journal of network security(vol2, issue1)

14
STM JOURNALS Scientific Technical Medical (JoNS) Network Security Journal of (Jan - April 2014) ISSN 2321 – 8517

Upload: stm-journals-publication

Post on 07-Apr-2016

228 views

Category:

Documents


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Journal of network security(vol2, issue1)

STM JOURNALSScientific Technical Medical

(JoNS)

Network Security

Journal of

(Jan - April 2014)

ISSN 2321 – 8517

Page 2: Journal of network security(vol2, issue1)

STM Publication, a strong initiative by Consortium E-Learning Network Private ltd.(Estd. 2006) was launched in the

year 2010 under the support and guidance by our esteemed Editorial and Advisory board members from renowned

institutes.

Objectives of STM Publication(s):

?Scientific, Technical and Medical research promotions.

?Publication of genuine Research/Review, Short Articles and Case Studies through proper review

process.

?Publishing Special Issues on Conferences.

?Preparing online platform for other print Journals.

?Empowering the libraries with online and print Journals in Scientific, Technical and Medical

domains.

?Publishing and distribution of books on various subjects which mainly falls in the category of

Nanotechnology, Scientific and technical writing & Environment, Health and Safety.

Salient Features:

?A bouquet of 100+ Journals that fall under Science, Technical & Medical domains.

?Employs Open Journals System (OJS) A Journal Management & Publishing System.

?The first and one of the fastest growing publication website in India as well as in abroad for its quality

and coverage.

?Rapid online submission and publication of papers, soon after their formal acceptance/ finalization.

?Facilitates linking with the other authors or professionals.

?Worldwide circulation and visibility.

Journal of Network Security

Focus and Scope Covers

Journal of Network Security is published (frequency: three times a year) in India by STM Journals (division of

Consortium e-Learning Network Private Ltd. Pvt.) The views expressed in the articles do not necessarily reflect of the

Publisher. The publisher does not endorse the quality or value of the advertised/sponsored products described therein.

Please consult full prescribing information before issuing a prescription for any products mentioned in this publication.

No part of this publication may be reproduced, stored in retrieval system or transmitted in any from without written

permission of the publisher.

To cite any of the material contained in this Journal, in English or translation, please use the full English reference at the

beginning of each article. To reuse any of the material, please contact STM Journals ([email protected])

(ISSN: 2321-8517)

?Internet, Network and Wireless Network Security& Applications

?Mobile, Sensor Network, Database and System Security

?Virus, worms, Trojan Protection, E-mail security, Spam, Phishing and E-mail fraud

?Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)

?Cryptographic protocols

? Intrusion Detection and Prevention

STM Publication(s)

Page 3: Journal of network security(vol2, issue1)

STM Journals (division of Consortium e-Learning Network Private Ltd. ) having its Marketing office located at Office

No. 4, First Floor, CSC pocket E Market, Mayur Vihar Phase II, New Delhi-110091, India is the Publisher of Journal.

Statements and opinions expressed in the Journal reflect the views of the author(s) and are not the opinion of STM

Journals unless so stated.

Subscription Information and Order:

Cost of Journal:

? National Subscription: Rs. 3750/- per Journal (includes 3 print issues), Single Issue copy purchase Rs.1500/copy

? International Subscription:

? Online Only- $99, Print Only-$149 (includes 3 print issues)

? Online + Print-$199 (includes 3 print issues + online access of published back volumes )

To purchase print compilation of back issues please send your query at [email protected]

Subscription must be prepaid. Rates outside the India includes speed delivery charges. Prices subject to change

without notice.

Mode of Payment: At par cheque, Demand draft, and RTGS (payment to be made in favor of

Consortium E-Learning Network. Pvt. ltd., payable at Delhi/New Delhi.

Online Access Policy

A). For Authors:

In order to provide maximum citation and wide publicity to the authors work, STM Journals also have Open Access

Policy, authors who would like to get their work open access can opt for Optional Open Access publication at

nominal cost as follows

India, SARC and African Countries: INR 2500 or 100 USD including single hard copy of Author's Journal.

Other Countries: USD 200 including single hard copy of Author's Journal.

B). For Subscribers:

? Online access will be activated within 72 hours of receipt of the payment (working days), subject to receipt of

correct information on user details/Static IP address of the subscriber.

? The access will be blocked:

? If the user requests for the same and furnishes valid reasons for blocking.

? Due to technical issue.

? Misuse of the access rights as per the access policy.

Advertising and Commercial Reprint Inquiries: STM Journals with wide circulation and visibility offer an excellent

media for showcasing/promotion of your products/services and the events-namely, Conferences, Symposia/Seminars

etc. These journals have very high potential to deliver the message across the targeted audience regularly with each

published issue. The advertisements on bulk subscriptions, gift subscriptions or reprint purchases for distribution etc. are

also very welcome.

Lost Issue Claims: Please note the following when applying for lost or missing issues:

? Claims for print copies lost will be honored only after 45 days of the dispatch date and before publication of the

next issue as per the frequency.

? Tracking id for the speed post will be provided to all our subscribers and the claims for the missing Journals will

be entertained only with the proofs which will be verified at both the ends.

? Claims filed due to insufficient (or no notice) of change of address will not be honored.

? Change of Address of Dispatch should be intimated to STM Journals at least 2 months prior to the dispatch

schedule as per the frequency by mentioning subscriber id and the subscription id.

? Refund requests will not be entertained.

Legal Disputes

All the legal disputes are subjected to Delhi Jurisdiction only.

If you have any questions, please contact the Publication Management Team:

[email protected]; Tel : +91 0120-4781211.

Page 4: Journal of network security(vol2, issue1)

Chairman

Mr. Puneet Mehrotra

Managing Director STM Journals, Consortium eLearning Network Pvt. Ltd.(CELNET)

Noida ,India

Group Managing Editor Dr. Archana Mehrotra

DirectorCELNET, Delhi, India

Puneet Pandeya

ManagerMonika Malhotra

Assistant Manager

Assistant Editors

Aditya Sanyal

Himani Garg

Himani Pandey

Publication Management Team

Internal Members

External Members

Dr. Bimlesh Lochab

Industrial Tribology Machine Dynamics & Maintenance

Engineering Centre (ITMMEC)

Indian Institute of Technology Delhi, India

Prof. S. Ramaprabhu

Alternative Energy Technology Laboratory,

Department of Physics,

Indian Institute of Technology, Chennai, India

Dr. Rajiv Prakash

School of Materials Science and Technology,

Institute of Technology, Banaras Hindu University,

Varanasi, India

Dr. Rakesh Kumar

Assistant Professor, Department of

Applied Chemistry, BIT Mesra,

Patna, India

Associate Editors

Gargi Asha Jha

Nupur Anand

Priyanka Aswal

Sona Chahal

Page 5: Journal of network security(vol2, issue1)

STM Journal (s) Advisory Board

Dr. Ashish RunthalaLecturer, Biological Sciences Group,

Birla Institute of Technology & Science, Pilani Rajasthan, India.

Dr. Baldev RajDistinguished Scientist & Director,

Indira Gandhi Centre for Atomic Research

(ICGAR)Kalpakkam, India.

Dr. Baskar KaliyamoorthyAssociate Professor, Department

of Civil Engineering National Institute of Technology Trichy, India.

Prof. Bankim Chandra RayProfessor and Head, Department of

Metallurgical and Materials Engineering National Institute of Technology,

Rourkela, India.

Prof. D. N. Rao Professor, Department of Biochemistry,

AIIMS, New Delhi, India.

Prof. Jugal KishoreProfessor, Department of Community

Medicine, Maulana Azad Medical College, New Delhi, India.

Dr. Pankaj PoddarScientist, Physical & Materials ChemistryDivision, National Chemical Laboratory,

Pune, India.

Dr. Hardev Singh VirkProfessor Emeritus, Eternal

University, Baru Sahib, India.

Dr. Nandini Chatterjee SinghAssociate Professor,

National Brain Research Centre, Manesar, India.

Page 6: Journal of network security(vol2, issue1)

Dr. Shankargouda PatilAsst. Prof., Department of Oral

Pathology, KLE Society's Institute of Dental Sciences, Bangalore, India.

Prof. Subash Chandra MishraProfessor, Metallurgical & Materials

Engineering Department, NIT, Rourkela, India.

Prof. Yuwaraj Marotrao GhugalProfessor and Head Department, Govt.College of Engineering Station Road,

Osmanpura, Aurangabad, India.

Prof. Sundara RamaprabhuProfessor, Department of Physics

Indian Institute of Technology Madras, India.

Dr. Shrikant Balkisan DhootHead Research & Development,

Nurture Earth R&D Pvt LtdMIT Campus, Beed bypass road,

Aurangabad, India.

Dr. Rakesh KumarAssistant Professor,

Department of Applied Chemistry, BIT Mesra, Patna, India.

Dr. Priyavrat TharejaHead, Materials and Metallurgical

Engineering department, PEC University of Technology,

Chandigarh, India.

STM Journal (s) Advisory Board

Page 7: Journal of network security(vol2, issue1)

Editorial Board

Dr. Divakar Singh YadavDept. of Computer Science & Engineering,

Institute of Engineering and Technology UP Technical University, Lucknow, India

Maj. Gen Anil kumar Jain Amity University, India

Dr. Mark BurginDept. of Mathematics, UCLA, Los Angeles,

CA 90095, USA, United States

Yaduvir SinghDepartment of Electrical and Instrumentation Engineering,

Thapar University, Patiala Punjab, India

Dr. Gunamani JenaME CSE, PhD, FIE, MIEEE,

LMISTE, MCSI, India

Senthil Kumar A.V.Hindusthan College of Arts

and Science, Coimbatore, India

Dr. Adesh Kumar SharmaNational Dairy Research Institute

(Deemed University), Indian Council of Agriculture, Haryana, India

Prof. Prasanta K. JanaIndian School of Mines, Dhanbad

Dr. B.L. ShivakumarAssoc. Prof., Dept. of Computer Applications,

Sri Ramakrishna Engineering College, NGGO Colony Post, Coimbatore, India

Page 8: Journal of network security(vol2, issue1)

I take the privilege to present the hard copy compilation for the [Volume 2 Issue (1)] Journal of

Network Security (JoNS). The intension of JoNS is to create an atmosphere that stimulates

creativeness, research and growth in the area of Network Security .

The development and growth of the mankind is the consequence of brilliant Research done by

eminent Scientists and Engineers in every field. JoNS provides an outlet for Research findings and

reviews in areas of Network Security found to be relevant for National and International recent

developments & research initiative.

The aim and scope of the Journal is to provide an academic medium and an important reference for

the advancement and dissemination of Research results that support high level learning, teaching and

research in the domain of Network Security .

Finally, I express my sincere gratitude and thanks to our Editorial/ Reviewer board and Authors for

their continued support and invaluable contributions and suggestions in the form of authoring write-

ups/ reviewing and providing constructive comments for the advancement of the journals. With

regards to their due continuous support and co-operation, we have been able to publish quality

Research/Review findings for our customers base.

I hope you will enjoy reading this issue and we welcome your feedback on any aspect of the Journal.

Dr. Archana Mehrotra

Director

STM Journals

Director's Desk

STM JOURNALS

Page 9: Journal of network security(vol2, issue1)

1. An Approach to Develop Secure Ear Biometric System Md. Rabiul Islam, Md. Mostafizur Rahman, Rizoan Toufiq 1

2. Behavioral Prediction of Network Attacks Using Honeypot Rules Saranya K 7

3. Detection of Distributed Denial of Service Attack by Hidden Markov Model through Web Proxy System A. Aafreen, Kannan Balasubramanian 13

4. Performance Analysis of AODV, DSR and CGSR Routing Protocol in MANET based on Energy Consumption Priyanka Bansal, Jawahar Thakur 21

5. Prediction of Phishing Website using Visual Cryptography P. Suryaprabha, A. Anny Leema 28

ContentsJournal of Network Security

Page 10: Journal of network security(vol2, issue1)

JoNS (2014)© STM Journals 2014. All Rights Reserved

Journal of Network Security ISSN: 2321-8517

Volume 2, Issue 1

www.stmjournals.com

An Approach to Develop Secure Ear Biometric System

Md. Rabiul Islam*, Md. Mostafizur Rahman, Rizoan Toufiq Department of Computer Science & Engineering, Rajshahi University of Engineering and

Technology, Rajshahi, Bangladesh

Abstract Biometrics is now the significant identification process for security system. The future

of biometrics is surely leads to a system because the acquisition process for biometrics

is very simple. Ear biometrics has an important role on biometrics system. Because it is a passive biometrics system which means that the user does not have to take active part

in the whole process. The most interesting human anatomical parts for such passive,

physiological biometrics systems based on images acquired from cameras are face and ear. This paper introduces to ear biometrics as a passive human identification systems.

Using two different methods and comparison between them help anyone to find the best

ear biometrics method. Geometrical method of feature extraction from human ear

images in order to perform human identification is presented with the help of two

different edge detection algorithms.

Keywords: Biometrics, ear identification, passive biometrics, geometrical method

Page 11: Journal of network security(vol2, issue1)

JoNS (2014) STM Journals 2014. All Rights Reserved

Journal of Network Security ISSN: 2321-8517

Volume 2, Issue 1

www.stmjournals.com

Behavioral Prediction of Network Attacks

Using Honeypot Rules

Saranya K* B. S. Abdur Rahman University, Vandlur, Chennai, India

Abstract In this paper is presented an approach for behavioral prediction of network attacks using

honeypot rules using support physical machine as a classification technique. The

proposed honeypot is used to trap delay and gather information about the attackers. These systems are centralized at a strategic point in the network and collect data into a

log file that is subsequently analyzed as main vulnerability. Honeypots can generate the signature with the help of attack classifier, and it can detect and record known and

unknown attacks in addition. Signature-based classifier uses Bayesian classification

algorithm to represent malicious file or normal file. Therefore, the IP addresses correspond to higher chances for detecting intruders as more fake systems would be

mined in the network.

Keywords: Honeypot, attacks defined, signature generation, malicious, non-

malicious, IP blacklisting

Page 12: Journal of network security(vol2, issue1)

JoNS (2014) 13-20 © STM Journals 2014. All Rights Reserved Page 13

Journal of Network Security ISSN: 2321-8517

Volume 2, Issue 1

www.stmjournals.com

Detection of Distributed Denial of Service Attack by

Hidden Markov Model through Web Proxy System

A. Aafreen*, Kannan Balasubramanian Mepco Schlenk Engineering College, Mepco Schlenk Engineering College, Sivakasi,

Tamilnadu, India

Abstract Nowadays the attack against the computer system is becoming very common and vulnerable. Indirect web proxy distributed denial of service attack is an increasingly

common internet phenomenon and is capable of making the internet services unavailable.

Such type of attacks cannot be easily discovered by most existing defense systems since malicious traffic is hidden in the aggregated traffic. Also the source of the attack traffic

and normal traffic cannot be distinguished because both of them share the same IP of the

proxy server. To overcome this problem, a new improved hidden semi-Markov model is proposed. Therefore, applying this proposed method protects the origin server from the

web proxy-based HTTP attacks. Web proxy’s access behavior can be regarded as the combination of the externally observable behavior and the internal driving mechanism.

The internal driving mechanism can be estimated by the observable features of proxy-to-

server traffic through the hidden semi-Markov model. Hidden semi-Markov model describes the dynamic behavior process of the aggregated traffic. The false positive rate

is also detected with respect to the incoming traffic.

Keywords: Traffic analysis, traffic modeling, distributed denial of service attack,

attack detection, attack response

Page 13: Journal of network security(vol2, issue1)

JoNS (2014)© STM Journals 2014. All Rights Reserved

Journal of Network Security ISSN: 2321-8517

Volume 2, Issue 1

www.stmjournals.com

Performance Analysis of AODV, DSR and CGSR

Routing Protocol in MANET based on

Energy Consumption

Priyanka Bansal*, Jawahar Thakur Department of Computer Science, HPU Shimla, India

Abstract

Mobile Ad-hoc networks (MANET) have gained lots of attention in researches in recent

years, especially in routing protocols due to their dynamic nature. There are number of

routing protocols in MANET networks and performance of these routing protocols have been evaluated focusing on metrics such as delay, packet delivery, routing

overhead, throughput. However, not much work has been done to evaluate energy aspect of these routing protocols. Design new energy efficient routing algorithms are

based on this basic MANET routing protocols is the latest research area in MANET

and WSN. This paper will discuss the performance analysis of Dynamic Source Routing (DSR),Ad-hoc On-Demand Distance Vector(AODV) and Cluster-Gate routing

protocol(CGSR) routing protocol in MANET based on energy consumption. A detailed simulation model using OMNeT++4.3 with different mobility and traffic models are

used to study their energy consumption. Finally, an evaluation of these routing

protocols based on energy consumption is presented.

Keywords: Mobile Ad hoc network (MANET), routing protocols, energy

consumption, AODV, DSR, CGSR

Page 14: Journal of network security(vol2, issue1)

JoNS (2014) © STM Journals 2014. All Rights Reserved

Journal of Network Security ISSN: 2321-8517

Volume 2, Issue 1

www.stmjournals.com

Prediction of Phishing Website using Visual Cryptography

P. Suryaprabha*, A. Anny Leema BS Abdur Rahman University, Chennai, India

Abstract Phishing is a new type of social network attack. It is the act of attempting to acquire the information such as username, password, credit card details, etc. In this project, a new

approach named as “Image Captcha Based Authentication Using Visual Cryptography”

to solve the problem of phishing is proposed. The string is converted into image captcha using the extracting and embedding method. The visual cryptography is used to preserve

the privacy of image captcha by decomposing the original image captcha into two shares

using VCS (2*2). One of the shares is kept with the user and the other is kept in the server side. The user has to enter the user name and upload his share in the login phase.

If the site is legitimate, it will display the image captcha and on the other hand image captcha will not be displayed if the website is fraudulent. This work is implemented in

Java as front-end and SQL as backend. This work helps to identify the phishing site and

the textual keyword validation along with visual cryptography.

Keywords: Phishing, embedded EVCS, luminance method, visual cryptography

scheme