Pub Date : 2018-05-31DOI: 10.14257/IJSIA.2018.12.3.04
Muhammad Salman, Rizki Yugitama, Amiruddin, R. F. Sari
{"title":"KAMIES: Security Optimization of KASUMI Algorithm by Increasing Diffusion Level","authors":"Muhammad Salman, Rizki Yugitama, Amiruddin, R. F. Sari","doi":"10.14257/IJSIA.2018.12.3.04","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.3.04","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49176052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-31DOI: 10.14257/IJSIA.2018.12.3.03
Ahmed Khan, Aaliya Sarfaraz
The publication generally focuses on the security configuration and monitoring of wireless local area networks (WLANs) which are extensively being used by various organizations. Wireless Local Area Networks (WLANs) presents an exceptional challenge for the different organizations that are using Wireless Local Area Networks [1]. Over the years, the percentage of attacks on Wireless Local Area Networks has been increased, which as a result has compelled the organizations and users of WLAN to rethink about their WLAN security. The publication is a way forward for improving the standards of security and monitoring of the wireless local area networks (WLANs) and the devices which connect to those networks by giving pertinent recommendations. The article is really helpful for all those who are associated with the planning, implementation, maintenance and monitoring of the security of the wireless local area networks of a particular organization and all the devices that are connected to these WLAN like network professionals, security professionals, system administrators and all other entities related with the security of an organization’s network. The scope of the publication is restricted to wireless networks that are unclassified and also the unclassified facilities that fall within range of such wireless networks.
{"title":"Practical Guidelines for Securing Wireless Local Area Networks (WLANs)","authors":"Ahmed Khan, Aaliya Sarfaraz","doi":"10.14257/IJSIA.2018.12.3.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.3.03","url":null,"abstract":"The publication generally focuses on the security configuration and monitoring of wireless local area networks (WLANs) which are extensively being used by various organizations. Wireless Local Area Networks (WLANs) presents an exceptional challenge for the different organizations that are using Wireless Local Area Networks [1]. Over the years, the percentage of attacks on Wireless Local Area Networks has been increased, which as a result has compelled the organizations and users of WLAN to rethink about their WLAN security. The publication is a way forward for improving the standards of security and monitoring of the wireless local area networks (WLANs) and the devices which connect to those networks by giving pertinent recommendations. The article is really helpful for all those who are associated with the planning, implementation, maintenance and monitoring of the security of the wireless local area networks of a particular organization and all the devices that are connected to these WLAN like network professionals, security professionals, system administrators and all other entities related with the security of an organization’s network. The scope of the publication is restricted to wireless networks that are unclassified and also the unclassified facilities that fall within range of such wireless networks.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41751992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-31DOI: 10.14257/IJSIA.2018.12.3.02
M. Sayegh, Karine Aoun Barakat
{"title":"Privacy and Disclosure: Customer Attitudes Towards the Use of Big Data by Retail Companies","authors":"M. Sayegh, Karine Aoun Barakat","doi":"10.14257/IJSIA.2018.12.3.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.3.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48346153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-31DOI: 10.14257/ijsia.2018.12.3.01
N. Thirupathi Rao, C. Sekhar, D. Bhattacharyya, Tai-hoon Kim
{"title":"Some Studies on the Security and Space Issues and Challenges in Cloud Computing based Data Centers","authors":"N. Thirupathi Rao, C. Sekhar, D. Bhattacharyya, Tai-hoon Kim","doi":"10.14257/ijsia.2018.12.3.01","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.3.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42691192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-31DOI: 10.14257/IJSIA.2018.12.2.01
Atheer Bassel, J. Nordin, Mohammed B. Abdulkareem
{"title":"An Invisible Image Watermarking Based On Modified Particle Swarm Optimization (PSO) Algorithm","authors":"Atheer Bassel, J. Nordin, Mohammed B. Abdulkareem","doi":"10.14257/IJSIA.2018.12.2.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2018.12.2.01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41313745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-31DOI: 10.14257/IJSIA.2018.12.2.02
Nur Farhana Hordri, Noor Azurati Ahmad, S. Yuhaniz, S. Sahibuddin, A. Ariffin, Nur Afifah Mohd Saupi, N. Zamani, Yasmin Jeffry, Mohamad Firham Efendy Md. Senan
Context: Malware is a variety of forms of hostile or intrusive software that being thrown around online. Data analytics is the process of examining data sets in order to draw conclusions about information they contain, increasingly with the aid of specialized systems and software. Objectives: The aims of the study are to identify the types of malware analytics and identify the purpose of malware analytics. Method: A Systematic Literature Review (SLR) was carried out and reported based on the preferred reporting items for systematic reviews. 1114 papers were retrieved by manual search in six databases which are IEEE, Science Direct, Taylor and Francis, ACM, Wiley and Springer Link. 53 primary studies were finally included. Results: From these studies, 70% were conference papers and 30% were journal articles. Five classification of malware analytics techniques were identified and analysed. The classifications are (1) descriptive analytics, (2) diagnostic analytics, (3) predictive analytics, (4) prescriptive analytics and (5) visual analytics. Conclusion: This review delivers the evidence that malware analytics is an active research area. The review provides researchers with some guidelines for future research on this topic. It also provides broad information on malware analytics techniques which could be useful for practitioners.
背景:恶意软件是各种形式的恶意或侵入性软件,被扔在网上。数据分析是检查数据集的过程,目的是得出关于其中包含的信息的结论,越来越多地借助专门的系统和软件。目的:本研究的目的是确定恶意软件分析的类型和确定恶意软件分析的目的。方法:进行系统文献综述(SLR),并根据系统评价的首选报告项目进行报告。在IEEE、Science Direct、Taylor and Francis、ACM、Wiley和施普林格Link 6个数据库中人工检索论文1114篇,最终纳入53篇主要研究。结果:这些研究中,70%为会议论文,30%为期刊论文。识别并分析了五种类型的恶意软件分析技术。分类是(1)描述性分析,(2)诊断性分析,(3)预测性分析,(4)规定性分析和(5)可视化分析。结论:这篇综述提供了恶意软件分析是一个活跃的研究领域的证据。该综述为今后的研究提供了一些指导。它还提供了关于恶意软件分析技术的广泛信息,这可能对从业者有用。
{"title":"Classification of Malware Analytics Techniques: A Systematic Literature Review","authors":"Nur Farhana Hordri, Noor Azurati Ahmad, S. Yuhaniz, S. Sahibuddin, A. Ariffin, Nur Afifah Mohd Saupi, N. Zamani, Yasmin Jeffry, Mohamad Firham Efendy Md. Senan","doi":"10.14257/IJSIA.2018.12.2.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.02","url":null,"abstract":"Context: Malware is a variety of forms of hostile or intrusive software that being thrown around online. Data analytics is the process of examining data sets in order to draw conclusions about information they contain, increasingly with the aid of specialized systems and software. Objectives: The aims of the study are to identify the types of malware analytics and identify the purpose of malware analytics. Method: A Systematic Literature Review (SLR) was carried out and reported based on the preferred reporting items for systematic reviews. 1114 papers were retrieved by manual search in six databases which are IEEE, Science Direct, Taylor and Francis, ACM, Wiley and Springer Link. 53 primary studies were finally included. Results: From these studies, 70% were conference papers and 30% were journal articles. Five classification of malware analytics techniques were identified and analysed. The classifications are (1) descriptive analytics, (2) diagnostic analytics, (3) predictive analytics, (4) prescriptive analytics and (5) visual analytics. Conclusion: This review delivers the evidence that malware analytics is an active research area. The review provides researchers with some guidelines for future research on this topic. It also provides broad information on malware analytics techniques which could be useful for practitioners.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"9-18"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42472902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-31DOI: 10.14257/IJSIA.2018.12.2.06
A. Siahaan
{"title":"Rabin-Karp Elaboration in Comparing Pattern Based on Hash Data","authors":"A. Siahaan","doi":"10.14257/IJSIA.2018.12.2.06","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.06","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"59-66"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2018.12.2.06","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47273205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-31DOI: 10.14257/IJSIA.2018.12.2.05
Manal Al-Sharrah, Mohammad A. Alkandari
{"title":"Towards a More Secured Solution in RDP: On-Demand Desktop Local Admin Rights","authors":"Manal Al-Sharrah, Mohammad A. Alkandari","doi":"10.14257/IJSIA.2018.12.2.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.05","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"45-58"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43790756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-31DOI: 10.14257/IJSIA.2018.12.2.07
N. Thirupathi Rao, P. Srinivas, D. Bhattacharyya, Tai-hoon Kim
{"title":"A Detailed Review on Mobile Ad Hoc Networks: Protocols, Security Issues and Challenges","authors":"N. Thirupathi Rao, P. Srinivas, D. Bhattacharyya, Tai-hoon Kim","doi":"10.14257/IJSIA.2018.12.2.07","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.07","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"67-78"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47793399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-31DOI: 10.14257/IJSIA.2018.12.2.03
Anurag Singh Tomar, Sumit Kumar, S. K. Chaurasiya, Vanshika Shrivastava
{"title":"Novel Approach for E-passport Authentication using Elgamal Cryptosystem","authors":"Anurag Singh Tomar, Sumit Kumar, S. K. Chaurasiya, Vanshika Shrivastava","doi":"10.14257/IJSIA.2018.12.2.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"12 1","pages":"19-28"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43828571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}