International Journal of Computer Network and Information Security (IJCNIS)

IJCNIS Vol. 6, No. 9, Aug. 2014

Cover page and Table of Contents: PDF (size: 124KB)

Table Of Contents

REGULAR PAPERS

SysProp: A Web-based Data Backup, Synchronization and System Administration

By Salekul Islam Mohammad Amanul Islam

DOI: https://doi.org/10.5815/ijcnis.2014.09.01, Pub. Date: 8 Aug. 2014

From the inception of computer based computing, preventing data loss or data corruption is considered as one of the difficult challenges. In early days, data reliability had been increased by replicating data in multiple disks, which were attached with the same system and later located inside the same network. Later, to avoid potential risk of single point of failure, the replicated data storage has been separated from the network from which the data has been originated. Thus, following the concept of peer-to-peer (P2P) networking, P2P storage system has been designed, where data has been replicated inside multiple remote peers’ redundant storages. With the advent of Cloud computing, a similar but more reliable Cloud-based storage system has been developed. Note that Cloud storages are expensive for small and medium enterprises. Moreover, users are often reluctant to store their sensitive data inside a third-party’s network that they do now own or control. In this paper, we design, develop and deploy a storage system that we named SysProp. Two widely used tools—Web applications and UNIX daemon—have been incorporated in the development process of SysProp. Our goal is to congregate benefits of different storage systems (e.g., networked, P2P and Cloud storages) in a single application. SysProp provides a remotely accessible, Web-based interface, where users have full control over their data and data is being transferred in encrypted form. Moreover, for data backup, a powerful UNIX tool, rsync has been used that synchronize data by transferring only the updated portion. Finally, SysProp is a successful demonstration of the concept that UNIX daemons can be remotely executed and controlled over the Web. Hence, this concept might be exploited to build many system administrative applications.

[...] Read more.
Effect of Maintenance on Computer Network Reliability

By Rima Oudjedi Damerdji Myriam Noureddine

DOI: https://doi.org/10.5815/ijcnis.2014.09.02, Pub. Date: 8 Aug. 2014

At the time of the new information technolo-gies, computer networks are inescapable in any large organization, where they are organized so as to form powerful internal means of communication. In a context of dependability, the reliability parameter proves to be fundamental to evaluate the performances of such sys-tems. In this paper, we study the reliability evaluation of a real computer network, through three reliability models. The computer network considered (set of PCs and server interconnected) is localized in a company established in the west of Algeria and dedicated to the production of ammonia and fertilizers. The result permits to compare between the three models to determine the most appropriate reliability model to the studied network, and thus, contribute to improving the quality of the network. In order to anticipate system failures as well as improve the reliability and availability of the latter, we must put in place a policy of adequate and effective maintenance based on a new model of the most common competing risks in maintenance, Alert-Delay model. At the end, dependability measures such as MTBF and reliability are calculated to assess the effectiveness of maintenance strategies and thus, validate the alert delay model.

[...] Read more.
Direction-of-Arrival Estimation for Stratospheric Platforms Mobile Stations

By Yasser Albagory

DOI: https://doi.org/10.5815/ijcnis.2014.09.03, Pub. Date: 8 Aug. 2014

This paper presents a new approach for localizing mobile phone users using the promising technique of stratospheric platform (SP) flying at altitudes 17-22 km high and a suitable Direction-of-Arrival technique (DOA). The proposed technique provides information about accurate locations for mobile stations - through high resolution DOA technique - which is very important for traffic control and rescue operations at emergency situations. The DOA estimation in this technique defines the user location using MUSIC algorithm which provides good accuracy comparable to the Global Positioning System (GPS) techniques but without the need for GPS receivers. Several scenarios for users’ locations determination are tested and examined to define the robustness of the proposed technique.

[...] Read more.
Integrity Analysis of Multimedia File Transmission between Mobile Phones

By Sweta Deana Bye. Dhondoo Vidasha. Ramnarain-Seetohul Razvi. Doomun

DOI: https://doi.org/10.5815/ijcnis.2014.09.04, Pub. Date: 8 Aug. 2014

Mobile forensics deals with evidence from mobile devices. Data recovered from the mobile devices are helpful in investigation to solve criminal cases. It is crucial to preserve the integrity of these data. According to research carried out [1], it has been noted that not all data extracted from mobile phones have discrepancies in hash values during integrity verification. It has been reported that only the Multimedia Messaging Service message type showed a variation in hash values when performing data extraction. The main objective in this work is to study the variance in the content of the graphic files transferred between mobile phones via Bluetooth or MMS. We also determine the causes of such variations, if any, while checking the graphics file integrity. Different parameters including distance and file format have been varied and a series of test were conducted using: mobile sets of same make same model, same make different model and different make different model on different graphic file formats of different sizes. Results obtained confirmed that there was no alteration of graphic files during Bluetooth transmission. However, while transmitting the graphic files through Multimedia Messaging Service, results showed notable alteration level for graphic files of certain file format and size.

[...] Read more.
Congestion Control in WMSNs by Reducing Congestion and Free Resources to Set Accurate Rates and Priority

By Akbar Majidi Hamid MIRVAZIRI

DOI: https://doi.org/10.5815/ijcnis.2014.09.05, Pub. Date: 8 Aug. 2014

The main intention of this paper is focus on mechanism for reducing congestion in the network by free resources to set accurate rates and priority data needs. If two nodes send their packets in the shortest path to the parent node in a crowded place, a source node must prioritize the data and uses data that have lower priorities of a suitable detour nodes consisting of low or non- active consciously. The proposed algorithm is applied to the nodes near the base station (which convey more traffic) after the congestion detection mechanism detected the congestion. Obtained results from simulation test done by NS-2 simulator demonstrate the innovation and validity of proposed method with better performance in comparison with CCF, PCCP and DCCP protocols.

[...] Read more.
C₂DF: High Rate DDOS filtering method in Cloud Computing

By Pourya Shamsolmoali M. Afshar Alam Ranjit Biswas

DOI: https://doi.org/10.5815/ijcnis.2014.09.06, Pub. Date: 8 Aug. 2014

Distributed Denial of Service (DDOS) attacks have become one of the main threats in cloud environment. A DDOS attack can make large scale of damages to resources and access of the resources to genuine cloud users. Old-established defending system cannot be easily applied in cloud computing due to their relatively low competence and wide storage. In this paper we offered a data mining and neural network technique, trained to detect and filter DDOS attacks. For the simulation experiments we used KDD Cup dataset and our lab datasets. Our proposed model requires small storage and ability of fast detection. The obtained results indicate that our model has the ability to detect and filter most type of TCP attacks. Detection accuracy was the metric used to evaluate the performance of our proposed model. From the simulation results, it is visible that our algorithms achieve high detection accuracy (97%) with fewer false alarms.

[...] Read more.
Artificial Intrusion Detection Techniques: A Survey

By Ashutosh Gupta Bhoopesh Singh Bhati Vishal Jain

DOI: https://doi.org/10.5815/ijcnis.2014.09.07, Pub. Date: 8 Aug. 2014

Networking has become the most integral part of our cyber society. Everyone wants to connect themselves with each other. With the advancement of network technology, we find this most vulnerable to breach and take information and once information reaches to the wrong hands it can do terrible things. During recent years, number of attacks on networks have been increased which drew the attention of many researchers on this field. There have been many researches on intrusion detection lately. Many methods have been devised which are really very useful but they can only detect the attacks which already took place. These methods will always fail whenever there is a foreign attack which is not famous or which is new to the networking world. In order to detect new intrusions in the network, researchers have devised artificial intelligence technique for Intrusion detection prevention system. In this paper we are going to cover what types evolutionary techniques have been devised and their significance and modification.

[...] Read more.
SM-SIP: Seamless Mobility Management for Heterogeneous Wireless Networks

By Khaled Zeraoulia Nadjib Badache

DOI: https://doi.org/10.5815/ijcnis.2014.09.08, Pub. Date: 8 Aug. 2014

Next-generation wireless networks (NGN) and internet of Thing (IoT) become two leaders of designing mobile multimedia services. The deployment of these services using heterogeneous wireless networks will be the important factor that leads to profound change in the way that these services are delivered. Also, how these services will be managed is a real challenge. Consequently, Seamless mobility management should be provided to support various services in heterogeneous networks. A SIP-based network appears as a very attractive alternative to mobile multimedia applications. In this paper, we introduce a novel mobility management strategy for mobile SIP networks, in which we develop a seamless handover used mobile SIP scheme called SM-SIP (Seamless Mobility Management for Heterogeneous Wireless Networks for Mobile SIP environment). SM-SIP can significantly reduce the system signaling cost and handover delay, by proactively processing the address allocation and session updates using link layer information of wireless networks. Also, our performance study shows that SM-SIP reduces efficiently packets loss using an anticipated buffering scheme.

[...] Read more.