International Journal of Computer Networks and Communications Security

Volume 7, Issue 5, May 2019

 

 

Network Optimization for Improved Performance and Speed for SDN and Security Analysis of SDN Vulnerabilities
 

Network Optimization for Improved Performance and Speed for SDN and Security Analysis of SDN Vulnerabilities

Pages: 83-90 (8) | [Full Text] PDF (547 KB)
A Haggag
Electronics Technology Department, Faculty of Industrial Education, Helwan University

Abstract -
Software defined Network (SDN) has shown a great interest since its emergence. The extreme efficiency in comparison with traditional networks and its agility introduced by separating control and data planes provided many benefits to the market. Yet, there are many challenges accompanied with this agility, leading to many security concerns and threats such as Denial of Service (DoS) and Flooding attacks and many other threats. This paper aims at assessing the effectiveness of this technology via comparisons against traditional networks using standard comparison parameters such as Throughput and Round Trip Time (RTT) and to measuring speed and efficiency of the new underlying technology. Security analysis is carried out to exploit SDN vulnerabilities by implementing successful attacks using primitive SDN Toolkit.
 
Index Terms - SDN, Control plane, Data plane, Network Topologies, DoS. Flooding Attacks

Citation - A Haggag. "Network Optimization for Improved Performance and Speed for SDN and Security Analysis of SDN Vulnerabilities." International Journal of Computer Networks and Communications Security 7, no. 5 (2019): 83-90.

Social Media Analytics using Visualization: Snapchat
 

Social Media Analytics using Visualization: Snapchat

Pages: 91-95 (5) | [Full Text] PDF (322 KB)
N Alsulaim, N Alkhalaf, M Alghamdi, R Alolaqi, H Almughaidi
Department of Management Information Systems, Imam Abdulrahman Bin Faisal University (IAU), Dammam, Kingdom of Saudi Arabia

Abstract -
Today, social media plays a crucial role in the life of the modern community. Many people use different social media means for different purposes on a daily basis, from communication with friends and family to promotion and of products. One of the biggest social media platforms is Snapchat where people share a big amount of data every day. With the increasing use of social media, the need to analyze the transmitted data appeared. Social media analysis aimed to identify tendencies and patterns of social media platforms that may be used for many purposes, from identification of the most popular industries to determination of the content that is most resonates to the audience. Social media data is a so-called raw data that includes all the activity of all the users of one or another social media platform. It should pass several processes before it can be analyzed and evaluated. Throughout these processes, data are freed from all the noisy data and is visualized to make it easier for analysis and evaluation. Tools such as Tableau and Rapid Miner were used to analyze and evaluate Snapchat’s data for eight industries, and then data about the top ten accounts for each industry collected according to the number of views. The most viewed industry in Snapchat has been identified using Rapid Miner through K-Means algorithm. Other Rapid Miner’s operators such as normalize, clustering and decision tree operators were used to evaluate data and make the prediction analysis for future tendencies.
 
Index Terms - Data Mining, Snapchat, Data Visualization, Tableau, Rapid Miner

Citation - N Alsulaim, N Alkhalaf, M Alghamdi, R Alolaqi, H Almughaidi. "Social Media Analytics using Visualization: Snapchat." International Journal of Computer Networks and Communications Security 7, no. 5 (2019): 91-95.

Comparative Study of Cryptography Algorithms and Its’ Applications
 

Comparative Study of Cryptography Algorithms and Its’ Applications

Pages: 96-103 (8) | [Full Text] PDF (253 KB)
MNB Anwar, M Hasan, MM Hasan, JZ Loren, S.M.T Hossain
Faculty of Computer Science, American International University- Bangladesh, Dhaka, Bangladesh

Abstract -
In modern world, security is the most valuable term in the field of communication system. Security comes along with many technologies and methods, where one of the most secure technologies is Cryptography where ordinary plain text is converted into cipher text for transferring data to the valid user. Cryptography algorithms can be divided into two types based on the number of keys such as Symmetric and Asymmetric where Symmetric algorithm works with one single key and Asymmetric algorithm works with two different keys. However, selecting the appropriate algorithms for specific application has been always a challenging task because of the latency, key size, and security issues. Cryptographic algorithms face different type of attacks like brute force attack, man in the middle attack, cycle attacks etc., which are still remained as threads. This paper presents the performance analysis, based on different performance metrics and threads, of various techniques of cryptographic algorithms and identifies the suitable algorithms for different types of applications.
 
Index Terms - Encryption, Algorithms, Symmetric, Asymmetric, Applications

Citation - MNB Anwar, M Hasan, MM Hasan, JZ Loren, S.M.T Hossain. "Comparative Study of Cryptography Algorithms and Its’ Applications." International Journal of Computer Networks and Communications Security 7, no. 5 (2019): 96-103.