International Journal of Security and Its Applications最新文献

筛选
英文 中文
Implementation of a Mobile Agent System to Detect DoS/DDoS Flooding Attacks in Cloud Computing 云计算环境下检测DoS/DDoS泛洪攻击的移动代理系统实现
International Journal of Security and Its Applications Pub Date : 2017-12-31 DOI: 10.14257/ijsia.2017.11.12.04
Abdelali Saidi, Elmehdi Bendriss, M. E. Marraki
{"title":"Implementation of a Mobile Agent System to Detect DoS/DDoS Flooding Attacks in Cloud Computing","authors":"Abdelali Saidi, Elmehdi Bendriss, M. E. Marraki","doi":"10.14257/ijsia.2017.11.12.04","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.12.04","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":"35-44"},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41546618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancement of Cloud Security using DNA Inspired Multifold Cryptographic Technique 使用DNA启发的多重加密技术增强云安全
International Journal of Security and Its Applications Pub Date : 2017-12-31 DOI: 10.14257/IJSIA.2017.11.12.02
Manreet Sohal, Sandeep Sharma
{"title":"Enhancement of Cloud Security using DNA Inspired Multifold Cryptographic Technique","authors":"Manreet Sohal, Sandeep Sharma","doi":"10.14257/IJSIA.2017.11.12.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.12.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"15-26"},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2017.11.12.02","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45549127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Searchable Encryption: A Review 可搜索加密:综述
International Journal of Security and Its Applications Pub Date : 2017-12-31 DOI: 10.14257/IJSIA.2017.11.12.07
Khadijah Chamili, Md. Jan Nordin, W. Ismail, Abduljalil Radman
{"title":"Searchable Encryption: A Review","authors":"Khadijah Chamili, Md. Jan Nordin, W. Ismail, Abduljalil Radman","doi":"10.14257/IJSIA.2017.11.12.07","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.12.07","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"79-88"},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44316317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Security Solution for Secure Communication for Cross Layer Design in WSN WSN中跨层设计的安全通信安全解决方案
International Journal of Security and Its Applications Pub Date : 2017-12-31 DOI: 10.14257/ijsia.2017.11.12.03
R. Saini, Ritika
{"title":"Security Solution for Secure Communication for Cross Layer Design in WSN","authors":"R. Saini, Ritika","doi":"10.14257/ijsia.2017.11.12.03","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.12.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"27-34"},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42809227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISPAS: An Intelligent, Smart Parking Allotment System for Travelling Vehicles in Urban Areas ISPAS:一种用于城市出行车辆的智能智能停车分配系统
International Journal of Security and Its Applications Pub Date : 2017-12-31 DOI: 10.14257/IJSIA.2017.11.12.05
A. Tyagi, Sreenath Niladhuri
{"title":"ISPAS: An Intelligent, Smart Parking Allotment System for Travelling Vehicles in Urban Areas","authors":"A. Tyagi, Sreenath Niladhuri","doi":"10.14257/IJSIA.2017.11.12.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.12.05","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"45-64"},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46527210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Evaluation Metrics used in 3D Mesh Watermarking: A Study 三维网格水印中评价指标的研究
International Journal of Security and Its Applications Pub Date : 2017-11-30 DOI: 10.14257/ijsia.2017.11.11.04
Sagarika Borah, B. Borah
{"title":"Evaluation Metrics used in 3D Mesh Watermarking: A Study","authors":"Sagarika Borah, B. Borah","doi":"10.14257/ijsia.2017.11.11.04","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.11.04","url":null,"abstract":"Three Dimensional (3D) models are watermarked to protect their ownership information and to maintain the integrity while transmitted over networked communication. These watermarking operations change the mesh details during data embedding, which in turn affects the perceptual quality or geometrical details of the mesh. There are two different situations where a mesh watermarking technique needs to be evaluated. One of them is to make sure that the watermark embedding function induces minimal perceptual distortion to the original model and the second situation is assessing the similarity between the extracted watermark and the original one to estimate robustness of the watermarking scheme. However surface mesh quality is assessed in two ways: subjective way (observation directly from the human) or objective way where some metrics are formulated by researchers to measure the mesh quality that can meet the human observation. This study covers a detailed discussion of various objective mesh quality assessment metrics proposed for detecting the mesh degradation due to different classes of watermarking techniques. Robustness estimation metrics to assess the similarity of watermarks are also discussed.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"41-52"},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2017.11.11.04","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45588755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Problems of SOA Applications SOA应用程序的安全问题
International Journal of Security and Its Applications Pub Date : 2017-11-30 DOI: 10.14257/IJSIA.2017.11.11.03
M. Q. Saleem
{"title":"Security Problems of SOA Applications","authors":"M. Q. Saleem","doi":"10.14257/IJSIA.2017.11.11.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.11.03","url":null,"abstract":"Service Oriented Architecture has gained the popularity in the market because workflows of a business process can easily be realized by the composition of services. Post-development stages express the real strength of the SOA paradigm when a new business process can be realized by just composing existing services and a new application is developed by just assembling existing reusable services. However; due to increase in the number of services, connectivity between the services also increases which causes the rise of the security risk exponentially. Security, which is one of the most important aspects of any software system, is often neglected or given less importance while developing SOA applications. This paper compiled the work of different researchers working in the area of SOA security. The focus of the paper is to present the security problems of SOA applications highlighted by the several authors. These security problems must be addressed for the development of secure Services Oriented applications.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"31-40"},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44210226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Text Encryption 动态文本加密
International Journal of Security and Its Applications Pub Date : 2017-11-30 DOI: 10.14257/IJSIA.2017.11.11.02
M. Al-Muhammed, R. A. Zitar
{"title":"Dynamic Text Encryption","authors":"M. Al-Muhammed, R. A. Zitar","doi":"10.14257/IJSIA.2017.11.11.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.11.02","url":null,"abstract":"Although many encryption algorithms achieve high levels of security, they adopt a static computational behavior that is ensured only by the secret key. If the key is predicted, the ciphered text can be easily decrypted, and thus it is unclear how the security of these algorithms will play out given the tremendous increase in processor power and the availability of sophisticated tools that can analyze ciphered text and predict a key. This paper proposes a dynamic approach to encryption in which a static knowledge of symbols and mapping tools is defined, but also in which the computations of the algorithm, and consequently the encryption, is dynamically controlled by adjusting the behavior of the operations. In addition to a key, the dynamic behavior of the algorithm provides additional tools such as masking and mapping rules to protect ciphered. Experiments conducted with our prototype implementation showed that our system is effective with linear execution time and fixed space requirements.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"13-30"},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47140095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Machine Learning Based Botnet Detection in Software Defined Networks 软件定义网络中基于机器学习的僵尸网络检测
International Journal of Security and Its Applications Pub Date : 2017-11-30 DOI: 10.14257/IJSIA.2017.11.11.01
Farhan Tariq, S. Baig
{"title":"Machine Learning Based Botnet Detection in Software Defined Networks","authors":"Farhan Tariq, S. Baig","doi":"10.14257/IJSIA.2017.11.11.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.11.01","url":null,"abstract":"This paper proposed a flow-based approach to detect botnet by applying machine learning algorithms to software defined networks without reading packet payload. The proposed work uses network flows as input and process it in two windows based modules to extract a statistical feature set to be used for classification. The first module process network flow stream to extract flow traces. The window size of this module is 10 which means a flow trace with 10 flows is considered as a trace of interest and forwarded to the next module for further processing. The second module processes the selected trace and fetches historical flows in last 60-minute window for the source and destination IPs of the trace. The feature set is extracted from selected trace and relevant historical flows. The approach applies supervised decision tree based machine learning algorithm to create a model during a training phase using extracted feature set. This model is then used to classify flow traces during the testing phase. The dataset for experimentation is extracted from publicly available real botnet and normal traces. The experimental findings show that the method is capable to detect unknown botnet. The results show detection rate of 97% for known botnets and 90% for unknown botnets.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":"1-12"},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2017.11.11.01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47055728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Securing Publish-Subscribe Services with Dynamic Security Protocol in MQTT Enabled Internet of Things 基于MQTT的物联网动态安全协议保护发布-订阅服务
International Journal of Security and Its Applications Pub Date : 2017-11-30 DOI: 10.14257/IJSIA.2017.11.11.05
A. Bashir, A. H. Mir
{"title":"Securing Publish-Subscribe Services with Dynamic Security Protocol in MQTT Enabled Internet of Things","authors":"A. Bashir, A. H. Mir","doi":"10.14257/IJSIA.2017.11.11.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.11.05","url":null,"abstract":"Rapid developments in the field of embedded system, sensor technology, IP addressing and wireless communication are driving the growth of Internet of Things (IoT) in a variety of applications which include environment monitoring, smart manufacturing, e-health and smart agriculture. Due to heterogeneous and constrained nature of IoT nodes, many new security and privacy issues are introduced. IoT devices and systems collect a lot of private data about people, for example an intelligent meter knows when you are home and what devices you use when you are there. This data is shared with other devices and also stored in database or cloud server. Absence of security protocols for these resource constrained smart devices averts their widespread implementation. To address this problem, we propose a mechanism for securing application layer MQTT (Message Queue Telemetry Transport) protocol messages in IoT. The proposed security method for Internet of Things is lightweight in nature and suits well for resource constricted devices. The proposed method counters most of the likely confidentiality attacks in IoT.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"53-66"},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2017.11.11.05","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41837644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信