Performance Measurements on Various Wi-Fi Security Options

Publication Date : October 2015

SearchDL ID : 04.IJIS.2015.1.7

View Abstract

Abstract :  The security issues gain more importance while the usage rates of wireless networks grow rapidly. There are several security mechanisms that distinguish the protocols from each other based on their specific characteristics such as encryption and authentica tion methods. These mechanisms and also the protocols themselves affect the network performance like the number of user applications running on the network . The most vital subject required at that point is the performance measurements through some metrics . In this study , we handle several Wi - Fi security protocols with different encryption options and represent their effects on the network traffic values. On this purpose, we clarify how the protocols can be compared due to the metrics of bandwidth and throug hput.

Read less

View Paper    


Improvement A5/1 Encryption Algorithm Based On Sponge Techniques

Publication Date : October 2015

SearchDL ID : 04.IJIS.2015.1.2

View Abstract

Abstract :  A5/1 stream cipher is used in Global System for Mobile Communications (GSM) in order to provide privacy on air communication. In this paper introduce new improvements to the A5/1 stream cipher based on using new technology concepts called sponge function. Sponge functions that represent in this paper constructed based on combine between the advantage of stream cipher and hash concepts. New S-box generation is proposed to provide the dynamic features to the sponge technology in order solve the weakness that appear in majority function that used in A5/1 stream cipher by provide dynamic behavior in number of registers and transformation . According the experimental results and the compassion between the A5/1 and the proposed improvement shown the proposed algorithm will increase the randomness features for the A5/l algorithm. The output bit-stream generated by the proposed stream cipher has improved the randomness performance and provide more security to the GSM security algorithm.

Read less

View Paper    


Comparison study of different intrusion detection systems

Publication Date : October 2015

SearchDL ID : 04.IJIS.2015.1.4

View Abstract

Abstract :  The intrusion detection system is a mechanism that can detect intrusions within different types of computer system. we have defined the different categories according to their uses of IDS in a computer system and existing approaches were cited for each category which are The host IDS and IDS networks and the Cloud based IDS

Read less

View Paper    


Cloudification and Security Implications of TaaS

Publication Date : October 2015

SearchDL ID : 04.IJIS.2015.1.5

View Abstract

Abstract :  Cloud com puting has got attention of telecommunications operators as a potential cost saver, because it enables sharing computing resources within network infrastructure and between operators. The concept of Telecommunications network as a Service (TaaS) has been p roposed as a renovation direction of mobile operators. However, information security which is one of the major challenges of the cloud computing should be seriously investigated and discussed in order to realize TaaS in practice. For this purpose, we revie w new threats introduced by TaaS and discuss prevention mechanisms to resist them. Based on the cloud deployment model, we further propose a security framework, “Cloud Security Framework for Operators (CSFO)” in order to support TaaS. We also go through op en research issues about security related to TaaS and propose future research focus

Read less

View Paper    


Random Mapping Transform Algorithm Applied Private key Cryptography (SWAT Algorithm)

Publication Date : October 2015

SearchDL ID : 04.IJIS.2015.1.1

View Abstract

Abstract :  using the private and public keys in customized cryptographs is limited by mathematics formulas or in other words mathematically mapping technique. If the message “x” and the cryptograph message “y” are both known , then these keys can be predicted and broken b y using high performance computers HPC or parallel computing with advanced cryptanalysis technique or using Quantum Computer ( cryptograph massage “y” can be known from the files headers as in many computer files) [1]. In this paper we introduce a simple m athematical technique that can generate randomly the cryptograph data straight (or block form) without needing to the synchronization between the transmitter and the receiver. To explain this , we should enable the transmitter ( Ali ) to send his encrypted data which can be detected by the receiver ( Bob ) and in the same time we should prevent the unlikely person ( Oscar ) from getting any idea about transmitted data between Ali and Bob by using our mathematical technique in this paper, we give an example to s how the difficulties which will face Oscar when he try to attack by using a brute force or any cryptanalysis Technique (if the x=the massage and y=crypto - massage are both known in any way ) the programming in MATLAB r2012b and for plot helping http://www.fooplot.com.

Read less

View Paper    


A Novel Approach of Data Sanitization by Noise Addition and Knowledge Discovery by Clustering

Publication Date : October 2015

SearchDL ID : 04.IJIS.2015.1.8

View Abstract

Abstract :  Security of published data cannot be less important as compared to unpublished data or the data which is not made public. Therefore, PII (Personally Identifiable Information) is removed and data sanitized when organizations recording large volumes of data publish that data. However, this approach of ensuring data privacy and security can result in loss of utility of that published data for knowledge discovery. Therefore, a fine balance is required between privacy and the utility needs of published data. In this paper, we study this delicate balance by evaluating four data mining clustering techniques for knowledge discovery and propose two privacy/utility quantification parameters. We subsequently perform number of experiments to statistically identify which clustering technique is best suited with desirable level of privacy/utility while noise is incrementally increased by simultaneously degrading data accuracy, completeness and consistency.

Read less

View Paper    


New Intelligent Heuristic Algorithm to Mitigate Security Vulnerabilities in IPv6

Publication Date : October 2015

SearchDL ID : 04.IJIS.2015.1.3

View Abstract

Abstract :  Zero day Cyber-attacks created potential impacts on the way information is held and protected, however one of the vital priorities for governments, agencies and organizations is to secure their network businesses, transactions and communications, simultaneously to avoid security policy and privacy violations under any circumstances. Covert Channel is used to in/ex-filtrate classified data secretly, whereas encryption is used merely to protect communication from being decoded by unauthorized access. In this paper, we propose a new Security Model to mitigate security attacks on legitimate targets misusing IPv6 vulnerabilities. The approach analyses, detects and classifies hidden communication channels through implementing an enhanced feature selection algorithm with a coherent Naive Bayesian Classifier. NBC is one of the most prominent classification algorithm defining the highest probability in data mining area. The proposed framework uses Intelligent Heuristic Algorithm (IHA) to analyse and create a novel primary training data, furthermore a modified Decision Tree C4.5 technique is suggested to classify the richest attribute presenting hidden channels in IPv6 network. The results evaluation showed better detection performance, high accuracy in True Positive Rate (TPR) and a low False Negative Rate (FNR) and a clear attribute ranking.

Read less

View Paper    


Implementation and Performance Evaluation of Embedded IPsec in Microkernel OS

Publication Date : October 2015

SearchDL ID : 04.IJIS.2015.1.9

View Abstract

Abstract :  The rapid development of the embedded systems and the wide use of them in many sensitive fields require safeguarding their communications. Internet Protocol Security (IPsec) i s w idely u sed t o s olve n etwork s ecurity p roblems by providing confidentiality and integrity for the communications in the network, but it introduces communication overhead. This overhead becomes a critical factor with embedded systems because of their low computing power and limited resources. In this research, we studied the overhead of using embedded IPsec in constrained resource systems, which run microkernel operating system (OS), in terms of the network latency and throughput. To conduct our experiment first, we ran the test with an unmodified network stack, and then we ran the same test with the modified network stack which contains the IPsec implementation. Later, we compared the results obtained from these two sets of experiments to examine the overhead. Our research demonstrated that the overhead imposed by IPsec protocols is small and well within the capabilities of even low cost microcontrollers such as the one used in the Raspberry Pi computer.

Read less

View Paper    


Page : 1