{"title":"Implementation of a Mobile Agent System to Detect DoS/DDoS Flooding Attacks in Cloud Computing","authors":"Abdelali Saidi, Elmehdi Bendriss, M. E. Marraki","doi":"10.14257/ijsia.2017.11.12.04","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.12.04","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":"35-44"},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41546618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancement of Cloud Security using DNA Inspired Multifold Cryptographic Technique","authors":"Manreet Sohal, Sandeep Sharma","doi":"10.14257/IJSIA.2017.11.12.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.12.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"15-26"},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2017.11.12.02","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45549127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khadijah Chamili, Md. Jan Nordin, W. Ismail, Abduljalil Radman
{"title":"Searchable Encryption: A Review","authors":"Khadijah Chamili, Md. Jan Nordin, W. Ismail, Abduljalil Radman","doi":"10.14257/IJSIA.2017.11.12.07","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.12.07","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"79-88"},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44316317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Solution for Secure Communication for Cross Layer Design in WSN","authors":"R. Saini, Ritika","doi":"10.14257/ijsia.2017.11.12.03","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.12.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"27-34"},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42809227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ISPAS: An Intelligent, Smart Parking Allotment System for Travelling Vehicles in Urban Areas","authors":"A. Tyagi, Sreenath Niladhuri","doi":"10.14257/IJSIA.2017.11.12.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.12.05","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"45-64"},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46527210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation Metrics used in 3D Mesh Watermarking: A Study","authors":"Sagarika Borah, B. Borah","doi":"10.14257/ijsia.2017.11.11.04","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.11.04","url":null,"abstract":"Three Dimensional (3D) models are watermarked to protect their ownership information and to maintain the integrity while transmitted over networked communication. These watermarking operations change the mesh details during data embedding, which in turn affects the perceptual quality or geometrical details of the mesh. There are two different situations where a mesh watermarking technique needs to be evaluated. One of them is to make sure that the watermark embedding function induces minimal perceptual distortion to the original model and the second situation is assessing the similarity between the extracted watermark and the original one to estimate robustness of the watermarking scheme. However surface mesh quality is assessed in two ways: subjective way (observation directly from the human) or objective way where some metrics are formulated by researchers to measure the mesh quality that can meet the human observation. This study covers a detailed discussion of various objective mesh quality assessment metrics proposed for detecting the mesh degradation due to different classes of watermarking techniques. Robustness estimation metrics to assess the similarity of watermarks are also discussed.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"41-52"},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2017.11.11.04","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45588755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Problems of SOA Applications","authors":"M. Q. Saleem","doi":"10.14257/IJSIA.2017.11.11.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.11.03","url":null,"abstract":"Service Oriented Architecture has gained the popularity in the market because workflows of a business process can easily be realized by the composition of services. Post-development stages express the real strength of the SOA paradigm when a new business process can be realized by just composing existing services and a new application is developed by just assembling existing reusable services. However; due to increase in the number of services, connectivity between the services also increases which causes the rise of the security risk exponentially. Security, which is one of the most important aspects of any software system, is often neglected or given less importance while developing SOA applications. This paper compiled the work of different researchers working in the area of SOA security. The focus of the paper is to present the security problems of SOA applications highlighted by the several authors. These security problems must be addressed for the development of secure Services Oriented applications.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"31-40"},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44210226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Text Encryption","authors":"M. Al-Muhammed, R. A. Zitar","doi":"10.14257/IJSIA.2017.11.11.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.11.02","url":null,"abstract":"Although many encryption algorithms achieve high levels of security, they adopt a static computational behavior that is ensured only by the secret key. If the key is predicted, the ciphered text can be easily decrypted, and thus it is unclear how the security of these algorithms will play out given the tremendous increase in processor power and the availability of sophisticated tools that can analyze ciphered text and predict a key. This paper proposes a dynamic approach to encryption in which a static knowledge of symbols and mapping tools is defined, but also in which the computations of the algorithm, and consequently the encryption, is dynamically controlled by adjusting the behavior of the operations. In addition to a key, the dynamic behavior of the algorithm provides additional tools such as masking and mapping rules to protect ciphered. Experiments conducted with our prototype implementation showed that our system is effective with linear execution time and fixed space requirements.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"13-30"},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47140095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning Based Botnet Detection in Software Defined Networks","authors":"Farhan Tariq, S. Baig","doi":"10.14257/IJSIA.2017.11.11.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.11.01","url":null,"abstract":"This paper proposed a flow-based approach to detect botnet by applying machine learning algorithms to software defined networks without reading packet payload. The proposed work uses network flows as input and process it in two windows based modules to extract a statistical feature set to be used for classification. The first module process network flow stream to extract flow traces. The window size of this module is 10 which means a flow trace with 10 flows is considered as a trace of interest and forwarded to the next module for further processing. The second module processes the selected trace and fetches historical flows in last 60-minute window for the source and destination IPs of the trace. The feature set is extracted from selected trace and relevant historical flows. The approach applies supervised decision tree based machine learning algorithm to create a model during a training phase using extracted feature set. This model is then used to classify flow traces during the testing phase. The dataset for experimentation is extracted from publicly available real botnet and normal traces. The experimental findings show that the method is capable to detect unknown botnet. The results show detection rate of 97% for known botnets and 90% for unknown botnets.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":" ","pages":"1-12"},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2017.11.11.01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47055728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing Publish-Subscribe Services with Dynamic Security Protocol in MQTT Enabled Internet of Things","authors":"A. Bashir, A. H. Mir","doi":"10.14257/IJSIA.2017.11.11.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.11.05","url":null,"abstract":"Rapid developments in the field of embedded system, sensor technology, IP addressing and wireless communication are driving the growth of Internet of Things (IoT) in a variety of applications which include environment monitoring, smart manufacturing, e-health and smart agriculture. Due to heterogeneous and constrained nature of IoT nodes, many new security and privacy issues are introduced. IoT devices and systems collect a lot of private data about people, for example an intelligent meter knows when you are home and what devices you use when you are there. This data is shared with other devices and also stored in database or cloud server. Absence of security protocols for these resource constrained smart devices averts their widespread implementation. To address this problem, we propose a mechanism for securing application layer MQTT (Message Queue Telemetry Transport) protocol messages in IoT. The proposed security method for Internet of Things is lightweight in nature and suits well for resource constricted devices. The proposed method counters most of the likely confidentiality attacks in IoT.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"53-66"},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2017.11.11.05","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41837644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}