International Journal of Computer Networks and Communications Security

Volume 5, Issue 11, November 2017

 

 

A Systematic and Generic Method for Choosing A SDN Controller
 

A Systematic and Generic Method for Choosing A SDN Controller

Pages: 239-247 (9) | [Full Text] PDF (680 KB)
O. BELKADI, Y. LAAZIZ
LabTIC, National School of Applied Sciences in Tangier, Department of Communication systems and Computer science, Morocco

Abstract -
Controllers are fundamental elements for the implementation of a Software-Defined Network (SDN) application. The present work focusses on the problem of choosing the appropriate controller, for a specific use case, among the multiple solutions proposed by academia and industry. We here present a new method for controllers benchmarking, which allows finding the right controller for each use case in a systematic and rational manner. The Method is based on two steps: the first consists on classifying the controllers using a Multi-Criteria Decision Making method according to the relevance of their features for the use case. This step enables to limit considerably the number of potential controllers for the SDN application. In the second step, a performance evaluation is carried out using the CBENCH tool, where only the first three ranked controllers at the first step are considered. The method has been tested in the case of user traffic classification over SDN, where ten most known controllers were considered. The results showed that OpenDaylight (ODL) is the controller that responds the better to the constraints and requirements of this specific application. The method is generic and can be applied regardless of the SDN application.
 
Index Terms - Software Defined Networks, Multi-Criteria Decision Making, Analytic Hierarchy Process, CBENCH, SDN Controllers

Citation - O. BELKADI, Y. LAAZIZ. "A Systematic and Generic Method for Choosing A SDN Controller." International Journal of Computer Networks and Communications Security 5, no. 11 (2017): 239-247.

CPhD: Entire Insight to Detect Phishing Attack
 

CPhD: Entire Insight to Detect Phishing Attack

Pages: 248-257 (10) | [Full Text] PDF (693 KB)
A. HOSSEINI, A. HOSSEINI
Department of Electronic and Computer Engineering, School of Electrical Engineering, Iran University of Science and Technology, Tehran 16846, Iran
Pardis Nasibe-Shahid Sherafat, Farhangian University, Tehran, P.O.BOX 19396-14464, Iran

Abstract -
Phishing is a type of Internet procedure to seek to get a victim’s credentials such as passwords, credit card numbers, bank account details and other sensitive information by defrauded webpages. Deceptive webpages have particular features to deflect victims to fall into trap. Comprehensive Phishing Detector (CPhD) system can distinguish phishing websites from legitimate websites by extracting these features from URL pattern, website content, images and animations of webpages. The central goal of this system is reducing the run-time of investigation and using instant calculation method and algorithms. Approximately, for every 1,200,000 requests in DNS logs or TLS/SSL logs we need 12min to explore phishing-IPs, 14ms to compare every-two URLs for seeking suspicious URL, 1.20min to compare every two sites words and finally 3min to compare two images. These tests were implemented on 90 Iranian banks, social network sites, search engines and some other well-known sites.
 
Index Terms - Taxonomy-Phishing, URL, Levenshtein, Correlation, DNS

Citation - A. HOSSEINI, A. HOSSEINI. "CPhD: Entire Insight to Detect Phishing Attack." International Journal of Computer Networks and Communications Security 5, no. 11 (2017): 248-257.

Probating Value of the Electronic Document in Computer Crimes
 

Probating Value of the Electronic Document in Computer Crimes

Pages: 258-263 (6) | [Full Text] PDF (420 KB)
IM BOLANO
Institucion Educativa San Juan Bosco de Sabanagrande, Atlantico - Colombia

Abstract -
For researchers of cybercrime one of the most complexes in addition to its detection is your check, these same characteristics and the circumstances of time and space in which they are made and, in most cases, by the intangibility of the evidence that must be collected and used to demonstrate its occurrence. These criminal offenses such as new forms are a reality in our time, by which different legal systems have had to cash them incorporating, not only prevent, but when judicializarlos can prove their commission.
 
Index Terms - Computer Crimes, cybercrime, circumstances,

Citation - IM BOLANO. "Probating Value of the Electronic Document in Computer Crimes." International Journal of Computer Networks and Communications Security 5, no. 11 (2017): 258-263.