International Journal of Computer Network and Information Security (IJCNIS)

ISSN: 2074-9090 (Print)

ISSN: 2074-9104 (Online)

DOI: https://doi.org/10.5815/ijcnis

Website: https://www.mecs-press.org/ijcnis

Published By: MECS Press

Frequency: 6 issues per year

Number(s) Available: 138

(IJCNIS) in Google Scholar Citations / h5-index

IJCNIS is committed to bridge the theory and practice of computer network and information security. From innovative ideas to specific algorithms and full system implementations, IJCNIS publishes original, peer-reviewed, and high quality articles in the areas of computer network and information security. IJCNIS is well-indexed scholarly journal and is indispensable reading and references for people working at the cutting edge of computer network, information security, and their applications.

 

IJCNIS has been abstracted or indexed by several world class databases: ScopusSCImago, Google Scholar, Microsoft Academic Search, CrossRef, Baidu Wenku, IndexCopernicus, IET Inspec, EBSCO, VINITI, JournalSeek, ULRICH's Periodicals Directory, WorldCat, Scirus, Academic Journals Database, Stanford University Libraries, Cornell University Library, UniSA Library, CNKI Scholar, ProQuest, J-Gate, ZDB, BASE, OhioLINK, iThenticate, Open Access Articles, Open Science Directory, National Science Library of Chinese Academy of Sciences, The HKU Scholars Hub, etc..

Latest Issue
Most Viewed
Most Downloaded

IJCNIS Vol. 17, No. 4, Aug. 2025

REGULAR PAPERS

Software-defined Networking Controller for Detection of DDoS Attacks Based on Deep Neural Networks

By Jeyavim Sherin R. C. Parkavi K.

DOI: https://doi.org/10.5815/ijcnis.2025.04.01, Pub. Date: 8 Aug. 2025

Advancements in technology contribute to an increased vulnerability to cyberattacks, with Distributed Denial of Service (DDoS) attacks being a prominent threat. Attackers overwhelm network servers with excessive data, hindering legitimate users from accessing them. Software Defined Networking (SDN) is particularly susceptible due to its centralized architecture, making it a prime target for DDoS attacks aimed at the control planes. As cloud computing has grown rapidly, software-defined networks have been developed to provide dynamic management and enhanced performance. Several security concerns are growing, especially as DDoS attacks and malicious actors become more interested in SDN controllers. Many researchers have proposed detecting DDoS attacks. Due to their unqualified features and non-realistic data sets, these approaches have high false positive rates and low accuracy. As a result, SDN controllers can be protected against DDoS attacks using deep learning algorithms (DL). Furthermore, the suggested method comprises three phases: The process involves pre-processing the data, selecting significant features for DDoS detection based on correlation, and utilizing Deep Neural Networks (DNNs) for the detection. In order to evaluate the efficiency of the method proposed, we employ a benchmarking dataset to evaluate the false positive rate as well as detectability, with the traditional assessment indicators. In this paper, we propose a deep learning method for detection of DDoS attacks called DNNADSC, which is the first anomaly detection method based on deep neural network for DDoS attacks. The method proposed efficaciously recognizes DDoS attacks, with the detection rate of 99.39%, with a precision of 97.41% with a false-positive rate (FPR) that is 0.0665 with the F1 measure of 99.32%.

[...] Read more.
A Novel Verkle Tree-based Post-quantum Digital Signature System with Enhanced Random Number Generation

By Maksim Iavich Tamari Kuchukhidze Razvan Bocu

DOI: https://doi.org/10.5815/ijcnis.2025.04.02, Pub. Date: 8 Aug. 2025

The security of public key cryptosystems has become a major concern due to recent developments in the field of quantum computing. Despite efforts to enhance defenses against quantum attacks, current methods are impractical due to safety and efficacy concerns. A recent study explores hash-based digital signature methods and evaluates their effectiveness using Merkle trees. Furthermore, novel approaches based on Verkle trees and vector commitments have been studied to reduce quantum threats. 
First, we introduce a post-quantum digital signature system that combines vector commitments based on lattices with Verkle trees. This architecture optimizes traditional Merkle tree architecture by preserving resistance to quantum attacks while improving cryptographic proofs. Second, in order to ensure secure initial seed generation without sacrificing operational viability, we create a hybrid random number generation framework that combines quantum random number generation (QRNG) with pseudorandom approaches. We provide a detailed analysis of generating random numbers in our article, which makes it easier to build a post quantum cryptosystem that uses our generator to provide initial random values. Our system is notable for its robust security against quantum threats, speed, and efficiency.

[...] Read more.
A Hybrid PSO-GSA Approach for Cluster Head Selection and Fuzzy Logic Data Aggregation in DEEC-based WSNs

By Sarang Dagajirao Pravin Sahebrao Patil.

DOI: https://doi.org/10.5815/ijcnis.2025.04.04, Pub. Date: 8 Aug. 2025

Wireless sensor networks (WSNs) play a critical role in various applications such as environmental monitoring, healthcare, and industrial automation. The Distributed Energy-Efficient Clustering (DEEC) algorithm has been widely used for efficient data gathering and energy management in WSNs. However, the selection of cluster heads (CHs) in DEEC and data aggregation remain challenging tasks that significantly impact the performance and lifetime of the network. In this paper, we propose a novel approach for cluster head selection in the Distributed Energy-Efficient Clustering (DEEC) algorithm, utilizing the Particle Swarm Optimization-Gravitational Search Algorithm (PSO-GSA). Our approach enhances the CH selection process in DEEC by leveraging the strengths of both PSO and GSA, resulting in more optimal CH selection considering energy efficiency and network coverage. Furthermore, we employ fuzzy logic for data aggregation, which improves the accuracy and efficiency of sensor data aggregation. Our proposed hybrid approach, combining PSO-GSA for CH selection and fuzzy logic for data aggregation, is unique and original, and contributes to the advancement of WSNs and optimization techniques. Through extensive simulations and analysis, we demonstrate the effectiveness and superiority of our proposed approach over existing methods. This paper presents a significant advancement in WSN optimization techniques, promising enhanced energy efficiency and robustness in practical applications. Our approach achieves up to 36.66% and 60.45% increase in first node dead compared to DEEC in DL-DEEC with DA, highlighting its superior performance in prolonging network lifetime.

[...] Read more.
Real-time Sybil Attack Detection Based on Channel Characterization in VANET

By Reham Almesaeed

DOI: https://doi.org/10.5815/ijcnis.2025.04.05, Pub. Date: 8 Aug. 2025

Vehicular Ad hoc Networks (VANETs) are vital for efficient and secure vehicle-to-infrastructure communication in intelligent transportation systems. sybil attacks, where malicious entities adopt multiple identities, are a major security concern in VANETs. Detecting and mitigating these attacks is crucial for ensuring communication reliability and trust. This article focuses on detecting sybil attacks in Vehicle-to-Vehicle (V2V) communication by using a novel mechanism that characterizes the wireless channel through Received Signal Strength Indicator (RSSI) and angular spread in both azimuth and elevation planes. By incorporating angular spread alongside RSSI, the proposed mechanism offers more accurate and robust detection, particularly in dense vehicle environments. Utilizing a precise wireless channel model based on ray tracing statistics, the approach outperforms traditional RSSI-based methods. Experimental results confirm the enhanced accuracy and reliability of the proposed mechanism for detecting sybil attacks in V2V communication scenarios.

[...] Read more.
Identifying Influential Nodes in the Spread of Criminal Information in Social Networks

By Shynar Mussiraliyeva Gulshat Baispay Ihor Tereikovskyi

DOI: https://doi.org/10.5815/ijcnis.2025.04.06, Pub. Date: 8 Aug. 2025

The purpose of this work is to develop an algorithm and a method for identifying key nodes involved in the dissemination of criminal information within social networks. This study focuses on social network analysis (SNA) metrics that facilitate the detection of influential actors in organized groups, particularly activists who serve as primary disseminators of criminal content. The research objects include both the textual content and metadata of users on social media platforms such as "Vkontakte" and "YouTube." To achieve this goal, an algorithm for detecting nodes that distribute criminal information has been developed. A conceptual model has been constructed, integrating network analysis principles with computational techniques to assess influence. This model introduces a novel framework for evaluating social network nodes based on a combination of structural, semantic, and emotional factors. Specifically, it incorporates influence assessment metrics that consider the heterogeneous nature of content, including its linguistic features, sentiment, and patterns of engagement. Additionally, the model accounts for the emission dynamics of criminal content, allowing for a more precise determination of high-risk nodes within the network. A method for quantifying the influence of social network nodes engaged in criminal content dissemination has been formulated. This method utilizes centrality measures along with content analysis techniques to improve accuracy in detecting key actors. Experimental validation conducted on multiple real-world datasets (including VKontakte groups and known extremist networks) demonstrated that the proposed method achieves an accuracy of up to 80% in identifying the most influential criminal nodes. Compared to baseline centrality-based methods, our approach provides more reliable detection due to the integration of semantic-emotional metrics and emission indicators. The results confirm the practical value of the method in operational scenarios such as the early detection of criminal activity and the prioritization of threat actors for monitoring. These findings have strong implications for real-world applications in law enforcement and cybersecurity. By leveraging advanced algorithmic techniques for social network monitoring, authorities can proactively detect and mitigate the spread of criminal information.

[...] Read more.
Performance Optimization of Vehicle-to-vehicle Communication through Reactive Routing Protocol Analysis

By Ketut Bayu Yogha Bintoro Tri Kuntoro Priyambodo Kunto Wicaksono Ade Syahputra

DOI: https://doi.org/10.5815/ijcnis.2025.04.07, Pub. Date: 8 Aug. 2028

The study focuses on improving the Quality of Service (QoS) in Vehicle-to-Vehicle (V2V) communication within Vehicular Ad Hoc Networks (VANETs) by enhancing the Learning Automata-based Ad Hoc On-Demand Distance Vector (LA-AODV) routing protocol. Unlike the standard AODV, which is a reactive routing protocol, and previous configurations of LA-AODV, this research introduces a fine-tuning strategy for the learning automata parameters. This strategy allows the parameters to dynamically adapt to changing network conditions to reduce routing overhead and enhance transmission stability. Three modified versions of LA-AODV referred to as setups A, B, and C, are evaluated against the standard AODV and earlier LA-AODV configurations. The performance of each setup is measured using key QoS metrics: flood ID, packet loss ratio (PLR), packet delivery ratio (PDR), average throughput, end-to-end delay, and jitter. These metrics are crucial in evaluating the efficiency, reliability, and performance of V2V communication systems within VANETs. The results demonstrate that the LA-AODV variants significantly reduce flood ID counts, which represent the number of times a packet is broadcasted, compared to AODV, with setups A and B achieving reductions of 10.24% and 28.74%, respectively, at 200 transmissions, indicating enhanced scalability. Additionally, LA-AODV setup A provides 5.4% higher throughput in high-density scenarios. The modified versions also significantly decrease delay and jitter, achieving reductions of over 99.99% and 99.93%, respectively, at 50 transmissions. These findings underscore the adaptive capabilities of the proposed LA-AODV modifications, providing reassurance about the robustness of the system. They also highlight the importance of parameter optimization in maintaining reliable V2V communication. Future work will benchmark LA-AODV against other state-of-the-art protocols to validate its effectiveness further.

[...] Read more.
Smart Tool for Text Content Analysis to Identify Key Propaganda Narratives and Disinformation in News Based on NLP and Machine Learning

By Maryna Nyzova Victoria Vysotska Lyubomyr Chyrun Zhengbing Hu Yuriy Ushenko Dmytro Uhryn

DOI: https://doi.org/10.5815/ijcnis.2025.04.08, Pub. Date: 8 Aug. 2025

The paper presents the development of a smart tool for automated analysis of news text content in order to identify propaganda narratives and disinformation. The relevance of the project is due to the growth of the information threat in the context of a hybrid war, in particular in the Ukrainian information space. The proposed solution is implemented in the form of a browser plugin that provides instant analysis of content without the need to switch to third-party services. The methodology is based on the use of modern natural language processing (NLP) and deep learning methods (in particular, BERT models) to classify content according to the level of propaganda impact and identify key narratives. As part of the study, modern models of transformers for text analysis, in particular BERT, were used. For the task of classifying propaganda, pre-trained GloVe vectors optimised for news articles were used, which provided the best results among the options considered. Instead, the BERT model was used to classify narratives, which showed higher accuracy in the processing of texts reflecting subjective thoughts. The adaptation included the use of a multilingual version of BERT (multilingual BERT), as it allows you to effectively work with Ukrainian-language data, which is a key advantage for localised analysis in the context of information warfare. Before using BERT, pre-processing of texts was carried out with the addition of syntactic, punctuation, emotional and stylistic features, which increased the accuracy of classification. For a more complete and reliable assessment of the effectiveness of propaganda classification models and narratives, a set of key metrics was used for propaganda/ narratives analyses Accuracy (0.94/0.86), Precision (0.95/0.69), Recall (0.96/0.71) and F1-score (0.96/0.70).The developed model showed high accuracy results: the F1-score for the propaganda classification problem was 0.96 and for the narrative classification problem – 0.70, which significantly exceeds the results of similar approaches, in particular XGBoost (0.92 and 0.50, respectively). In addition, the system supports full-fledged work with Ukrainian-language content, which is its key competitive advantage. The practical application of the tool covers journalism, fact-checking, analytics, and improving media literacy among citizens, contributing to the improvement of the state's information security.

[...] Read more.
Machine Learning-based Intrusion Detection Technique for IoT: Simulation with Cooja

By Ali H. Farea Kerem Kucuk

DOI: https://doi.org/10.5815/ijcnis.2024.01.01, Pub. Date: 8 Feb. 2024

The Internet of Things (IoT) is one of the promising technologies of the future. It offers many attractive features that we depend on nowadays with less effort and faster in real-time. However, it is still vulnerable to various threats and attacks due to the obstacles of its heterogeneous ecosystem, adaptive protocols, and self-configurations. In this paper, three different 6LoWPAN attacks are implemented in the IoT via Contiki OS to generate the proposed dataset that reflects the 6LoWPAN features in IoT. For analyzed attacks, six scenarios have been implemented. Three of these are free of malicious nodes, and the others scenarios include malicious nodes. The typical scenarios are a benchmark for the malicious scenarios for comparison, extraction, and exploration of the features that are affected by attackers. These features are used as criteria input to train and test our proposed hybrid Intrusion Detection and Prevention System (IDPS) to detect and prevent 6LoWPAN attacks in the IoT ecosystem. The proposed hybrid IDPS has been trained and tested with improved accuracy on both KoU-6LoWPAN-IoT and Edge IIoT datasets. In the proposed hybrid IDPS for the detention phase, the Artificial Neural Network (ANN) classifier achieved the highest accuracy among the models in both the 2-class and N-class. Before the accuracy improved in our proposed dataset with the 4-class and 2-class mode, the ANN classifier achieved 95.65% and 99.95%, respectively, while after the accuracy optimization reached 99.84% and 99.97%, respectively. For the Edge IIoT dataset, before the accuracy improved with the 15-class and 2-class modes, the ANN classifier achieved 95.14% and 99.86%, respectively, while after the accuracy optimized up to 97.64% and 99.94%, respectively. Also, the decision tree-based models achieved lightweight models due to their lower computational complexity, so these have an appropriate edge computing deployment. Whereas other ML models reach heavyweight models and are required more computational complexity, these models have an appropriate deployment in cloud or fog computing in IoT networks.

[...] Read more.
Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review

By Sumit Goyal

DOI: https://doi.org/10.5815/ijcnis.2014.03.03, Pub. Date: 8 Feb. 2014

These days cloud computing is booming like no other technology. Every organization whether it’s small, mid-sized or big, wants to adapt this cutting edge technology for its business. As cloud technology becomes immensely popular among these businesses, the question arises: Which cloud model to consider for your business? There are four types of cloud models available in the market: Public, Private, Hybrid and Community. This review paper answers the question, which model would be most beneficial for your business. All the four models are defined, discussed and compared with the benefits and pitfalls, thus giving you a clear idea, which model to adopt for your organization.

[...] Read more.
Classification of HHO-based Machine Learning Techniques for Clone Attack Detection in WSN

By Ramesh Vatambeti Vijay Kumar Damera Karthikeyan H. Manohar M. Sharon Roji Priya C. M. S. Mekala

DOI: https://doi.org/10.5815/ijcnis.2023.06.01, Pub. Date: 8 Dec. 2023

Thanks to recent technological advancements, low-cost sensors with dispensation and communication capabilities are now feasible. As an example, a Wireless Sensor Network (WSN) is a network in which the nodes are mobile computers that exchange data with one another over wireless connections rather than relying on a central server. These inexpensive sensor nodes are particularly vulnerable to a clone node or replication assault because of their limited processing power, memory, battery life, and absence of tamper-resistant hardware. Once an attacker compromises a sensor node, they can create many copies of it elsewhere in the network that share the same ID. This would give the attacker complete internal control of the network, allowing them to mimic the genuine nodes' behavior. This is why scientists are so intent on developing better clone assault detection procedures. This research proposes a machine learning based clone node detection (ML-CND) technique to identify clone nodes in wireless networks. The goal is to identify clones effectively enough to prevent cloning attacks from happening in the first place. Use a low-cost identity verification process to identify clones in specific locations as well as around the globe. Using the Optimized Extreme Learning Machine (OELM), with kernels of ELM ideally determined through the Horse Herd Metaheuristic Optimization Algorithm (HHO), this technique safeguards the network from node identity replicas. Using the node identity replicas, the most reliable transmission path may be selected. The procedure is meant to be used to retrieve data from a network node. The simulation result demonstrates the performance analysis of several factors, including sensitivity, specificity, recall, and detection.

[...] Read more.
D2D Communication Using Distributive Deep Learning with Coot Bird Optimization Algorithm

By Nethravathi H. M. Akhila S. Vinayakumar Ravi

DOI: https://doi.org/10.5815/ijcnis.2023.05.01, Pub. Date: 8 Oct. 2023

D2D (Device-to-device) communication has a major role in communication technology with resource and power allocation being a major attribute of the network. The existing method for D2D communication has several problems like slow convergence, low accuracy, etc. To overcome these, a D2D communication using distributed deep learning with a coot bird optimization algorithm has been proposed. In this work, D2D communication is combined with the Coot Bird Optimization algorithm to enhance the performance of distributed deep learning. Reducing the interference of eNB with the use of deep learning can achieve near-optimal throughput. Distributed deep learning trains the devices as a group and it works independently to reduce the training time of the devices. This model confirms the independent resource allocation with optimized power value and the least Bit Error Rate for D2D communication while sustaining the quality of services. The model is finally trained and tested successfully and is found to work for power allocation with an accuracy of 99.34%, giving the best fitness of 80%, the worst fitness value of 46%, mean value of 6.76 and 0.55 STD value showing better performance compared to the existing works.

[...] Read more.
A Critical appraisal on Password based Authentication

By Amanpreet A. Kaur Khurram K. Mustafa

DOI: https://doi.org/10.5815/ijcnis.2019.01.05, Pub. Date: 8 Jan. 2019

There is no doubt that, even after the development of many other authentication schemes, passwords remain one of the most popular means of authentication. A review in the field of password based authentication is addressed, by introducing and analyzing different schemes of authentication, respective advantages and disadvantages, and probable causes of the ‘very disconnect’ between user and password mechanisms. The evolution of passwords and how they have deep-rooted in our life is remarkable. This paper addresses the gap between the user and industry perspectives of password authentication, the state of art of password authentication and how the most investigated topic in password authentication changed over time. The author’s tries to distinguish password based authentication into two levels ‘User Centric Design Level’ and the ‘Machine Centric Protocol Level’ under one framework. The paper concludes with the special section covering the ways in which password based authentication system can be strengthened on the issues which are currently holding-in the password based authentication.

[...] Read more.
Social Engineering: I-E based Model of Human Weakness for Attack and Defense Investigations

By Wenjun Fan Kevin Lwakatare Rong Rong

DOI: https://doi.org/10.5815/ijcnis.2017.01.01, Pub. Date: 8 Jan. 2017

Social engineering is the attack aimed to manipulate dupe to divulge sensitive information or take actions to help the adversary bypass the secure perimeter in front of the information-related resources so that the attacking goals can be completed. Though there are a number of security tools, such as firewalls and intrusion detection systems which are used to protect machines from being attacked, widely accepted mechanism to prevent dupe from fraud is lacking. However, the human element is often the weakest link of an information security chain, especially, in a human-centered environment. In this paper, we reveal that the human psychological weaknesses result in the main vulnerabilities that can be exploited by social engineering attacks. Also, we capture two essential levels, internal characteristics of human nature and external circumstance influences, to explore the root cause of the human weaknesses. We unveil that the internal characteristics of human nature can be converted into weaknesses by external circumstance influences. So, we propose the I-E based model of human weakness for social engineering investigation. Based on this model, we analyzed the vulnerabilities exploited by different techniques of social engineering, and also, we conclude several defense approaches to fix the human weaknesses. This work can help the security researchers to gain insights into social engineering from a different perspective, and in particular, enhance the current and future research on social engineering defense mechanisms.

[...] Read more.
Forensics Image Acquisition Process of Digital Evidence

By Erhan Akbal Sengul Dogan

DOI: https://doi.org/10.5815/ijcnis.2018.05.01, Pub. Date: 8 May 2018

For solving the crimes committed on digital materials, they have to be copied. An evidence must be copied properly in valid methods that provide legal availability. Otherwise, the material cannot be used as an evidence. Image acquisition of the materials from the crime scene by using the proper hardware and software tools makes the obtained data legal evidence. Choosing the proper format and verification function when image acquisition affects the steps in the research process. For this purpose, investigators use hardware and software tools. Hardware tools assure the integrity and trueness of the image through write-protected method. As for software tools, they provide usage of certain write-protect hardware tools or acquisition of the disks that are directly linked to a computer. Image acquisition through write-protect hardware tools assures them the feature of forensic copy. Image acquisition only through software tools do not ensure the forensic copy feature. During the image acquisition process, different formats like E01, AFF, DD can be chosen. In order to provide the integrity and trueness of the copy, hash values have to be calculated using verification functions like SHA and MD series. In this study, image acquisition process through hardware-software are shown. Hardware acquisition of a 200 GB capacity hard disk is made through Tableau TD3 and CRU Ditto. The images of the same storage are taken through Tableau, CRU and RTX USB bridge and through FTK imager and Forensic Imager; then comparative performance assessment results are presented.

[...] Read more.
Comparative Analysis of KNN Algorithm using Various Normalization Techniques

By Amit Pandey Achin Jain

DOI: https://doi.org/10.5815/ijcnis.2017.11.04, Pub. Date: 8 Nov. 2017

Classification is the technique of identifying and assigning individual quantities to a group or a set. In pattern recognition, K-Nearest Neighbors algorithm is a non-parametric method for classification and regression. The K-Nearest Neighbor (kNN) technique has been widely used in data mining and machine learning because it is simple yet very useful with distinguished performance. Classification is used to predict the labels of test data points after training sample data. Over the past few decades, researchers have proposed many classification methods, but still, KNN (K-Nearest Neighbor) is one of the most popular methods to classify the data set. The input consists of k closest examples in each space, the neighbors are picked up from a set of objects or objects having same properties or value, this can be considered as a training dataset. In this paper, we have used two normalization techniques to classify the IRIS Dataset and measure the accuracy of classification using Cross-Validation method using R-Programming. The two approaches considered in this paper are - Data with Z-Score Normalization and Data with Min-Max Normalization.

[...] Read more.
Statistical Techniques for Detecting Cyberattacks on Computer Networks Based on an Analysis of Abnormal Traffic Behavior

By Zhengbing Hu Roman Odarchenko Sergiy Gnatyuk Maksym Zaliskyi Anastasia Chaplits Sergiy Bondar Vadim Borovik

DOI: https://doi.org/10.5815/ijcnis.2020.06.01, Pub. Date: 8 Dec. 2020

Represented paper is currently topical, because of year on year increasing quantity and diversity of attacks on computer networks that causes significant losses for companies. This work provides abilities of such problems solving as: existing methods of location of anomalies and current hazards at networks, statistical methods consideration, as effective methods of anomaly detection and experimental discovery of choosed method effectiveness. The method of network traffic capture and analysis during the network segment passive monitoring is considered in this work. Also, the processing way of numerous network traffic indexes for further network information safety level evaluation is proposed. Represented methods and concepts usage allows increasing of network segment reliability at the expense of operative network anomalies capturing, that could testify about possible hazards and such information is very useful for the network administrator. To get a proof of the method effectiveness, several network attacks, whose data is storing in specialised DARPA dataset, were chosen. Relevant parameters for every attack type were calculated. In such a way, start and termination time of the attack could be obtained by this method with insignificant error for some methods.

[...] Read more.
Password Security: An Analysis of Password Strengths and Vulnerabilities

By Katha Chanda

DOI: https://doi.org/10.5815/ijcnis.2016.07.04, Pub. Date: 8 Jul. 2016

Passwords can be used to gain access to specific data, an account, a computer system or a protected space. A single user may have multiple accounts that are protected by passwords. Research shows that users tend to keep same or similar passwords for different accounts with little differences. Once a single password becomes known, a number of accounts can be compromised. This paper deals with password security, a close look at what goes into making a password strong and the difficulty involved in breaking a password. The following sections discuss related work and prove graphically and mathematically the different aspects of password securities, overlooked vulnerabilities and the importance of passwords that are widely ignored. This work describes tests that were carried out to evaluate the resistance of passwords of varying strength against brute force attacks. It also discusses overlooked parameters such as entropy and how it ties in to password strength. This work also discusses the password composition enforcement of different popular websites and then presents a system designed to provide an adaptive and effective measure of password strength. This paper contributes toward minimizing the risk posed by those seeking to expose sensitive digital data. It provides solutions for making password breaking more difficult as well as convinces users to choose and set hard-to-break passwords.

[...] Read more.
Optimal Route Based Advanced Algorithm using Hot Link Split Multi-Path Routing Algorithm

By Akhilesh A. Waoo Sanjay Sharma Manjhari Jain

DOI: https://doi.org/10.5815/ijcnis.2014.08.07, Pub. Date: 8 Jul. 2014

Present research work describes advancement in standard routing protocol AODV for mobile ad-hoc networks. Our mechanism sets up multiple optimal paths with the criteria of bandwidth and delay to store multiple optimal paths in the network. At time of link failure, it will switch to next available path. We have used the information that we get in the RREQ packet and also send RREP packet to more than one path, to set up multiple paths, It reduces overhead of local route discovery at the time of link failure and because of this End to End Delay and Drop Ratio decreases. The main feature of our mechanism is its simplicity and improved efficiency. This evaluates through simulations the performance of the AODV routing protocol including our scheme and we compare it with HLSMPRA (Hot Link Split Multi-Path Routing Algorithm) Algorithm. Indeed, our scheme reduces routing load of network, end to end delay, packet drop ratio, and route error sent. The simulations have been performed using network simulator OPNET. The network simulator OPNET is discrete event simulation software for network simulations which means it simulates events not only sending and receiving packets but also forwarding and dropping packets. This modified algorithm has improved efficiency, with more reliability than Previous Algorithm.

[...] Read more.
Machine Learning-based Intrusion Detection Technique for IoT: Simulation with Cooja

By Ali H. Farea Kerem Kucuk

DOI: https://doi.org/10.5815/ijcnis.2024.01.01, Pub. Date: 8 Feb. 2024

The Internet of Things (IoT) is one of the promising technologies of the future. It offers many attractive features that we depend on nowadays with less effort and faster in real-time. However, it is still vulnerable to various threats and attacks due to the obstacles of its heterogeneous ecosystem, adaptive protocols, and self-configurations. In this paper, three different 6LoWPAN attacks are implemented in the IoT via Contiki OS to generate the proposed dataset that reflects the 6LoWPAN features in IoT. For analyzed attacks, six scenarios have been implemented. Three of these are free of malicious nodes, and the others scenarios include malicious nodes. The typical scenarios are a benchmark for the malicious scenarios for comparison, extraction, and exploration of the features that are affected by attackers. These features are used as criteria input to train and test our proposed hybrid Intrusion Detection and Prevention System (IDPS) to detect and prevent 6LoWPAN attacks in the IoT ecosystem. The proposed hybrid IDPS has been trained and tested with improved accuracy on both KoU-6LoWPAN-IoT and Edge IIoT datasets. In the proposed hybrid IDPS for the detention phase, the Artificial Neural Network (ANN) classifier achieved the highest accuracy among the models in both the 2-class and N-class. Before the accuracy improved in our proposed dataset with the 4-class and 2-class mode, the ANN classifier achieved 95.65% and 99.95%, respectively, while after the accuracy optimization reached 99.84% and 99.97%, respectively. For the Edge IIoT dataset, before the accuracy improved with the 15-class and 2-class modes, the ANN classifier achieved 95.14% and 99.86%, respectively, while after the accuracy optimized up to 97.64% and 99.94%, respectively. Also, the decision tree-based models achieved lightweight models due to their lower computational complexity, so these have an appropriate edge computing deployment. Whereas other ML models reach heavyweight models and are required more computational complexity, these models have an appropriate deployment in cloud or fog computing in IoT networks.

[...] Read more.
Classification of HHO-based Machine Learning Techniques for Clone Attack Detection in WSN

By Ramesh Vatambeti Vijay Kumar Damera Karthikeyan H. Manohar M. Sharon Roji Priya C. M. S. Mekala

DOI: https://doi.org/10.5815/ijcnis.2023.06.01, Pub. Date: 8 Dec. 2023

Thanks to recent technological advancements, low-cost sensors with dispensation and communication capabilities are now feasible. As an example, a Wireless Sensor Network (WSN) is a network in which the nodes are mobile computers that exchange data with one another over wireless connections rather than relying on a central server. These inexpensive sensor nodes are particularly vulnerable to a clone node or replication assault because of their limited processing power, memory, battery life, and absence of tamper-resistant hardware. Once an attacker compromises a sensor node, they can create many copies of it elsewhere in the network that share the same ID. This would give the attacker complete internal control of the network, allowing them to mimic the genuine nodes' behavior. This is why scientists are so intent on developing better clone assault detection procedures. This research proposes a machine learning based clone node detection (ML-CND) technique to identify clone nodes in wireless networks. The goal is to identify clones effectively enough to prevent cloning attacks from happening in the first place. Use a low-cost identity verification process to identify clones in specific locations as well as around the globe. Using the Optimized Extreme Learning Machine (OELM), with kernels of ELM ideally determined through the Horse Herd Metaheuristic Optimization Algorithm (HHO), this technique safeguards the network from node identity replicas. Using the node identity replicas, the most reliable transmission path may be selected. The procedure is meant to be used to retrieve data from a network node. The simulation result demonstrates the performance analysis of several factors, including sensitivity, specificity, recall, and detection.

[...] Read more.
D2D Communication Using Distributive Deep Learning with Coot Bird Optimization Algorithm

By Nethravathi H. M. Akhila S. Vinayakumar Ravi

DOI: https://doi.org/10.5815/ijcnis.2023.05.01, Pub. Date: 8 Oct. 2023

D2D (Device-to-device) communication has a major role in communication technology with resource and power allocation being a major attribute of the network. The existing method for D2D communication has several problems like slow convergence, low accuracy, etc. To overcome these, a D2D communication using distributed deep learning with a coot bird optimization algorithm has been proposed. In this work, D2D communication is combined with the Coot Bird Optimization algorithm to enhance the performance of distributed deep learning. Reducing the interference of eNB with the use of deep learning can achieve near-optimal throughput. Distributed deep learning trains the devices as a group and it works independently to reduce the training time of the devices. This model confirms the independent resource allocation with optimized power value and the least Bit Error Rate for D2D communication while sustaining the quality of services. The model is finally trained and tested successfully and is found to work for power allocation with an accuracy of 99.34%, giving the best fitness of 80%, the worst fitness value of 46%, mean value of 6.76 and 0.55 STD value showing better performance compared to the existing works.

[...] Read more.
A Critical appraisal on Password based Authentication

By Amanpreet A. Kaur Khurram K. Mustafa

DOI: https://doi.org/10.5815/ijcnis.2019.01.05, Pub. Date: 8 Jan. 2019

There is no doubt that, even after the development of many other authentication schemes, passwords remain one of the most popular means of authentication. A review in the field of password based authentication is addressed, by introducing and analyzing different schemes of authentication, respective advantages and disadvantages, and probable causes of the ‘very disconnect’ between user and password mechanisms. The evolution of passwords and how they have deep-rooted in our life is remarkable. This paper addresses the gap between the user and industry perspectives of password authentication, the state of art of password authentication and how the most investigated topic in password authentication changed over time. The author’s tries to distinguish password based authentication into two levels ‘User Centric Design Level’ and the ‘Machine Centric Protocol Level’ under one framework. The paper concludes with the special section covering the ways in which password based authentication system can be strengthened on the issues which are currently holding-in the password based authentication.

[...] Read more.
Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review

By Sumit Goyal

DOI: https://doi.org/10.5815/ijcnis.2014.03.03, Pub. Date: 8 Feb. 2014

These days cloud computing is booming like no other technology. Every organization whether it’s small, mid-sized or big, wants to adapt this cutting edge technology for its business. As cloud technology becomes immensely popular among these businesses, the question arises: Which cloud model to consider for your business? There are four types of cloud models available in the market: Public, Private, Hybrid and Community. This review paper answers the question, which model would be most beneficial for your business. All the four models are defined, discussed and compared with the benefits and pitfalls, thus giving you a clear idea, which model to adopt for your organization.

[...] Read more.
Detecting Remote Access Network Attacks Using Supervised Machine Learning Methods

By Samuel Ndichu Sylvester McOyowo Henry Okoyo Cyrus Wekesa

DOI: https://doi.org/10.5815/ijcnis.2023.02.04, Pub. Date: 8 Apr. 2023

Remote access technologies encrypt data to enforce policies and ensure protection. Attackers leverage such techniques to launch carefully crafted evasion attacks introducing malware and other unwanted traffic to the internal network. Traditional security controls such as anti-virus software, firewall, and intrusion detection systems (IDS) decrypt network traffic and employ signature and heuristic-based approaches for malware inspection. In the past, machine learning (ML) approaches have been proposed for specific malware detection and traffic type characterization. However, decryption introduces computational overheads and dilutes the privacy goal of encryption. The ML approaches employ limited features and are not objectively developed for remote access security. This paper presents a novel ML-based approach to encrypted remote access attack detection using a weighted random forest (W-RF) algorithm. Key features are determined using feature importance scores. Class weighing is used to address the imbalanced data distribution problem common in remote access network traffic where attacks comprise only a small proportion of network traffic. Results obtained during the evaluation of the approach on benign virtual private network (VPN) and attack network traffic datasets that comprise verified normal hosts and common attacks in real-world network traffic are presented. With recall and precision of 100%, the approach demonstrates effective performance. The results for k-fold cross-validation and receiver operating characteristic (ROC) mean area under the curve (AUC) demonstrate that the approach effectively detects attacks in encrypted remote access network traffic, successfully averting attackers and network intrusions.

[...] Read more.
Synthesis of the Structure of a Computer System Functioning in Residual Classes

By Victor Krasnobayev Alexandr Kuznetsov Kateryna Kuznetsova

DOI: https://doi.org/10.5815/ijcnis.2023.01.01, Pub. Date: 8 Feb. 2023

An important task of designing complex computer systems is to ensure high reliability. Many authors investigate this problem and solve it in various ways. Most known methods are based on the use of natural or artificially introduced redundancy. This redundancy can be used passively and/or actively with (or without) restructuring of the computer system. This article explores new technologies for improving fault tolerance through the use of natural and artificially introduced redundancy of the applied number system. We consider a non-positional number system in residual classes and use the following properties: independence, equality, and small capacity of residues that define a non-positional code structure. This allows you to: parallelize arithmetic calculations at the level of decomposition of the remainders of numbers; implement spatial spacing of data elements with the possibility of their subsequent asynchronous independent processing; perform tabular execution of arithmetic operations of the base set and polynomial functions with single-cycle sampling of the result of a modular operation. Using specific examples, we present the calculation and comparative analysis of the reliability of computer systems. The conducted studies have shown that the use of non-positional code structures in the system of residual classes provides high reliability. In addition, with an increase in the bit grid of computing devices, the efficiency of using the system of residual classes increases. Our studies show that in order to increase reliability, it is advisable to reserve small nodes and blocks of a complex system, since the failure rate of individual elements is always less than the failure rate of the entire computer system.

[...] Read more.
Information Technology Risk Management Using ISO 31000 Based on ISSAF Framework Penetration Testing (Case Study: Election Commission of X City)

By I Gede Ary Suta Sanjaya Gusti Made Arya Sasmita Dewa Made Sri Arsa

DOI: https://doi.org/10.5815/ijcnis.2020.04.03, Pub. Date: 8 Aug. 2020

Election Commission of X City is an institution that serves as the organizer of elections in the X City, which has a website as a medium in the delivery of information to the public and as a medium for the management and structuring of voter data in the domicile of X City. As a website that stores sensitive data, it is necessary to have risk management aimed at improving the security aspects of the website of Election Commission of X City. The Information System Security Assessment Framework (ISSAF) is a penetration testing standard used to test website resilience, with nine stages of attack testing which has several advantages over existing security controls against threats and security gaps, and serves as a bridge between technical and managerial views of penetration testing by applying the necessary controls on both aspects. Penetration testing is carried out to find security holes on the website, which can then be used for assessment on ISO 31000 risk management which includes the stages of risk identification, risk analysis, and risk evaluation. The main findings of this study are testing a combination of penetration testing using the ISSAF framework and ISO 31000 risk management to obtain the security risks posed by a website. Based on this research, obtained the results that there are 18 security gaps from penetration testing, which based on ISO 31000 risk management assessment there are two types of security risks with high level, eight risks of medium level security vulnerabilities, and eight risks of security vulnerability with low levels. Some recommendations are given to overcome the risk of gaps found on the website.

[...] Read more.
Evaluation of GAN-based Models for Phishing URL Classifiers

By Thi Thanh Thuy Pham Tuan Dung Pham Viet Cuong Ta

DOI: https://doi.org/10.5815/ijcnis.2023.02.01, Pub. Date: 8 Apr. 2023

Phishing attacks by malicious URL/web links are common nowadays. The user data, such as login credentials and credit card numbers can be stolen by their careless clicking on these links. Moreover, this can lead to installation of malware on the target systems to freeze their activities, perform ransomware attack or reveal sensitive information. Recently, GAN-based models have been attractive for anti-phishing URLs. The general motivation is using Generator network (G) to generate fake URL strings and Discriminator network (D) to distinguish the real and the fake URL samples. This is operated in adversarial way between G and D so that the synthesized URL samples by G become more and more similar to the real ones. From the perspective of cybersecurity defense, GAN-based motivation can be exploited for D as a phishing URL detector or classifier. This means after training GAN on both malign and benign URL strings, a strong classifier/detector D can be achieved. From the perspective of cyberattack, the attackers would like to to create fake URLs that are as close to the real ones as possible to perform phishing attacks. This makes them easier to fool users and detectors. In the related proposals, GAN-based models are mainly exploited for anti-phishing URLs. There have been no evaluations specific for GAN-generated fake URLs. The attacker can make use of these URL strings for phishing attacks. In this work, we propose to use TLD (Top-level Domain) and SSIM (Structural Similarity Index Score) scores for evaluation the GAN-synthesized URL strings in terms of the structural similariy with the real ones. The more similar in the structure of the GAN-generated URLs are to the real ones, the more likely they are to fool the classifiers. Different GAN models from basic GAN to others GAN extensions of DCGAN, WGAN, SEQGAN are explored in this work. We show from the intensive experiments that D classifier of basic GAN and DCGAN surpasses other GAN models of WGAN and SegGAN. The effectiveness of the fake URL patterns generated from SeqGAN is the best compared to other GAN models in both structural similarity and the ability in deceiving the phishing URL classifiers of LSTM (Long Short Term Memory) and RF (Random Forest).

[...] Read more.