206,268 research outputs found
New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files
With the rapid development of various multimedia technologies, more and more
multimedia data are generated and transmitted in the medical, commercial, and
military fields, which may include some sensitive information which should not
be accessed by or can only be partially exposed to the general users.
Therefore, security and privacy has become an important, Another problem with
digital document and video is that undetectable modifications can be made with
very simple and widely available equipment, which put the digital material for
evidential purposes under question .With the large flood of information and the
development of the digital format Information hiding considers one of the
techniques which used to protect the important information. The main goals for
this paper, provides a general overview of the New Classification Methods for
Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files
Distributed Denial of Service Prevention Techniques
The significance of the DDoS problem and the increased occurrence,
sophistication and strength of attacks has led to the dawn of numerous
prevention mechanisms. Each proposed prevention mechanism has some unique
advantages and disadvantages over the others. In this paper, we present a
classification of available mechanisms that are proposed in literature on
preventing Internet services from possible DDoS attacks and discuss the
strengths and weaknesses of each mechanism. This provides better understanding
of the problem and enables a security administrator to effectively equip his
arsenal with proper prevention mechanisms for fighting against DDoS threat.Comment: ISSN: 1793-819
Analyzing Cryptographic Algorithms for Secure Cloud Network
Pay as per usage concept of Cloud computing has brought revolutionary changes
in the information technology world.Comment: 9 Pages, 8 Figures, IJASCSE ISSN No.-2278-7917, Vol 3, Issue 6, 201
Blockchain and its Role in the Internet of Things (IoT)
Blockchain (BC) in the Internet of Things (IoT) is a novel technology that
acts with decentralized, distributed, public and real-time ledger to store
transactions among IoT nodes. A blockchain is a series of blocks, each block is
linked to its previous blocks. Every block has the cryptographic hash code,
previous block hash, and its data. The transactions in BC are the basic units
that are used to transfer data between IoT nodes. The IoT nodes are different
kind of physical but smart devices with embedded sensors, actuators, programs
and able to communicate with other IoT nodes. The role of BC in IoT is to
provide a procedure to process secured records of data through IoT nodes. BC is
a secured technology that can be used publicly and openly. IoT requires this
kind of technology to allow secure communication among IoT nodes in
heterogeneous environment. The transactions in BC could be traced and explored
through anyone who are authenticated to communicate within the IoT. The BC in
IoT may help to improve the communication security. In this paper, I explored
this approach, its opportunities and challenges.Comment: 7 Page
A Criticism of the Current Security, Privacy and Accountability Issues in Electronic Health Records
Cryptography has been widely accepted for security and partly for privacy
control as discovered from past works. However, many of these works did not
provide a way to manage cryptographic keys effectively especially in EHR
applications, as this is the Achilles heel of cryptographic techniques
currently proposed. The issue of accountability for legitimate users also has
not been so popular and only a few considered it in EHR. Unless a different
approach is used, the reliant on cryptography and password or escrow based
system for key management will impede trust of the system and hence its
acceptability. Also users with right access should also be monitored without
affecting the clinician workflow. This paper presents a detailed review of some
selected recent approaches to ensuring security, privacy and accountability in
EHR and gaps for future research were also identified.Comment: published (2014
Password Cracking and Countermeasures in Computer Security: A Survey
With the rapid development of internet technologies, social networks, and
other related areas, user authentication becomes more and more important to
protect the data of the users. Password authentication is one of the widely
used methods to achieve authentication for legal users and defense against
intruders. There have been many password cracking methods developed during the
past years, and people have been designing the countermeasures against password
cracking all the time. However, we find that the survey work on the password
cracking research has not been done very much. This paper is mainly to give a
brief review of the password cracking methods, import technologies of password
cracking, and the countermeasures against password cracking that are usually
designed at two stages including the password design stage (e.g. user
education, dynamic password, use of tokens, computer generations) and after the
design (e.g. reactive password checking, proactive password checking, password
encryption, access control). The main objective of this work is offering the
abecedarian IT security professionals and the common audiences with some
knowledge about the computer security and password cracking, and promoting the
development of this area.Comment: add copyright to the tables to the original authors, add
acknowledgement to helpe
An Implementation of Intrusion Detection System Using Genetic Algorithm
Nowadays it is very important to maintain a high level security to ensure
safe and trusted communication of information between various organizations.
But secured data communication over internet and any other network is always
under threat of intrusions and misuses. So Intrusion Detection Systems have
become a needful component in terms of computer and network security. There are
various approaches being utilized in intrusion detections, but unfortunately
any of the systems so far is not completely flawless. So, the quest of
betterment continues. In this progression, here we present an Intrusion
Detection System (IDS), by applying genetic algorithm (GA) to efficiently
detect various types of network intrusions. Parameters and evolution processes
for GA are discussed in details and implemented. This approach uses evolution
theory to information evolution in order to filter the traffic data and thus
reduce the complexity. To implement and measure the performance of our system
we used the KDD99 benchmark dataset and obtained reasonable detection rate
A Robust Client Verification in cloud enabled m-Commerce using Gaining Protocol
The proposed system highlights a novel approach of exclusive verification
process using gain protocol for ensuring security among both the parties
(client-service provider) in m-commerce application with cloud enabled service.
The proposed system is based on the potential to verify the clients with
trusted hand held device depending on the set of frequent events and actions to
be carried out. The framework of the proposed work is design after collecting a
real time data sets from an android enabled hand set, which when subjected to
gain protocol, will result in detection of malicious behavior of illegal
clients in the network. The real time experiment is performed with applicable
datasets gather, which show the best result for identifying threats from last 2
months data collected
A Roadmap Towards Resilient Internet of Things for Cyber-Physical Systems
The Internet of Things (IoT) is a ubiquitous system connecting many different
devices - the things - which can be accessed from the distance. The
cyber-physical systems (CPS) monitor and control the things from the distance.
As a result, the concepts of dependability and security get deeply intertwined.
The increasing level of dynamicity, heterogeneity, and complexity adds to the
system's vulnerability, and challenges its ability to react to faults. This
paper summarizes state-of-the-art of existing work on anomaly detection,
fault-tolerance and self-healing, and adds a number of other methods applicable
to achieve resilience in an IoT. We particularly focus on non-intrusive methods
ensuring data integrity in the network. Furthermore, this paper presents the
main challenges in building a resilient IoT for CPS which is crucial in the era
of smart CPS with enhanced connectivity (an excellent example of such a system
is connected autonomous vehicles). It further summarizes our solutions,
work-in-progress and future work to this topic to enable "Trustworthy IoT for
CPS". Finally, this framework is illustrated on a selected use case: A smart
sensor infrastructure in the transport domain.Comment: preprint (2018-10-29
Hardware Architecture of Complex K-best MIMO Decoder
This paper presents a hardware architecture of complex K-best Multiple Input
Multiple Output (MIMO) decoder reducing the complexity of Maximum Likelihood
(ML) detector. We develop a novel low-power VLSI design of complex K-best
decoder for 8x8 MIMO and 64 QAM modulation scheme. Use of Schnorr-Euchner (SE)
enumeration and a new parameter, Rlimit in the design reduce the complexity of
calculating K-best nodes to a certain level with increased performance. The
total word length of only 16 bits has been adopted for the hardware design
limiting the bit error rate (BER) degradation to 0.3 dB with list size, K and
Rlimit equal to 4. The proposed VLSI architecture is modeled in Verilog HDL
using Xilinx and synthesized using Synopsys Design Vision in 45 nm CMOS
technology. According to the synthesize result, it achieves 1090.8 Mbps
throughput with power consumption of 782 mW and latency of 0.044 us. The
maximum frequency the design proposed is 181.8 MHz.Comment: 13 pages, 5 figures, 1 tabl
- …