International Journal of Computer Networks and Communications Security

Volume 5, Issue 4, April 2017

 

 

A Multi-Perspective and Multi-Level Analysis Framework in Network Security Situational Awareness
 

A Multi-Perspective and Multi-Level Analysis Framework in Network Security Situational Awareness

Pages: 71-75 (6) | [Full Text] PDF (254 KB)
M Azhagiri, A Rajesh, S Karthik
Research Scholar St.Peters University, Avadi, Chennai-600054
Professor/CSE C Abdul Hakeem College of Engineering and Technology, Melvisharam, Tamil Nadu 632509
Associate Professor/IT V.M.K.V Engineering College, Salem, Tamil Nadu 636308

Abstract -
Network Security Situation Awareness (NSSA) knowledge has been comprehensively studied in multi-data analyzing research these years. NSSA is a conception pertinent to assessing and showing the global and comprehensive situation of network security, so it requires people to collect all kinds of data and analysis for as many dimensions as possible in order to reflect the macroscopic pictures. For network security situation evaluation method has been provided, and it represents how to apply this method to NSSA. A multi-perspective and multi-level analysis framework for NSSA is presented to demonstrate the advantages and effectiveness by using this method.
 
Index Terms - Situation Awareness, Multi-Level Analysis, Multi-Perspective Analysis, NSSA

Citation - M Azhagiri, A Rajesh, S Karthik. "A Multi-Perspective and Multi-Level Analysis Framework in Network Security Situational Awareness ." International Journal of Computer Networks and Communications Security 5, no. 4 (2017): 71-75.

Performance Analysis of Select Forwarding Attack on WSN and Its Detection and Removal From Network
 

Performance Analysis of Select Forwarding Attack on WSN and Its Detection and Removal From Network

Pages: 76-79 (4) | [Full Text] PDF (Please wait)
V Kumawat, D kavita, BS Jangra
Jayoti Vidyapeeth Womens, University, Jaipur (Raj.), IndiaFGM Govt. PG College, Haryana, India

Abstract -
Wireless Sensor Network is quite vulnerable to many security compromising attacks as wormhole attack, message replay or tampering, identity spoofing, black hole attack, eavesdropping, and so on. One of the impacts of select forwarding attack is that, it can be used to drops some of data packets. LEACHES (Low Energy Adaptive Clustering Hierarchy) apply cluster rotation randomly for distribution of energy among all sensor nodes. In this paper, Selective Forwarding Attack creation, detection, and then removal are done on LEACH routing in Wireless Sensor Networks. It is analyzed that how performance of networks affected with select forwarding attack then performance of detection & removal algorithm is analyzed. Moreover Performance of LEACH has been evaluated in terms of Packet Delivery Ratio with number of attacker node of select forwarding attack. The proposed analysis is simulated using network simulator NS2. The prevention technique is significantly successful in handling the attack while restoring the performance of network and reduces the effect of attack from the network.
 
Index Terms - WSN, LEACH, Select Forwarding Attack

Citation - V Kumawat, D kavita, BS Jangra. "Performance Analysis of Select Forwarding Attack on WSN and Its Detection and Removal From Network." International Journal of Computer Networks and Communications Security 5, no. 4 (2017): 76-79.

Securing the SIP Communications with XML Security Mechanisms in VoIP Application
 

Securing the SIP Communications with XML Security Mechanisms in VoIP Application

Pages: 80-86 (6) | [Full Text] PDF (328 KB)
A Handoura, D Bourget
Laboratoire de l Informatique des Telecommunications Ecole Nationale Superieure des Telecommunications de Bretagne France

Abstract -
The intelligent network is a basis to establish and commercialize the services by the telecommunication network. Selling services and information by a network does not define solely a considerable increase of the sum of the information flowing by the network, but also a question of confidentiality and integrity. These papers discuss and proposes a methods based on the integration of signaling protocol SIP on IN for realize a procedure of client authentication and data confidentiality.
 
Index Terms - IN, SIP, Threats, Security, XML, SOAP, VoIP

Citation - A Handoura, D Bourget. "Securing the SIP Communications with XML Security Mechanisms in VoIP Application." International Journal of Computer Networks and Communications Security 5, no. 4 (2017): 80-86.