

Description of Black Hole Attack Behaviour in MANET |
Pages: 322-329 (8) | [Full Text] PDF (223 KB) |
A Ahmed, A Hanan, I Osman |
Faculty of Computer Science and Information Technology, University of Tabuk, Tabuk, Saudi ArabiaFaculty of Computer Science and Information System, Universiti Technologi Malaysia, Johor, MalaysiaFaculty of Computer Science, Sudan University Science and Technology, Khartoum, Sudan |
Abstract - The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders answer each route request with fake route reply to advertise its self-have a shortest route to the destination. In This paper a full description of black hole behaviour is presented, and state-of-the-art ways to detect and eliminate black hole attacks in existing solution are discussed, as well as analyse the categories of these solutions and provide a comparison table. |
Index Terms - Mobile Ad hoc Networks, Routing Protocols, Black Hole Attack |
C itation - A Ahmed, A Hanan, I Osman. "Description of Black Hole Attack Behaviour in MANET." International Journal of Computer Networks and Communications Security 4, no. 12 (2016): 322-329. |
ZigBee Security Using Public Key Steganography |
Pages: 330-335 (6) | [Full Text] PDF (345 KB) |
I Hussain, N Pandey, MC Negi |
Amity Institute of Information Technology, Amity University Uttar Pradesh, NoidaDelivery Manager, TechMahindra Ltd, A7, Sector 64, Noida |
Abstract - ZigBee an IEEE 802.15.4 based specification is a low cost, low complexity and low power consumption wireless personal area network (WPAN) standard targeted at the wide development of long battery life devices in wireless control and monitoring applications. It finds a wide use in the industrial and physical operation and so it is majorly associated with M2M and IoT. The security on such WPANs is a concern and has been gaining a lot of attention in recent years. The security techniques in use for such kind of networks over past years are cryptographic techniques. However, the techniques proposed so far have the major scope of improvement to come up with more secure data transfer. As in cryptography encrypted messages no matter how unbreakable, will arouse suspicion and can be sufficient for an attacker, who eavesdrops the network that something important has been detected. Therefore to preserve security in such networks we propose another way to secure data by using Public key Steganography, which is a technique that allows two parties to send hidden messages over a public channel in a way that an adversary cannot even detect that the hidden messages are being sent. So as cryptography protects the contents of a message alone, Steganography can be said to protect both, contents of the message and even hiding the fact that a secret message is being sent. Our sole aim is to propose a Public key Steganographic method that resists to steganalysis and hence we show that this solution can be an energy-efficient solution with a low latency to secure data transfer in wireless personal area networks. |
Index Terms - ZigBee, IEEE 802.15.4, Public Key Steganography, Reserved Bits, Stego Object |
C itation - I Hussain, N Pandey, MC Negi. "ZigBee Security Using Public Key Steganography ." International Journal of Computer Networks and Communications Security 4, no. 12 (2016): 330-335. |
Identifying the Most Frequently Attacked Ports Using Association Rule Mining |
Pages: 336-342 (7) | [Full Text] PDF (292 KB) |
D HASSAN |
Computers and Systems Department, National Telecommunication Institute, Cairo, 11768, Egypt |
Abstract - The security events presented in the dataset of network intrusion detection systems (NIDS) provide useful information about various network attacks that lunched against the network. For each security event, different information can be extracted including but not limited to the type of the event, the start and end time of the event, the source and destination IP addresses and ports. In this paper, we propose a novel framework for mining security events of DARPA-2009 network intrusion detection dataset. Our approach relies on finding a correlation between the security event of the dataset and the destination port that is exploited by an attacker in order to hack the network according to what security event reports. Association rule mining technique has been used in this paper to discover such correlation, since it is widely used to find strong correlations between features of massive datasets in terms of generated rules. Thus, the proposed framework aims to discover the most frequently destination ports that often exploited by an attacker to lunch a network attack according to the generated rules. This can save the time required to manually categorize destination ports in view of the security events reported in the dataset. Moreover, it can be very useful in creating various security policies for blocking the ports that can be used as back-doors by the attacker that let him/her illegally accesses the network. Various sets of rules have been generated using association rules based on apriori algorithm for the experimental analysis of the proposed approach. The performance of this algorithm is compared based on various interestingness measures. |
Index Terms - Network Intrusion Detection, Association Rule Mining, Apriori Algorithm, Port Attack Detection |
C itation - D HASSAN. "Identifying the Most Frequently Attacked Ports Using Association Rule Mining ." International Journal of Computer Networks and Communications Security 4, no. 12 (2016): 336-342. |