International Journal of Computer Network and Information Security (IJCNIS)

IJCNIS Vol. 5, No. 5, Apr. 2013

Cover page and Table of Contents: PDF (size: 131KB)

Table Of Contents

REGULAR PAPERS

Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals

By Zhukov Igor Mikhaylov Dmitry Starikovskiy Andrey Kuznetsov Dmitry Tolstaya Anastasia Zuykov Alexander

DOI: https://doi.org/10.5815/ijcnis.2013.05.01, Pub. Date: 8 Apr. 2013

This paper deals with the description of the threats to mobile devices and suggests the security software that provides comprehensive protection of personal data and mobile telephone from malware and illegal activity of cyber criminals. The developed security software Green Head protects personal smartphones of majority of brands from spam, viruses and unauthorized access. It is an innovative software product ensuring information security of mobile phones from all currently existing threats that today does not have any full analogs. Green Head security software warns the user about wiretapping, which keeps professional and personal confidential information intact. The developed security software is universal for people using mobile phones in professional and personal life because any stored information is protected from various attacks.

[...] Read more.
The Design and Development of Real-Time EVoting System in Nigeria with Emphasis on Security and Result Veracity

By Shafii Muhammad Abdulhamid Olawale Surajudeen Adebayo Damian Oshomah Ugiomoh Mohammed Danlami AbdulMalik

DOI: https://doi.org/10.5815/ijcnis.2013.05.02, Pub. Date: 8 Apr. 2013

Elections are believed to be the key pillars of democracy and voting is one of the electoral processes that ensure the sustenance of democracy in any civil society. In this paper, we developed an electronic voting system, which will eliminate rigging and manipulation of results to its barest minimum, this problem is mostly associated with the manual system of voting. The implementation of electronic voting system in Nigeria will boost the integrity of INEC and the result they produce. The programs used to develop this system are PHP, MySQL, Java Query, CSS and HTML. These packages make the Graphic Interface User friendly enough for even those with little or no computer knowledge.

[...] Read more.
Criteria Specifications for the Comparison and Evaluation of Access Control Models

By Shabnam Mohammad Hasani Nasser Modiri

DOI: https://doi.org/10.5815/ijcnis.2013.05.03, Pub. Date: 8 Apr. 2013

Nowadays, information systems cover all-important aspects of people's life, and computer applications are vastly used in widespread fields from medicine to military sector. Because of considerable dependence on computer-based systems, the security of the information saved in these systems is of great concern, and therefore, the complexity of data protection and availability of many modern systems are increasing. Access control is considered as the core of information security and the center of data protection and availability of needs. In the organizations, whose operations require the share of digital resources with different degrees of sensitivity, such an access control is crucially required. Considering the diverse structure, requirements, and specifications of an organization, and taking into account that access control policies and models are available in diverse forms, it is required to select and implement an appropriate access control model consistent with the security requirements of the related organization in order to achieve the best results and minimum access risks and threats. In this paper, the main and most important criteria in the different access control models are evaluated and finally, the most appropriate model is introduced for implementation based on the security policies and requirements of organizations and the specifications of each access control model.

[...] Read more.
Biometric Passport Validation Scheme using Radio Frequency Identification

By V.K. Narendira Kumar B. Srinivasan

DOI: https://doi.org/10.5815/ijcnis.2013.05.04, Pub. Date: 8 Apr. 2013

Biometric passports issued nowadays have an embedded RFID chip that carries digitally signed biometric information. This RIFD chip is integrated into the cover of a passport, called a biometric passport. Electronic passports as it is sometimes called, represents a bold initiative in the deployment of two new technologies: RIFD and biometrics such as face, fingerprints, palm prints and iris. The electronic passport is the privacy and security risks that arise by embedding RFID technology. The goal of the adoption of the biometric passport is not only to expedite processing at border crossings, but also to increase security. Policymakers have put their faith in the technological promise of biometric identification because absolute identification could eliminate mismatched computer records and stolen identities.

[...] Read more.
A Bespoke Technique for Secret Messaging

By Mahimn Pandya Hiren Joshi Ashish Jani

DOI: https://doi.org/10.5815/ijcnis.2013.05.05, Pub. Date: 8 Apr. 2013

The communication of digital assets on the internet infrastructure is increasing in its volume with threats on its security with regard to active and passive attacks of eavesdroppers. This concern has opened up the research channel to improve the techniques of secure and reliable communication protecting intellectual property rights and message security. Constant efforts of researchers in this area to achieve communication at faster rate maintaining security of digital assets, is giving improved techniques to achieve the goal. The efforts made here in this work are in the direction to enhance level of security in making faster reliable and secure communication. In spite of continued efforts, still as on today, it is challenging to hide the communication from eavesdropper. The disciplines of Cryptography, Steganography and Digital Watermarking are still popular areas of research. They are continuously digging to find robust and effective algorithms to protect digital communications and digital assets. It is very true that if the complexity in algorithm is increased, higher security level can be achieved. In the reviewed work, Researchers have developed algorithms for text encryption and embedment in digital watermarking using LSB at cost of time. The proposed work is targeted to maintain the tradeoff between the complexity level of algorithm and security level of message considering the time factor. The proposed work has evolved with two algorithms: AMEADT (ASCII Message Encryption and Decryption Technique) to protect secret message and AMEAET (ASCII Message Embedment and Extraction Technique) to embed encrypted text to digital image. The implementation of these algorithms has resulted in justifying higher level of security with comparatively lower level of complexity of algorithm.

[...] Read more.
Defending of IP Spoofing by Ingress Filter in Extended-Inter Domain Packet Key Marking System

By G.Velmayil S.Pannirselvam

DOI: https://doi.org/10.5815/ijcnis.2013.05.06, Pub. Date: 8 Apr. 2013

The significance of the DDoS problem and the increased occurrence and strength of attacks has led to the dawn of numerous prevention mechanisms. IP spoofing is most frequently used in denial-of-service attacks. In such attacks, the goal is to flood the victim with overwhelming amounts of traffic, and the attacker does not care about receiving responses to the attack packets. IP spoofing is one of the basic weaknesses in the Internet Protocol to launch the DDOS attack. Each prevention mechanism has some unique advantages and disadvantages over the others. The existing methods become ineffective due to a large number of filters required and they lack in information about where to place the filter. We propose Ingress filter in Extended Inter Domain Packet Key marking system .This paper comprises of two functional blocks namely, Key marking system and filtering blocks. In the marking block, each source is labeled with a key. The key is changed continuously for a certain period of time to provide secured system and is validated at border routers. In the filtering block, spoofed packets are filtered at the border router using Ingress filter to filter beyond periphery routers. The filter placement algorithm clearly put forwards the conditions under which the filter can operate accurately. The accuracy of the proposed systems is validated using Network Simulator (NS-2).

[...] Read more.
Recent Replica Placement Algorithms in P2P Networks – A Review

By Kala Karun. A Jayasudha. J. S

DOI: https://doi.org/10.5815/ijcnis.2013.05.07, Pub. Date: 8 Apr. 2013

Peer-to-Peer (P2P) systems provide a platform for large internet scale distributed applications with no dedicated infrastructure. In P2P systems, applications are developed by dividing them across individual systems termed peers which take the role of both client as well as server. Popularity of objects in such a system can change rapidly, which demands the need for a rapid and light weight content replication strategy which considers this dynamic popularity changes. While considering P2P in distributed file sharing applications, data availability has significant impact on the system's performance. In addition to optimized availability, the replica placement should guarantee reduced search and data access latency. It should be dynamically adaptable to instantaneous query arrival rate as well as dynamic membership of individual peers. Also, it should provide good performance with reduced number of control messages. Thus an intelligent placement of replicas considering various factors of the system always outperforms a random placement of replicas on random peers. This paper reviews and compares various recent replica placement algorithms for structured as well as unstructured P2P networks.

[...] Read more.
Effect of Black Hole Attack on MANET Routing Protocols

By Jaspal Kumar M. Kulkarni Daya Gupta

DOI: https://doi.org/10.5815/ijcnis.2013.05.08, Pub. Date: 8 Apr. 2013

Due to the massive existing vulnerabilities in mobile ad-hoc networks, they may be insecure against attacks by the malicious nodes. In this paper we have analyzed the effects of Black hole attack on mobile ad hoc routing protocols. Mainly two protocols AODV and Improved AODV have been considered. Simulation has been performed on the basis of performance parameters and effect has been analyzed after adding Black-hole nodes in the network. Finally the results have been computed and compared to stumble on which protocol is least affected by these attacks.

[...] Read more.