首页 > 最新文献

International journal of network security & its applications最新文献

英文 中文
Differentially Private Transmission Control Protocol Synchronize Packet Counts 差分私有传输控制协议同步包数
Pub Date : 2019-09-01 DOI: 10.6633/IJNS.201909
N. Mkuzangwe, F. Nelwamondo
Copyright: 2019 International Journal of Network Security. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, kindly consult the publisher's website.
版权所有:2019国际网络安全杂志。由于版权限制,所附PDF文件仅包含全文项的摘要。要获取全文,请咨询出版商的网站。
{"title":"Differentially Private Transmission Control Protocol Synchronize Packet Counts","authors":"N. Mkuzangwe, F. Nelwamondo","doi":"10.6633/IJNS.201909","DOIUrl":"https://doi.org/10.6633/IJNS.201909","url":null,"abstract":"Copyright: 2019 International Journal of Network Security. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, kindly consult the publisher's website.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"29 1","pages":"835-842"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73329061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System Call Dependence Graph Based Behavior Decomposition of Android Applications 基于系统调用依赖图的Android应用程序行为分解
Pub Date : 2019-07-31 DOI: 10.5121/IJNSA.2019.11403
Bin Zhao
Millions of developers and third-party organizations have flooded into the Android ecosystem due to Android’s open-source feature and low barriers to entry for developers. .However, that also attracts many attackers. Over 90 percent of mobile malware is found targeted on Android. Though Android provides multiple security features and layers to protect user data and system resources, there are still some overprivileged applications in Google Play Store or third-party Android app stores at wild. In this paper, we proposed an approach to map system level behavior and Android APIs, based on the observation that system level behaviors cannot be avoidedbut sensitive Android APIs could be evaded.To the best of our knowledge, our approach provides the first work to decompose Android application behaviors based on system-level behaviors. We then map system level behaviors and Android APIs through System Call Dependence Graphs. The study also shows that our approach can effectively identify potential permission abusing, with an almost negligible performance impact.
由于Android的开源特性和较低的准入门槛,数以百万计的开发者和第三方组织涌入了Android生态系统,但这也吸引了许多攻击者。超过90%的手机恶意软件都是针对Android的。尽管Android提供了多种安全功能和层来保护用户数据和系统资源,但在Google Play Store或第三方Android应用商店中仍然存在一些过度特权的应用程序。在本文中,我们提出了一种映射系统级行为和Android api的方法,基于观察到系统级行为无法避免,而敏感的Android api可以逃避。据我们所知,我们的方法提供了基于系统级行为分解Android应用程序行为的第一个工作。然后,我们通过系统调用依赖图映射系统级行为和Android api。研究还表明,我们的方法可以有效地识别潜在的权限滥用,而对性能的影响几乎可以忽略不计。
{"title":"System Call Dependence Graph Based Behavior Decomposition of Android Applications","authors":"Bin Zhao","doi":"10.5121/IJNSA.2019.11403","DOIUrl":"https://doi.org/10.5121/IJNSA.2019.11403","url":null,"abstract":"Millions of developers and third-party organizations have flooded into the Android ecosystem due to Android’s open-source feature and low barriers to entry for developers. .However, that also attracts many attackers. Over 90 percent of mobile malware is found targeted on Android. Though Android provides multiple security features and layers to protect user data and system resources, there are still some overprivileged applications in Google Play Store or third-party Android app stores at wild. In this paper, we proposed an approach to map system level behavior and Android APIs, based on the observation that system level behaviors cannot be avoidedbut sensitive Android APIs could be evaded.To the best of our knowledge, our approach provides the first work to decompose Android application behaviors based on system-level behaviors. We then map system level behaviors and Android APIs through System Call Dependence Graphs. The study also shows that our approach can effectively identify potential permission abusing, with an almost negligible performance impact.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82839248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Chaotic Confusion-Diffusion Image Encryption Based on Henon Map 基于Henon映射的混沌混沌扩散图像加密
Pub Date : 2019-07-31 DOI: 10.5121/ijnsa.2019.11402
Ashraf Afifi
This paper suggests chaotic confusion-diffusion image encryption based on the Henon map. The proposed chaotic confusion-diffusion image encryption utilizes image confusion and pixel diffusion in two levels. In the first level, the plainimage is scrambled by a modified Henon map for n rounds. In the second level, the scrambled image is diffused using Henon chaotic map. Comparison between the logistic map and modified Henon map is established to investigate the effectiveness of the suggested chaotic confusion-diffusion image encryption scheme. Experimental results showed that the suggested chaotic confusion-diffusion image encryption scheme can successfully encrypt/decrypt images using the same secret keys. Simulation results confirmed that the ciphered images have good entropy information and low correlation between coefficients. Besides the distribution of the gray values in the ciphered image has random-like behavior. . KEYWORDS
提出了一种基于Henon映射的混沌混沌扩散图像加密方法。提出的混沌混淆-扩散图像加密算法利用图像混淆和像素扩散两个层次。在第一个关卡中,普通图像被修改后的Henon地图打乱n轮。第二层,利用Henon混沌映射对打乱后的图像进行扩散。通过对logistic映射和改进Henon映射的比较,验证了所提出的混沌混淆扩散图像加密方案的有效性。实验结果表明,所提出的混沌混沌扩散图像加密方案可以使用相同的密钥对图像进行加密/解密。仿真结果表明,加密后的图像具有良好的熵信息和较低的系数相关性。此外,灰度值在加密图像中的分布具有随机性。关键字
{"title":"A Chaotic Confusion-Diffusion Image Encryption Based on Henon Map","authors":"Ashraf Afifi","doi":"10.5121/ijnsa.2019.11402","DOIUrl":"https://doi.org/10.5121/ijnsa.2019.11402","url":null,"abstract":"This paper suggests chaotic confusion-diffusion image encryption based on the Henon map. The proposed chaotic confusion-diffusion image encryption utilizes image confusion and pixel diffusion in two levels. In the first level, the plainimage is scrambled by a modified Henon map for n rounds. In the second level, the scrambled image is diffused using Henon chaotic map. Comparison between the logistic map and modified Henon map is established to investigate the effectiveness of the suggested chaotic confusion-diffusion image encryption scheme. Experimental results showed that the suggested chaotic confusion-diffusion image encryption scheme can successfully encrypt/decrypt images using the same secret keys. Simulation results confirmed that the ciphered images have good entropy information and low correlation between coefficients. Besides the distribution of the gray values in the ciphered image has random-like behavior. . KEYWORDS","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84302319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Authentication Mechanism Enhancement Utilising Secure Repository for Passwordless Handshake 利用安全存储库进行无密码握手的身份验证机制增强
Pub Date : 2019-07-31 DOI: 10.5121/ijnsa.2019.11401
I. Pikrammenos, Panagiotis Tolis, Panagiotis Perakis
This paper suggests chaotic confusion-diffusion image encryption based on the Henon map. The proposed chaotic confusion-diffusion image encryption utilizes image confusion and pixel diffusion in two levels. In the first level, the plainimage is scrambled by a modified Henon map for n rounds. In the second level, the scrambled image is diffused using Henon chaotic map. Comparison between the logistic map and modified Henon map is established to investigate the effectiveness of the suggested chaotic confusion-diffusion image encryption scheme. Experimental results showed that the suggested chaotic confusion-diffusion image encryption scheme can successfully encrypt/decrypt images using the same secret keys. Simulation results confirmed that the ciphered images have good entropy information and low correlation between coefficients. Besides the distribution of the gray values in the ciphered image has random-like behavior.
提出了一种基于Henon映射的混沌混沌扩散图像加密方法。提出的混沌混淆-扩散图像加密算法利用图像混淆和像素扩散两个层次。在第一个关卡中,普通图像被修改后的Henon地图打乱n轮。第二层,利用Henon混沌映射对打乱后的图像进行扩散。通过对logistic映射和改进Henon映射的比较,验证了所提出的混沌混淆扩散图像加密方案的有效性。实验结果表明,所提出的混沌混沌扩散图像加密方案可以使用相同的密钥对图像进行加密/解密。仿真结果表明,加密后的图像具有良好的熵信息和较低的系数相关性。此外,灰度值在加密图像中的分布具有随机性。
{"title":"Authentication Mechanism Enhancement Utilising Secure Repository for Passwordless Handshake","authors":"I. Pikrammenos, Panagiotis Tolis, Panagiotis Perakis","doi":"10.5121/ijnsa.2019.11401","DOIUrl":"https://doi.org/10.5121/ijnsa.2019.11401","url":null,"abstract":"This paper suggests chaotic confusion-diffusion image encryption based on the Henon map. The proposed chaotic confusion-diffusion image encryption utilizes image confusion and pixel diffusion in two levels. In the first level, the plainimage is scrambled by a modified Henon map for n rounds. In the second level, the scrambled image is diffused using Henon chaotic map. Comparison between the logistic map and modified Henon map is established to investigate the effectiveness of the suggested chaotic confusion-diffusion image encryption scheme. Experimental results showed that the suggested chaotic confusion-diffusion image encryption scheme can successfully encrypt/decrypt images using the same secret keys. Simulation results confirmed that the ciphered images have good entropy information and low correlation between coefficients. Besides the distribution of the gray values in the ciphered image has random-like behavior.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"394 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76554674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Generalized Legendre Polynomials for Support Vector Machines (SVMS) Classification 支持向量机(svm)分类的广义Legendre多项式
Pub Date : 2019-07-31 DOI: 10.5121/IJNSA.2019.11406
Ashraf Afifi, E. A. Zanaty
In this paper, we introduce a set of new kernel functions derived from the generalized Legendre polynomials to obtain more robust and higher support vector machine (SVM) classification accuracy. The generalized Legendre kernel functions are suggested to provide a value of how two given vectors are like each other by changing the inner product of these two vectors into a greater dimensional space. The proposed kernel functions satisfy the Mercer’s condition and orthogonality properties for reaching the optimal result with low number support vector (SV). For that, the new set of Legendre kernel functions could be utilized in classification applications as effective substitutes to those generally used like Gaussian, Polynomial and Wavelet kernel functions. The suggested kernel functions are calculated in compared to the current kernels such as Gaussian, Polynomial, Wavelets and Chebyshev kernels by application to various non-separable data sets with some attributes. It is seen that the suggested kernel functions could give competitive classification outcomes in comparison with other kernel functions. Thus, on the basis test outcomes, we show that the suggested kernel functions are more robust about the kernel parameter change and reach the minimal SV number for classification generally.
本文引入了一组由广义Legendre多项式衍生而来的新核函数,以获得更鲁棒和更高的支持向量机(SVM)分类精度。提出了广义勒让德核函数,通过将两个给定向量的内积变换到更大的维度空间中,来提供两个给定向量如何彼此相似的值。所提出的核函数满足Mercer条件和正交性,可以在少量支持向量(SV)下达到最优结果。因此,新的Legendre核函数集可以作为高斯核函数、多项式核函数和小波核函数等常用核函数的有效替代品,用于分类应用。将所提出的核函数应用于具有某些属性的各种不可分数据集,并与现有的高斯核、多项式核、小波核和切比雪夫核等核函数进行了比较。与其他核函数相比,所建议的核函数可以给出有竞争力的分类结果。因此,在测试结果的基础上,我们表明所建议的核函数对核参数变化具有更强的鲁棒性,并且通常达到最小的SV数用于分类。
{"title":"Generalized Legendre Polynomials for Support Vector Machines (SVMS) Classification","authors":"Ashraf Afifi, E. A. Zanaty","doi":"10.5121/IJNSA.2019.11406","DOIUrl":"https://doi.org/10.5121/IJNSA.2019.11406","url":null,"abstract":"In this paper, we introduce a set of new kernel functions derived from the generalized Legendre polynomials to obtain more robust and higher support vector machine (SVM) classification accuracy. The generalized Legendre kernel functions are suggested to provide a value of how two given vectors are like each other by changing the inner product of these two vectors into a greater dimensional space. The proposed kernel functions satisfy the Mercer’s condition and orthogonality properties for reaching the optimal result with low number support vector (SV). For that, the new set of Legendre kernel functions could be utilized in classification applications as effective substitutes to those generally used like Gaussian, Polynomial and Wavelet kernel functions. The suggested kernel functions are calculated in compared to the current kernels such as Gaussian, Polynomial, Wavelets and Chebyshev kernels by application to various non-separable data sets with some attributes. It is seen that the suggested kernel functions could give competitive classification outcomes in comparison with other kernel functions. Thus, on the basis test outcomes, we show that the suggested kernel functions are more robust about the kernel parameter change and reach the minimal SV number for classification generally.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"78 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75082807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Image Encryption Scheme with Huffman Encoding and Steganography Technique 一种基于霍夫曼编码和隐写技术的新型图像加密方案
Pub Date : 2019-07-31 DOI: 10.5121/IJNSA.2019.11404
M. Kumari, V. Pawar, Pawan Kumar
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.
在今天这个时代,当一切都借助于计算机技术完成时,对保密通信的需求急剧增加。不仅是国家最高情报机密这样的敏感数据,普通民众的个人信息也需要保护。过去,研究人员以不同的方式使用了几种加密和隐写技术的组合来保护正在传输的数据。密码学是利用数学算法将数据转换成难以理解的形式,而隐写术则是将数据隐藏在图像、数据、音频或视频等载体中。密码学提供了必要的机制,在互联网等公共通讯媒介上提供问责制、准确性和保密性,而隐写术则用于版权、防止电子文件伪造等其他领域。我们认为,这种安全机制可以进一步增加,通过合并使用霍夫曼编码,以减少数据长度。本文的研究方向是对数据进行隐藏、保护和压缩。它通过逐一应用各种加密技术来解释执行过程,我们的目标是从现有技术中获得最佳安全性。本文在MATLAB2016a中实现了该技术,结果表明,该技术比传统技术更好。
{"title":"A Novel Image Encryption Scheme with Huffman Encoding and Steganography Technique","authors":"M. Kumari, V. Pawar, Pawan Kumar","doi":"10.5121/IJNSA.2019.11404","DOIUrl":"https://doi.org/10.5121/IJNSA.2019.11404","url":null,"abstract":"In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"53 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80733661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Encouraging password manager use 鼓励使用密码管理器
Pub Date : 2019-06-01 DOI: 10.1016/S1353-4858(19)30075-3
K. Renaud, Verena Zimmermann
{"title":"Encouraging password manager use","authors":"K. Renaud, Verena Zimmermann","doi":"10.1016/S1353-4858(19)30075-3","DOIUrl":"https://doi.org/10.1016/S1353-4858(19)30075-3","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"38 1","pages":"20"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78691289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
ENHANCING THE WORDPRESS SYSTEM:FROM ROLE TO ATTRIBUTE-BASED ACCESS CONTROL 增强wordpress系统:从基于角色到基于属性的访问控制
Pub Date : 2019-05-31 DOI: 10.5121/IJNSA.2019.11301
Lifeng Cao, J. Ou, Amir H. Chinaei
Role-Based Access Control (RBAC) is the most commonly used model on web applications. The advantages of RBAC are the ease of understanding, applying and managing privileges. The static RBAC model cannot alter access permission in real-time without human involvement and therefore the model suffers from increasing false negative (and/or false positive) outcomes. Hence, the Attribute-Based Access Control (ABAC) model has been proposed to introduce dynamicity and minimize human involvement in order to enhance security. WordPress is a very popular Role-Based content management system. To our best knowledge, no solution to merge from RBAC to ABAC model for WordPress applications has been found. Our contribution is a WordPress plug-in that we have developed to build ABAC upon the existing RBAC setups. In this journey, we have investigated various scenarios by studying different application categories to come up with an enhanced automatic model that adds real-time grant and revoke feature to WordPress.
基于角色的访问控制(RBAC)是web应用程序中最常用的模型。RBAC的优点是易于理解、应用和管理特权。静态RBAC模型无法在没有人工参与的情况下实时更改访问权限,因此该模型遭受越来越多的假阴性(和/或假阳性)结果的影响。因此,提出了基于属性的访问控制(ABAC)模型,以引入动态性和最小化人为干预来提高安全性。WordPress是一个非常流行的基于角色的内容管理系统。据我们所知,还没有找到WordPress应用程序从RBAC到ABAC模型合并的解决方案。我们的贡献是开发了一个WordPress插件,用于在现有的RBAC设置上构建ABAC。在这个旅程中,我们通过研究不同的应用程序类别来研究各种场景,以提出一个增强的自动模型,该模型为WordPress添加了实时授权和撤销功能。
{"title":"ENHANCING THE WORDPRESS SYSTEM:FROM ROLE TO ATTRIBUTE-BASED ACCESS CONTROL","authors":"Lifeng Cao, J. Ou, Amir H. Chinaei","doi":"10.5121/IJNSA.2019.11301","DOIUrl":"https://doi.org/10.5121/IJNSA.2019.11301","url":null,"abstract":"Role-Based Access Control (RBAC) is the most commonly used model on web applications. The advantages of RBAC are the ease of understanding, applying and managing privileges. The static RBAC model cannot alter access permission in real-time without human involvement and therefore the model suffers from increasing false negative (and/or false positive) outcomes. Hence, the Attribute-Based Access Control (ABAC) model has been proposed to introduce dynamicity and minimize human involvement in order to enhance security. WordPress is a very popular Role-Based content management system. To our best knowledge, no solution to merge from RBAC to ABAC model for WordPress applications has been found. Our contribution is a WordPress plug-in that we have developed to build ABAC upon the existing RBAC setups. In this journey, we have investigated various scenarios by studying different application categories to come up with an enhanced automatic model that adds real-time grant and revoke feature to WordPress.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79056182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SURVEY ON SECURE ROUTING IN VANETS 叶片安全路由的研究
Pub Date : 2019-05-31 DOI: 10.2139/ssrn.3416335
Afef Slama, Ilhem Lengliz
Vehicular Ad Hoc Networks (VANETs) are based on network technology where cars act as mobile nodes to form a communication network. In VANETs, routing protocols have a significance regarding the overall network performance since they determine the way of sending and receiving packets between mobile nodes. Most of the protocols proposed for VANETs are adapted from Mobile ad hoc networks (MANETs) routing protocols. However, due to the specific characteristics of VANETs, especially high mobility, and dynamic topology, the routing protocols in ad hoc networks do not adapt immediately to VANETs. Therefore, secure routing of Vehicular ad hoc networks (VANETs) against attacks, which are of various types, is still a challenging issue. This paper is going to present a synthesis of the most relevant protocols that have addressed the secure routing issue in VANETs. It also establishes a comparison regarding the offered features and the studied performance aspects through which it is notified that a security mechanism depends not only on the level of efficiency but also on the network constraints.
车辆自组织网络(vanet)是基于网络技术,其中汽车作为移动节点形成通信网络。在vanet中,路由协议对整体网络性能具有重要意义,因为它们决定了移动节点之间发送和接收数据包的方式。大多数针对vanet提出的协议都是改编自移动自组织网络(manet)的路由协议。然而,由于vanet的特点,特别是高移动性和动态拓扑结构,自组织网络中的路由协议不能立即适应vanet。因此,车辆自组织网络(vanet)的安全路由抵御各种类型的攻击仍然是一个具有挑战性的问题。本文将综合介绍解决VANETs中安全路由问题的最相关协议。它还建立了关于所提供的特性和所研究的性能方面的比较,通过这种比较,它被告知安全机制不仅取决于效率水平,还取决于网络约束。
{"title":"SURVEY ON SECURE ROUTING IN VANETS","authors":"Afef Slama, Ilhem Lengliz","doi":"10.2139/ssrn.3416335","DOIUrl":"https://doi.org/10.2139/ssrn.3416335","url":null,"abstract":"Vehicular Ad Hoc Networks (VANETs) are based on network technology where cars act as mobile nodes to form a communication network. In VANETs, routing protocols have a significance regarding the overall network performance since they determine the way of sending and receiving packets between mobile nodes. Most of the protocols proposed for VANETs are adapted from Mobile ad hoc networks (MANETs) routing protocols. However, due to the specific characteristics of VANETs, especially high mobility, and dynamic topology, the routing protocols in ad hoc networks do not adapt immediately to VANETs. Therefore, secure routing of Vehicular ad hoc networks (VANETs) against attacks, which are of various types, is still a challenging issue. This paper is going to present a synthesis of the most relevant protocols that have addressed the secure routing issue in VANETs. It also establishes a comparison regarding the offered features and the studied performance aspects through which it is notified that a security mechanism depends not only on the level of efficiency but also on the network constraints.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88780898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET 基于KDD cup 99数据集的入侵检测分类程序
Pub Date : 2019-05-31 DOI: 10.5121/IJNSA.2019.11302
Shaker El-Sappagh, A. Mohammed, Tarek Ahmed AlSheshtawy
In network security framework, intrusion detection is one of a benchmark part and is a fundamental way to protect PC from many threads. The huge issue in intrusion detection is presented as a huge number of false alerts; this issue motivates several experts to discover the solution for minifying false alerts according to data mining that is a consideration as analysis procedure utilized in a large data e.g. KDD CUP 99. This paper presented various data mining classification for handling false alerts in intrusion detection as reviewed. According to the result of testing many procedure of data mining on KDD CUP 99 that is no individual procedure can reveal all attack class, with high accuracy and without false alerts. The best accuracy in Multilayer Perceptron is 92%; however, the best Training Time in Rule based model is 4 seconds . It is concluded that ,various procedures should be utilized to handle several of network attacks.
在网络安全框架中,入侵检测是一个基准部分,是保护PC机免受多线程攻击的基本手段。入侵检测中的一个大问题是大量的假警报;这个问题促使一些专家根据数据挖掘发现最小化错误警报的解决方案,这是在大数据(例如KDD CUP 99)中使用的分析过程中的一个考虑因素。本文对入侵检测中处理虚假警报的各种数据挖掘分类进行了综述。在KDD CUP 99上对多个数据挖掘过程进行了测试,结果表明,该过程不是单个过程,可以揭示所有的攻击类别,具有较高的准确率和无误报的特点。多层感知器的最佳准确率为92%;然而,基于规则的模型的最佳训练时间是4秒。结论是,应对多种网络攻击应采用不同的程序。
{"title":"CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET","authors":"Shaker El-Sappagh, A. Mohammed, Tarek Ahmed AlSheshtawy","doi":"10.5121/IJNSA.2019.11302","DOIUrl":"https://doi.org/10.5121/IJNSA.2019.11302","url":null,"abstract":"In network security framework, intrusion detection is one of a benchmark part and is a fundamental way to protect PC from many threads. The huge issue in intrusion detection is presented as a huge number of false alerts; this issue motivates several experts to discover the solution for minifying false alerts according to data mining that is a consideration as analysis procedure utilized in a large data e.g. KDD CUP 99. This paper presented various data mining classification for handling false alerts in intrusion detection as reviewed. According to the result of testing many procedure of data mining on KDD CUP 99 that is no individual procedure can reveal all attack class, with high accuracy and without false alerts. The best accuracy in Multilayer Perceptron is 92%; however, the best Training Time in Rule based model is 4 seconds . It is concluded that ,various procedures should be utilized to handle several of network attacks.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74186101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
International journal of network security & its applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1