Journal of Computer, Internet and Network Security [ISSN: 2457-0176 (online)]

Archives

2017

Vol 2, No 3 (2017): Cloud Technology Using by IOT

Authors: Dr. K. Vikram

Abstract: The Internet of Things continues to develop, further potential is estimated by a combination with related technology approaches and concepts such as Cloud computing, Future Internet, Big Data, robotics and Semantic Technologies The idea is of course not new as such but becomes now evident as those related concepts have started to reveal synergies by combining them

Vol 2, No 3 (2017): Increasing Life Time Energy Using OSLR Protocol

Authors: Nishanth .K, Pankesh .M, Madhan Raj .M, Viva Mary John

Abstract: Mobile Ad-Hoc Network (MANET) is a wireless ad-hoc network comprising of mobile devices which undergo peer to peer routing, to provide network connectivity instead of pre-existing network infrastructure. Despite its simplicity of network infrastructure, however it poses challenges of variable link capacity, dynamic topology, exhaustible battery power of nodes and limited physical security. In MANET, broadcasting is a conventional mechanism carried out to deliver messages from source node to all other nodes in MANET. Flooding is commonly used method for broadcasting of Route Request (RREQ) packet which is prone to broadcast storm problem. As a result, there is a need of an efficient routing strategy to build a reliable route which can neglect high variation of signal strength, collision and draining of battery power. In this paper, a new approach is introduced to rebroadcast based on an efficiency factor called delay and to provide a route repairing procedure against link failures. Our approach also focuses on disseminating neighbour coverage knowledge within nodes in order to avoid duplication problem of RREQ packets. Simulation results of our approach reveal better performance in terms of metrics such as packet delivery ratio, energy consumption and control overhead.

Vol 2, No 3 (2017): Preventing Flood Attacks in Disruption Tolerant Networks

Authors: Ashthoush Pathak, Kavitha .K, Vandana Suman, Srividhya .S

Abstract: In a Disruption Tolerant Networks (DTN), wireless packets are transmitted via neighbour nodes instead of an initial station. Without the management of centralized unit, mobility ad-hoc networks are unprotected to security threats from flooding attacks floated along compromised vertex or interloper. During commune path finding process of AODV protocol, attackers may mischievously deteriorate the broadcast problem to exhaust commune energy and processing resources on legal DTN vertex. When a sender vertex needs a data period with a receiver node, it distribution of a message to its neighbours in a hop-by-hop manner. One critical kind of flooding attacks called data flooding appears to be unavoidably proliferated in Wi-Fi networks. In the data flooding attack system, attackers would send mass amount of data packets with out-of-domain IP address as its destination node. The communicating services organized by all in-between vertex fatigue their energy and processing resources. The implemented system can suppress redundant data packets using the cooperation of receiver node and neighbour nodes within one-hop range of the attacking node. A Petri Net design was developed to model the implemented approach and configure all relevant system aspects in a concise system for successive analysis. Authentication is a process for conforming the originality of system. When authenticate with object, the goal is to conform that have the genuine article. When authenticate with person, the goal is to conform that are not dealing with an imposter.

Vol 2, No 3 (2017): Big Data: Architecture, Applications and Security

Authors: Suraj Kurde, Shraddha Popat

Abstract: Big data is set of large data sets. With changes in requirements and application areas of database systems, expectations from database systems developers had made many changes in system. As application areas have changed, new threats have been introduced. These threats and some security measurements are discussed in this paper.

Vol 2, No 2 (2017): Social Network Content Based P2P File Sharing In Manets Using Ant Colony Optimization

Authors: C. Bharathi Priya, V.Meena

Abstract: Mobile Adhoc Network(MANET) is characterized by constant change that forms connected and disconnected MANETs .Due to the challenges of MANETs ,existing social network file sharing it makes file transfer ineffective for certain applications. Most of file sharing is made through smart phones, laptops and PCs from one system to another. This paper explains sharing of audio file, text files efficiently over the network. Existing P2P content based file sharing system namely Social network-based P2P cOntent-based file sharing in disconnected mObile ad hoc Networks (SPOON), for disconnected MANETs was used widely. For efficient file searching, SPOON groups the common-interest of the nodes that frequently meet with each other as communities. This system uses an interest extraction algorithm to derive node’s interests from its files for content-based file searching. The proposed work is based on social network based file sharing, the objective is to allow users to download media files such as music, movies, and games using a using twitter dataset analysis. Clustering technique is also used to cluster large datasets. Ant colony algorithm(ACO)is the solution to solve optimisation problems in real world. Ants are the agents that move along between nodes in a graph to find the shortest path. This improves the Accuracy, Processing time, Processing cost and file search efficiency.

Vol 2, No 2 (2017): A Study of Various Steganography Techniques for Information Security

Author: Manvi Breja

Abstract: This paper has tried to review completely different steganography techniques for concealment of the information. Steganography has played an importance role due to the exponential growth and secret communication of potential computer users over the internet. It is defined as the study of invisible communication, that deals with the ways of hiding the existence of the communicated message. The cryptography is used for protecting information. The combination of encryption methods of cryptography and steganography enable the user to transmit information, and thus provide more security while transferring data.

Vol 2, No 2 (2017): Privacy Protection Online Social Media Profile

Author: A. Aafiya Thahaseen 

Abstract: Items shared through Social Media may affect more than one user’s privacy e.g., photos that depict multiple users, comments that mention multiple users, events in which multiple users are invited, etc, the lack of multi-party privacy management support in current mainstream Social Media infrastructures makes users unable to appropriately control to whom these items are actually shared or not. Computational mechanisms that are able to merge the privacy preferences of multiple users into a single policy for an item can help solve this problem.

 

However, merging multiple users’ privacy preferences is not an easy task, because privacy preferences may conflict, so methods to resolve conflicts are needed. Moreover, these methods need to consider how users’ would actually reach an agreement about a solution to the conflict in order to propose solutions that can be acceptable by all of the users affected by the item to be shared. Current approaches are either too demanding or only consider fixed ways of aggregating privacy preferences. In this paper, we propose the first computational mechanism to resolve conflicts for multi-party privacy management in Social Media that is able to adapt to different situations by modeling the concessions that users make to reach a solution to the conflicts. We also present results of a user study in which our proposed mechanism outperformed other existing approaches in terms of how many times each approach matched users’ behaviour.

Vol 2, No 1 (2017): A Review on Google Project Loon

Authors: Sudesh L. Farpat, Bhushan Thakare

Abstract: This topic describes an overview of a Balloon-powered Internet for everyone. Currently we are using the internet service through Internet Service Providers to connect globally. Loon purpose is to provide wireless network to remote areas through of a set of high altitude balloon equipped with advanced sophisticated wireless transceivers to connect people globally. This technology could allow developing countries to avoid the using of expensive underground infrastructure.

Vol 2, No 1 (2017): Smart Medicine Box for Patient Using NFC

Authors: Sana Ansari, Amrut Jagtap, Geetanjali Golande , Gauri Bhagat

Abstract: Internet-of-Things (IoT) have great business potential in home healthcare services however, a comprehensive platform is still missing. An intelligent home-based platform, the I-Home HealthIoT, is proposed and implemented in this project. It involves platform for an open-platformbased intelligent medicine box (I-Medi-Box) with enhanced connectivity and interchange ability for the integration of devices and services. Intelligent pharmaceutical packaging (I-Medi pack) with communication capability enabled by functional materials. The proposed platform seamlessly fuses an android application and NFC tags with medical services for improved user experience and service efficiency.

Vol 2, No 1 (2017): Providing Security Using Honey words

Authors: Vignesh Kannathason, Karan Shivarkar, Shantanu Pimpale, S Pawar

Abstract: Jules and Rivest proposed honey words (decoy passwords) to detect attacks against hashed password databases. As per the law, each password has several honey words in order to secure the account from the fraud users. If honey words are selected properly, a cyber-attacker who steals a file of hashed passwords cannot be sure if it is the real password or a honey word for any account. Entering with a honey word to login will trigger an alarm notifying the user about a password file breach. He will get the log list of all the honey word passwords entered by the attacker; he will be notified and will request him to change the current password. How can you come to know if your password is stolen or not? The answer is no u don’t. This is the reason why we will be providing a log file. Password cracking is getting faster day by day. Bots are well programmed that they can crack any passwords by using probability combination method. To avoid these combinational password cracking we are using honewort and when the attacker enters the honey word he will be redirected to honey pot where the fake data files are stored .honey pot will be managed by the administrator. This will reduce brute force attacks secure server called honey checker which can distinguish a user real password among honey words of each user.

Vol 2, No 1 (2017): Current Trends and Security Issues in Wireless Sensor Networks

Author: Kavyashree E.D

Abstract: Wireless Sensor Network (WSN) is a collection of sensor nodes. Sensor nodes are small in size and of low cost, which are operated under the control of central authority known as base station using wireless channel. Wireless sensor network shows a great promise for various futuristic applications like military applications, nuclear power plant, Environment monitoring, health care, target tracking and recognition of physical phenomenon .It has a set of constraints like low computation capability, limited memory, reduced battery life, and lack of infrastructure. Due to extensive use of wireless sensor network in real world data confidentiality must be maintained, so security plays a vital role. The use of this particular network is crucial in many contexts regardless of geographical position and so on. This work brief out the security requirements and outline the current research issues.


2016

Vol 1, No 3 (2016): Study Review on Network Security and Designing Firewalls

M. Pathak

The world today is hostile. Only takes a tiny percentage to do a lot of damage. Daily changes in technology, network security professionals have also been forced to constantly change firewalls, routers and other network device configurations to keep up with this technological pace. Firewalls involve more than the technology to implement them. Specifying a set of filtering rules, known as a policy, is typically complicated and error-prone. High-level languages have been developed to simplify the task of correctly defining a firewall’s policy. Therefore, this paper reviews the that only network security architecture by using firewalls are protect internal and external attacks in modern computer networks.

Vol 1, No 3 (2016): A Novel Approach for Detecting Wormhole Attacks Using Expected Transmission Count Technique

Author: Vartika Sharma

Abstract: Wireless Sensor Networks are emerging as a promising platform for a variety of application areas. However many security issues impede its wide deployment in practice. The nature of the wireless communication, the fast deployment practices, and the hostile environments where they may be deployed, make them vulnerable to a wide range of security attacks. Among these attacks wormhole attack plays a major role. This paper analyzes and finds solution for wormhole attack and enhances the detection of innovative packets which is possibly done by DAWN. We rigorously prove that DAWN guarantees a good bound of successful detection rate. We perform analysis on the resistance of DAWN against collusion attacks. DAWN does not rely on any location information, global synchronization assumptions or special hardware/middleware. It is only based on the local information that can be obtained from regular network coding protocols, and thus the overhead of our algorithms is tolerable. The experimental results have verified the effectiveness and the efficiency of DAWN.

Vol 1, No 2 (2016): A Review: Big data Analysis framework

Authors: Uttam Chauhan, Apurva Shah, Uday Yadav, Mahendra Patel

Abstract: Big data is about high volume and often high velocity data streams with highly diverse data types. To make maximum utilization of massive data, there should be some solid framework to manage the data. In this paper, various architectures have been studied for review. The universal architecture for big data is applicable for common massive data application. In many situations, you may need to react to the current state of data. There is also another class of architecture, real-time big data analysis architecture. Real-time big data architecture is to analyze the stream of online data. Streaming computing is designed to handle a continuous stream of a large amount of unstructured data. Batch mode architecture analyzes the data which are stored earlier. We have also studied RUBA architecture which deals with analysis of real-time data. There is some system which provides recommendation regarding some product or service based on experience of pervious customer or consumer. These types of system collects large amount of data and then analyze them called recommendation system. The architecture of a recommendation system, consumer behavior analysis has been presented here.

Vol 1, No 1 (2016): Image Filtering in Social Networks

Authors: Jisha A K, Aswathy K R, Sharon Mary

Abstract: In the last decade, online social networks (OSNs) have become a popular interactive medium to communicate, share and disseminate a considerable amount of information on human life. Daily and continuous communication implies the exchange of several types of content, including free text, image, audio and video data. The aim of the this paper is to propose and experimentally evaluate an automated system, called Filtered Wall (FW), that can filter out unwanted images from social network user walls. Image filtering is a technique that helps to access and arrange digital images from a large collection of databases by using the images features.



Vol 1, No 1 (2016): Improving the Performance of Web Application using Cloud Technology

Authors' Names: Neelam D.S., Dr. Ramani S

Abstract: Cloud Computing technology is enabling a ubiquitous network access to the shared pool of configurable computing resources. Scalability is critical to the success of many enterprises currently involved in doing business on the web applications and in providing information that may vary drastically from one time to another. Maintaining sufficient resources to meet requirements can be costly. By deploying a web application to Infrastructure-as-a-Service clouds increases the array of virtual machine types with qualitatively defined CPU, disk, and network I/O capabilities. To illustrate these decisions, analysts must: understand how their web applications behaves in the cloud; quantify representative of workloads for execution; and support service level objectives regardless of the performance limits of the hosting infrastructure. In this paper, we introduce a dynamic prediction Algorithm. The Main work has demonstrated the compelling benefits of the Cloud which is capable of handling sudden load balancing, delivering IT resources on-demands to users, and maintaining higher resource utilization across a pool of Virtual Machines, thus reducing infrastructure and management costs


101 - 116 of 116 Items     << < 1 2 3 4 5