International Journal of Computer Network and Information Security (IJCNIS)

IJCNIS Vol. 16, No. 5, Oct. 2024

Cover page and Table of Contents: PDF (size: 191KB)

Table Of Contents

REGULAR PAPERS

Traffic Engineering with Specified Quality of Service Parameters in Software-defined Networks

By Artem Volokyta Alla Kogan Oleksii Cherevatenko Dmytro Korenko Dmytro Oboznyi Yurii Kulakov

DOI: https://doi.org/10.5815/ijcnis.2024.05.01, Pub. Date: 8 Oct. 2024

A method of traffic engineering (TE) based on the method of multi-path routing is proposed in the study. Today, one of the main challenges in networking is to organize an efficient TE system that will provide such parameters of quality of service (QoS) as the allowable value of packet loss and time for traffic re-routing. Traditional one-way routing facilities do not provide the required quality of service (QoS) parameters for TE. Modern computer networks use static and dynamic routing algorithms, which are characterized by big time complexity and a large amount of service information. This negatively affects the overall state of the network, namely: leads to network congestion, device failure, loss of information during routing and increases the time for traffic re-routing. Research has shown that the most promising way to solve the TE problem in computer networks is a comprehensive approach, which consists of multi-path routing, SDN technology and monitoring of the overall situation of the network. This paper proposes a method of traffic engineering in a software-defined network with specified quality of service parameters, which has reduced the time of traffic re-routing and the percentage of packet loss due to the combination of the centralized TE method and multi-path routing. From a practical point of view, the obtained method, will improve the quality of service in computer networks in comparison with the known method of traffic construction.

[...] Read more.
Blocking Fraud, Advertising, or Campaign-Related Calls with a Blockchain-based Mobile App

By Remzi Gurfidan Serafettin Atmaca

DOI: https://doi.org/10.5815/ijcnis.2024.05.02, Pub. Date: 8 Oct. 2024

The use of a person's cell phone to commit fraud is known as cell phone fraud. Such scams are usually carried out through fake phone calls or text messages. The victim receives a call from a cell phone scammer, usually claiming to have an emergency or a legal problem. The purpose of the scam is usually to convince the victim to provide personal or financial information. This may include private information such as social security numbers, bank account details or credit card information. In addition, users are often subjected to unsolicited calls for marketing and information gathering initiatives such as campaigns, advertisements and surveys. In this study, a smartphone application built on the blockchain is created to stop these nuisance actions. Transaction times and performance tests have been rigorously performed according to the difficulty levels of the blockchain structure.

[...] Read more.
Multi Attribute Trust Aware Routing for Adversary Detection in Wireless Sensor Networks

By Akshatha Hari Bhat Balachandra Achar H. V. Anil Mehta

DOI: https://doi.org/10.5815/ijcnis.2024.05.03, Pub. Date: 8 Oct. 2024

Security attacks has become major obstacles in Wireless Sensor Networks (WSN) and Trust Aware Routing is second line of defense. With an aim to improve on the existing routing mechanisms, in this paper, we propose Interactive, Onlooker and Capability Trust Aware Routing (IOC-TAR), a multi-trust attribute framework for trust management in WSNs. IOC-TAR employs three trust features to establish a trustworthy relationship between sensor nodes for their cooperation. Interactive trust uses communication interactions, onlooker trust uses neighbor node’s opinions and capability trust uses stability and fault tolerance for trust assessment. For, each node, one composite trust factor is formulated and decides its trustworthiness. Extensive simulation experiments are conducted to evaluate the effectiveness and efficiency of proposed IOC-TAR in the identification of malicious nodes and the provision of attack resilience. The results declare that the IOC-TAR enhances the attack resilience by improving Malicious Detection rate and reducing False Positive Rate.

[...] Read more.
A Novel Model for Protecting the Privacy of Digital Images in Cloud Using Permutated Fragmentation and Encryption Algorithms

By Ahmed Y. Mahmoud Mohammed Ibraheem AL Kahlout

DOI: https://doi.org/10.5815/ijcnis.2024.05.04, Pub. Date: 8 Oct. 2024

Maintaining privacy is becoming increasingly challenging due to growing reliance on cloud services and software, respectively. Our data is stored in a virtual environment on unreliable cloud machines, making it susceptible to privacy breaches if not handled properly. Encrypting data before uploading it can be a solution to this problem, but it can be time-consuming. However, all of the encryption methods used to safeguard digital data so far did not fulfillment privacy and integration requirements. This is because encryption cannot function independently. Data that is encrypted and stored on a single cloud server can still be accessed by attackers, compromising the privacy of the data. In this paper, we propose a new model based on the user's classification of privacy level. The proposed model divides the digital file into multiple fragments and separately encrypts each fragment; each fragment is encrypted as separated blocks. Additionally, permutation is implemented on encrypted fragments because they are stored in the cloud with replication fragments on another cloud service. This approach ensures that even if the attacker’s gains access to one fragment, they would not be able to access the entire file, thereby safeguarding the privacy of the data.

[...] Read more.
An Efficient Approach for Detection of Compromised SDN Switches and Restoration of Network Flow

By Tinku Adhikari Ajoy Kumar Khan Malay Kule Subhajit Das

DOI: https://doi.org/10.5815/ijcnis.2024.05.05, Pub. Date: 8 Oct. 2024

In Software Defined Networking (SDN) the data plane is separated from the controller plane to achieve better functionality than the traditional networking. Although this approach poses a lot of security vulnerabilities due to its centralized approach. One significant issue is compromised SDN switches because the switches are dumb in SDN architecture and in absence of any intelligence it can be a easy target to the attackers. If one or more switches are attacked and compromised by the attackers, then the whole network might be down or defunct. Therefore, in this work we have devised a strategy to successfully detect the compromised SDN switches, isolate them and then reconstruct the whole network flow again by bypassing the compromised switches. In our proposed approach of detection, we have used two controllers, one as primary and another as secondary which is used to run and validate our algorithm in the detection process. Flow reconstruction is the next job of the secondary controller which after execution is conveyed to the primary controller. A two-controller strategy has been used to balance the additional load of detection and reconstruction activity from the master controller and thus achieved a balanced outcome in terms of running time and CPU utilization. All the propositions are validated by experimental analysis of the results and compared with existing state of the art to satisfy our claim.

[...] Read more.
Disinformation, Fakes and Propaganda Identifying Methods in Online Messages Based on NLP and Machine Learning Methods

By Victoria Vysotska Krzysztof Przystupa Lyubomyr Chyrun Serhii Vladov Yuriy Ushenko Dmytro Uhryn Zhengbing Hu

DOI: https://doi.org/10.5815/ijcnis.2024.05.06, Pub. Date: 8 Oct. 2024

A new method of propaganda analysis is proposed to identify signs and change the dynamics of the behaviour of coordinated groups based on machine learning at the processing disinformation stages. In the course of the work, two models were implemented to recognise propaganda in textual data - at the message level and the phrase level. Within the framework of solving the problem of analysis and recognition of text data, in particular, fake news on the Internet, an important component of NLP technology (natural language processing) is the classification of words in text data. In this context, classification is the assignment or assignment of textual data to one or more predefined categories or classes. For this purpose, the task of binary text classification was solved. Both models are built based on logistic regression, and in the process of data preparation and feature extraction, such methods as vectorisation using TF-IDF vectorisation (Term Frequency – Inverse Document Frequency), the BOW model (Bag-of-Words), POS marking (Part-Of-Speech), word embedding using the Word2Vec two-layer neural network, as well as manual feature extraction methods aimed at identifying specific methods of political propaganda in texts are used. The analogues of the project under development are analysed the subject area (the propaganda used in the media and the basis of its production methods) is studied. The software implementation is carried out in Python, using the seaborn, matplotlib, genism, spacy, NLTK (Natural Language Toolkit), NumPy, pandas, scikit-learn libraries. The model's score for propaganda recognition at the phrase level was obtained: 0.74, and at the message level: 0.99. The implementation of the results will significantly reduce the time required to make the most appropriate decision on the implementation of counter-disinformation measures concerning the identified coordinated groups of disinformation generation, fake news and propaganda. Different classification algorithms for detecting fake news and non-fakes or fakes identification accuracy from Internet resources ana social mass media are used as the decision tree (for non-fakes identification accuracy 0.98 and fakes identification accuracy 0.9903), the k-nearest neighbours (0.83/0.999), the random forest (0.991/0.933), the multilayer perceptron (0.9979/0.9945), the logistic regression (0.9965/0.9988), and the Bayes classifier (0.998/0.913). The logistic regression (0.9965) the multilayer perceptron (0.9979) and the Bayesian classifier (0.998) are more optimal for non-fakes news identification. The logistic regression (0.9988), the multilayer perceptron (0.9945), and k-nearest neighbours (0.999) are more optimal for identifying fake news identification.

[...] Read more.
Path Loss Analysis of ZigBee for Smart Meter Network Deployment in NAN

By Sehan Samarakoon Maheshi B. Dissanayake Kithsiri M Liyanage Sudheera Navaratne Chirantha Jayasinghe Prabhath Illangakoon

DOI: https://doi.org/10.5815/ijcnis.2024.05.07, Pub. Date: 8 Oct. 2024

A fundamental and vital aspect of Smart Metering infrastructure is the communication technologies and techniques associated with it, especially between the Smart Meters and the Data Concentrator Unit. Among many available communication technologies, ZigBee provides a low-cost, low-power, and easy-to-deploy network solution for a Smart Meter network. There exists limited literature that discusses ZigBee as a potential communication technology for long-range networks. Hence thorough analysis is demanded on the suitability of ZigBee for smart meter deployment under different types of environmental conditions, coverage ranges, and obstacles. This work evaluates the performance of an extended ZigBee module in outdoor as well as indoor conditions in the presence of different types of obstacles. Parameters are obtained for path loss exponent and the standard deviation of the Gaussian Random variable to validate the Log Normal Shadowing model for modeling long-range ZigBee communication. The impact of obstacles on path loss is also considered. The results show that the Log Normal Shadowing model is a good approximation for the behavior of ZigBee path loss. Accordingly, the suitability of ZigBee for a Smart Meter network spanned as a Neighborhood Area Network is also assessed based on the approximated model.

[...] Read more.
IHBOT: An Intelligent and Hybrid Model for Investigation and Classification of IoT Botnet

By Umang Garg Santosh Kumar Manoj Kumar

DOI: https://doi.org/10.5815/ijcnis.2024.05.08, Pub. Date: 8 Oct. 2024

The Internet of Things (IoT) is revolutionizing the technological market with exponential growth year wise. This revolution of IoT applications has also brought hackers and malware to gain remote access to IoT devices. The security of IoT systems has become more critical for consumers and businesses because of their inherent heterogenous design and open interfaces. Since the release of Mirai in 2016, IoT malware has gained an exponential growth rate. As IoT system and their infrastructure have become critical resources that triggers IoT malware injected by various shareholders in different settings. The enormous applications cause flooding of insecure packets and commands that fueled threats for IoT applications. IoT botnet is one of the most critical malwares that keeps evolving with the network traffic and may harm the privacy of IoT devices. In this work, we presented several sets of malware analysis mechanisms to understand the behavior of IoT malware. We devise an intelligent and hybrid model (IHBOT) that integrates the malware analysis and distinct machine learning algorithms for the identification and classification of the different IoT malware family based on network traffic. The clustering mechanism is also integrated with the proposed model for the identification of malware families based on similarity index. We have also applied YARA rules for the mitigation of IoT botnet traffic.  

[...] Read more.
Finding and Mitigating a Vulnerability of the Color Wheel PIN Protocol

By Samir Chabbi Djalel Chefrour Nour El Madhoun

DOI: https://doi.org/10.5815/ijcnis.2024.05.09, Pub. Date: 8 Oct. 2024

There is an increasing usage in the banking sector of Smartphones enabled with Near Field Communication (NFC), to improve the services offered for the customers. This usage requires a security enhancement of the systems that employ this technology like the Automated Teller Machines (ATMs). One example is the Color Wheel Personal Identification Number (CWPIN) security protocol designed to authenticate users on ATMs using NFC enabled smartphones without typing the PIN code directly. CWPIN has been compared in the literature to several other protocols and was considered easier to use, more cost-effective and more resistant to various attacks on ATMs such as card reader skimming, keylogger injection, shoulder surfing, etc. Nevertheless, we demonstrate in this paper that CWPIN is vulnerable to the multiple video recordings intersection attack. We do so through concrete examples and a thorough analysis that reveals a high theoretical probability of attack success. A malicious party can use one or two hidden cameras to record the ATM and smartphone screens during several authentication sessions, then disclose the user's PIN code by intersecting the information extracted from the video recordings. In a more complex scenario, these video recordings could be obtained by malware injected into the ATM and the user's smartphone to record their screens during CWPIN authentication sessions. Our intersection attack requires a few recordings, usually three or four, to reveal the PIN code and can lead to unauthorized transactions if the user's smartphone is stolen. We also propose a mitigation of the identified attack through several modifications to the CWPIN protocol and discuss its strengths and limitations.

[...] Read more.
Joint Decoding Technique for Collision Resolution in Non-orthogonal Multiple Access Environment

By Suprith P. G. Mohammed Riyaz Ahmed Mithileysh Sathiyanarayanan

DOI: https://doi.org/10.5815/ijcnis.2024.05.10, Pub. Date: 8 Oct. 2024

Multiple access technologies have grown hand in hand from the first generation to the 5th Generation (5G) with both performance and quality improvement. Non-Orthogonal Multiple Access (NOMA) is the recent multiple access technology adopted in the 5G communication technology. Capacity requirements of wireless networks have grown to a large extent with the penetration of ultra-high-definition video transmission, Internet of Things (IoT), and virtual reality applications taking ground in the recent future. This paper develops the Physical Layer Network Coding (PNC) for collision resolution in a NOMA environment with two users. Traditionally NOMA uses Successive Interference Cancellation (SIC) for collision resolution. While additionally a decoding algorithm is added along with SIC to improve the performance of the collision resolution. MATLAB-based simulation is developed on the NOMA environment with two users using Viterbi coding, Low-Density Parity Check (LDPC), and Turbo coding. Performance parameters of Bit Error Rate (BER) and throughput are compared for these three algorithms. It is observed that the Turbo coding performed better among these three algorithms both in the BER and throughput. The BER obtained from the SIC- Turbo is found to be performing well with an increase of about 14% from the ordinary SIC implementation. The performance of the collision resolution has increased by 13% to 14% when joint decoding techniques are used and thus increasing the throughput of the NOMA paradigm.

[...] Read more.