Pub Date : 2021-03-31DOI: 10.33832/ijsia.2021.15.1.01
Ranie B. Canlas
{"title":"Capturing Security Mechanisms Applied to Ecommerce: An Analysis of Transaction Security","authors":"Ranie B. Canlas","doi":"10.33832/ijsia.2021.15.1.01","DOIUrl":"https://doi.org/10.33832/ijsia.2021.15.1.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42678781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-31DOI: 10.33832/ijsia.2020.14.1.01
Bosubabu Samban, Y. Ramesh, M. .. Rao, T. C. Rao
{"title":"Blockchain Approach to Cyber Security Vulnerabilities Attacks and Potential Countermeasures","authors":"Bosubabu Samban, Y. Ramesh, M. .. Rao, T. C. Rao","doi":"10.33832/ijsia.2020.14.1.01","DOIUrl":"https://doi.org/10.33832/ijsia.2020.14.1.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41400409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-31DOI: 10.33832/ijsia.2020.14.1.02
Zeeshan Haider, Tauseef Jamal, M. Asam, S. A. Butt, A. Ajaz
— The degradation of an adequate medical facilities for safety and healthy human atmosphere motivated researchers to think more generously to provide a smart solution in medical applications. Wireless body area network (WBAN) is one of the potential platform to cope up to the needs of prevailing medical demands and challenges. In the literature, WBAN is a femto-network (ranges up to few meters) formation around a human body for sensing, transmission and reception functionality. These functionalities are executed using various modes by placement of sensors node on human posture or by injecting inside of the human body. This mode of communication have various challenges when deployed in medical applications. Due to the critical nature of human physiological sensed data which demands a reliable and secure transmission, reception between sensors, intermediate and master node. This article outcomes are two fold, first is the state of art challenges of WBAN and the need of the ultimate smart solution for safe and reliable communication in Wireless body area Networks. Secondly, using Cooperation techniques for mitigation of WBAN issues, proposed cooperative model is presented for reliable data transmission using an efficient network resource utilization mechanism.
{"title":"Mitigation of Wireless Body Area Networks Challenges using Cooperation","authors":"Zeeshan Haider, Tauseef Jamal, M. Asam, S. A. Butt, A. Ajaz","doi":"10.33832/ijsia.2020.14.1.02","DOIUrl":"https://doi.org/10.33832/ijsia.2020.14.1.02","url":null,"abstract":"— The degradation of an adequate medical facilities for safety and healthy human atmosphere motivated researchers to think more generously to provide a smart solution in medical applications. Wireless body area network (WBAN) is one of the potential platform to cope up to the needs of prevailing medical demands and challenges. In the literature, WBAN is a femto-network (ranges up to few meters) formation around a human body for sensing, transmission and reception functionality. These functionalities are executed using various modes by placement of sensors node on human posture or by injecting inside of the human body. This mode of communication have various challenges when deployed in medical applications. Due to the critical nature of human physiological sensed data which demands a reliable and secure transmission, reception between sensors, intermediate and master node. This article outcomes are two fold, first is the state of art challenges of WBAN and the need of the ultimate smart solution for safe and reliable communication in Wireless body area Networks. Secondly, using Cooperation techniques for mitigation of WBAN issues, proposed cooperative model is presented for reliable data transmission using an efficient network resource utilization mechanism.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47204281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-31DOI: 10.33832/ijsia.2020.14.1.03
Haris Mumtaz, M. Alshayeb, S. Mahmood, M. Niazi
— Use case modelling is an industrial de-facto standard technique to express functional requirements. Security bad smells are design flaws that can potentially degrade the quality of software by affecting a system’s ability to prevent malicious activities. The presence of security bad smells in a use case model is likely to propagate security vulnerabilities to other software artefacts. Therefore, the detection and refactoring of security bad smells in use case models is important for ensuring the overall quality of software systems. In this paper, we propose a genetic algorithm-based detection approach to detect security bad smells. A refactoring process is then applied to correct the security bad smells. Finally, the improvement to security is assessed through the statistical analysis of quality metrics. The practicality of the approach is demonstrated by applying it to a set of use case models. The results show that the proposed security bad smell detection and correction technique can significantly improve the quality of use case models.
{"title":"Improving the Security Quality of Use Case Models through the Application of Software Refactoring Using Genetic Algorithm","authors":"Haris Mumtaz, M. Alshayeb, S. Mahmood, M. Niazi","doi":"10.33832/ijsia.2020.14.1.03","DOIUrl":"https://doi.org/10.33832/ijsia.2020.14.1.03","url":null,"abstract":"— Use case modelling is an industrial de-facto standard technique to express functional requirements. Security bad smells are design flaws that can potentially degrade the quality of software by affecting a system’s ability to prevent malicious activities. The presence of security bad smells in a use case model is likely to propagate security vulnerabilities to other software artefacts. Therefore, the detection and refactoring of security bad smells in use case models is important for ensuring the overall quality of software systems. In this paper, we propose a genetic algorithm-based detection approach to detect security bad smells. A refactoring process is then applied to correct the security bad smells. Finally, the improvement to security is assessed through the statistical analysis of quality metrics. The practicality of the approach is demonstrated by applying it to a set of use case models. The results show that the proposed security bad smell detection and correction technique can significantly improve the quality of use case models.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48130277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-31DOI: 10.33832/ijsia.2019.13.4.05
Priyanka Tripathi, R. Makwana
{"title":"An Ensemble Classification Approach with Selective Under and Over Sampling of Imbalance Intrusion Detection Dataset","authors":"Priyanka Tripathi, R. Makwana","doi":"10.33832/ijsia.2019.13.4.05","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.05","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45087269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-31DOI: 10.33832/ijsia.2019.13.4.01
S. Makka, B. B. Sagar
{"title":"Communication of Two Controller Area Network Segments through Wireless Sensor Network","authors":"S. Makka, B. B. Sagar","doi":"10.33832/ijsia.2019.13.4.01","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69499543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-31DOI: 10.33832/ijsia.2019.13.4.08
A. Singh, Anurag Jain
{"title":"Financial Fraud Detection using Bio-Inspired Key Optimization and Machine Learning Technique","authors":"A. Singh, Anurag Jain","doi":"10.33832/ijsia.2019.13.4.08","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.08","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46967711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-31DOI: 10.33832/ijsia.2019.13.4.06
R. Johari, A. Parihar
{"title":"BLAST: Blockchain Algorithm for Secure Transaction","authors":"R. Johari, A. Parihar","doi":"10.33832/ijsia.2019.13.4.06","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.06","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49173077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-31DOI: 10.33832/ijsia.2019.13.4.11
N. Thirupathi Rao, D. Bhattacharyya
{"title":"Recent Cyber Security Breaches and Preventive Measures","authors":"N. Thirupathi Rao, D. Bhattacharyya","doi":"10.33832/ijsia.2019.13.4.11","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.11","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44320299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-31DOI: 10.33832/ijsia.2019.13.4.09
Surabhi Sharma, R. Jain
{"title":"EACO: An Enhanced Ant Colony Optimization Algorithm for Task Scheduling in Cloud Computing","authors":"Surabhi Sharma, R. Jain","doi":"10.33832/ijsia.2019.13.4.09","DOIUrl":"https://doi.org/10.33832/ijsia.2019.13.4.09","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45356853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}