{"title":"Signs of things to come?","authors":"K. MacMillan","doi":"10.1016/s1353-4858(20)30022-2","DOIUrl":"https://doi.org/10.1016/s1353-4858(20)30022-2","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"15 1","pages":"20"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73012471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dissecting .NET ransomware: key generation, encryption and operation","authors":"Pranshu Bajpai, R. Enbody","doi":"10.1016/s1353-4858(20)30020-9","DOIUrl":"https://doi.org/10.1016/s1353-4858(20)30020-9","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"1 1","pages":"8-14"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77171370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-organization and Autonomous Network Survey","authors":"Houneida Sakly","doi":"10.5121/ijnsa.2020.12102","DOIUrl":"https://doi.org/10.5121/ijnsa.2020.12102","url":null,"abstract":"The autonomic network gathers several aspects of Self-organization, which is depicted, into different autonomous function such as the Self- configuration, the Self-optimization, the Self-repair, the Selfprotection, and the Self-cure. The latter is considered as one of the autonomous functions wished of a system network, which could be described by autonomous behavior is realized by structures of the control loops and loop of control.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"12 1","pages":"19-29"},"PeriodicalIF":0.0,"publicationDate":"2020-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86901579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dynamic Billing System in Smart Grid Using Permissioned Blockchain","authors":"Ozgur Oksuz","doi":"10.5121/CSIT.2020.100106","DOIUrl":"https://doi.org/10.5121/CSIT.2020.100106","url":null,"abstract":"This paper proposes an efficient data aggregation and dynamic billing system that it consists of a permissioned blockchain. This blockchain contains a ledger that keeps users’ anonimized identities and electricity consumption for predefined time ranges. Using consumption data of users, a billing mechanism is able to bill the users accordingly. In the construction, since all the parties in the system have the ledger, every party has the aggregated usage of the electricity without using very heavy cryptographic operations such as homomorphic encryption, bilinear pairing, etc. Using the ledgers in our model, the aggregation of the users’ electricity consumption can be computed by anyone in the system. Moreover, users are able to verify their bills and check any data using a signature scheme. This results that integrity of all data is going to be preserved. The proposed approach mainly uses hash functions to provide the same functionality (aggregation of the users’ data consumption, data integrity check and dynamic pricing and billing) with preserving data privacy of the users.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"108 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76370101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A SURVEY ON THE USE OF DATA CLUSTERING FOR INTRUSION DETECTION SYSTEM IN CYBERSECURITY.","authors":"Binita Bohara, Jay Bhuyan, Fan Wu, Junhua Ding","doi":"10.5121/ijnsa.2020.12101","DOIUrl":"https://doi.org/10.5121/ijnsa.2020.12101","url":null,"abstract":"<p><p>In the present world, it is difficult to realize any computing application working on a standalone computing device without connecting it to the network. A large amount of data is transferred over the network from one device to another. As networking is expanding, security is becoming a major concern. Therefore, it has become important to maintain a high level of security to ensure that a safe and secure connection is established among the devices. An intrusion detection system (IDS) is therefore used to differentiate between the legitimate and illegitimate activities on the system. There are different techniques are used for detecting intrusions in the intrusion detection system. This paper presents the different clustering techniques that have been implemented by different researchers in their relevant articles. This survey was carried out on 30 papers and it presents what different datasets were used by different researchers and what evaluation metrics were used to evaluate the performance of IDS. This paper also highlights the pros and cons of each clustering technique used for IDS, which can be used as a basis for future work.</p>","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"12 1","pages":"1-18"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.5121/ijnsa.2020.12101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39206844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The state of operational technology security","authors":"Steve Mansfield-Devine","doi":"10.1016/s1353-4858(19)30121-7","DOIUrl":"https://doi.org/10.1016/s1353-4858(19)30121-7","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"20 1","pages":"9-13"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81800135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Map Reduce Implementation for Malicious Websites Classification","authors":"Maminur Islam, Subash Poudyal, Kishor Datta Gupta","doi":"10.5121/ijnsa.2019.11503","DOIUrl":"https://doi.org/10.5121/ijnsa.2019.11503","url":null,"abstract":"Due to the rapid growth of the internet, malicious websites [1] have become the cornerstone for internet crime activities. There are lots of existing approaches to detect benign and malicious websites — some of them giving near 99% accuracy. However, effective and efficient detection of malicious websites has now seemed reasonable enough in terms of accuracy, but in terms of processing speed, it is still considered an enormous and costly task because of their qualities and complexities. In this project, We wanted to implement a classifier that would detect benign and malicious websites using network and application features that are available in a data-set from Kaggle, and we will do that using MapReduce to make the classification speeds faster than the traditional approaches.[2].","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"449 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86662608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EUNICERT: Ethereum Based Digital Certificate Verification System","authors":"T. Huynh, Dang Khoa Pham","doi":"10.5121/ijnsa.2019.11502","DOIUrl":"https://doi.org/10.5121/ijnsa.2019.11502","url":null,"abstract":"The fake certificate is a special global problem in today's digital age. Thousands of universities and educational institutions around the world do not exist but can release hundreds of millions of fake degrees. Verifying the integrity of qualifications is a real challenge for today's employers. Applying the anti-data modifying properties of blockchain technology, this study proposes a solution issuing and verifying digital certificates called EUniCert to solve this problem. By changing the design and integrating new consensus algorithm used in Ethereum platform into the Unicoin network that was used to verify and store the information related to the issued digital certificate, the EUniCert improves the latency to validate transactions as well as the number of verified blocks in the blockchain network compared to the previous solution that we have proposed. We implement a simple blockchain system to illustrate the management operation of the digital certificates on the ethereum platform. Besides, we conduct a simulation to evaluate the performance of our proposal compared with the previous system. The result is that the average latency decreases by 3.27 times as well as the number of verified blocks increases by 11% compared with the previous system.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"55 7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90050896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}