首页 > 最新文献

International Journal of Security and Its Applications最新文献

英文 中文
An Algorithm to Secure Virtual Machine Image in Cloud Environment 云环境下虚拟机镜像安全算法研究
Pub Date : 2017-05-31 DOI: 10.14257/ijsia.2017.11.5.05
Preeti Thakur, Devesh Kumar Srivastava
Virtual Machine is a combined form of operating system and application. Virtualization provides the facility to run multiple operating systems on a single physical machine. These multiple operating systems are called guest operating systems. In server Virtualization many virtual machines (VMs) can run on one server including its own server. These VMs can be migrated from one server to another. As VM image will be downloaded to create a new virtual machine on the guest operating system it has some security problems. Unauthorized access can create the security issues like Malware injection. Due to which there is a need of scheme capable of providing encryption, malware detection, automatic patching to restore the image. In this paper an algorithm is proposed which is capable of providing solution to the above issues.
虚拟机是操作系统和应用程序的结合形式。虚拟化提供了在单个物理机器上运行多个操作系统的功能。这些多个操作系统被称为客户操作系统。在服务器虚拟化中,许多虚拟机(VM)可以在一台服务器上运行,包括它自己的服务器。这些虚拟机可以从一台服务器迁移到另一台服务器。由于VM映像将被下载以在来宾操作系统上创建新的虚拟机,因此存在一些安全问题。未经授权的访问可能会造成诸如恶意软件注入之类的安全问题。因此,需要一种能够提供加密、恶意软件检测、自动修补以恢复图像的方案。本文提出了一种能够解决上述问题的算法。
{"title":"An Algorithm to Secure Virtual Machine Image in Cloud Environment","authors":"Preeti Thakur, Devesh Kumar Srivastava","doi":"10.14257/ijsia.2017.11.5.05","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.5.05","url":null,"abstract":"Virtual Machine is a combined form of operating system and application. Virtualization provides the facility to run multiple operating systems on a single physical machine. These multiple operating systems are called guest operating systems. In server Virtualization many virtual machines (VMs) can run on one server including its own server. These VMs can be migrated from one server to another. As VM image will be downloaded to create a new virtual machine on the guest operating system it has some security problems. Unauthorized access can create the security issues like Malware injection. Due to which there is a need of scheme capable of providing encryption, malware detection, automatic patching to restore the image. In this paper an algorithm is proposed which is capable of providing solution to the above issues.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46505970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure and Efficient Message Delivery Scheme for VANET 一种安全高效的VANET消息传递方案
Pub Date : 2017-05-31 DOI: 10.14257/IJSIA.2017.11.5.07
Huaijin Liu, Yonghong Chen, D. Agrawal
In order to meet the need of scalability of vehicular ad hoc network (VANET), when using the roadside unit (RSU) for message authentication and broadcast, many studies have paid little attention to the message transmission delay and the communication overhead caused by the signature. For the sake of guaranteeing the reliability of the message and improve the efficiency of message transmission, this paper proposes a secure and efficient message delivery scheme for VANET. The scheme firstly uses the opp-dir dissemination model to propagate the message to solve the problem of message transmission delay. Then, the message is signed by the aggregate MAC technique to ensure the reliability of the message. Extensive experiments validate that the proposed scheme can reduce the message transmission delay and communication overhead, improve the message delivery ratio.
为了满足车载自组织网络(VANET)可扩展性的需要,在使用路旁单元(RSU)进行消息认证和广播时,许多研究很少关注由签名引起的消息传输延迟和通信开销。为了保证消息的可靠性和提高消息传输的效率,本文提出了一种安全高效的VANET消息传递方案。该方案首先采用opp-dir传播模型进行消息传播,解决了消息传输延迟的问题。然后采用聚合MAC技术对消息进行签名,保证消息的可靠性。大量的实验证明,该方案可以降低消息传输延迟和通信开销,提高消息传送率。
{"title":"A Secure and Efficient Message Delivery Scheme for VANET","authors":"Huaijin Liu, Yonghong Chen, D. Agrawal","doi":"10.14257/IJSIA.2017.11.5.07","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.5.07","url":null,"abstract":"In order to meet the need of scalability of vehicular ad hoc network (VANET), when using the roadside unit (RSU) for message authentication and broadcast, many studies have paid little attention to the message transmission delay and the communication overhead caused by the signature. For the sake of guaranteeing the reliability of the message and improve the efficiency of message transmission, this paper proposes a secure and efficient message delivery scheme for VANET. The scheme firstly uses the opp-dir dissemination model to propagate the message to solve the problem of message transmission delay. Then, the message is signed by the aggregate MAC technique to ensure the reliability of the message. Extensive experiments validate that the proposed scheme can reduce the message transmission delay and communication overhead, improve the message delivery ratio.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47205067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Coalesce of SNE-Wavelet-SVM Technique for Network Intrusion Detection 基于sne -小波-支持向量机的网络入侵检测
Pub Date : 2017-05-31 DOI: 10.14257/IJSIA.2017.11.5.01
Yasir Hamid, Ludovic Journax, F. Shah, M. Sugumaran
Recognizing intrusions quickly and precisely is vital to the proficient operation of computer networks. Precisely describing critical classes of intrusions extraordinarily encourages their recognizable proof; be that as it may, the nuances and complexities of anomalous activities can without much of a stretch complicate the procedure. Due to the inherent capability of the signal processing to discover the novel and obscure attacks, they have been pretty popular for Network Intrusion Detection, and the nearness of the self-comparability in the system activity propels the appropriateness for the application Wavelets. In this work we first subject the network data to dimension reduction using Stochastic Neighbor Embedding (SNE) and then preform the wavelet decomposition of the data. The classification results of the pre-processed data using Gaussian SVM over different bandwidths uphold the claim that the proposed system has appreciably improved detection coverage for all the attack groups and the normal data as well, and at the same time minimized the false alarms. (Coiflets), Biorthogonal wavelets, Harmonic wavelets, Legendre wavelets, M-band wavelets and Composite wavelets.
快速准确地识别入侵对于熟练操作计算机网络至关重要。准确地描述入侵的关键类别,极大地鼓励了它们的可识别证据;尽管如此,异常活动的细微差别和复杂性可能会使程序复杂化。由于信号处理发现新颖和模糊攻击的固有能力,它们在网络入侵检测中非常流行,而系统活动中自相似性的接近性推动了应用Wavelets的适当性。在这项工作中,我们首先使用随机邻居嵌入(SNE)对网络数据进行降维,然后对数据进行小波分解。使用高斯SVM在不同带宽上对预处理数据的分类结果支持这样的说法,即所提出的系统显著提高了对所有攻击组和正常数据的检测覆盖率,同时最大限度地减少了误报。(Coiflets)、双正交小波、谐波小波、勒让德小波、M-带小波和复合小波。
{"title":"A Coalesce of SNE-Wavelet-SVM Technique for Network Intrusion Detection","authors":"Yasir Hamid, Ludovic Journax, F. Shah, M. Sugumaran","doi":"10.14257/IJSIA.2017.11.5.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.5.01","url":null,"abstract":"Recognizing intrusions quickly and precisely is vital to the proficient operation of computer networks. Precisely describing critical classes of intrusions extraordinarily encourages their recognizable proof; be that as it may, the nuances and complexities of anomalous activities can without much of a stretch complicate the procedure. Due to the inherent capability of the signal processing to discover the novel and obscure attacks, they have been pretty popular for Network Intrusion Detection, and the nearness of the self-comparability in the system activity propels the appropriateness for the application Wavelets. In this work we first subject the network data to dimension reduction using Stochastic Neighbor Embedding (SNE) and then preform the wavelet decomposition of the data. The classification results of the pre-processed data using Gaussian SVM over different bandwidths uphold the claim that the proposed system has appreciably improved detection coverage for all the attack groups and the normal data as well, and at the same time minimized the false alarms. (Coiflets), Biorthogonal wavelets, Harmonic wavelets, Legendre wavelets, M-band wavelets and Composite wavelets.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43136683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-Voting System using Homomorphic Encryption in a Cloud Based Environment 基于云环境的同态加密电子投票系统
Pub Date : 2017-05-31 DOI: 10.14257/IJSIA.2017.11.5.06
R. Jain, S. Madan, B. Garg, Y. Kapila, Abhishek Gupta
Cryptography as we know it, is among the most discussed topics in the security world. Any transaction, financial or social, any data, corporate or private is not secure in an environment such as the cloud, where everything is connected to everything. The only way to save anything or to make a transaction securely is to make it meaningless to the rest of the world. It can be made meaningless when converted to some other form and this some other form can only be obtained through encryption. In this paper we discuss various techniques of homomorphic encryption applied on cloud computing and the need of security over the cloud by citing relevant statistics. We then propose and implement a secure E-voting system using the paillier encryption scheme. The main goal of this research is to design a secure voting system using the internet platform to communicate between the voting system and voters.
正如我们所知,密码学是安全世界中讨论最多的话题之一。任何交易,无论是金融还是社交,任何数据,无论是公司还是私人,在云这样的环境中都是不安全的,在云环境中,一切都与一切相连。保存任何东西或安全地进行交易的唯一方法是使其对世界其他地方毫无意义。当转换成其他形式时,它可能变得毫无意义,而这种其他形式只能通过加密获得。在本文中,我们通过引用相关统计数据,讨论了应用于云计算的各种同态加密技术以及在云上安全的需要。然后,我们提出并实现了一个使用paillier加密方案的安全电子投票系统。本研究的主要目标是设计一个安全的投票系统,利用互联网平台在投票系统和选民之间进行通信。
{"title":"E-Voting System using Homomorphic Encryption in a Cloud Based Environment","authors":"R. Jain, S. Madan, B. Garg, Y. Kapila, Abhishek Gupta","doi":"10.14257/IJSIA.2017.11.5.06","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.5.06","url":null,"abstract":"Cryptography as we know it, is among the most discussed topics in the security world. Any transaction, financial or social, any data, corporate or private is not secure in an environment such as the cloud, where everything is connected to everything. The only way to save anything or to make a transaction securely is to make it meaningless to the rest of the world. It can be made meaningless when converted to some other form and this some other form can only be obtained through encryption. In this paper we discuss various techniques of homomorphic encryption applied on cloud computing and the need of security over the cloud by citing relevant statistics. We then propose and implement a secure E-voting system using the paillier encryption scheme. The main goal of this research is to design a secure voting system using the internet platform to communicate between the voting system and voters.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48994736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Conceptual Model for Exploring the Factors Influencing Information Security Culture 探讨信息安全文化影响因素的概念模型
Pub Date : 2017-05-31 DOI: 10.14257/ijsia.2017.11.5.02
Amjad Mahfuth, S. Yussof, Asmidar Abu Bakar, N. Ali, Waleed Abdallah
Human behavior is considered as one of the main threats in an organization. Owing to the fact that human element is the weakest link in security area, it is crucial to provide an ideal information security culture within an organization in order to guide the employees’ perception, attitudes and security behavior. Furthermore, this culture can protect an organization against many information security threats posed by the employees. In this paper, we have proposed a conceptual model exploring the factors influencing the information security culture. Those factors are Security Awareness, Security Knowledge, Belief, Top Management, Security Policy, Security Behavior , Information Security Training, Security Risk Analysis and Assessment, Security Compliance, Ethical and Legal, Trust, Technology, Change Management, People, Information Security, Security Responsibility, Process, Strategy and Environment. The aim of the conceptual model would help the researchers to develop effective solutions and to provide a suitable background for information security culture across an organization. The study recommends researchers to conduct many studies in this area to focus on and investigate each of identified factors in the conceptual model in order to improve information security culture in organizations.
人的行为被认为是组织中的主要威胁之一。鉴于人的因素是安全领域最薄弱的环节,在组织内部提供一种理想的信息安全文化,以指导员工的感知、态度和安全行为至关重要。此外,这种文化可以保护组织免受员工带来的许多信息安全威胁。在本文中,我们提出了一个概念模型,探讨了影响信息安全文化的因素。这些因素包括安全意识、安全知识、信念、最高管理层、安全政策、安全行为、信息安全培训、安全风险分析和评估、安全合规性、道德和法律、信任、技术、变革管理、人员、信息安全、安全责任、流程、战略和环境。概念模型的目的是帮助研究人员制定有效的解决方案,并为整个组织的信息安全文化提供合适的背景。该研究建议研究人员在这一领域进行许多研究,重点关注和调查概念模型中的每一个已确定因素,以改善组织中的信息安全文化。
{"title":"A Conceptual Model for Exploring the Factors Influencing Information Security Culture","authors":"Amjad Mahfuth, S. Yussof, Asmidar Abu Bakar, N. Ali, Waleed Abdallah","doi":"10.14257/ijsia.2017.11.5.02","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.5.02","url":null,"abstract":"Human behavior is considered as one of the main threats in an organization. Owing to the fact that human element is the weakest link in security area, it is crucial to provide an ideal information security culture within an organization in order to guide the employees’ perception, attitudes and security behavior. Furthermore, this culture can protect an organization against many information security threats posed by the employees. In this paper, we have proposed a conceptual model exploring the factors influencing the information security culture. Those factors are Security Awareness, Security Knowledge, Belief, Top Management, Security Policy, Security Behavior , Information Security Training, Security Risk Analysis and Assessment, Security Compliance, Ethical and Legal, Trust, Technology, Change Management, People, Information Security, Security Responsibility, Process, Strategy and Environment. The aim of the conceptual model would help the researchers to develop effective solutions and to provide a suitable background for information security culture across an organization. The study recommends researchers to conduct many studies in this area to focus on and investigate each of identified factors in the conceptual model in order to improve information security culture in organizations.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2017.11.5.02","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45960626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Application Layer DDOS Attack Detection Using Hybrid Machine Learning Approach 应用层DDOS攻击检测的混合机器学习方法
Pub Date : 2017-04-30 DOI: 10.14257/IJSIA.2017.11.4.07
Rizwan Ur Rahman, D. Tomar, A. V. Jijin
Application Layer Distributed Denial of Service (App-DDoS) attack has become a major threat to web security. Attack detection is difficult as they mimic genuine user request. This paper proposes a clustering based correlation approach for detecting application layer DDoS attack on HTTP protocol. Proposed approach has two main modules ----Flow monitoring module and User behavior monitoring module. Flow monitor is responsible to analyze data flow information. User behavior monitor analyses end user behavior. Proposed approach is capable to detect three main attacks on HTTP protocol, i.e. HTTP-GET attack, HTTP-POST attack and Slow Read attack. It is also possible to detect hybrid type of DDoS attacks which uses a mixture network and application layer DDoS techniques. Comparative analysis of clustering algorithms on generated dataset is also done to demonstrate the effectiveness of detection approach.
应用层分布式拒绝服务(App DDoS)攻击已成为网络安全的主要威胁。攻击检测很困难,因为它们模仿真实的用户请求。本文提出了一种基于聚类的关联检测HTTP协议应用层DDoS攻击的方法。所提出的方法有两个主要模块——流量监控模块和用户行为监控模块。流量监控器负责分析数据流信息。用户行为监视器分析最终用户的行为。该方法能够检测HTTP协议的三种主要攻击,即HTTP-GET攻击、HTTP-POST攻击和慢速读取攻击。还可以检测使用混合网络和应用层DDoS技术的混合类型的DDoS攻击。并对生成的数据集的聚类算法进行了比较分析,验证了检测方法的有效性。
{"title":"Application Layer DDOS Attack Detection Using Hybrid Machine Learning Approach","authors":"Rizwan Ur Rahman, D. Tomar, A. V. Jijin","doi":"10.14257/IJSIA.2017.11.4.07","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.4.07","url":null,"abstract":"Application Layer Distributed Denial of Service (App-DDoS) attack has become a major threat to web security. Attack detection is difficult as they mimic genuine user request. This paper proposes a clustering based correlation approach for detecting application layer DDoS attack on HTTP protocol. Proposed approach has two main modules ----Flow monitoring module and User behavior monitoring module. Flow monitor is responsible to analyze data flow information. User behavior monitor analyses end user behavior. Proposed approach is capable to detect three main attacks on HTTP protocol, i.e. HTTP-GET attack, HTTP-POST attack and Slow Read attack. It is also possible to detect hybrid type of DDoS attacks which uses a mixture network and application layer DDoS techniques. Comparative analysis of clustering algorithms on generated dataset is also done to demonstrate the effectiveness of detection approach.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41601823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Implementation of a Two-Level Security Door Access Using Keypad and Voice Recognition 使用键盘和语音识别实现两级安全门禁
Pub Date : 2017-04-30 DOI: 10.14257/ijsia.2017.11.4.04
Morkat M. Yilwatda, J. A. Enokela, N. Goshwe
It is possible today to automate a growing number of speaker-recognition tasks with such technologies as voice or speaker verification and voice identification. These systems have been applied to real-world security applications. They have, however, been undergoing modifications due to the poor level of security architecture that they provide to users. Hence there is the need, as has been done in this work, to develop a more efficient, user friendly and complex security system that can curtail illegal intrusion into special facilities. The system described in this paper uses matrix keypad which is interfaced with a microcontroller for first level security validation to monitor and control the execution of desired tasks within the keypad and voice recognition (KVR) system. A voice recognition Integrated Circuit is used for second level security verification. A tristate buffer is also employed to logically isolate the buses of the digital signal processing (DSP) chip and those of the microcontroller. From the research, tests were conducted for both noiseless and noisy environments and the recommended distance between the user and microphone in a noiseless environment using electrets type condenser microphone is 1.0 cm to 16 cm while under noisy condition it was found to be 1.0 cm to 6.0 cm. These results depend on the sensitivity of the microphone and the environmental conditions at the time. It can be deduced from the research that integrating the keypad and voice recognition design can help to optimize the security level of the system and by implication help in controlling unwanted intrusion into the special facilities such as museum, military armory, financial institution, etc.
如今,利用诸如语音或说话者验证和语音识别之类的技术,可以使越来越多的说话者识别任务自动化。这些系统已应用于现实世界中的安全应用程序。然而,由于它们为用户提供的安全体系结构级别较差,它们一直在进行修改。因此,正如在这项工作中所做的那样,有必要开发一个更高效、用户友好和复杂的安全系统,以减少对特殊设施的非法入侵。本文中描述的系统使用矩阵键盘,该键盘与用于一级安全验证的微控制器接口,以监控和控制键盘和语音识别(KVR)系统内所需任务的执行。语音识别集成电路用于二级安全验证。三态缓冲器也用于逻辑隔离数字信号处理(DSP)芯片的总线和微控制器的总线。根据研究,对无噪声和有噪声环境进行了测试,在使用驻极体型电容式麦克风的无噪声环境中,用户与麦克风之间的推荐距离为1.0厘米至16厘米,而在有噪声的条件下,建议距离为1.0 cm至6.0厘米。这些结果取决于麦克风的灵敏度和当时的环境条件。研究表明,将键盘和语音识别设计相结合有助于优化系统的安全级别,并有助于控制对博物馆、军事军械库、金融机构等特殊设施的不必要入侵。
{"title":"Implementation of a Two-Level Security Door Access Using Keypad and Voice Recognition","authors":"Morkat M. Yilwatda, J. A. Enokela, N. Goshwe","doi":"10.14257/ijsia.2017.11.4.04","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.4.04","url":null,"abstract":"It is possible today to automate a growing number of speaker-recognition tasks with such technologies as voice or speaker verification and voice identification. These systems have been applied to real-world security applications. They have, however, been undergoing modifications due to the poor level of security architecture that they provide to users. Hence there is the need, as has been done in this work, to develop a more efficient, user friendly and complex security system that can curtail illegal intrusion into special facilities. The system described in this paper uses matrix keypad which is interfaced with a microcontroller for first level security validation to monitor and control the execution of desired tasks within the keypad and voice recognition (KVR) system. A voice recognition Integrated Circuit is used for second level security verification. A tristate buffer is also employed to logically isolate the buses of the digital signal processing (DSP) chip and those of the microcontroller. From the research, tests were conducted for both noiseless and noisy environments and the recommended distance between the user and microphone in a noiseless environment using electrets type condenser microphone is 1.0 cm to 16 cm while under noisy condition it was found to be 1.0 cm to 6.0 cm. These results depend on the sensitivity of the microphone and the environmental conditions at the time. It can be deduced from the research that integrating the keypad and voice recognition design can help to optimize the security level of the system and by implication help in controlling unwanted intrusion into the special facilities such as museum, military armory, financial institution, etc.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49392167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Dendritic Cell Algorithm Based Intrusion Detection System for Wireless Sensor Networks 一种改进的基于树状细胞算法的无线传感器网络入侵检测系统
Pub Date : 2017-04-30 DOI: 10.14257/IJSIA.2017.11.4.02
Weipeng Guo, Yonghong Chen
Base on the similarities between WSNs intrusion detection and artificial immune system. This paper utilizes the benefits of one of the Danger Theory based AIS intrusion detection algorithms, namely the Dendritic Cell Algorithm (DCA) to design a distributed and hierarchical intrusion detection model for WSN. Beside, because of the shortcomings of DCA about its Dendritic Cell (DC) evaluation mechanism and lymph decision mechanism, the false alarm rate is high. Therefore, this paper puts forward an improved Dendritic Cell Algorithm reference to the idea of data fusion theory. In this algorithm, we firstly define a scoring function to evaluate the DC context in DC part. And then in lymph part, we fuse multiple DCs’ evaluation through Dempster rule to make global decision. The experimental results show that the improved DCA based IDS proposed can effectively improve the accuracy rate without depending on the MCAV threshold and show advantages in flexibility and adaptability.
基于无线传感器网络入侵检测与人工免疫系统的相似性。本文利用基于危险理论的AIS入侵检测算法之一树突状细胞算法(DCA)的优点,设计了一种面向WSN的分布式分层入侵检测模型。此外,由于DCA在树突状细胞(DC)评估机制和淋巴决策机制方面存在不足,导致其虚警率较高。因此,本文借鉴数据融合理论的思想,提出了一种改进的树突状细胞算法。在该算法中,我们首先定义一个评分函数来评估DC部分中的DC上下文。然后在淋巴部分,通过Dempster规则融合多个dc的评价,进行全局决策。实验结果表明,本文提出的基于DCA的改进IDS可以有效地提高识别率,而不依赖于MCAV阈值,并具有灵活性和适应性方面的优势。
{"title":"An Improved Dendritic Cell Algorithm Based Intrusion Detection System for Wireless Sensor Networks","authors":"Weipeng Guo, Yonghong Chen","doi":"10.14257/IJSIA.2017.11.4.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.4.02","url":null,"abstract":"Base on the similarities between WSNs intrusion detection and artificial immune system. This paper utilizes the benefits of one of the Danger Theory based AIS intrusion detection algorithms, namely the Dendritic Cell Algorithm (DCA) to design a distributed and hierarchical intrusion detection model for WSN. Beside, because of the shortcomings of DCA about its Dendritic Cell (DC) evaluation mechanism and lymph decision mechanism, the false alarm rate is high. Therefore, this paper puts forward an improved Dendritic Cell Algorithm reference to the idea of data fusion theory. In this algorithm, we firstly define a scoring function to evaluate the DC context in DC part. And then in lymph part, we fuse multiple DCs’ evaluation through Dempster rule to make global decision. The experimental results show that the improved DCA based IDS proposed can effectively improve the accuracy rate without depending on the MCAV threshold and show advantages in flexibility and adaptability.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45868097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DNA and Blum Blum Shub Random Number Generator Based Security Key Generation Algorithm 基于DNA和Blum Blum Shub随机数生成器的安全密钥生成算法
Pub Date : 2017-04-30 DOI: 10.14257/IJSIA.2017.11.4.01
Gurpreet Kour Sodhi, G. S. Gaba
The communication sector suffers from serious security related threats. The technique presented in this paper is a step towards providing security to the confidential data. The work is based on generating a unique key through DNA and random number generator. Each random sequence produced by Blum Blum Shub random number generator is the result of a seed value which makes the sequence unique and reproducible. The final security key obtained is unique and upon being tested using NIST randomness evaluation tests, it is concluded that the key generated retains its uniqueness to a high level, thus providing efficient security mechanism. Thus, it is possible to integrate it with any security system used in communication sector.
通信部门受到严重的安全威胁。本文提出的技术是为机密数据提供安全性的一步。这项工作的基础是通过DNA和随机数生成器生成一个唯一的密钥。Blum-Blum-Shub随机数生成器生成的每个随机序列都是种子值的结果,该种子值使序列具有唯一性和可重复性。获得的最终安全密钥是唯一的,在使用NIST随机性评估测试进行测试后,可以得出结论,生成的密钥在很大程度上保持了其唯一性,从而提供了有效的安全机制。因此,可以将其与通信领域中使用的任何安全系统集成。
{"title":"DNA and Blum Blum Shub Random Number Generator Based Security Key Generation Algorithm","authors":"Gurpreet Kour Sodhi, G. S. Gaba","doi":"10.14257/IJSIA.2017.11.4.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.4.01","url":null,"abstract":"The communication sector suffers from serious security related threats. The technique presented in this paper is a step towards providing security to the confidential data. The work is based on generating a unique key through DNA and random number generator. Each random sequence produced by Blum Blum Shub random number generator is the result of a seed value which makes the sequence unique and reproducible. The final security key obtained is unique and upon being tested using NIST randomness evaluation tests, it is concluded that the key generated retains its uniqueness to a high level, thus providing efficient security mechanism. Thus, it is possible to integrate it with any security system used in communication sector.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44375337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Steganography and Data Loss Prevention: An overlooked risk? 隐写术和数据丢失预防:一个被忽视的风险?
Pub Date : 2017-04-30 DOI: 10.14257/IJSIA.2017.11.4.06
Juan Gutiérrez-Cárdenas
Steganography is the art or science of hiding information into a carrier in such a way that the hidden data could not be detected at first sight. Steganography techniques have broadened their scope of action, from hiding information into picture media, to audio steganography and to the field of network steganography. All these methods entail a potential threat to the information security policies of any business; having into the data leakage threats its likely focus. In this scenario, business corporations cannot remain blind to these types of threats and should consider adequate policies and prevention techniques to avoid these risks. We have analyzed in this article the potential dangers that an organization could face in the light of these types of steganography techniques along with a review of current commercial software vendors to analyze their offers and mishaps on Data Leakage Prevention regarding steganography risks.
隐写术是一种将信息隐藏到载体中的艺术或科学,其隐藏的数据无法被第一眼发现。隐写技术已经扩大了其作用范围,从将信息隐藏到图像媒体,到音频隐写,再到网络隐写领域。所有这些方法都对任何企业的信息安全策略构成潜在威胁;数据泄露威胁是其可能关注的焦点。在这种情况下,企业不能对这些类型的威胁视而不见,应该考虑适当的策略和预防技术来避免这些风险。在本文中,我们分析了组织在这些类型的隐写技术下可能面临的潜在危险,并回顾了当前的商业软件供应商,以分析他们的产品和有关隐写风险的数据泄漏预防的事故。
{"title":"Steganography and Data Loss Prevention: An overlooked risk?","authors":"Juan Gutiérrez-Cárdenas","doi":"10.14257/IJSIA.2017.11.4.06","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.4.06","url":null,"abstract":"Steganography is the art or science of hiding information into a carrier in such a way that the hidden data could not be detected at first sight. Steganography techniques have broadened their scope of action, from hiding information into picture media, to audio steganography and to the field of network steganography. All these methods entail a potential threat to the information security policies of any business; having into the data leakage threats its likely focus. In this scenario, business corporations cannot remain blind to these types of threats and should consider adequate policies and prevention techniques to avoid these risks. We have analyzed in this article the potential dangers that an organization could face in the light of these types of steganography techniques along with a review of current commercial software vendors to analyze their offers and mishaps on Data Leakage Prevention regarding steganography risks.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48785488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International Journal of Security and Its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1