11 research outputs found

    An ensemble based approach for effective intrusion detection using majority voting

    Get PDF
    Of late, Network Security Research is taking center stage given the vulnerability of computing ecosystem with networking systems increasingly falling to hackers. On the network security canvas, Intrusion detection system (IDS) is an essential tool used for timely detection of cyber-attacks. A designated set of reliable safety has been put in place to check any severe damage to the network and the user base. Machine learning (ML) is being frequently used to detect intrusion owing to their understanding of intrusion detection systems in minimizing security threats. However, several single classifiers have their limitation and pose challenges to the development of effective IDS. In this backdrop, an ensemble approach has been proposed in current work to tackle the issues of single classifiers and accordingly, a highly scalable and constructive majority voting-based ensemble model was proposed which can be employed in real-time for successfully scrutinizing the network traffic to proactively warn about the possibility of attacks. By taking into consideration the properties of existing machine learning algorithms, an effective model was developed and accordingly, an accuracy of 99%, 97.2%, 97.2%, and 93.2% were obtained for DoS, Probe, R2L, and U2R attacks and thus, the proposed model is effective for identifying intrusion

    SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS

    Get PDF
    The idea to connect everything to anything and at any point of time is what vaguely defines the concept of the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn significant attention during the past few years, the pace at which new devices are being integrated into the system will profoundly impact the world in a good way but also poses some severe queries about security and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most significant concerns of IoT is to provide security assurance for the data exchange because data is vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where each layer provides a service. The security needs vary from layer to layer as each layer serves a different purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks have been discussed along with some existing and proposed countermeasures

    Comparative Analysis of Structures And Attacks on Various Stream Ciphers

    Get PDF
    ABSTRCAT INTRODUCTION Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? Today when tens of millions of people rely on Internet for essential communication and trade & commerce between them, a secure system becomes a very important issue to deal with. Cryptography under such circumstances forms an essential aspect for secure communications. Cryptography deals with four major goals viz Confidentiality, Data integrity, Authentication and Nonrepudiation and thus is widely used to secure telephonic messages, e-mails, credit card information, and corporate data[1] but with all these applications under its sleeve, one must keep in mind that cryptography on its own does not suffice all the requirements of security. Cryptography systems can be broadly classified into symmetric-key systems (AES,RC4,DES) that use a single key that both the sender and recipient have, and public-key or asymmetric systems (ElGamal, McEliece, RSA) that use two keys, a public key known to everyone and a private key that only the recipient of messages uses t = O(S t , K c C ) t = E(P t , Z t S ) t+1 = U (P, S t , K c Where the encryption function E is such that it is easy to construct a decryption function D, the decryption process can be described as follows: ), Z t = O(S t ,K c P ) t = D(C t , Z t S ) t+1 = U(P t , S t As stated in , Kc) . Stream ciphers are generally much faster than block ciphers No or limited error propagation Low hardware complexity The keystream can be sometimes generated prior to encryption/decryption.(in the synchronous case) Further on, Stream ciphers can be classified based on internal state as being either synchronous or self synchronizing. If the change in state occurs independent of the plaintext or cipher text messages the cipher is categorized as a synchronous stream cipher. In contrast, self-synchronizing stream ciphers update their state based on previous cipher text digits. In case of synchronous ciphers, the keystream generated is dependent only on the key and the position i while as in case of selfsynchronous the keystream depends only on the key and a fixed amount of previous ciphertext. Synchronous ciphers are described as having no error propagation while error propagation is limited in self-synchronous With synchronous ciphers, synchronization is achieved with 'marker positions' in the transmission, in contrast self-synchronizing ciphers have the facility to resume correct decryption if the keystream falls out of synchronization. Though desirable properties are found in both the variations, various implications are found in both of these. During decryption, the synchronous cipher limits the opportunity of detecting an error and a more serious limitation is that the attacker is able to make controlled changes to parts of ciphertext knowing very well the effect being induced on the corresponding plaintext. Rueppe

    Prioritizing factors for the adoption of IoT-based smart irrigation in Saudi Arabia: a GRA/AHP approach

    Get PDF
    The irrigation sector in the Kingdom of Saudi Arabia (KSA) confronts a range of obstacles, such as scarce water resources, the elevated salinity and alkalinity of irrigation water, inefficient irrigation practices, and inter-sectoral competition for water resources. These challenges have led to diminishing agricultural yields and abandonment of arable lands. Internet of Things (IoT)-based irrigation systems present a promising remedy for these issues. By curbing water wastage and ensuring precise water delivery to crops, IoT-based irrigation systems offer a viable solution to the challenges entrenched in traditional irrigation methodologies in KSA. However, the widespread implementation of an IoT-based Smart Irrigation System (I-SIMS) poses a multifaceted and intricate challenge in KSA. This study is focused on the identification of the factors and challenges through a systematic review and ranking of the challenges/factors that exert a significant influence on the adoption of I-SIMS. Ranking aids in determining the importance of various alternatives. It enables locating the best options that support the required objectives in complex decision situations. The study employs both Grey Relational Analysis (GRA) and Analytical Hierarchical Process (AHP) methodologies to prioritize these factors. The study’s conclusive findings indicate that among the challenges, technical expertise and security measures emerge as the foremost concerns that demand attention

    Abstracts from the 3rd International Genomic Medicine Conference (3rd IGMC 2015)

    Get PDF

    DataSheet_1_Prioritizing factors for the adoption of IoT-based smart irrigation in Saudi Arabia: a GRA/AHP approach.zip

    No full text
    The irrigation sector in the Kingdom of Saudi Arabia (KSA) confronts a range of obstacles, such as scarce water resources, the elevated salinity and alkalinity of irrigation water, inefficient irrigation practices, and inter-sectoral competition for water resources. These challenges have led to diminishing agricultural yields and abandonment of arable lands. Internet of Things (IoT)-based irrigation systems present a promising remedy for these issues. By curbing water wastage and ensuring precise water delivery to crops, IoT-based irrigation systems offer a viable solution to the challenges entrenched in traditional irrigation methodologies in KSA. However, the widespread implementation of an IoT-based Smart Irrigation System (I-SIMS) poses a multifaceted and intricate challenge in KSA. This study is focused on the identification of the factors and challenges through a systematic review and ranking of the challenges/factors that exert a significant influence on the adoption of I-SIMS. Ranking aids in determining the importance of various alternatives. It enables locating the best options that support the required objectives in complex decision situations. The study employs both Grey Relational Analysis (GRA) and Analytical Hierarchical Process (AHP) methodologies to prioritize these factors. The study’s conclusive findings indicate that among the challenges, technical expertise and security measures emerge as the foremost concerns that demand attention.</p
    corecore