International Journal of Computer Networks and Communications Security

Volume 2, Issue 2, February 2014




A Supervised Learning Algorithm for E-Banking Phishing Webpage Classification Using Nefclass Back Propagation

Pages: 52-69 (18) | [Full Text] PDF (509 KB)
Malathi.P and Dr.P.Vivekanandan
Dhanalakshmi Srinivasan College of Engineering and technology, Assistant Professor, Master of Computer Applications, Anna University, Chennai
Professor and head computer centre, A.C.Tech, Anna University

Phishing webpage that mimic the webpage of legitimate, to steal information from users which become the fashionable practice and sophistical growing among the perpetrators of the Web. This phishing scams become a gigantic problem from e-bankers and e-commerce users. It is dynamic and very complex problem to classify phishing webpage because of alike absolute character of legitimate webpage. This paper presents an approach to overcome the complicatedness for foretelling or classifying e-banking phishing webpage. The classification of phishing webpage leads to the subjective consideration of various factors, the NEuro-Fuzzy CLASSification(NEFCLASS) Back Propagation algorithm can be an effectual analysis of classification model. The NEFCLASS Back Propagation algorithm analyzes the webpage in natural way in human intellectual manner. The various multi modal features are considered in this paper for effectual classification with three phishing stratums. Thirty features are extracted are grouped in six different property that under three stratums respectively.
Index Terms E-banking, Webpage, Phishers, Phishing attack, Fuzzy Logic



Improving Energy Efficient QOS Performance for Heterogeneous MANET

Pages: 70-81 (12) | [Full Text] PDF (414 KB)
Associate Professor , Saranathan College of Engineering, Department of Computer Science & Engineering, Anna university, Chennai
Professor, National Institute of Technology, Computer Science & Engineering, Tiruchirapalli, Tamilnadu

In Mobile Ad hoc Networks, routing is one of the most essential tasks owing to volatile topology. In MANET, the nodes can depart and connect the network; this uneven nature makes support of QoS (Quality of Service) is a complex task. A major issue in heterogeneous networks is energy utilization. In this paper, a heterogeneous network is intended to attain enhanced energy-efficient multipath QoS provisioning. Primarily, the multipath routes are assumed to be discovered and they then find the gateway node along with all the nodes in the network by using the gateway selection procedure. By using a QoS based Energy Efficient Optimal Multipath route discovery and route maintenance in multipath routing protocol, discover the optimal path for data transmission from the source to the destination. In this way, QoS parameters such as bandwidth, throughput, packet delivery ratio and end-to-end delay will be computed and accomplish in the best possible way.  
Index Terms Heterogeneous MANET, multipath routing, gateway selection, gateway migration and QoS provisioning



Photonic band gap structure for improve the Performance of Band stop filters

Pages: 82-86 (5) | [Full Text] PDF (815 KB)
Pooja Sahoo and P.K. Singhal
Department of Electronics & communication Engineering, Madhav Institute of Technology & Science, Gwalior (M.P), India

In this paper we have designed two new compact Photonic Band Gap Structures, shows the properties of Band stop filters. Photonic Band gap filters are designed on central frequencies 1.7GHz and 2.2GHz. These Photonic filters are stable and observable. Also used photonic band gap structure on the filter surfaces, have been provided information about the increasing bandwidth up to 30% of band stop filters. To use of the PBG filters, the broad stop band has been obtained, slow wave factor increased, com-pensate for fabrication of tolerance has been improved and the unit elements of the band stop filter with open-circuited stub has been redundant and more compact configuration obtained.  
Index Terms PBG (Photonic Band Gap), Band Stop Filter (BSF), Printed Circuit Board (PCB), Defected Ground Structure (DGS), Computer Simulation Technology Software (CST) and Spectrum Analyzer



Hybrid Approach using intrusion Detection System

Pages: 87-92 (6) | [Full Text] PDF (410 KB)
Tariq Ahamad and Abdullah Aljumah
College of Computer Engineering & Sciences, Salman Bin Abdulaziz University, KSA, Saudi Arabia

The rapid growth of the computers that are interconnected, the crime rate has also increased and the ways to mitigate those crimes has become the important problem now. In the entire globe, organizations, higher learning institutions and governments are completely dependent on the computer networks which plays a major role in their daily operations. Hence the necessity for protecting those networked systems has also increased. An intrusion detection system (IDS) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. In this research article, we will try to analyse different intrusion detection approaches SVM, ANN, SOM , Fuzzy Logic. In this research article, we have proposed a new technique that will tackle with all these different intrusion attacks. We propose a hybrid kind of approach that might be useful while facing these vicious network intrusion attacks.  
Index Terms IDS, Fuzzy Logic , intrusion detection system, Hybrid Approach