International Journal of Computer Networks and Communications Security

Volume 4, Issue 12, December 2016

 

 

Description of Black Hole Attack Behaviour in MANET
 

Description of Black Hole Attack Behaviour in MANET

Pages: 322-329 (8) | [Full Text] PDF (223 KB)
A Ahmed, A Hanan, I Osman
Faculty of Computer Science and Information Technology, University of Tabuk, Tabuk, Saudi Arabia
Faculty of Computer Science and Information System, Universiti Technologi Malaysia, Johor, Malaysia
Faculty of Computer Science, Sudan University Science and Technology, Khartoum, Sudan

Abstract -
The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders answer each route request with fake route reply to advertise its self-have a shortest route to the destination. In This paper a full description of black hole behaviour is presented, and state-of-the-art ways to detect and eliminate black hole attacks in existing solution are discussed, as well as analyse the categories of these solutions and provide a comparison table.
 
Index Terms - Mobile Ad hoc Networks, Routing Protocols, Black Hole Attack

Citation - A Ahmed, A Hanan, I Osman. "Description of Black Hole Attack Behaviour in MANET." International Journal of Computer Networks and Communications Security 4, no. 12 (2016): 322-329.

ZigBee Security Using Public Key Steganography
 

ZigBee Security Using Public Key Steganography

Pages: 330-335 (6) | [Full Text] PDF (345 KB)
I Hussain, N Pandey, MC Negi
Amity Institute of Information Technology, Amity University Uttar Pradesh, Noida
Delivery Manager, TechMahindra Ltd, A7, Sector 64, Noida

Abstract -
ZigBee an IEEE 802.15.4 based specification is a low cost, low complexity and low power consumption wireless personal area network (WPAN) standard targeted at the wide development of long battery life devices in wireless control and monitoring applications. It finds a wide use in the industrial and physical operation and so it is majorly associated with M2M and IoT. The security on such WPANs is a concern and has been gaining a lot of attention in recent years. The security techniques in use for such kind of networks over past years are cryptographic techniques. However, the techniques proposed so far have the major scope of improvement to come up with more secure data transfer. As in cryptography encrypted messages no matter how unbreakable, will arouse suspicion and can be sufficient for an attacker, who eavesdrops the network that something important has been detected. Therefore to preserve security in such networks we propose another way to secure data by using Public key Steganography, which is a technique that allows two parties to send hidden messages over a public channel in a way that an adversary cannot even detect that the hidden messages are being sent. So as cryptography protects the contents of a message alone, Steganography can be said to protect both, contents of the message and even hiding the fact that a secret message is being sent. Our sole aim is to propose a Public key Steganographic method that resists to steganalysis and hence we show that this solution can be an energy-efficient solution with a low latency to secure data transfer in wireless personal area networks.
 
Index Terms - ZigBee, IEEE 802.15.4, Public Key Steganography, Reserved Bits, Stego Object

Citation - I Hussain, N Pandey, MC Negi. "ZigBee Security Using Public Key Steganography ." International Journal of Computer Networks and Communications Security 4, no. 12 (2016): 330-335.

Identifying the Most Frequently Attacked Ports Using Association Rule Mining
 

Identifying the Most Frequently Attacked Ports Using Association Rule Mining

Pages: 336-342 (7) | [Full Text] PDF (292 KB)
D HASSAN
Computers and Systems Department, National Telecommunication Institute, Cairo, 11768, Egypt

Abstract -
The security events presented in the dataset of network intrusion detection systems (NIDS) provide useful information about various network attacks that lunched against the network. For each security event, different information can be extracted including but not limited to the type of the event, the start and end time of the event, the source and destination IP addresses and ports. In this paper, we propose a novel framework for mining security events of DARPA-2009 network intrusion detection dataset. Our approach relies on finding a correlation between the security event of the dataset and the destination port that is exploited by an attacker in order to hack the network according to what security event reports. Association rule mining technique has been used in this paper to discover such correlation, since it is widely used to find strong correlations between features of massive datasets in terms of generated rules. Thus, the proposed framework aims to discover the most frequently destination ports that often exploited by an attacker to lunch a network attack according to the generated rules. This can save the time required to manually categorize destination ports in view of the security events reported in the dataset. Moreover, it can be very useful in creating various security policies for blocking the ports that can be used as back-doors by the attacker that let him/her illegally accesses the network. Various sets of rules have been generated using association rules based on apriori algorithm for the experimental analysis of the proposed approach. The performance of this algorithm is compared based on various interestingness measures.
 
Index Terms - Network Intrusion Detection, Association Rule Mining, Apriori Algorithm, Port Attack Detection

Citation - D HASSAN. "Identifying the Most Frequently Attacked Ports Using Association Rule Mining ." International Journal of Computer Networks and Communications Security 4, no. 12 (2016): 336-342.