In this paper we propose techniques for securing big data environments such as public cloud with tenants using their virtual machines for different services such as utility and healthcare. Our model makes use of state based monitoring of... more
In this paper we propose techniques for securing big data environments such as public cloud with tenants using their virtual machines for different services such as utility and healthcare. Our model makes use of state based monitoring of the data sources for service specific detection of the attacks and offline traffic analysis of multiple data sources to detect attacks such as botnets.
Secure software development has received lots of attention in recent years due to the rise of security breaches attributed to software problems. There have been several studies that address software security from different perspectives:... more
Secure software development has received lots of attention in recent years due to the rise of security breaches attributed to software problems. There have been several studies that address software security from different perspectives: security requirements, security modeling, security testing, security best practices and standards, static and dynamic analysis tools, etc. However, there has been no or little research done in the area of secure programming languages. Therefore, language–level support for secure coding warrants further attention and interest. This work is an attempt to shed light on the requirements in terms of language constructs that must be available in popular and widely used object-oriented programming languages to build secure software. This research work focuses on the most common security vulnerabilities and proposes mitigation strategies in terms of language-level constructs and mechanisms.
In current era, the proliferation of IoT devices has transformed our daily life to a new level and made our life easier. IoT devices have interconnected with each other for communing and sharing information to gateways or Access Points... more
In current era, the proliferation of IoT devices has transformed our daily life to a new level and made our life easier. IoT devices have interconnected with each other for communing and sharing information to gateways or Access Points (APs) for further processing of data. However, this provides growth to cybersecurity and zero-day attacks in IoT networks. In this paper, we have reviewed the deep learning models and datasets which are used to detect malicious data in an IoT ecosystem. We have observed that the combination of Long Short-Term Memory (LSTM) and Convolution Neural Network (CNN), LSTM, and stacked auto-encoders have better accuracy and precision for detecting malicious packets in the IoT environment. Moreover, a detailed theoretical analysis of deep learning models and datasets is also performed. This review provides a pathway for the new researchers to conduct research in IoT security and privacy issues by making these findings as references.
Voice over IP (VoIP) is the technology allowing voice and multimedia transmissions as data packets over a private or a public IP network. Thanks to the benefits that it may provide, the VoIP technology is increasingly attracting attention... more
Voice over IP (VoIP) is the technology allowing voice and multimedia transmissions as data packets over a private or a public IP network. Thanks to the benefits that it may provide, the VoIP technology is increasingly attracting attention and interest in the industry. Actually, VoIP allows significant benefits for customers and communication services providers such as cost savings, rich media service, phone and service portability, mobility, and the integration with other applications. Nevertheless, the deployment of the VoIP technology encounters many challenges such as architecture complexity, interoperability issues, QoS issues, and security concerns. Among these disadvantages, VoIP security issues are becoming more serious because traditional security devices, protocols, and architectures cannot adequately protect VoIP systems from recent intelligent attacks. The aim of this paper is carry out a deep analysis of the security concerns of the VoIP technology. Firstly, we present a...
A Mobile ad-hoc network (MANET) is a latest and emerging Research topic among researchers. The reason behind the popularity of MANET is flexibility and independence of network infrastructure. MANET has some unique characteristic like... more
A Mobile ad-hoc network (MANET) is a latest and emerging Research topic among researchers. The reason behind the popularity of MANET is flexibility and independence of network infrastructure. MANET has some unique characteristic like dynamic network topology, limited power and limited bandwidth for communication. MANET has more challenge compare to any other conventional network. However the dynamical network topology of MANETs, infrastructure-less property and lack of certificate authority make the security problems of MANETs need to pay more attention. This paper represents review of layer wise security attacks. It also discussed the issues and challenges of mobile ad hoc network. On the importance of security issues, this paper proposed intrusion detection framework for detecting network layer threats such as black hole attack.
E-commerce Security is a part of the Information Security framework and is specifically applied to the components that affect e-commerce that include Computer Security, Data security and other wider realms of the Information Security... more
E-commerce Security is a part of the Information Security framework and is specifically applied to the components that affect e-commerce that include Computer Security, Data security and other wider realms of the Information Security framework. Authentication of an e-commerce smart card transaction is the process through which a merchant verifies the validity of the payment information provided by the customer. The process involves the verification of both the cardholder's identity and the card's authenticity. Address Verification Service enables merchants who accept credit card payments in a non-face-to-face setting to compare the billing address (the address to which the card issuer sends its monthly statement for that account) provided by a customer to the billing address on the card issuer's file before processing a transaction. Ecommerce offers the banking industry great opportunity, but also creates a set of new risks and vulnerability such as security threats. Information security, therefore, is an essential management and technical requirement for any efficient and effective Payment transaction activities over the internet.
With the widespread use of mobile technologies, the importance of cybersecurity is increasing in our country as well as all over the world. Android operating system-based smartphones and tablets used in mobile technologies are frequently... more
With the widespread use of mobile technologies, the importance of cybersecurity is increasing in our country as well as all over the world. Android operating system-based smartphones and tablets used in mobile technologies are frequently in use for communication, social networking, banking, and payment transactions and become an important part of developing technology. Although the Android operating system is among the most popular operating systems, one of the biggest challenges faced by android users and developers is to ensure the security of the operating system. In this research, the security mechanism was examined with the android operating system architecture, and the exploitation of android vulnerabilities scenarios was created. These scenarios were carried out on various examples using the Smart Pentester Framework (SPF) tool. Also, by examining the sources in the literature, exploitations of android vulnerabilities are classified into categories. Based on the created classification and the exploitation methods scenarios taking place in the virtual environment built on Kali Linux, it is aimed to raise awareness of android operating system users and developers against possible risks.
The recent explosive growth of mobile data traffic, the continuously growing demand for higher data rates, and the steadily increasing pressure for higher mobility have led to the fifth-generation mobile networks. To this end,... more
The recent explosive growth of mobile data traffic, the continuously growing demand for higher data rates, and the steadily increasing pressure for higher mobility have led to the fifth-generation mobile networks. To this end, network-coding (NC)-enabled mobile small cells are considered as a promising 5G technology to cover the urban landscape by being set up on-demand at any place, and at any time on any device. In particular, this emerging paradigm has the potential to provide significant benefits to mobile networks as it can decrease packet transmission in wireless multicast, provide network capacity improvement , and achieve robustness to packet losses with low energy consumption. However, despite these significant advantages, NC-enabled mobile small cells are vulnerable to various types of attacks due to the inherent vulnerabilities of NC. Therefore, in this paper, we provide a categorization of potential security attacks in NC-enabled mobile small cells. Particularly, our focus is on the identification and categorization of the main potential security attacks on a scenario architecture of the ongoing EU funded H2020-MSCA project "SECRET" being focused on secure network coding-enabled mobile small cells.
Mobile Ad Hoc networks are networks in which users, regardless of geographical locations, can have access to its information and services. These networks are divided into 2 categories: network with structure and network without structure... more
Mobile Ad Hoc networks are networks in which users, regardless of geographical locations, can have access to its information and services. These networks are divided into 2 categories: network with structure and network without structure or Ad Hoc. Network structures are composed of fixed gates and wired networks. A mobile host can communicate with the other through a bridge called base station. A mobile host can move geographically while communicating when the host is out of the domain of a base station, it will be connected to another base station and will continue the communication,in this method the base stations are fixed. In contrast to a network structure, all nodes are portable in an Ad Hoc network and communicate dynamically and with a preferred method. All of the nodes in this network act as a router and engage in discovering and route a intenance[1].The major problem of these networks designing is that these are vulnerable to security attacks. In this paper, the threats aAd Hocnetwork and also security objectives against these threats will be reviewed and some important routing protocols for these kinds of networks, are compared and evaluated. This comparison, unlike previous comparisons, covers wide range of protocols and develops software NS2.
Mobile Ad Hoc networks are networks in which users, regardless of geographical locations, can have access to its information and services. These networks are divided into 2 categories: network with structure and network without structure... more
Mobile Ad Hoc networks are networks in which users, regardless of geographical locations, can have access to its information and services. These networks are divided into 2 categories: network with structure and network without structure or Ad Hoc. Network structures are composed of fixed gates and wired networks. A mobile host can communicate with the other through a bridge called base station. A mobile host can move geographically while communicating when the host is out of the domain of a base station, it will be connected to another base station and will continue the communication,in this method the base stations are fixed. In contrast to a network structure, all nodes are portable in an Ad Hoc network and communicate dynamically and with a preferred method. All of the nodes in this network act as a router and engage in discovering and route a intenance[1].The major problem of these networks designing is that these are vulnerable to security attacks. In this paper, the threats a...
Wireless sensor networks (WSNs) have been the subject of intensive research in the past few years and the backbone of most maximum present information technology. WSNs have been employed in various applications such as track monitoring... more
Wireless sensor networks (WSNs) have been the subject of intensive research in the past few years and the backbone of most maximum present information technology. WSNs have been employed in various applications such as track monitoring battlegrounds in military fields and patients' medical requirements in the civilian field. The wireless sensor networks are always randomly distributed in an open area (hostile), pervasive environment, and open media channel. Thus, WSNs are vulnerable to several species of attacks. Moreover, messages may be easily intercepted or altered because the transmission is not secure, hence effective key management scheme is strongly needed to reduce the risks. Cryptography methods are a crucial aspect of WSNs to reach security goals. In this paper, we propose an efficient and secure message transmission scheme that combines the Knapsack algorithm with the Diffie-Hellmann process to encrypt messages. The results and analysis show that the proposed scheme is efficient and it achieves most of the security goals providing high privacy and security. It is also resilient against some of the well-known attacks.
This Electronic commerce or e-commerce is currently one of the most significant aspects of the Internet to emerge. It covers a range of different types of businesses, Smart cards today perceive epidemic growth as a secure and favourable... more
This Electronic commerce or e-commerce is currently one of the most significant aspects of the Internet to emerge. It covers a range of different types of businesses, Smart cards today perceive epidemic growth as a secure and favourable identification and authentication schemes with various applications like using control system, driving license, Epassports, E-commerce business etc., and the list is expanding. During recent years, cryptographic approaches have been applied to remove these problems. Among these approaches, Dynamic Id protocols have been played a vital role in providing secure communications. ID-based authentication scheme which can reduce all kinds of security flaws. The functionally, performance and security analysis show that current methodology is feasible in terms of computation cost, storage capacity and the scheme can resist server attack.
In today's world, social networks are very common. Various types of social networks are used by millions of users and they enable people to communicate with friends and relatives while still allowing them to exchange private details.... more
In today's world, social networks are very common. Various types of social networks are used by millions of users and they enable people to communicate with friends and relatives while still allowing them to exchange private details. However, problems with preserving a user's information's privacy and protection may arise, particularly where the user's posted material is multimedia, such as images, videos, and audios. Uploaded multimedia material contains knowledge that can be spread virally and nearly instantly inside and outside of a social networking platform. Any business must also have a stable network. Every day, new security threats emerge, making high-speed wired and wireless networks, as well as internet links, insecure and inefficient. Security measures strategies nowadays are more oriented on satisfying the cutting-edge needs of today's rapidly growing industries. In areas like privacy, where secure and authenticated resource access is one of the most critical facets of information security, the need is often triggered. The author of this paper has summarised the necessary steps and criteria for establishing a reliable network in the context of large industry/organizational needs. Wi-Fi networks are commonly used to link different services to cellular networks and to wirelessly connect numerous computers. Various requirements are needed to cope with Wi-Fi attacks and network hacking attempts. The aim of this paper is to create a fully secure and privacy network infrastructure in an organisation by looking at main security techniques for different network scenarios. The author used a case study to show the absolute minimum of security protocols that must be applied in any business. Furthermore, we concentrate on different risks that occur as a result of the distribution of multimedia material on a social networking platform separately. We will go through the most up-to-date security options for protecting social network service consumers against these attacks. Then, in order to accomplish the aim of a trustworthy and stable social network ecosystem, we propose future directions and explore several simple solution strategies.
Importance of security in ad-hoc networks is increasing due to a tremendous boon in mobile equipment usage. Due to the characteristic of ad hoc network being decentralized, wireless and infrastructure-less makes it vulnerable to various... more
Importance of security in ad-hoc networks is increasing due to a tremendous boon in mobile equipment usage. Due to the characteristic of ad hoc network being decentralized, wireless and infrastructure-less makes it vulnerable to various attacks that cause disruption in the network. In order to provide possible security measures to handle the malicious activity in the network, security services are made sure to be implied. This paper includes a study of the required security goals to be achieved by the network and possible attacks that might result in alteration of network functionality. Vaishali Tyagi | Dr. Parul Tomar"Review on Various Security Attacks in Ad-Hoc Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15830.pdfhttp://www.ijtsrd.com/computer-science/computer-security/15830/review-on-various-security-attacks-in-ad-hoc-net...