. This paper introduces flooding attack detection system based on SNMP MIB data, which selects effective MIB variables and compares some different classification algorithms based on chosen variables. Finally, the proposed system, models detection mechanism, is using the algorithm with the highest accuracy. The advantage of this system is its ability to learn. System’s detection model will be optimized after receiving the new data. While the behavior of attack changes, the system will be adapted easily.
Index Terms Dos attack, SNMP, MIB, Intrusion Detection System, Data Mining.



Path-finding in Multi-Agent, unexplored And Dynamic Military Environment Using Genetic Algorithm

Pages: 285-291 (7) | [Full Text] PDF (354 KB)
Saeed Saeedvand, Seyed Naser Razavi and Fahimeh Ansaroudi
Computer Engineering Department, Faculty of Electrical and Computer Engineering, University of Tabriz, Tabriz, Iran

Path-finding in multi-agent, unexplored and dynamic military environment is one of the most important issues for solving in simulators. In this article a substructure of agent Path-finding is created which these agents are placed in an unexplored environment, also they communicate each other and use proposed methods to find targets to reach them. The most important aim of this article is to consider the targets behavior to decrease the required cost for reaching to the targets by improving agent’s behavior in a dynamic military environment and improving agent’s interactions. In the proposed method each agent has movement ability in a dynamic environment autonomously and they have ability to find targets between obstacles. Therefore to solve this problem all of the necessary constraints to find path in a dynamic and unexplored environment are considered and Genetic algorithm is used. 
Index Terms Multi-agent system, Military environment, Path finding, Chromosome, Fitness Function.



Smuggling VOIP Watermarks Using Intended Corrupted Packets

Pages: 292-297 (6) | [Full Text] PDF (386 KB)
Mazen Mohamed Flaifl, Sherif Radwan Belal, Ismail Abdel Ghafar Ismail, Ashraf Diaa El-Din Elbayomy, Mohamed Zaki Abdel Megeed
Military Technical Collage, Department of Computer Engineering
Arab Academy for Science and Technology
Azhar University, Department of Computer Engineering
Military Technical Collage, Department of Communications

Designing and embedding a watermark for VoIP is the main goal of this paper, A new model is introduced and characterized by high robustness, high security and must be non-perceptual. The watermarking model is suitable for real-time service and supports the needs of embedding the watermark into the traffic of VoIP and its extraction additionally this model offers authentication and integrity. The model based on digital watermarking and steganography. Another factor was taken in consideration; the amount of data used and its influence on the voice quality of service. the model is implemented using C# code for both embedding and extracting the watermarking spite of the intended cheating mechanisms that might complicate the send/receive conditions. In addition, the model performance has confirmed its robustness and quality of service. 
Index Terms IP Telephony / VoIP Security, Digital Watermarking, Steganography.



A Practical Approach to Asses Fatal Attacks in Enterprise Network to Identify Effective Mitigation Techniques

Pages: 298-307 (10) | [Full Text] PDF (1.49 MB)
Graduate Student, Faculty of Engineering, American International University-Bangladesh
Assistant Professor, Faculty of Engineering, American International University-Bangladesh
Assistant Professor, Faculty of Science and IT, American International University-Bangladesh

For any organization, having a secured network is the primary thing to reach their business requirements. A network is said to be secured when it can sustain from attacks, which may damage the whole network. Over the last few decades, internetworking has grown tremendously and lot of importance is given to secure the network. To develop a secure network, network administrators must have a good understanding of all attacks that are caused by an intruder and their mitigation techniques. This paper explores the most fatal attacks that might cause serious downtime to an enterprise network and examines practical approaches to understand the behavior of the attacks and devise effective mitigation techniques. It also describes the importance of security policies and how security policies are designed in real world. 
Index Terms DoS Attack, ARP Spoofing, Evil Twin Attack, Man-in-the-middle Attack, DHCP Starvation.



A Comprehensive View of Hadoop MapReduce Scheduling Algorithms

Pages: 308-317 (10) | [Full Text] PDF (301 KB)
Seyed Reza Pakize
Department of Computer, Islamic Azad University, Yazd Branch, Yazd, Iran

Hadoop is a Java-based programming framework that supports the storing and processing of large data sets in a distributed computing environment and it is very much appropriate for high volume of data. it's using HDFS for data storing and using MapReduce to processing that data. MapReduce is a popular programming model to support data-intensive applications using shared-nothing clusters. the main objective of MapReduce programming model is to parallelize the job execution across multiple nodes for execution. nowadays, all focus of the researchers and companies toward to Hadoop. due this, many scheduling algorithms have been proposed in the past decades. there are three important scheduling issues in MapReduce such as locality, synchronization and fairness. The most common objective of scheduling algorithms is to minimize the completion time of a parallel application and also achieve to these issues. in this paper, we describe the overview of Hadoop MapReduce and their scheduling issues and problems. then, we have studies of most popular scheduling algorithms in this field. finally, highlighting the implementation Idea, advantages and disadvantage of these algorithms. 
Index Terms Hadoop, Map Reduce, Locality, Scheduling algorithm, Synchronization, Fairness.



Firewall-based Solution for Preventing Privilege Escalation Attacks in Android

Pages: 318-327 (10) | [Full Text] PDF (617 KB)
Ali Magdy, Mohsen Mahros and Elsayed Hemayed
Bank Misr, Department of Information Comm. Technology, Cairo, Egypt
Cairo University, Department of Comm. and Electronics, Cairo, Egypt

In this paper, we are proposing a Firewall-based solution for protecting Android operating systems against privilege escalation attacks, mainly, confused deputy attacks and collusion attacks. The proposed Firewall protects the applications that have critical privilege permission. Any other applications without the critical permission will not be able to call protected applications via privilege escalation attacks. Since the Internet is the door of attack, we consider the permission to access Internet as a critical permission. As such, any application cannot access the Internet directly or indirectly, through privilege escalation, without confirmation of the user disallowing invulnerable leakage of private data. The proposed solution allows also protection to different critical permissions through the creation of multi-critical protection zones. We implemented the multi-critical protection zones by selecting READ_CONTACTS permission and INTERNET permission as critical permissions and the applications having one of these permission or both, they will be protected by our firewall against the privilege escalation attacks. The efficiency and effectiveness of the proposed solution are evaluated in this paper along with the imposed overhead. The evaluation includes the Android with one zone firewall and with two zones firewall. 
Index Terms Privilege escalation attacks, Android Security, Collusion Attack, Confused Deputy Attack, Excessive privilege Attack.



Energy Analysis in Wireless Sensor Network: A Comparison

Pages: 328-338 (11) | [Full Text] PDF (808 KB)
Vasaki Ponnusamy
Faculty of Integrative Sciences and Technology, Quest International University Perak, Jalan Raja Permaisuri Bainun, 30250 Ipoh, Malaysia

This paper explores energy exploitation in a sensor network deployed under diverse configurations. We are looking at sensor network deployed using multihop, clustering, direct and mobility based transmission. A lot of work has been done using these mechanisms to convey sensor data to the base station by taking energy into consideration. The aim of this study is to present an analysis of energy utilization using these techniques by comparing energy usage at different parts of the network. The outcome of the analysis helps researchers to identify the best mechanism for energy efficient communication in sensor network. Further, the research presents a comparison of work done by other researchers using these communication techniques, to further validate our analysis. 
Index Terms Energy Analysis, Comparison of Energy Utilization, Wireless Sensor.