Quantum Attack Resistant Cloud
PSV Vachaspati, P.S.Avadhani
Abstract: The emergence of cloud computing in the computing arena has had a major effect in a way we utilize computing resources. It is being heralded by many as the new computing paradigm, coming with disruptive technologies which are expected to foster all sorts of innovations. However, further investigations suggest that the cloud computing is nothing new, rather an evolution of different existing technologies creatively integrated together. Therefore, it has inherited strengths and weaknesses of existing technologies, but has lowered the entry bar to computing making it an interesting proposition. In this paper we propose quantum attack resistant cloud computing.
Keywords : Cloud Computing; quantum attack; lattice cryptography; Cloud Providers.
Implementing a Web Browser with Phishing Detection Techniques
Aanchal Jain, Vineet Richariya
Abstract: Phishing is the combination of social engineering and technical exploits designed to convince a victim to provide personal information, usually for the monetary gain of the attacker. Phishing has become the most popular practice among the criminals of the Web. Phishing attacks are becoming more frequent and sophisticated. The impact of phishing is drastic and significant since it can involve the risk of identity theft and financial losses. Phishing scams have become a problem for online banking and e-commerce users. In this paper we propose a novel approach to detect phishing attacks. We implemented a prototype web browser which can be used as an agent and processes each arriving email for phishing attacks. Using email data collected over a period time we demonstrate data that our approach is able to detect more phishing attacks than existing schemes.
Keywords : Phishing detection; Web browser.
Storage Area Network Implementation on an Educational Institute Network
Safarini Osama
Abstract: The storage infrastructure is the foundation on which information relies and therefore must support a company’s business objectives and business model. In this environment, simply deploying more and faster storage devices is not enough; a new kind of infrastructure is needed, one that provides more enhanced network availability, data accessibility, and system manageability than is provided by today’s infrastructure. The SAN meets this challenge. The SAN liberates the storage device, so it is not on a particular server bus, and attaches it directly to the network. In other words, storage is externalized and functionally distributed across the organization. The SAN also enables the centralizing of storage devices and the clustering of servers, which makes for easier and less expensive administration. So the idea is to create an intelligent SAN infrastructure that stretches to meet increased demands, allows highly available and heterogeneous access to expanding information.
Keywords : SAN – Storage Area Network, RAID – Redundant Array of Independent Disks, FAStT600 – Fibre Array Storage Technology, ESCON – Enterprise Systems Connection.
A Survey of Remote Internet Voting Vulnerabilities
Okediran O. O., Omidiora E. O., Olabiyisi S. O., Ganiyu R. A.
Abstract: Majority of the conventional voting techniques have been employed over the years in elections. Each of these techniques had attendant short comings. The existing conventional voting systems have been subjected to gross abuse and irregularities. Electronic voting which is emerging as an alternative to these conventional voting systems, though highly promising is not free of flaws; remote internet voting systems still suffer from many security problems which rely on the clients, the servers, and the network connections. Denial-of service attacks and viruses still belong to the most challenging security issues. In this paper we discuss the security issues associated with remote internet voting. In particular, we examine the feasibility of running national elections over the Internet. The focus of this paper is on the limitations of the current deployed infrastructure in terms of the security of the hosts and the Internet itself. We conclude that without appropriate security measures, internet based elections can be a challenge.
Keywords : Internet voting; Electronic voting; Penetration attacks; Denial of service; Digital divides.
Approaches to Wireless Sensor Network: Security Protocols
Harmandeep Singh, Garima Malik
Abstract: The advancement of electronics and wireless communication technologies have enabled the development of large scale wireless sensor network that consist of many low-power, low-cost and small size sensor nodes. With the help of sensor network we facilitate large scale and real time data processing even in complex environment. The proliferation of sensor application has increased the need of security in sensor network. At the beginning WSN were not built keeping the security in mind because sensor networks may interact with very sensitive data and operate in hostile unattended environments. It is imperative that at the beginning of the system design, this security concern should be addressed. In this paper we present the intent to investigate the security related issues and challenges in wireless sensor network. To provide security and privacy to small sensor nodes in terms of computation, communication, memory, storage and energy supply. The security methods for existing networks which include mobile ad-hoc network are not well suitable for wireless sensor networks because of the resource limitations of sensor nodes.
Keywords : DOS; Sybil Attack; black hole attack;, hello flood attack; wormhole attack; LEAP; CSMA/CA.
Implementing a Web Browser with Web Defacement Detection Techniques
Tushar Kanti, Vineet Richariya, Vivek Richariya
Abstract: Website Defacement is an attack on a website that changes the visual appearance of the site or a webpage. These are typically the work of system crackers, who break into a web server and replace the hosted website with one of their own. The most common method of defacement is using SQL Injections to log on to administrator accounts. Defacements usually consist of an entire page. This page usually includes the defacer’s pseudonym or “Hacking Codename.” Sometimes, the Website Defacer makes fun of the system administrator for failing to maintain server security. Most times, the defacement is harmless, however, it can sometimes be used as a distraction to cover up more sinister actions such as uploading malware or deleting essential files from the server. Web defacement results in extreme embarrassment to the web site owner, regardless of the commercial interest in the web site. However, persons and companies who are targets of web defacement, often have substantial interest in maintaining the professional image and integrity of the web site. This paper proposes a checksum based web defacement detection mechanism. We developed a prototype web browser which can be used to check the defacement on a particular website. We also propose a recovery mechanism for the defaced pages using the same checksum based approach.
Keywords : Web defacement; web security; threat detection; prevention.
Quality Requirements Optimization with Architectural Styles
Marwan AL-Abed Abu-Zanona, Yosef Hasan Jbara, Farah Hanna AL-Zawaideh
Abstract: Small and large scale business and financial corporations are becoming more and more vital in our everyday life. These organizations are faced with increasing pressures to provide high quality services, especially in an increasing competitive environment. To stay competitive, adaptations and enhancements of service operations and the associated business processes need to take place continuously. A growing concern for such business corporations and the structure of its business processes is their functional and non-functional quality requirements. Current approaches often fail to explicitly specify the organizational business structure, objects, rules, constraints, etc. upon which any improvements of quality of business services or the evolution of an existing one must be based. In this paper and based on modeling and simulation we proposes a simple method using architectural styles to predict these quality requirements. Simulation results show that functional and non-functional quality requirements can be achieved.
Keywords : quality requirements; architectural style; simulation.
An Improved Algorithm for Mining Association Rules in Large Databases
Farah Hanna AL-Zawaidah, Yosef Hasan Jbara, Marwan AL-Abed Abu-Zanona
Abstract: Mining association rules in large databases is a core topic of data mining. Discovering these associations is beneficial to the correct and appropriate decision made by decision makers. Discovering frequent itemsets is the key process in association rule mining. One of the challenges in developing association rules mining algorithms is the extremely large number of rules generated which makes the algorithms inefficient and makes it difficult for the end users to comprehend the generated rules. This is because most traditional association rule mining approaches adopt an iterative technique to discover association rule, which requires very large calculations and a complicated transaction process. Furthermore, the existing mining algorithms cannot perform efficiently due to high and repeated disk access overhead. Because of this, in this paper we present a novel association rule mining approach that can efficiently discover the association rules in large databases. The proposed approach is derived from the conventional Apriori approach with features added to improve data mining performance. We have performed extensive experiments and compared the performance of our algorithm with existing algorithms found in the literature. Experimental results show that our approach outperforms other approaches and show that our approach can quickly discover frequent itemsets and effectively mine potential association rules.
Keywords : mining; association rules; frequent patterns; apriori.