A. O. Isah, J. Alhassan, I. Ismaila, O. S. Adebayo
{"title":"Tracking of Malicious Attacks on Data Online: A Systematic Review","authors":"A. O. Isah, J. Alhassan, I. Ismaila, O. S. Adebayo","doi":"10.14738/tnc.84.9463","DOIUrl":"https://doi.org/10.14738/tnc.84.9463","url":null,"abstract":"Tracking of computer network system attacks is a proactive measure to protect against attacks on data, that are basically encrypted for confidential security reasons, while in transit on the computer information channel. Cyber security threat continues to increase in direct proportion to the rate at which internet based services are deployed. In this systematic review, 53 research papers from reputable publishers were downloaded out of which 41 papers that are closely related to tracking of malicious attackers on encrypted data online were review under the consideration of attacks on encrypted data, and tracking malicious attacks; with respect to proposed technique, problem addressed, comparison to existing methodology, parameters used, major findings and then limitations and future knowledge. The authors then deduce the classification of four varying types of attacks (Keyword Guessing Attack, Selective opening attacks, Leakage-Abuse Attacks, and Key Reinstallation Attacks) from the review, to narrow down research into the future countermeasures for these attacks. 11 research papers actual discuss countermeasures for these classification types, with Keyword Guessing Attack being the focus of 6 research work, Selective Opening Attacks have 3 papers trying to solve vulnerabilities permitting such attacks, 2 papers aimed research solutions at Leakage-Abuse Attacks, and Key Reinstallation Attacks, has mention but none of the papers reviewed proffer mitigation techniques. The remaining 30 papers concentrated discussions on general attacks on encrypted data. Inclining future research attention to the four kinds of attacks against encrypted data will improve attack detection contrary to the commonly post-mortem approach.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114537426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A genetic algorithm to solve the robust design problem for a Flow Network with Node Failure","authors":"Noha Hamdy, M. Hassan, Mohamed Eid Hussein","doi":"10.14738/tnc.84.8949","DOIUrl":"https://doi.org/10.14738/tnc.84.8949","url":null,"abstract":"The robust design problem in a flow network is defined as search optimal node capacity that can be assigned such that the network still survived even under the node’s failure. This problem is considered as an NP-hard. So, this paper proposes a genetic algorithm-based approach to solve it for a flow network with node failure. The proposed based genetic approach is used to assign the optimal capacity for each node to minimize the total capacities and maximize the network reliability. The proposed approach takes the capacity for each critical node should have the maximum capacity (usually equals to the demand value) to alleviate that the reliability to drop to zero. Three network examples are used to show the efficiency of our algorithm. Also, the results obtained by our approach are compared with those obtained by the previous approximate algorithm.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115800657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Magnitude of Effect of Rural Banditry on IFAD-CASP Participating Crop Producers in Zamfara State, Nigeria","authors":"Sanchi Id, S. U., Kaka Y, M. A","doi":"10.14738/dafs.104.13878","DOIUrl":"https://doi.org/10.14738/dafs.104.13878","url":null,"abstract":"The researched analyzed the extent/ magnitude of effects of rural banditry on IFAD-CASP participating crop producers in Zamfara state, Nigeria. Interview schedule and focused group discussion (FGD) were used to collect data from 360 respondents that were selected for the study. A multi stage and simple random sampling technique was used in selecting the respondents. Descriptive statistical tools (mean, percentages, frequency distribution and ranking) were used for data analysis. The results of the study reveals that majority of the respondents were married with an average household size of 8 persons and income level of less than N 20,000 /month. Most of the respondents (50%) indicate that the conflict is very severe resulting to great economic, physical and social effects on the respondents. Majority (70%) of the respondents’ perceived western agricultural zone of the study location as intense conflict area. The results of ranking of ef fect of rural banditry on IFAD-CASP in the study area, indicates poor participation, increased rural poverty, poor supervision of programme, poor economic growth and poor information dissemination were ranked 1 st , 2 nd , 3 rd , and 4 th respectively. Based on the finding of the study, it could be concluded that rural banditry poses poor economic growth, increased rural poverty, poor participation, and poor programme implementation and induces fear and uncertainty. The study therefore, recommend that urgent recruitment of adequate security personnel to patrol the porous borders, prompt enrollment of the vulnerable into government social investment programmes, organize training/seminars for peace building purpose.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115959601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wi-Fi Security Using WEKA","authors":"Khaing Khaing Soe Wai","doi":"10.14738/tnc.83.8253","DOIUrl":"https://doi.org/10.14738/tnc.83.8253","url":null,"abstract":"Wi-Fi is a vital piece of day by day life. Billions of people the world over depend upon Wi-Fi in their homes and organizations, to shop, bank, facilitate life, and remain related. Wireless connectivity devices, for example, phones, Laptops and PCs are by and large progressively utilized by University students to get to learning assets nearby systems and the Internet. Most of the phones offer security shows for relationship with a Wi-Fi router. This paper presents a layout of Wi-Fi security and suggestions as indicated by Wi-Fi organization.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121801238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Security: Simulation and Analysis of TCP SYN Flooded DDOS Attack using WireShark","authors":"Yee Mon Thant","doi":"10.14738/tnc.83.8389","DOIUrl":"https://doi.org/10.14738/tnc.83.8389","url":null,"abstract":"Nowadays Internet of Things (IoTs) technology is significantly entering our daily lives because IoT have widely scope such as security systems, smart industrial environment, vehicles, electronic appliances, wearable devices, healthcare etc. Since these devices are interconnected with each other on the internet to give the various types of services to consumers with various technologies. The emergence of new technology in various fields it also brings up challenges in the area of the forensic investigation. The latest tools and the procedure stream did won't satisfy disseminated and current IoT infrastructure. In recent year, the huge improvement of DDoS assault in IoT network, IoT security has directly gotten to be one of the first concerned points inside the field of network security. SYN flood assault misuses the TCP’ three way handshake handle and all victim's assets are depleted and assist connection requests cannot be considered, so this can be denying the legitimate gets to. The outcomes produced are utilized as evidences to demonstrate that a machine is victimized and is confronting a DDOS attack. In this paper, we have done network analysis for detecting SYN flooded attack on IoT Smart Environment using WireShark.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130979745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Forensics Analysis of ICMP Flooded DDoS Attack using WireShark","authors":"Thazin Tun","doi":"10.14738/tnc.83.8250","DOIUrl":"https://doi.org/10.14738/tnc.83.8250","url":null,"abstract":"The usage of Denial of Service (DoS) and Distributed Denial of Service (DDoS) packets by the assailant may change and dependent on various sorts of administrations and protocols. A flooding DDoS attack depends on an immense volume of assault traffic which is named as a Flooding based DDoS packet. Flooding-based DDoS packet endeavors to block the injured individual's system transfer speed with genuine-looking however undesirable IP information. Because of which Legitimate IP packets can’t arrive at the unfortunate casualty in view of the absence of data transfer capacity asset. Internet Control Message Protocol (ICMP) Flood started by sending countless ICMP packets to a remote host. Thus, the deceived framework's assets will be devoured by taking care of the assaulting packets, which in the long run makes the framework be inaccessible by different customers. In this paper, we distinguish of ICMP Flood DDoS packet by utilizing WireShark.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130165580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Permissions Correlation for Android Apps Using Statistical SVD Approach","authors":"Zon Nyein Nway","doi":"10.14738/tnc.82.8181","DOIUrl":"https://doi.org/10.14738/tnc.82.8181","url":null,"abstract":"Nowadays, almost all the users use Android applications in their smart phones for various reasons Since Android is free operating system, android-apps can be easily downloaded via biggest open app stores and third-party mobile app markets. But these applications were not guaranteed whether these are malware apps or not by legitimate organizations. As mobile phones are glued with most of the people, malware applications threaten all of them for their private information. So, the work of analysis for the apps is very important. The proposed system analyzes the correlation patterns of app’s permissions that must be used in all android apps by developers by using a statistical technique called singular value decomposition (SVD). The analysis phase uses the numbers of malware samples 50 to 300 from https://www.kaggle.com/goorax/static-analysis-of-android-malware-of-2017. The proposed system evaluates the risk level (High, Medium, and Low) of Android applications based on the correlation patterns of permissions. The system accuracy is 85% for both malware and goodware applications. \u0000Nowadays, almost all the users use Android applications in their smart phones for various reasons Since Android is free operating system, android-apps can be easily downloaded via biggest open app stores and third-party mobile app markets. But these applications were not guaranteed whether these are malware apps or not by legitimate organizations. As mobile phones are glued with most of the people, malware applications threaten all of them for their private information. So, the work of analysis for the apps is very important. The proposed system analyzes the correlation patterns of app’s permissions that must be used in all android apps by developers by using a statistical technique called singular value decomposition (SVD). The analysis phase uses the numbers of malware samples 50 to 300 from https://www.kaggle.com/goorax/static-analysis-of-android-malware-of-2017. The proposed system evaluates the risk level (High, Medium, and Low) of Android applications based on the correlation patterns of permissions. The system accuracy is 85% for both malware and goodware applications.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129502035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Strength and Weakness of Regression Analysis and Quartile and IQR Deviation by using Test- Driven Development","authors":"Myint Myint Moe Myint Myint Moe","doi":"10.14738/tnc.82.8117","DOIUrl":"https://doi.org/10.14738/tnc.82.8117","url":null,"abstract":"Test-Driven Development (TDD) derives an evolutionary approach which needs unit test cases to be made before implementation of the code. The goal of this paper is to examine product code quality and programmer productivity using test-driven development approach. This paper establishes regression analysis and quartile & inter-quartile range deviation to evaluate the process effect on external code quality and developer productivity. The results of this paper are that if developer productivity is the actual effect, external code quality will be fewer decreased and external code quality is the actual effect if developer productivity will be fewer reduced. Test-Driven Development can produce the clear of code, simple and bug-release. Defect numbers decreased when automated unit tests are written iteration related to test-driven development. If necessary, the code refactoring is acted TDD. This proposed system evaluates regression analysis and quartile & inter-quartile range deviation based on a fixed time-frame.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128503440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Analysis of Classification Algorithms on Students’ Performance","authors":"N. Aye","doi":"10.14738/tnc.82.8267","DOIUrl":"https://doi.org/10.14738/tnc.82.8267","url":null,"abstract":"Recently educational system, many features control a student’s performance. Students should be well stimulated to study their education. Motivation leads to interest, interest leads to success in their lives. Appropriate assessment of abilities encourages the students to do better in their education. Data mining is to find out patterns by analyzing a large dataset and apply those patterns to predict the possibility of the future events. Data mining is a very critical field in educational area and it provides high potential for the schools and universities. In data mining, there are various classification techniques with various levels of accuracy. This paper focuses to make comparative evaluation of four classifiers such as J48, Naive Bayesian, Bayesian Network and Decision Stump by using WEKA tool. This study is to investigate and identify the best classification technique to analyze and predict the students’ performance of University of Jordan.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122837792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Condition Absolute Stability Control System of Electromagnetoelastic Actuator for Communication Equipment","authors":"S. Afonin","doi":"10.14738/tnc.81.7775","DOIUrl":"https://doi.org/10.14738/tnc.81.7775","url":null,"abstract":"We obtained the condition absolute stability on the derivative for the control system of electromagnetoelastic actuator for communication equipment. We applied the frequency methods for Lyapunov stable control system to calculate the condition absolute stability control system of electromagnetoelastic actuator. We used Yakubovich criterion absolute stability system with the condition on the derivative. The aim of this work is to determine the condition of the absolute stability on the derivative for the control system of electromagnetoelastic actuator. We received the stationary set of the control system of the hysteresis deformation of the electromagnetoelastic actuator. The stationary set is the segment of the straight line.","PeriodicalId":448328,"journal":{"name":"Transactions on Networks and Communications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114397805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}