New user registration
Event organizer registration
Login via your institution account
Login via your organization account
Login via your publisher account
Login using your new user credentials
Forgot username or password?
Subscribe to SciArchives
Computer Science >
Computer Science (General)
Journal of Network and Information Security
Publisher:Publishing India Group
Editor in chief:Dr. Pooja Taneja
Your selection(s) could not be saved due to an internal error. Please try again.
Browse by Volumes
A Study And Modeling For Improving Grid Service Reliability Using Hive
Author:Renita Raymond, Karnavel Kuppusamy
Volume: 1 | Issue no: 2-2013 | Pagination: 49-53
The promise of Grid computing organizations being able to acquire all the power they need for only as long as it is necessary is incredibly compelling. Although grid computing has experienced significant success in bringing productivity gains and cost savings to engineering it has not yet proven its mettle for highly transaction oriented applications. When a program needs to access a remote resource, various types of failures are interleaved in the grid computing background, such as jamming failures, time-out failures, matchmaking failures, program failures, resource failures. This paper presents a grid service reliability model using hive that is used to expand the range of problems that can be solved with grid and host the transaction-oriented applications upon which businesses depend. In the proposed model, client request are handled by ontology, a database to check whether the resources available in the particular server or not. After finding the resource available, hive handles the request and moves the request to remote execution of Condor-G Scheduler. The Condor-G Scheduler executes the request and allocates the resource to the client. Thus the system reliability is afforded.
Analyzing Threat Perception And Geo-Location Of Internet-Facing Systems
Volume: 1 | Issue no: 2-2013 | Pagination: 31-48
There is no security on this earth; there is only opportunity.' -Douglas MacArthur. For understanding security, it is vital to know about the perception of threat. Hence, to analyze the security of information systems, we must be aware about the exposure of different systems as well as the tools available with an attacker to attack the system. In this paper, the research focused on gaining information about Cyber-security vulnerabilities, detecting vulnerable systems using known methods and then geo-location of systems for the visualization of the same. Three cases were studied to cover different type of systems so that it can be extrapolated from there on for generalization of the process of obtaining potentially vulnerable systems using this methodology suggested. We were successful in obtaining the list of potentially vulnerable systems and also estimated the ability of the tools used i.e. SHODAN and IP to geo-location websites and could conclude that these tools possess the potential of reducing the resources required to exploit a system, but, are vital to aid the defenders in identifying vulnerable systems.
Scratch Captcha ? A Novel Touch Scratch Approach To Resolve Captcha Issues
Author:Asif Hasnain, Waqas Malik, Mohsin Yaseen, Syed Jawad Hussain Shahzad
Volume: 1 | Issue no: 2-2013 | Pagination: 23-30
CAPTCHA [1; 2] (Reverse Turing Test) is an authorization test to ensure that response is coming from human. Over the years, its design has been vulnerable to different attacks that utilize the visual appearance of challenge. Therefore, designing a highly robust and usable CAPTCHA that can resist such attacks is highly desirable. The study proposes a novel scheme, named Scratch CAPTCHA. It is based on a new paradigm which emphasizes the notion that strength of the CAPTCHA must be formulated by the secrecy of challenge. We have tested the robustness of our idea against a simple bot attack that successfully emulates human behavior (or actions) but not their intelligence.
Intrusion Detection Systems: A Review
Author:Kajal Rai, M. Shyamala Devi
Volume: 1 | Issue no: 2-2013 | Pagination: 16-22
Protection of computer resources and stored documents is an important issue in today's world. Intruders have made many winning attempts to overthrow prestigious company networks. Although the current security solutions such as firewalls, and anti-virus software have their significant roles in securing organizations but they do not detect all types of attacks of today's cyber world. Intrusion detection is a mechanism used to detect various attacks on a network. There are many Intrusion detection Systems (IDSs) available today. Some of them are open source while some are commercially used. In this paper we give a brief introduction to open source IDSs: SNORT and BRO. Some of the common types of attacks on various layers of TCP/IP and how SNORT and BRO handle these attacks are discussed. Current research in intrusion detection is also included. It is concluded that intrusion detection is a challenging task due to the advent of many unknown attacks.
In-Line Auditing And Real-Time Lineage Summaries To Maintain Ownership Of Information Stored In Cloud Servers
Volume: 1 | Issue no: 2-2013 | Pagination: 1-14
We propose new security architecture to enhance direct control to the information stored in cloud servers. It splits the cloud stack to two layers and having the security control for the owner of the information between them. By executing security-critical operations at the inline owner agent, the owner of the data logically preserves the essential security control to its data physically stored in a private cloud. The shadow auditor monitors the integrity of information stored in a cloud server to detect unauthorized modification of the information even by the administrators in the clouds while real-time lineage summaries provide cloud users timely feedback on the quality of data without disturbing their workflow. Our performance evaluations showed that real-time lineage summaries are effective for feedbacking quality of information for systems that have frequent references to the information. The shadow auditor was also workload scalable, while the major bottleneck was securing communication between the split cloud and the owner agent. The proposed security architecture will be a solution to make secure transition to clouds while the advantages of clouds are maintained.
A Survey On Security And Privacy Protocols For Cognitive Wireless Sensor Networks
Volume: 1 | Issue no: 1-2013 | Pagination: 2-43
Wireless sensor networks (WSNs) have emerged as an important and new area in wireless and mobile computing research because of their numerous potential applications that range from indoor deployment scenarios in home and office to outdoor deployment in adversary's territory in a tactical battleground. Since in many WSN applications, lives and livelihoods may depend on the timeliness and correctness of sensor data obtained from dispersed sensor nodes, these networks must be secured to prevent any possible attacks that may be launched on them. Security is, therefore, an important issue in WSNs. However, this issue becomes even more critical in cognitive wireless sensor networks (CWSNs), a type of WSNs in which the sensor nodes have the capabilities of changing their transmission and reception parameters according to the radio environment under which they operate in order to achieve reliable and efficient communication and optimum utilization of the network resources. This survey paper presents a comprehensive discussion on various security issues in CWSNs by identifying numerous security threats in these networks and defense mechanisms to counter these vulnerabilities. Various types of attacks on CWSNs are categorized under different classes based on their natures and targets, and corresponding to each attack class, appropriate security mechanisms are presented. The paper also identifies some open problems in this emerging area of wireless networking research.
Software Safety Metrics For Safety-Critical Computer Systems
Author:Jayasri Kotti, Seetha Ramaiah P
Volume: 1 | Issue no: 1-2013 | Pagination: 68-70
Software safety is a composite of many factors. The safety aspects of computer-based systems as increasingly important as the use of software escalate because of its convenience and flexibility. There are many tools and metrics for software safety. Many safety metrics exists to help designers to identify potential safety problems. The area of software metrics play an important role in improving the quality of the software process. It is very important to select and use appropriate software safety metrics in software engineering. This paper reviews the method for selecting appropriate software safety metrics based on AHP. AHP theory is a classical multi attribute decisionmaking method and is more flexible, accurate, and has better sensitivity and consistency. This paper describes a set of software safety metrics for each phase of software life cycle. The following software safety metrics such as "Fault Density", "Test coverage", "Defect density", "Cyclomatic Complexity", etc. are identified to evaluate the safer software development methodology. These metrics are used to evaluate the software safety for many applications.
Experimental Based Performance Analysis Of Ieee 802.11/G Hybrid Network
Author:Atul M. Gosai, Uditnarayan Kar, Bhargavi H Goswami
Volume: 1 | Issue no: 1-2013 | Pagination: 61-66
The performance of IEEE 802.11/g hybrid network consisting of wired nodes, a mobile access point and mobile wireless nodes where the mobile access point is moving from one point to another to make the mobile wireless nodes or mobile hosts communicate is analysed. Taking into consideration the strong drive towards the wireless internet access through the mobile terminals, the impact on the performance of the network due to the mobile access point is analysed and examined. The result of the simulation based upon the experiment demonstrates the performance factors like throughput, packet delivery ratio and average delay over the conventional hybrid network. The whole simulation is done and analysed by using network simulator NS-2.35. It concludes on the performed throughput, packet delivery ratio and average delay.
Penetration Rate In The Virtual World And Its Effects On Economy
Author:Narinder Singh Rana, S. N. Panda
Volume: 1 | Issue no: 1-2013 | Pagination: 55-59
The Information and Communication Technology (ICT) sector, for its potential to generate huge economic and social development, has been the buzzword for all the business discussions and research in last two decades. In this paper, the authors have analyzed the growth rate of the Internet in terms of active and passive users in a global scenario. The data from various internet research organizations has been consolidated and used to deduce that the penetration of Internet, in the developed as well as developing economies of the world, is consistently increasing. As the number of users of the Internet increases, it would either have a positive or a negative impact on the economy of the country. The direction and extent of the effect has been studied in this paper.
Kullback-Leibler Divergence For Masquerade Detection
Author:Geetha Ranjini Viswanathan, Richard M. Low, Mark Stamp
Volume: 1 | Issue no: 1-2013 | Pagination: 45-53
A masquerader is an attacker who gains access to a legitimate user's credentials and pretends to be that user so as to evade detection. Several statistical techniques have been applied to the masquerade detection problem, including hidden Markov models (HMM) and one class naĻıve Bayes (OCNB). In addition, Kullback-Leibler (KL) divergence has been used in an effort to improve detection rates. In this paper, we analyze masquerade detection techniques that employ HMMs, OCNB, and KL divergence. Detailed statistical analysis is provided to compare the effectiveness of these various approaches.
Contact and support
Terms and conditions
Frequently asked questions
Copyright © 2015
All rights reserved. SciArchives.