keyboard_arrow_up
April 2020: Top Read Articles in Network Security & Its Applications

SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS

    Faheem Masoodi1 Shadab Alam2 and Shams Tabrez Siddiqui2 1 Department of Computer Science, University of Kashmir, J&k, India, 2Department of Computer Science, Jazan University, KSA

    ABSTRACT

    The idea to connect everything to anything and at any point of time is what vaguely defines the concept of the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn significant attention during the past few years, the pace at which new devices are being integrated into the system will profoundly impact the world in a good way but also poses some severe queries about security and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most significant concerns of IoT is to provide security assurance for the data exchange because data is vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where each layer provides a service. The security needs vary from layer to layer as each layer serves a different purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks have been discussed along with some existing and proposed countermeasures.

    KEYWORDS

    Internet of Things, privacy, attacks, security, threats, protocols.


    For More Details :
    http://aircconline.com/ijnsa/V11N2/11219ijnsa05.pdf



MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE

    Abdurrahman Pektaş1, ElifNurdan Pektaş2 and Tankut Acarman1, 1Department of Computer Engineering, Galatasaray University, İstanbul, Turkey, 2Siemens Turkey,Turkey

    ABSTRACT

    In the era of information technology and connected world, detecting malware has been a major security concern for individuals, companies and even for states. The New generation of malware samples upgraded with advanced protection mechanism such as packing, and obfuscation frustrate anti-virus solutions. API call analysis is used to identify suspicious malicious behavior thanks to its description capability of a software functionality. In this paper, we propose an effective and efficient malware detection method that uses sequential pattern mining algorithm to discover representative and discriminative API call patterns. Then, we apply three machine learning algorithms to classify malware samples. Based on the experimental results, the proposed method assures favorable results with 0.999 F-measure on a dataset including 8152 malware samples belonging to 16 families and 523 benign samples.

    KEYWORDS

    Android, Malware, Frequent Sequence Mining, Behavioural Pattern, API Calls, Dynamic Analysis


    For More Details :
    http://aircconline.com/ijnsa/V10N4/10418ijnsa01.pdf



ARCHITECTURE FOR INTRUSION DETECTION SYSTEM WITH FAULT TOLERANCE USING MOBILE AGENT

    ChintanBhatt1 ,Asha Koshti2 ,Hemant Agrawal3 , Zakiya Malek4 , DrBhushan Trivedi5, MCA Dept.,GLS Institute of Computer Technology, Ahmedabad, India

    ABSTRACT

    This paper is a survey of the work, done for making an IDS fault tolerant.Architecture of IDS that uses mobile Agent provides higher scalability. Mobile Agent uses Platform for detecting Intrusions using filter Agent, co-relater agent, Interpreter agent and rule database. When server (IDS Monitor) goes down, other hosts based on priority takes Ownership. This architecture uses decentralized collection and analysis for identifying Intrusion. Rule sets are fed based on user-behaviour or applicationbehaviour.This paper suggests that intrusion detection system (IDS) must be fault tolerant; otherwise, the intruder may first subvert the IDS then attack the target system at will.

    KEYWORDS

    Fault tolerance, Mobile Agent, Intrusion Detection System


    For More Details :
    http://airccse.org/journal/nsa/0911nsa13.pdf



IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY

    Moussa WITTI and Dimitri KONSTANTAS ,Information Science Institute University,Switzerland

    ABSTRACT

    The increase of smart devices has accelerated sensitive data exchange on the Internet using most of the time unsecured channels. Since a massive use of RFID (Radio-frequency Identification) tags in the transportation and construction industries from 1980 to 1990, with the expanded use of the Internet with 2G/3G or 4G since 2000, we are witnessing a new era of connected objects. A huge number of heterogeneous sensors may collect and dispatch sensitive data from an endpoint to worldwide network on the Internet. Privacy concerns in IOT remain important issues in the research. In this paper, we aim to evaluate current research state related to privacy and security in IOT by identifying existing approaches and publications trends. Therefore, we have conducted a systematic mapping study using automated searches from selected relevant academics databases. The result of this mapping highlights research type and contribution in different facets and research activities trends in the topic of “security and privacy” in IoT edge, cloud and fog environment.

    KEYWORDS

    Internet of Thing, privacy, security, the mapping study


    For More Details :
    http://aircconline.com/ijnsa/V10N6/10618ijnsa03.pdf



A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHNIQUE

    ManjuKumari1 ,Vipin Pawar2 and Pawan Kumar3 1YMCA University of Science and Technology, Faridabad, India 2Deenbandhu Chotu Ram University of Science and Technology, Murthal, India, 3Department of Mathematics, Maitreyi College, University of Delhi, Chanakyapuri, India

    ABSTRACT

    In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.

    KEYWORDS

    Cryptography; Steganography; Huffman Coding; Data Compression.


    For More Details :
    http://aircconline.com/ijnsa/V11N4/11419ijnsa04.pdf







menu
Reach Us

emailsecretary@cseij.org


emailcseijsecretary@yahoo.com

close