Thursday, August 24, 2017

A Novel Framework for Intrusion Detection Using Distributed Collaboration Detection Scheme in Packet Header Data

T.S. Urmila1 and R. Balasubramanian2 

1 Research Scholar, Mother Teresa Women’s University, Kodaikannal 

2 Dean, KarpagaVinayagar College of Engineering and Technology, Mathuranthagam 

ABSTRACT 

In recent years, the number of attacks on the computer network is voluminous. Secure data communication over the network is always under threat of intrusions. To protect from these attacks various intrusion detection techniques have been developed. Anomaly detection system detects the novel attacks based on deviation of the behavior of packets from the normal flow and Signature detection system detects known attacks based on stored signatures. We have proposed a Distributed collaboration detection scheme that combines the advantages of Anomaly and Signature based method by capturing the packets in real time. The uninteresting traffics are filtered by packet filtering and further normalization. The relevant features are selected based on our Correlation based BAT Feature Selection (CBBFS) Algorithm. Our Proposed Efficient Behavioral Prediction (EBP) scheme analyzes the episodes and classifies the attack based on EGSSI. Then Proficient Ordinance Generation (POG) for Inspection of IP Phase labels the IP as trusted or untrusted. Our proposed framework outperforms the results of existing classification algorithms (C4.5, Naive Bayes, PSO, GSA and EDADT) by reducing the rate of false positives.

KEYWORDS 

Intrusion Detection, Anomaly Detection, Signature Detection, Distributed Collaboration, Packet Header Data

Improving Distributed Energy Efficient Clustering Algorithm to Save Lifetime for Heterogeneous WSN

Phan Thi The, Bui Hoang Mai, Nguyen Thanh Tuan and Tran Cong Hung 

Post & Telecommunications Institute of Technology, Vietnam 

ABSTRACT 

Energy saving and prolonging network lifecycle are the most important targets for routing protocols in the WSN. Clustering is an effective way for widespreadnetwork life by reducing energy consumption. Nowadays, most studies aim at a homogeneous environment in which all sensor nodes have the same amount of initial energy. However, in a heterogeneous network environment, a number of sensor nodes are equipped with additional power sources, thus resulting in a power hierarchy. This heterogeneity in the sensor nodes leads to network life, stability. In this paper, we have proposed to improve BEENISH and DEEC protocols. Simulation results demonstrate that the proposed protocol has better performance in terms of network life, stability and packet delivery compared to Enhanced Distributed Energy Efficient Clustering (EDEEC), Enhanced Developed Distributed Energy Efficient Clustering (EDDEEC), Balanced Energy Efficient Network Integrated Super Heterogeneous (BEENISH)

KEYWORDS 

WSN, clustering, heterogeneous wireless sensor networks, hierarchical routing, DEEC, BEENISH.

Wednesday, August 23, 2017

Combined IEEE 802.15.4 Physical Layer and Virtual Multiple Input Multiple Output (VMIMO) Transmissions for Energy Efficient Wireless Sensor Networks

Fawaz Alassery 

Department of Computer Engineering, Taif University, Taif City, Saudi Arabia 

ABSTRACT 

A Wireless Sensor Network (WSN) consists of a hundred of sensor nodes deployed in sensing fields in order to serve various applications. The limited resources of sensor nodes such as energy source, computational ability and communication bandwidth are the most important challenges in designing a reliable smart WSN which guarantees the connectivity and maximizes the lifetime of sensor’s batteries. One of the available solutions for improving the energy efficiency of smart WSNs is by using the Virtual Multiple Input Multiple Output (V-MIMO) technology adapted to sensor nodes. In this paper, we proposed a high energy efficiency smart WSN in which we exploited the advantages Provided by the virtual MIMO technique (i.e. by reducing the multipath fading channel). Our network transmission has two scenarios. The first scenario is based on deploying one rechargeable relay node at the center of the sensing field which is responsible for receiving data packets from the source node, decoding and forwarding them to a destination node, while the second scenario is based on dividing the sensing field into clusters where each cluster has a rechargeable relay node which transfers data packets to a destination node in the same cluster or in any other cluster. In this work, we studied the effects of Rayleigh flat fading channels which increase the re- transmission error of data packets. Our simulation results show that the use of the advantages of virtual MIMO and one central/rechargeable relay node achieves only low energy efficiency for the Signal to Noise Ratio (SNR) range between –20 to 20dB over the Rayleigh flat fading channel. However, the second scenario achieves high energy efficiency due to the clustering technique and the central relay nodes with direct transmission in each cluster.

KEYWORDS 

Smart wireless sensor networks, high energy efficiency WSNs, virtual MIMO

Monday, August 21, 2017

Victim Based Statistical Filtering : A New Deterrent Against Spoofed DoS Traffic

Suhail Qadir Mir1 and S.M.K. Quadri2 

1 Post Graduate Department of computer sciences, University of Kashmir, India 

2Department of Computer Science, Jamia Millia Islamia, India 

ABSTRACT 

The extensive use of Internet and network based information resources on a global scale has led to the rise in a wide range of security incidents. One such attack is a TCP-SYN DoS attack, which makes use of IPSpoofing for its effectiveness. This paper presents a robust scheme for filtering spoofed DoS IP Packets in the Internet. We have proposed a robust filtering algorithm namely, Victim Based Statistical Filtering in this paper. The algorithm is inspired from the Hop-Count Filtering (HCF) method, which uses a corelation between IP addresses and their respective hop-counts to the destination server, to filter out the spoofed IP packets from the legitimate ones. The variation that we have proposed is adding the monitoring information of the usage levels of port numbers of the destination machine (victim), in the HCF Algorithm. The proposed VBSF algorithm was empirically evaluated and it was found to exhibit better performance than its predecessor.

KEYWORDS 

Hop Count, Flooding, TCP-SYN, DoS Attack, IP Spoofing, IP Filtering.

Sunday, August 20, 2017

Investigation of Computational Intelligence Techniques for Intrusion Detection in Wireless Sensor Networks

Christopher D. McDermott and Andrei Petrovski 
School of Computing Science and Digital Media, Robert Gordon University, Aberdeen, Scotland 

ABSTRACT 

Wireless Sensor Networks (WSNs) have become a key technology for the IoT and despite obvious benefits, challenges still exist regarding security. As more devices are connected to the internet, new cyber attacks are emerging which join well-known attacks posing significant threats to the confidentiality, integrity and availability of data in WSNs. In this work, we investigated two computational intelligence techniques for WSN intrusion detection. A back propagation neural network was compared with a support vector machine classifier. Using the NSL-KDD dataset, detection rates achieved by the two techniques for six cyber attacks were recorded. The results showed that both techniques offer a high true positive rate and a low false positive rate, making both of them good options for intrusion detection. In addition, we further show the support vector machine classifiers suitability for anomaly detection, by demonstrating its ability to handle low sample sizes, while maintaining an acceptable FPR rate under the required threshold.

KEYWORDS 

Wireless Sensor Networks (WSNs), Intrusion Detection System (IDS), Denial of Service (DoS), Artificial Neural Network (ANN), Feed-forward Backpropagation, Support Vector Machine (SVM).

Friday, August 18, 2017

New Proposed Architecture for Q3 Interface to Manage IP-Based Networks

Gholamreza Farahani 

Department of Electrical Engineering and Information Technology, Iranian Research 
Organization for Science and Technology (IROST), Tehran, Iran 

ABSTRACT 

This paper presents a new architecture of Q3 interface to combine OSI and Internet management protocols CMIP and SNMP with union management protocol in Telecommunication Management Network (TMN). To manage both OSI and IP-based networks, new proposed sub-layer is added between upper layers (SNMP and CMIP) and lower layers stack protocols such that with use of this sub-layer the TMN is able to communicate data between CMIP and SNMP with OSI and TCP/UDP/IP. Results of our simulation are shown that our new architecture named SUL (Sub-layer between Upper and Lower layers) has better performance than CMIP with 12.5% improvement in M-Get and M-Set services and 25% in M-Event Report service. Also SUL architecture performance will overcome to SNMP with 125% in M-Get and M-Set services and 66% in M-Event Report service. Usage of Q3 interface in telecommunication management network will improve the performance of instruction interchange approximately 26.6% in comparison to ordinary telecommunication. 

KEYWORDS 

Transmission Control Protocol, Internet Protocol, User Datagram Protocol, Simple Network Management Protocol, Common Management Information Protocol. 

Discovering New Cyber Protection Approaches from a Security Professional Prospective

Alain Loukaka1 and Shawon S. M. Rahman, Ph.D. 2 

1 Ph.D. Candidate,Information Security Assurance, Capella University, Minneapolis, MN, USA 2Associate Professor, Department of Computer Science Majmaah University, Majmaah, Kingdom of Saudi Arabia 

ABSTRACT

Cybersecurity has become a very hot topic due to high profile breaches that occurred in the past years. Despite the implementation of current known pre-emptive methods such as intrusion detection systems, anti-viruses, and the use of firewalls, hackers still find sophisticated means to steal data or impair an organization by targeting their assets. It is important that security professionals need to “think outside the box” and use new tools and techniques to mitigate threats beyond current known detections and prevention technologies. It is imperative that our infrastructure and assets are impermeable from domestic and foreign attackers. Our best line of defense is the detection of any threats or vulnerability to prevent or minimize damages of our assets from domestic and foreign attackers. 

KEYWORDS

Cybersecurity; Information Security; Intrusion Detection; Information Systems;Vulnerability; Security Professional; Exploits.  




Thursday, August 17, 2017

Decision Making System Supported by Adaptive Coloured Petri Nets

Haroldo Issao Guibu1,2and João José Neto2 
1 Instituto Federal de Educação, Ciência e Tecnologia de São Paulo, Brazil
 2Escola Politécnica da Universidade de São Paulo, Brazil  


ABSTRACT

This work presents a decision-making system supported by Adaptive Coloured Petri Net (ACPN). Experts in a given field can establish a set of rules for the proper functioning of a manufacturing process or even acompany, facilitating the decision-making process. However, whenever the scenario changes and new rules need to be incorporated into the rule set, or old rules need to be deleted or modified, the manager may find it difficult to reformulate this set of rules. An adaptive mechanism that facilitates the modification of the set of rules is fundamental to assist the manager in making decisions. The Adaptive Color Petri Net is a tool that enables the modification of the set of rules, transforming the IF-THEN rule format used by anauxiliary Extended Adaptive Decision Table in an equivalent ACPN subnet. 

KEYWORDS 

Adaptive Petri Nets, Coloured Petri Nets, Adaptive Decision Tables