19 research outputs found

    Trust-Based Security Technique to Curb Cooperative Black Hole Attacks in Mobile Ad Hoc Networks using OTB-DSR Protocol in NS-3

    Get PDF
    The advent of mobile technology led to the emergence of Mobile Ad-hoc networks (MANETs). These networks have no infrastructure and central authority. Nodes in MANETs act as both routers and hosts. MANET nodes join and leave the network at will making the network topology dynamic. MANETs are prone to both passive and active security attacks. Blackhole is a denial of service attack under active attacks. Blackhole nodes work in collaboration forming cooperative black hole attacks. The attacks drop or redirecting data packets on transit. Cooperative blackhole attacks are dangerous in operations where communication is critica

    Application of fuzzy logic to assess the quality of BPMN models

    Get PDF
    © Springer International Publishing AG, part of Springer Nature 2018. Modeling is the first stage in a Business Process’s (BP) lifecycle. A high-quality BP model is vital to the successful implementation, execution, and monitoring stages. Different works have evaluated BP models from a quality perspective. These works either used formal verification or a set of quality metrics. This paper adopts quality metric and targets models represented in Business Process Modeling and Notation (BPMN). It proposes an approach based on fuzzy logic along with a tool system developed under eclipse framework. The preliminary experimental evaluation of the proposed system shows encouraging results

    A SURVEY OF CASCADING STYLE SHEETS COMPLEXITY METRICS

    No full text
    Cascading style sheets (CSS) is a Web-based style sheet language that is used for the presentation of Web documents. CSS has advanced from CSS1 to CSS3.and extensions to CSS known as CSS pre-processors have also emerged in the last few years. As is the case with regular software, CSS have inherent complexity that keeps on increasing with age which is undesirable, and metrics are needed to measure with the aim of controlling it. Although several Web metrics have been proposed in the literature, the area of stylesheets is still lagging. Findings show that few CSS-related metrics exist, and there is no evidence of proof for their mathematical soundness through the popularly known frameworks such as Briand framework and Weyuker’s properties. In addition, they have not been empirically validated. In order to address this gap, future studies should focus on defining and validating new metrics for CSS and its pre-processors

    1st Nyeri National Polytechnic International Research Conference on Attaining Sustainable Growth through Science, Research, Technology and Innovation, Nyeri, Kenya. 11-13th March 2020.

    No full text
    The development of metrics tool is a basic requirement for the defined software metrics to be acceptable in the software industry. There are several metrics proposed over the years without tool support and this trend cannot be tolerated. Therefore, a metrics tool to automate the collection and analyse the defined Sassy CSS (SCSS) metrics has been developed and is herein referred as Structural Complexity Metrics Tool for Sassy Cascading Style Sheets (SCMT-SCSS). The tool was validated by using 4 SCSS files, and a convenient sample of 21 students who were trained in SCSS language. The results indicate that the tool computes metrics in a much less time than manual computation. The subjects rated the tool as very suitable for the tasks assigned, very accurate in computations of metrics values and very operable

    Structural Complexity Attribute Classification Framework (SCACF) for Sassy Cascading Style Sheets

    No full text
    Several researchers have proposed the various classes of software attributes to guide in the derivation of metrics for software products. These existing classifications have targeted traditional software paradigms such as procedural and object-oriented software. Sassy cascading style sheets (SCSS) has unique features since it combines Cascading style sheets (CSS) features with traditional software features such as variables, functions and control flows. Due to this uniqueness, there arises a need to develop a new classification scheme that can be effectively used to classify all the possible structural attributes for Sassy cascading style sheets. The aim of this paper, therefore, is to develop and validate a comprehensive software complexity attributes classification framework for SCSS. The new framework was validated through an online expert opinion survey, where thirteen SCSS experts were involved. Results show that the proposed framework is complete and effective to guide metrics researchers in defining new metrics for SCS

    Cloud Data Privacy Preserving Model for Health Information Systems Based on Multi Factor Authentication

    No full text
    With cloud computing (CC) becoming popular in recent years, variety of institutions, organizations, businesses and individual users are creating interest. They are adopting the technology in order to take advantage of shared web applications, low infrastructure cost, utility and distributed computing, cluster computing as well as reliable IT architecture. In the area of health, Cloud Health Information Systems (CHIS) play a key role not only on the healthcare businesses but patients as well. On the patient side, CHIS aid in sharing of medical data and health information, timely access of critical patient information and coordination of clinical services. Patients, who continue to demand for instantaneous and quality healthcare services are now able to access the services from experts even when they are not necessarily in the same physical location. This is being aided by proliferation of telemedicine through hosted cloud architecture. From the business perspective, CC has helped to cut down operational expenses by way of cost-effective clinical information system infrastructure through the implementation of a distributed platform. The platform has therefore saved businesses millions of dollars that would have gone to infrastructural and human resource investment. Even with these immense opportunities, cloud computing uptake has been serious inhibited by the privacy and security concerns. Due to the sensitivity of personal health information, businesses and individuals are apprehensive when it comes to adopting the technology or releasing the data to the cloud. This study is a results discussion of an enhanced model for attainment of data privacy on the cloud through use of multi factor authentication

    An Extended Security Measurement Framework For Open-Source Enterprise Resource Planning Software Security

    No full text
    Modern organizations are adopting new ways of measuring their level of security for compliance and justification of security investments. The highly interconnected environment has seen organizations generate lots of personal information and sensitive organizational data. Easiness in automation provided by open-source enterprise resource planning (ERP) software has accelerated its acceptability. The study aimed at developing a security measurement framework for open-source ERP software. The motivation was twofold: paradigm shift towards open-source ERP software and the need for justified investment on information security. Product quality evaluation method based on ISO 25010 framework guided the selection of attributes and factors. A security measurement framework with security posture at the highest level, attributes and factors was developed presenting a mechanism for assessing organization’s level of security. Security posture promotes customers’ confidence and gives management means to leverage resources for information security investment. The future work includes definition of metrics based on the framework

    Trust-Based Security Technique to Curb Cooperative Blackhole Attacks in Mobile Ad Hoc Networks using OTB-DSR Protocol in NS-3

    Get PDF
    The advent of mobile technology led to the emergence of Mobile Ad-hoc networks (MANETs). These networks have no infrastructure and central authority. Nodes in MANETs act as both routers and hosts. MANET nodes join and leave the network at will making the network topology dynamic. MANETs are prone to both passive and active security attacks. Blackhole is a denial of service attack under active attacks. Blackhole nodes work in collaboration forming cooperative black hole attacks. The attacks drop or redirecting data packets on transit. Cooperative blackhole attacks are dangerous in operations where communication is critical. This paper proposes a Trust-Based Resilient Cooperative Bait Detection Technique (TB-RCBDT), an integration of the Resilient Cooperative Bait Detection Technique (RCBDT) and Optimized Trust-Based Dynamic Source Routing (OTB-DSR)

    Optimized Trust-Based DSR Protocol to Curb Cooperative Blackhole Attacks in MANETs Using NS-3

    No full text
    MANETs Communication relies on special routing protocols that make security a challenging endeavor. MANETs are open to a range of active and passive attacks; black hole attack is an active attack affects the network layer. Cooperative black hole attack is a form of denial of service attack comprised of more than one black hole nodes that collaborate in order to drop data packets during communication process. In our study, we used the concept of trust to extend the DSR protocol in order to mitigate cooperative black hole attacks that leads to loss of data packets. The paper proposes an Optimized Trust-Based Dynamic Source Routing protocol. The proposed protocol integrates dynamic trust and friendship functions in the standard DSR protocol. The proposed protocol was designed, implemented and simulated in Network Simulator version 3 (NS-3). Simulation results indicate that the proposed protocol is superior to standard Dynamic Source Routing (DSR) protocol and Ad hoc On Demand Vector (AODV) protocols used as the benchmark protocols; in terms of packet delivery ratio, routing overhead and end-to-end delays and throughput used as performance metrics. The Optimized Trust-Based DSR protocol had a packet delivery ratio of above 95%, routing overhead of about 4.75% and an end-to-end delay of between 0.9 seconds and 1.65 seconds and a throughput of 95.6 Kbps
    corecore