Volume 1, Issue 7, 2011

By | August 9, 2018

Quantum Attack Resistant Cloud 

PSV Vachaspati, P.S.Avadhani 

Abstract: The emergence of cloud computing in the computing arena has  had a major effect in a way we utilize computing resources. It is being  heralded by many as the new computing paradigm, coming with disruptive  technologies which are expected to foster all sorts of innovations. However, further investigations suggest that the cloud computing is nothing new,  rather an evolution of different existing technologies creatively integrated  together. Therefore, it has inherited strengths and weaknesses of existing  technologies, but has lowered the entry bar to computing making it an  interesting proposition. In this paper we propose quantum attack resistant  cloud computing. 

Keywords : Cloud Computing; quantum attack; lattice cryptography; Cloud Providers. 


Implementing a Web Browser with Phishing Detection Techniques 

Aanchal Jain, Vineet Richariya

Abstract: Phishing is the combination of social engineering and technical  exploits designed to convince a victim to provide personal information,  usually for the monetary gain of the attacker. Phishing has become the  most popular practice among the criminals of the Web. Phishing attacks are  becoming more frequent and sophisticated. The impact of phishing is  drastic and significant since it can involve the risk of identity theft and  financial losses. Phishing scams have become a problem for online banking  and e-commerce users. In this paper we propose a novel approach to  detect phishing attacks. We implemented a prototype web browser which  can be used as an agent and processes each arriving email for phishing  attacks. Using email data collected over a period time we demonstrate  data that our approach is able to detect more phishing attacks than existing schemes. 

Keywords : Phishing detection; Web browser. 


Storage Area Network Implementation on an Educational Institute Network 

Safarini Osama

Abstract: The storage infrastructure is the foundation on which information  relies and therefore must support a company’s business objectives and  business model. In this environment, simply deploying more and faster storage devices is not enough; a new kind of infrastructure is needed, one that provides more  enhanced network availability, data accessibility, and system manageability  than is provided by today’s infrastructure. The SAN meets this challenge. The SAN liberates the storage device, so it is not on a particular server bus, and attaches it directly to the network. In other words, storage is  externalized and functionally distributed across the organization. The SAN  also enables the centralizing of storage devices and the clustering of  servers, which makes for easier and less expensive administration. So the  idea is to create an intelligent SAN infrastructure that stretches to meet  increased demands, allows highly available and heterogeneous access to  expanding information. 

Keywords : SAN – Storage Area Network, RAID – Redundant Array of  Independent Disks, FAStT600 – Fibre Array Storage Technology, ESCON –  Enterprise Systems Connection.


A Survey of Remote Internet Voting Vulnerabilities 

Okediran O. O., Omidiora E. O., Olabiyisi S. O., Ganiyu R. A.

Abstract: Majority of the conventional voting techniques have been  employed over the years in elections. Each of these techniques had  attendant short comings. The existing conventional voting systems have  been subjected to gross abuse and irregularities. Electronic voting which is  emerging as an alternative to these conventional voting systems, though  highly promising is not free of flaws; remote internet voting systems still  suffer from many security problems which rely on the clients, the servers,  and the network connections. Denial-of service attacks and viruses still  belong to the most challenging security issues. In this paper we discuss the  security issues associated with remote internet voting. In particular, we  examine the feasibility of running national elections over the Internet. The  focus of this paper is on the limitations of the current deployed  infrastructure in terms of the security of the hosts and the Internet itself.  We conclude that without appropriate security measures, internet based  elections can be a challenge. 

Keywords : Internet voting; Electronic voting; Penetration attacks; Denial  of service; Digital divides.  


Approaches to Wireless Sensor Network: Security Protocols 

Harmandeep Singh,  Garima Malik

Abstract: The advancement of electronics and wireless communication  technologies have enabled the development of large scale wireless sensor  network that consist of many low-power, low-cost and small size sensor  nodes. With the help of sensor network we facilitate large scale and real  time data processing even in complex environment. The proliferation of  sensor application has increased the need of security in sensor network. At  the beginning WSN were not built keeping the security in mind because  sensor networks may interact with very sensitive data and operate in  hostile unattended environments. It is imperative that at the beginning of  the system design, this security concern should be addressed.         In this paper we present the intent to investigate the security related  issues and challenges in wireless sensor network. To provide security and  privacy to small sensor nodes in terms of computation, communication,  memory, storage and energy supply. The security methods for existing  networks which include mobile ad-hoc network are not well suitable for  wireless sensor networks because of the resource limitations of sensor  nodes. 

Keywords : DOS; Sybil Attack; black hole attack;, hello flood attack;  wormhole attack; LEAP; CSMA/CA.


Implementing a Web Browser with Web Defacement Detection Techniques 

Tushar Kanti, Vineet Richariya, Vivek Richariya

Abstract: Website Defacement is an attack on a website that changes the  visual appearance of the site or a webpage. These are typically the work of  system crackers, who break into a web server and replace the hosted  website with one of their own. The most common method of defacement is  using SQL Injections to log on to administrator accounts. Defacements  usually consist of an entire page. This page usually includes the defacer’s  pseudonym or “Hacking Codename.” Sometimes, the Website Defacer makes fun of the system administrator for failing to maintain server security. Most times, the defacement is harmless, however, it can sometimes be used as a distraction to cover up more sinister actions such as uploading malware or  deleting essential files from the server. Web defacement results in extreme  embarrassment to the web site owner, regardless of the commercial  interest in the web site. However, persons and companies who are targets  of web defacement, often have substantial interest in maintaining the  professional image and integrity of the web site. This paper proposes a  checksum based web defacement detection mechanism. We developed a  prototype web browser which can be used to check the defacement on a particular website. We also propose a recovery mechanism for the defaced  pages using the same checksum based approach. 

Keywords : Web defacement; web security; threat detection; prevention. 


Quality Requirements Optimization with Architectural Styles 

Marwan AL-Abed Abu-Zanona, Yosef Hasan Jbara, Farah Hanna AL-Zawaideh

Abstract: Small and large scale business and financial corporations are  becoming more and more vital in our everyday life. These organizations are  faced with increasing pressures to provide high quality services, especially  in an increasing competitive environment. To stay competitive, adaptations and enhancements of service operations and the associated business  processes need to take place continuously. A growing concern for such  business corporations and the structure of its business processes is their  functional and non-functional quality requirements. Current approaches  often fail to explicitly specify the organizational business structure,  objects, rules, constraints, etc. upon which any improvements of quality of  business services or the evolution of an existing one must be based. In this  paper and based on modeling and simulation we proposes a simple method  using architectural styles to predict these quality requirements. Simulation  results show that functional and non-functional quality requirements can  be achieved. 

Keywords : quality requirements; architectural style; simulation.


An Improved Algorithm for Mining Association Rules in Large Databases 

Farah Hanna AL-Zawaidah, Yosef Hasan Jbara, Marwan AL-Abed Abu-Zanona


Abstract: Mining association rules in large databases is a core topic of data  mining. Discovering these associations is beneficial to the correct and  appropriate decision made by decision makers. Discovering frequent  itemsets is the key process in association rule mining. One of the  challenges in developing association rules mining algorithms is the  extremely large number of rules generated which makes the algorithms inefficient and makes it difficult for the end users to comprehend the  generated rules. This is because most traditional association rule mining  approaches adopt an iterative technique to discover association rule, which  requires very large calculations and a complicated transaction process.  Furthermore, the existing mining algorithms cannot perform efficiently due  to high and repeated disk access overhead. Because of this, in this paper  we present a novel association rule mining approach that can efficiently  discover the association rules in large databases. The proposed approach is  derived from the conventional Apriori approach with features added to  improve data mining performance. We have performed extensive  experiments and compared the performance of our algorithm with existing algorithms found in the literature. Experimental results show that our  approach outperforms other approaches and show that our approach can  quickly discover frequent itemsets and effectively mine potential  association rules. 

Keywords : mining; association rules; frequent patterns; apriori.

Leave a Reply

Your email address will not be published. Required fields are marked *