International Journal of Computer Networks and Communications Security

Volume 3, Issue 3, March 2015

 

 

 

MP-CA: A Malware Propagation Modeling Methodology Based on Cellular Automata

Pages: 63-73 (11) | [Full Text] PDF (1.49 MB)
Z BAKHSHI, MZ LIGHVAN, R MOSTAFAVI
Faculty of Electrical and Computer Engineering, University of Tabriz, Tabriz, Iran

Abstract -
The variety of security threats caused by malwares has turned their dispersion into a potential danger. Malware propagation modeling is a facility that allows the researchers to predict the side effects of a new threat and understand the behavior of the modeled malware. On the other hand, due to the high cost and diversity of existing networks and the capability of those networks to be infected by such malwares, behavioral modeling of malware becomes a challengeable issue in recent works. In the last few years, the growing popularity of smart phones has made them an attractive target to hackers and malware writers. One of possible communication channels for the penetration of mobile malware is the Bluetooth interface. In this paper, a new analytical modeling methodology for malware propagation using three-dimensional cellular automata and based on the epidemic theory has been presented and as a case study the propagation of Bluetooth worm has been discussed.
 
Index Terms - Malware, Propagation, Modeling, Cellular Automata, Bluetooth

Citation - Z BAKHSHI, MZ LIGHVAN, R MOSTAFAVI. "MP-CA: A Malware Propagation Modeling Methodology Based on Cellular Automata." International Journal of Computer Networks and Communications Security 3, no. 3 (2015): 63-73.

 

Efficient Allocation of TV White Spaces for Cognitive Radio in Pakistan

Pages: 74-77 (4) | [Full Text] PDF (387 KB)
A Rasheed, H Akmal, MA Khan, Iu Haq, M Shakir
Department of Electrical Engineering, COMSATS Institute of Information Technology, Islamabad

Abstract -
The spectrum utilization is a function of time and location. Hence, at different times and locations the utilization of spectrum might be different. The TV band 52-862 MHz has been the most crucial frequency band in Pakistan that remains unoccupied most of the time. The unoccupied frequency chunks in the TV band are termed as TV White Spaces (TVWS). In this paper, energy detection technique for spectrum sensing is implemented to locate the TVWS available in Pakistan and overall situation of the spectrum is analyzed. For this purpose, the whole frequency band is scanned with Universal Software Radio Peripheral (USRP2) hardware as well as spectrum analyzer to validate the results of the USRP2 and to investigate the potential of cognitive radios in Pakistan.
 
Index Terms - TVWS, USRP2, Cognitive Radio, TVWS in Pakistan, Energy Detection, Spectrum Sensing

Citation - A Rasheed, H Akmal, MA Khan, Iu Haq, M Shakir. "Efficient Allocation of TV White Spaces for Cognitive Radio in Pakistan." International Journal of Computer Networks and Communications Security 3, no. 3 (2015): 74-77.

 

A Model for Protecting Online Banking Using Transaction Monitoring

Pages: 78-82 (5) | [Full Text] PDF (309 KB)
MN Ahmed
Research Scholar, IFTM University, India

Abstract -
Wonderful technique has been invented to secure the online data over the network. Online application such as banking, electronic transactions and financial services is the example which is relevant and required highly secured critical transactions. As a high-speed internet infrastructure is being developed and people are slowly digitalized, financial activities also dependent on the internet .we have so many factor authentication technique to protect over the network. In this paper we will analyze the level of security in different authentication factor and will provide a new model to enhance the financial security based on user transaction monitoring.
 
Index Terms - Security, Factor Authentication, Transaction, Online banking, Out of band authentication, Biometric

Citation - MN Ahmed. "A Model for Protecting Online Banking Using Transaction Monitoring." International Journal of Computer Networks and Communications Security 3, no. 3 (2015): 78-82.

 

FCA- OE: Fault-Aware and Congestion-Aware Routing Algorithm Based on Odd-Even Algorithm for Network on Chip

Pages: 83-87 (5) | [Full Text] PDF (288 KB)
A Mehranzadeh, M Hoodgar, F Forootan
Department of computer, Dezful Branch, Islamic Azad University, Dezful, Iran

Abstract -
Routing algorithms play a crucial role in design of the network on chip .Fault and congestion are two situations that effect on the packets latency and energy consumption of NoC. This paper presents a fault and a congestion aware routing algorithm called FCA-OE based on Odd-Even (OE) routing algorithm. The simulation shows the strength of the FCA-OE by comparing it with odd-even routing algorithm under different traffic patterns. The Simulation results prove the FCA-OE routing algorithm can improve the average packet latency and the average packet loss rate (10%) in the presence of permanent faults compared with OE routing algorithm and it is capable to route the packets even with the faulty switches and links in network. Simulation results demonstrate that the FCA-OE routing algorithm provides less average energy consumption as compared to the Fault-Aware Dynamic Routing algorithm.
 
Index Terms - Network-on-Chip, Routing Algorithm, Adaptive, Fault Aware, Congestion Aware

Citation - A Mehranzadeh, M Hoodgar, F Forootan. "FCA- OE: Fault-Aware and Congestion-Aware Routing Algorithm Based on Odd-Even Algorithm for Network on Chip." International Journal of Computer Networks and Communications Security 3, no. 3 (2015): 83-87.

 

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Pages: 88-94 (7) | [Full Text] PDF (523 KB)
JA Khan, MN Iqbal, F Umer, M Adnan, Z A.Khan, M Shakir
Department of Electrical Engineering, COMSATS Institute of Information Technology, Islamabad
University of Management and Technology, Lahore, Pakistan

Abstract -
Mobile Ad Hoc networks have no base station and use multihop routing for transmission of data from a source node to its destination node. To make this multi-hop routing mechanism possible we need a routing protocol. We have adopted load balancing technique that can improve the overall performance for communication in a network. We have presented optimum performance for our novel protocol i.e. Energy Efficient Load Balanced (EFLBAODV) and compared it to the traditionally existing reactive routing protocol Ad Hoc on Demand Distance Vector (AODV) thus using the load balancing technique to improve the node to node communication in our network. Also our routing protocol will be energy efficient as it will minimize the communication time and overheads thus utilizing the energy resources. Some important metrics like route discovery time, route errors, MAC delay, network load, end-to-end delay and throughput have been taken to evaluate the overall improvement in the novel protocol.
 
Index Terms - MANET; Ad Hoc On-demand Distance Vector (AODV), Multi-hop Routing, Load Balancing, Energy Efficiency, Energy Efficient Load Balanced AODV (EFLBAODV)

Citation - JA Khan, MN Iqbal, F Umer, M Adnan, Z A.Khan, M Shakir. "Achieving Energy Efficiency in MANETs by Using Load Balancing Approach." International Journal of Computer Networks and Communications Security 3, no. 3 (2015): 88-94.

 

Media Storage Efficiency and Level Fingerprint Similarity in Network Forensic Analysis using Winnowing Multihashing Method

Pages: 95-102 (8) | [Full Text] PDF (964 KB)
I Sembiring, JE Istiyanto, E Winarko, A Ashari
Satya Wacana Christian University, Salatiga, Indonesia
Department of Computer Science and Electronics, Faculty of Mathematics and Natural Sciences, GadjahMada, University, Yogyakarta, Indonesia

Abstract -
Network forensics is a developing network security models that focused on the capture, recording, and analysis of network traffic, for the purposes of investigation. One of the problems in the Network forensics is the quantity or volume of data problems. Winnowing Multi hashing method can be used to conduct an investigation of attacks on the network forensic analysis. Value of Fingerprint is generated on Winnowing method Multi hashing (WMH), can be used as a marker of an attack that was captured by the Intrusion Detection System (IDS). WMH is a method that only takes excerpt of a payload. With this algorithm, the payload volume will be much more efficient because it only stores the fingerprint alone. This research is focused on the calculation of the efficiency of the storage medium and the optimum point combination fingerprint length, degree of similarity and storage media.
 
Index Terms - Winnowing Multi hashing, Jaccard Similarity, Network Forensic

Citation - I Sembiring, JE Istiyanto, E Winarko, A Ashari. "Media Storage Efficiency and Level Fingerprint Similarity in Network Forensic Analysis using Winnowing Multihashing Method." International Journal of Computer Networks and Communications Security 3, no. 3 (2015): 95-102.

 

Towards a multi-platform development based on MDA approach

Pages: 103-109 (7) | [Full Text] PDF (691 KB)
C Salma, A Issam, BLE habib, M Abdelaziz
Faculty of Sciences Ben M SIK, Department of mathematics and informatics, Casablanca, Morocco

Abstract -
The diversity of platforms on the smart phones market, including the large number of operating systems that use different technologies, engenders a fragmentation, ie, the IOS environment / Objective-C for iPhone and iPad, Java SDK for Android, J2ME for Symbian, etc. This fragmentation, make the mobile applications development quite difficult and very expensive. Recognizing the importance of defragmentation and wanting to optimize the design process of mobile applications, cross-platform development could be a good solution to this problematic. Several approaches exist to address the cross-platform development, each responding to a variety of issues. The choice of a cross-platform development approach depends mainly on two things: to know what type of mobile application should be directed, and or targeted platforms. In addition to this, follow a models-based approach is one of our goals, this article describes the solution adopted for the realization of a multi-platform development framework while relying on models, and therefore go beyond current approaches.
 
Index Terms - Multiplatform Development approach, Mobile applications Type, Native, MDA, Hybrid

Citation - C Salma, A Issam, BLE habib, M Abdelaziz. "Towards a multi-platform development based on MDA approach." International Journal of Computer Networks and Communications Security 3, no. 3 (2015): 103-109.

 

EFFECTIVE SVD-YCBCR COLOR IMAGE WATERMARKING

Pages: 110-116 (7) | [Full Text] PDF (614 KB)
F SARKARDEH, M KHALILI
Dept. Computer and Informatics Engineering ,PayameNoor University, Tehran, Iran

Abstract -
In this paper, a blocked-SVD based color image watermarking scheme is proposed in which, to embed the color watermark, two levels SVD are applied on Y channel of the converted host image. Moreover, to more security, imperceptibility and robustness, the watermark insertion is done using zigzag method on non-overlapping blocks. The experimental results reveal that the proposed algorithm not only satisfies the imperceptibility and watermarking robustness against different signal processing attacks such as JPEG compression, scaling, blurring, rotation, noising, filtering and etc., as well, rather, has better values compared to the existing works.
 
Index Terms - Color Image Watermarking, SVD, Zigzag Method, Ycbcr Color Space

Citation - F SARKARDEH, M KHALILI. "EFFECTIVE SVD-YCBCR COLOR IMAGE WATERMARKING." International Journal of Computer Networks and Communications Security 3, no. 3 (2015): 110-116.

 

An Efficient ECC-based Authentication and Key Agreement Protocol

Pages: 117-123 (7) | [Full Text] PDF (364 KB)
M Mohammadpoor, A Mehdizadeh
Department of Electrical Engineering, University of Gonabad, Gonabad, Iran
Department of Computing, Nilai University, 71800 Putra Nilai, Negeri Sembilan, Malaysia

Abstract -
Public-key cryptography is commonly used to authenticate communicating entities in some networks. One of the key tools in this way is to use the elliptic curves cryptography (ECC) which is relatively lightweight due to its shorter key size compared to the conventional River-Shamir-Adleman (RSA) method. This paper is proposing an efficient protocol by analysing two variants of ECC-based wireless authentication protocol, namely, Aydos-Savas-Koc s wireless authentication protocol (ASK-WAP) and user authentication protocol (UAP) from various security aspects and communication concerns. We show that although UAP is able to address some of ASK-WAP vulnerabilities, it is confined to one-way communication where the authentication can only be initialized by users and not the server. In light of their limitations, we suggest several possible improvements to both ASK-WAP and UAP. The proposed solutions focus on applying encryption methods to the transmitted keys and enabling two-way communication on UAP. From performance evaluation, we show that our proposed methods are able to address the security concerns of ASK-WAP and UAP, while at the same time achieving acceptable communication overheads.
 
Index Terms - TElliptic Curves Cryptography, ASK-WAP, UAP

Citation - M Mohammadpoor, A Mehdizadeh. "An Efficient ECC-based Authentication and Key Agreement Protocol." International Journal of Computer Networks and Communications Security 3, no. 3 (2015): 117-123.

 

Studying Performance in Supply Chain Management Using Data Mining Software

Pages: 124-129 (6) | [Full Text] PDF (403 KB)
H LAHMIDANI, OE BEQQALI
Department of Science and Technologies of Information and Communication, University Sidi Mohammed Ben Abdellah. Sciences university Dhar Mahraz, Fez, Morocco

Abstract -
This paper present a new supply chain management information system based on measuring performance using dataming software. One of The most important part of this study lays in comparing the most common softwares, referring to many criterias. This study will help managers to take decisions and enhance supply chain in public administrations using the combination of information systems and dataming studies. The information system is based on a new approach using customer complaints. It helps to generate dashboards, reports and charts in order to compare each supplier results and verify the quality of each delivery.
 
Index Terms - Supply Chain Management, Dataming Complaints, Software, Suppliers, Customers, Performance

Citation - H LAHMIDANI, OE BEQQALI. "Studying Performance in Supply Chain Management Using Data Mining Software." International Journal of Computer Networks and Communications Security 3, no. 3 (2015): 124-129.