12 research outputs found

    An Enhanced Boyer-Moore Algorithm for WorstCase Running Time

    Get PDF
    This article adderesses the exact string matching problem which consists in finding all occurrences of a given pattern in a text.It is an extensively studied problem in the field of computer science mainly due to despite its popularity in diverse area of application such as cluster computing, image and signal processing, speech analysis and recognition, information retrieval, data compression,computational biology,intrusion detection and virus scanning detection.In the last decade several new algorithm has been proposed.In this paper we compares all improved of the Boyer-Moore algorithm with my enhanced Boyer-Moore algorithm practically and theoretically result.It is not only generate the largest distance but also produces the minimum shifting and frequency of comparisons steps.By this enhanced algorithm we can reduce the number of comparisons frequency and number of shifting steps during the searching process.Moreover result of this enhanced Boyer-Moore algorithm reveals the efficiency is higher than of previous improved Boyer-Moore algorithms and time complexity is reduced in the concept of worst case analysis and lower than BM algorithm.Our enhanced algorithm 16% boost-up than previous improved Boyer-Moore algorithm when executed on the CPU.This enhanced Boyer-Moore algorithm can be plays an important role in finding extremely fast genetic moleculer and complex sequence pattern of interested database alignment of DNA

    Secure Routing Protocols Comparison Analysis Between RNBR, SAA, A-UPK

    Get PDF
    The advent of wireless communications and the development of mobile devices have made great strides in the development of roaming communications. The MANET mobile network was developed with the ability for mobile devices to quickly self-configure and extend wireless coverage without infrastructure support. Security is one of the most important areas of research and plays a vital role in determining the success of personal and commercial telephone systems.Therefore, this study focuses on systematically examining MANET security and accountability issues and analyzing the performance of solutions proposed by three different design approaches to security systems.First, it provides an approach for identifying trusted nodes employing the proposed RNBR method for secure routing.it provides a Self-Assured Assessment (SAA) method to estimate node stability. Its main goal is to contribute to a self-assessment-based reliability assessment mechanism that provides a reliable and reliable pathway.it provides a new authentication method to prevent forgery attacks. It supports authentication mechanisms to prevent RF attacks and ensure secure routing development.The main Objective of this paper is compare to packet delivery Ratio ,Control Overhead, Packet Drop Ratio in different secure RNBR,SAA,A-UPK Routing Protocols in MANETS

    Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model

    Full text link
    © 2018 Elsevier Inc. An effective security strategy for Wireless Sensor Networks (WSNs) is imperative to counteract security threats. Meanwhile, energy consumption directly affects the network lifetime of a wireless sensor. Thus, an attempt to exploit a low-consumption Intrusion Detection System (IDS) to detect malicious attacks makes a lot of sense. Existing Intrusion Detection Systems can only detect specific attacks and their network lifetime is short due to their high energy consumption. For the purpose of reducing energy consumption and ensuring high efficiency, this paper proposes an intrusion detection model based on game theory and an autoregressive model. The paper not only improves the autoregressive theory model into a non-cooperative, complete-information, static game model, but also predicts attack pattern reliably. The proposed approach improves on previous approaches in two main ways: (1) it takes energy consumption of the intrusion detection process into account, and (2) it obtains the optimal defense strategy that balances the system's detection efficiency and energy consumption by analyzing the model's mixed Nash equilibrium solution. In the simulation experiment, the running time of the process is regarded as the main indicator of energy consumption of the system. The simulation results show that our proposed IDS not only effectively predicts the attack time and the next targeted cluster based on the game theory, but also reduces energy consumption

    Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks.

    Get PDF
    Wireless Sensor Networks (WSNs) have become a key technology for the IoT and despite obvious benefits, challenges still exist regarding security. As more devices are connected to the internet, new cyber attacks are emerging which join well-known attacks posing significant threats to the confidentiality, integrity and availability of data in WSNs. In this work, we investigated two computational intelligence techniques for WSN intrusion detection. A back propagation neural network was compared with a support vector machine classifier. Using the NSL-KDD dataset, detection rates achieved by the two techniques for six cyber attacks were recorded. The results showed that both techniques offer a high true positive rate and a low false positive rate, making both of them good options for intrusion detection. In addition, we further show the support vector machine classifiers suitability for anomaly detection, by demonstrating its ability to handle low sample sizes, while maintaining an acceptable FPR rate under the required threshold

    SECURITY CHALLENGES IN MOBILE AD HOC NETWORKS: A SURVEY

    Get PDF
    ABSTRACT MANET is a kind of A

    Intrusion Detection in MANET Using Classification Algorithms: The Effects of Cost and Model Selection

    Get PDF
    Intrusion detection is frequently used as a second line of defense in Mobile Ad-hoc Networks (MANETs). In this paper we examine how to properly use classification methods in intrusion detection for MANETs. In order to do so we evaluate five supervised classification algorithms for intrusion detection on a number of metrics. We measure their performance on a dataset, described in this paper, which includes varied traffic conditions and mobility patterns for multiple attacks. One of our goals is to investigate how classification performance depends on the problem cost matrix. Consequently, we examine how the use of uniform versus weighted cost matrices affects classifier performance. A second goal is to examine techniques for tuning classifiers when unknown attack subtypes are expected during testing. Frequently, when classifiers are tuned using cross-validation, data from the same types of attacks are available in all folds. This differs from real-world employment where unknown types of attacks may be present. Consequently, we develop a sequential cross-validation procedure so that not all types of attacks will necessarily be present across all folds, in the hope that this would make the tuning of classifiers more robust. Our results indicate that weighted cost matrices can be used effectively with most statistical classifiers and that sequential cross-validation can have a small, but significant effect for certain types of classifiers

    Trust Evaluation in the IoT Environment

    Get PDF
    Along with the many benefits of IoT, its heterogeneity brings a new challenge to establish a trustworthy environment among the objects due to the absence of proper enforcement mechanisms. Further, it can be observed that often these encounters are addressed only concerning the security and privacy matters involved. However, such common network security measures are not adequate to preserve the integrity of information and services exchanged over the internet. Hence, they remain vulnerable to threats ranging from the risks of data management at the cyber-physical layers, to the potential discrimination at the social layer. Therefore, trust in IoT can be considered as a key property to enforce trust among objects to guarantee trustworthy services. Typically, trust revolves around assurance and confidence that people, data, entities, information, or processes will function or behave in expected ways. However, trust enforcement in an artificial society like IoT is far more difficult, as the things do not have an inherited judgmental ability to assess risks and other influencing factors to evaluate trust as humans do. Hence, it is important to quantify the perception of trust such that it can be understood by the artificial agents. In computer science, trust is considered as a computational value depicted by a relationship between trustor and trustee, described in a specific context, measured by trust metrics, and evaluated by a mechanism. Several mechanisms about trust evaluation can be found in the literature. Among them, most of the work has deviated towards security and privacy issues instead of considering the universal meaning of trust and its dynamic nature. Furthermore, they lack a proper trust evaluation model and management platform that addresses all aspects of trust establishment. Hence, it is almost impossible to bring all these solutions to one place and develop a common platform that resolves end-to-end trust issues in a digital environment. Therefore, this thesis takes an attempt to fill these spaces through the following research work. First, this work proposes concrete definitions to formally identify trust as a computational concept and its characteristics. Next, a well-defined trust evaluation model is proposed to identify, evaluate and create trust relationships among objects for calculating trust. Then a trust management platform is presented identifying the major tasks of trust enforcement process including trust data collection, trust data management, trust information analysis, dissemination of trust information and trust information lifecycle management. Next, the thesis proposes several approaches to assess trust attributes and thereby the trust metrics of the above model for trust evaluation. Further, to minimize dependencies with human interactions in evaluating trust, an adaptive trust evaluation model is presented based on the machine learning techniques. From a standardization point of view, the scope of the current standards on network security and cybersecurity needs to be expanded to take trust issues into consideration. Hence, this thesis has provided several inputs towards standardization on trust, including a computational definition of trust, a trust evaluation model targeting both object and data trust, and platform to manage the trust evaluation process

    Performance analysis of wireless intrusion detection systems

    Get PDF
    Wireless intrusion detection system (WIDS) has become a matter of increasing concern in recent years as a crucial element in wireless network security. WIDS monitors 802.11 traffic to identify the intrusive activities, and then alerts the complementary prevention part to combat the attacks. Selecting a reliable WIDS system necessitates inevitably taking into account a credible evaluation of WIDSs performance. WIDS effectiveness is considered the basic factor in evaluating the WIDS performance, thus it receives great attention in this thesis. Most previous experimental evaluations of intrusion detection systems (IDSs) were concerned with the wired IDSs, with an apparent lack of evaluating the wireless IDSs (WIDSs). In this thesis, we try to manipulate three main critiques of most pervious evaluations; lack of comprehensive evaluation methodology, holistic attack classification, and expressive evaluation metrics. In this thesis, we introduce a comprehensive evaluation methodology that covers all the essential dimensions for a credible evaluation of WIDSs performance. The main pivotal dimensions in our methodology are characterizing and generating the evaluation dataset, defining reliable and expressive evaluation metrics, and overcoming the evaluation limitations. Basically, evaluation dataset consists of two main parts; normal traffic (as a background) and malicious traffic. The background traffic, which comprises normal and benign activities in the absence of attacks, was generated in our experimental evaluation tests as real controlled traffic. The second and important part of the dataset is the malicious traffic which is composed of intrusive activities. Comprehensive and credible evaluation of WIDSs necessitates taking into account all possible attacks. While this is operationally impossible, it is necessary to select representative attack test cases that are extracted mainly from a comprehensive classification of wireless attacks. Dealing with this challenge, we have developed a holistic taxonomy of wireless security attacks from the perspective of the WIDS evaluator. The second pivotal dimension in our methodology is defining reliable evaluation metrics. We introduce a new evaluation metric EID (intrusion detection effectiveness) that manipulates the drawbacks of the previously proposed metrics, especially the common drawback of their main notion that leads to measuring a relative effectiveness. The notion of our developed metric EID helps in measuring the actual effectiveness. We also introduce another metric RR (attack recognition rate) to evaluate the ability of WIDS to recognize the attack type. The third important dimension in our methodology is overcoming the evaluation limitations. The great challenge that we have faced in the experimental evaluation of WIDSs is the uncontrolled traffic over the open wireless medium. This uncontrolled traffic affects the accuracy of the measurements. We overcame this problem by constructing an RF shielded testbed to take all the measurements under our control without any interfering from any adjacent stations. Finally, we followed our methodology and conducted experimental evaluation tests of two popular WIDSs (Kismet and AirSnare), and demonstrated the utility of our proposed solutions

    Analyse de performance des systĂšmes de dĂ©tection d’intrusion sans-fil

    Get PDF
    La sĂ©curitĂ© des rĂ©seaux sans fil fait l’objet d’une attention considĂ©rable ces derniĂšres annĂ©es. Toutefois, les communications sans fil sont confrontĂ©es Ă  plusieurs types de menaces et d’attaques. Par consĂ©quent, d’importants efforts, visant Ă  sĂ©curiser davantage les rĂ©seaux sans fil, ont dĂ» ĂȘtre fournis pour en vue de lutter contre les attaques sans fil. Seulement, croire qu’une prĂ©vention intĂ©grale des attaques peut s’effectuer au niveau de la premiĂšre ligne de dĂ©fense d’un systĂšme (pare-feux, chiffrement, 
) n’est malheureusement qu’illusion. Ainsi, l’accent est de plus en plus portĂ© sur la dĂ©tection des attaques sans fil au travers d’une seconde ligne de dĂ©fense, matĂ©rialisĂ©e par les systĂšmes de dĂ©tection d’intrusions sans fil (WIDS). Les WIDS inspectent le trafic sans fil, respectant la norme 802.11, ainsi que les activitĂ©s du systĂšme dans le but de dĂ©tecter des activitĂ©s malicieuses. Une alerte est ensuite envoyĂ©e aux briques chargĂ©es de la prĂ©vention pour contrer l’attaque. SĂ©lectionner un WIDS fiable dĂ©pend principalement de l’évaluation mĂ©ticuleuse de ses performances. L’efficacitĂ© du WIDS est considĂ©rĂ©e comme le facteur fondamental lors de l’évaluation de ses performances, nous lui accordons donc un grand intĂ©rĂȘt dans ces travaux de thĂšse. La majeure partie des Ă©tudes expĂ©rimentales visant l’évaluation des systĂšmes de dĂ©tection d’intrusions (IDS) s’intĂ©ressait aux IDS filaires, reflĂ©tant ainsi une carence claire en matiĂšre d’évaluation des IDS sans fil (WIDS). Au cours de cette thĂšse, nous avons mis l’accent sur trois principales critiques visant la plupart des prĂ©cĂ©dentes Ă©valuations : le manque de mĂ©thodologie d’évaluation globale, de classification d’attaque et de mĂ©triques d’évaluation fiables. Au cours de cette thĂšse, nous sommes parvenus Ă  dĂ©velopper une mĂ©thodologie complĂšte d’évaluation couvrant toutes les dimensions nĂ©cessaires pour une Ă©valuation crĂ©dible des performances des WIDSs. Les axes principaux de notre mĂ©thodologie sont la caractĂ©risation et la gĂ©nĂ©ration des donnĂ©es d’évaluation, la dĂ©finition de mĂ©triques d’évaluation fiables tout en Ă©vitant les limitations de l’évaluation. Fondamentalement, les donnĂ©es d’évaluation sont constituĂ©es de deux principales composantes Ă  savoir: un trafic normal et un trafic malveillant. Le trafic normal que nous avons gĂ©nĂ©rĂ© au cours de nos tests d’évaluation Ă©tait un trafic rĂ©el que nous contrĂŽlions. La deuxiĂšme composante des donnĂ©es, qui se trouve ĂȘtre la plus importante, est le trafic malveillant consistant en des activitĂ©s intrusives. Une Ă©valuation complĂšte et crĂ©dible des WIDSs impose la prise en compte de tous les scĂ©narios et types d’attaques Ă©ventuels. Cela Ă©tant impossible Ă  rĂ©aliser, il est nĂ©cessaire de sĂ©lectionner certains cas d’attaque reprĂ©sentatifs, principalement extraits d’une classification complĂšte des attaques sans fil. Pour relever ce dĂ©fi, nous avons dĂ©veloppĂ© une taxinomie globale des attaques visant la sĂ©curitĂ© des rĂ©seaux sans fil, d’un point de vue de l’évaluateur des WIDS. Le deuxiĂšme axe de notre mĂ©thodologie est la dĂ©finition de mĂ©triques fiables d’évaluation. Nous avons introduit une nouvelle mĂ©trique d’évaluation, EID (EfficacitĂ© de la dĂ©tection d’intrusion), visant Ă  pallier les limitations des prĂ©cĂ©dentes mĂ©triques proposĂ©es. Nous avons dĂ©montrĂ© l’utilitĂ© de la mĂ©trique EID par rapport aux autres mĂ©triques proposĂ©es prĂ©cĂ©demment et comment elle parvenait Ă  mesurer l’efficacitĂ© rĂ©elle tandis que les prĂ©cĂ©dentes mĂ©triques ne mesuraient qu’une efficacitĂ© relative. L’EID peut tout aussi bien ĂȘtre utilisĂ© pour l’évaluation de l’efficacitĂ© des IDS filaires et sans fil. Nous avons aussi introduit une autre mĂ©trique notĂ©e RR (Taux de Reconnaissance), pour mesurer l’attribut de reconnaissance d’attaque. Un important problĂšme se pose lorsque des tests d’évaluation des WIDS sont menĂ©s, il s’agit des donnĂ©es de trafics incontrĂŽlĂ©s sur le support ouvert de transmission. Ce trafic incontrĂŽlĂ© affecte sĂ©rieusement la pertinence des mesures. Pour outrepasser ce problĂšme, nous avons construit un banc d’essai RF blindĂ©, ce qui nous a permis de prendre des mesures nettes sans aucune interfĂ©rence avec quelconque source de trafic incontrĂŽlĂ©. Pour finir, nous avons appliquĂ© notre mĂ©thodologie et effectuĂ© des Ă©valuations expĂ©rimentales relatives Ă  deux WIDSs populaires (Kismet et AirSnare); nous avons dĂ©montrĂ© Ă  l’issue de ces Ă©valuations pratiques et l’utilitĂ© de nos solutions proposĂ©es. ABSTRACT : Wireless intrusion detection system (WIDS) has become a matter of increasing concern in recent years as a crucial element in wireless network security. WIDS monitors 802.11 traffic to identify the intrusive activities, and then alerts the complementary prevention part to combat the attacks. Selecting a reliable WIDS system necessitates inevitably taking into account a credible evaluation of WIDSs performance. WIDS effectiveness is considered the basic factor in evaluating the WIDS performance, thus it receives great attention in this thesis. Most previous experimental evaluations of intrusion detection systems (IDSs) were concerned with the wired IDSs, with an apparent lack of evaluating the wireless IDSs (WIDSs). In this thesis, we try to manipulate three main critiques of most pervious evaluations; lack of comprehensive evaluation methodology, holistic attack classification, and expressive evaluation metrics. In this thesis, we introduce a comprehensive evaluation methodology that covers all the essential dimensions for a credible evaluation of WIDSs performance. The main pivotal dimensions in our methodology are characterizing and generating the evaluation dataset, defining reliable and expressive evaluation metrics, and overcoming the evaluation limitations. Basically, evaluation dataset consists of two main parts; normal traffic (as a background) and malicious traffic. The background traffic, which comprises normal and benign activities in the absence of attacks, was generated in our experimental evaluation tests as real controlled traffic. The second and important part of the dataset is the malicious traffic which is composed of intrusive activities. Comprehensive and credible evaluation of WIDSs necessitates taking into account all possible attacks. While this is operationally impossible, it is necessary to select representative attack test cases that are extracted mainly from a comprehensive classification of wireless attacks. Dealing with this challenge, we have developed a holistic taxonomy of wireless security attacks from the perspective of the WIDS evaluator. The second pivotal dimension in our methodology is defining reliable evaluation metrics. We introduce a new evaluation metric EID (intrusion detection effectiveness) that manipulates the drawbacks of the previously proposed metrics, especially the common drawback of their main notion that leads to measuring a relative effectiveness. The notion of our developed metric EID helps in measuring the actual effectiveness. We also introduce another metric RR (attack recognition rate) to evaluate the ability of WIDS to recognize the attack type. The third important dimension in our methodology is overcoming the evaluation limitations. The great challenge that we have faced in the experimental evaluation of WIDSs is the uncontrolled traffic over the open wireless medium. This uncontrolled traffic affects the accuracy of the measurements. We overcame this problem by constructing an RF shielded testbed to take all the measurements under our control without any interfering from any adjacent stations. Finally, we followed our methodology and conducted experimental evaluation tests of two popular WIDSs (Kismet and AirSnare), and demonstrated the utility of our proposed solutions
    corecore