International Journal of Computer Networks and Communications Security

Volume 5, Issue 6, June 2017

 

 

IHASS: Intelligent and Hybrid Anti-Spam System
 

IHASS: Intelligent and Hybrid Anti-Spam System

Pages: 115-125 (11) | [Full Text] PDF (789 KB)
S Abdulla, A Altaher
College of Education, Instructional and Learning Technology Depart, Sultan Qaboos University, Oman
Faculty of Computing and Information Technology in Rabigh, King Abdulaziz University, Saudi Arabia

Abstract -
Spam emails are increasing continually and represent real threat to internet community. Email spammers use advanced software techniques to send millions of spam emails across the internet to distribute announcements of services and items to obtain commercial benefits. Spam detection became a challenge and most of the existing spam detection techniques are based on content-based filtering (CBF) which have many drawbacks. This paper aims to solve these CBF drawbacks by introducing designing, implementing, and evaluating a novel CBF approach for automatic detection of spam emails. The proposed approach is denoted as Intelligent and Hybrid Anti-Spam System. Its main theme is the neuro-fuzzy inference engine which has been applied successfully in a wide range of research. Initially, a normalization task is performed to remove any deceptive character from the text body. The preparation stage then examined the content of well-known datasets of spam emails to identify all the phrases that solely identify spam email. Our experiments show that IHASS could achieve very good accuracy level and works stably well.
 
Index Terms - Spam email detection, content-based filtering, neuro-fuzzy inference engine, kNN-based Evolving Neuro-Fuzzy Inference System

Citation - S Abdulla, A Altaher. "IHASS: Intelligent and Hybrid Anti-Spam System." International Journal of Computer Networks and Communications Security 5, no. 6 (2017): 115-125.

Improving Security and Performance in the TOR Network
 

Improving Security and Performance in the TOR Network

Pages: 126-129 (4) | [Full Text] PDF (173 KB)
DS Fadhil, AI Rasul, YA Muhammed
Department of Computer Science, Faculty of Science, Soran University, Kurdistan Region, Iraq

Abstract -
TOR software covers the browsers securely. This option makes the journalists, militants and some authorities to be unknown over internet. TOR (onion router) is very successful in low latency anonymous communication. TOR gives more benefits like untraceable network to both local adversary controlling a small network and companies that are low enough to support anonymous use and also remote login. There is other software like AN.ON, crowds and anonymiser.com also provide anonymous communication over networks but TOR software had proved its efficiency in the networking market especially in field of network security ,The IP addresses will be hidden in the server.
 
Index Terms - TOR network, authentication, IP hidden in the server

Citation - DS Fadhil, AI Rasul, YA Muhammed. "Improving Security and Performance in the TOR Network." International Journal of Computer Networks and Communications Security 5, no. 6 (2017): 126-129.

Energy Efficiency through Dynamic Packet Transmissions in Sensor Network
 

Energy Efficiency through Dynamic Packet Transmissions in Sensor Network

Pages: 130-136 (7) | [Full Text] PDF (347 KB)
Mohammed S. Al-kahtani
Dept. of Computer Engineering, Prince Sattam bin Abdulaziz University, Saudi Arabia

Abstract -
The work presented in this study proposes an efficient mechanism to reduce the computational and communicational costs associated with sensor network models. Specifically, the study focuses on two different models or topologies, each consisting of three different methods of data transmission for the purpose of reducing the interaction among network nodes when data measured at some instant, t-1, is equal to the data sensed at later instant, t. In terms of the model configurations, the simulation-based approach used to validate our proposed technique indicates that scenarios where member nodes of a cluster was not needed for computation required for less resources for data transmission with increased energy consumption than scenarios that required both member nodes and cluster heads for computation.
 
Index Terms - Sensor Network; Packet transmission; Single-hop; Multi-hop; Energy Efficiency

Citation - Mohammed S. Al-kahtani. "Energy Efficiency through Dynamic Packet Transmissions in Sensor Network." International Journal of Computer Networks and Communications Security 5, no. 6 (2017): 130-136.