AZROUR MOURADE - Academia.edu (original) (raw)
Papers by AZROUR MOURADE
The network security is the process of preventing and detecting unauthorized use of the networks ... more The network security is the process of preventing and detecting unauthorized use of the networks and stopping unauthorized users from accessing any part of systems. So, the network monitoring is demanding task. It is an essential part in the use of network administrators who are trying to maintain the good operating of their networks and need to monitor the traffic movements and the network performances. The needs of data analysis and classification are significantly increased to categorize data and make decisions by implementation of standardization and information extraction techniques. The design of an efficient classifier is one of the fundamental issues of automatic training. The actual network monitoring systems suffer from many constraints at the level of analysis and classification of data. To overcome this problem, it was necessary to define reliable methods of analysis to implement a relevant system to monitor the circulated traffic. The main goal of this paper is to model and validate a new traffic classifier able to categorize the collected data within the networks. This new proposed model is based on multilayer perceptron that composed of three layers. An efficient training algorithm is proposed to optimize the weights but also a recognition algorithm to validate the model.
Testing water quality has a significant role in environment controlling. Whenever, the water qual... more Testing water quality has a significant role in environment controlling. Whenever, the water quality is bad it can affect the aquatic life and surrounding environment. Due to the importance of some parameters to show the quality of water, we have designed an intelligent system that can measures remotely five parameters of water. The captured values are sent to the database which is connected to the platform. The platform can process the received values. The user can connect to the application via Internet Protocol for monitoring the measured parameters. The outcomes demonstrate that with fitting alignment, a dependable observing framework can be built up. This will enable catchment administrators to consistently observing the nature of the water at higher spatial goals than has recently been doable, and to keep up this reconnaissance over an all-inclusive timeframe. Moreover, it comprehends the conduct of seagoing creatures in respect to water contamination utilizing information investigation.
In today s communications over Internet Protocol (IP), Session Initiation Protocol (SIP) is using... more In today s communications over Internet Protocol (IP), Session Initiation Protocol (SIP) is using establish, modify and terminate the sessions multimedia among participants. Authentication is the most security service required for SIP. Authentication HTTP Digest is the original authentication protocol proposed for SIP. However, this protocol is demonstrated insecure against different attacks. To improve the authentication, a different authen-tication protocols have being proposed. Very recently, Jiang et al. demonstrate that Zhang et al.'s scheme cannot resist to impersonation attack. Then, Jiang et al. proposed their protocol. However, in this paper we show that Jiang et al.'s protocol suffer from server spoofing attack. In order to overcome this problem we propose an improved SIP authentication protocol. The security analysis shows that the proposed protocol is more secure and can deal with several attacks.
In today s communications over Internet Protocol (IP), Session Initiation Protocol (SIP) is using... more In today s communications over Internet Protocol (IP), Session Initiation Protocol (SIP) is using establish, modify and terminate the sessions multimedia among participants. Authentication is the most security service required for SIP. Authentication HTTP Digest is the original authentication protocol proposed for SIP. However, this protocol is demonstrated insecure against different attacks. To improve the authentication, a different authen-tication protocols have being proposed. Very recently, Jiang et al. demonstrate that Zhang et al.'s scheme cannot resist to impersonation attack. Then, Jiang et al. proposed their protocol. However, in this paper we show that Jiang et al.'s protocol suffer from server spoofing attack. In order to overcome this problem we propose an improved SIP authentication protocol. The security analysis shows that the proposed protocol is more secure and can deal with several attacks.
Session Initiation Protocol (SIP) is the most popular signaling protocol using in order to establ... more Session Initiation Protocol (SIP) is the most popular signaling protocol using in order to establish, modify and terminate the session multimedia between different participants. It was selected by the Third Generation Project Partnership (3GPP) as a multimedia application protocol in 3G mobile networks. SIP is the protocol currently used for signaling ToIP calls. The security of SIP is becoming more and more important. Authentication is the most important security service required by SIP. To ensure a secured communication, many SIP authentication protocols have been proposed. This work provides an overview of the proposed schemes based on elliptic curve cryptography. Those proposed schemes are analyzed in security consideration and the computational cost. 1. Introduction Telephony over IP (ToIP) is a service that allows you to transfer voice communications flow on IP (Internet Protocol). This is the application that will require the IP infrastructure as the standard for all types of information or media. The Session Initiation Protocol (SIP) is a signaling protocol used to manage, establish and terminate the communication sessions between two or more participants. SIP is not limited to telephone calls, but it can be used for multimedia conferencing [1], instant messaging and online games,... View this popularity and use in public networks, SIP security becomes more and more important. Authentication is the most security service required for SIP. The original SIP authentication protocol is HTTP Digest Authentication [2]. However, this protocol was found vulnerable to deferent attacks. In order to reinforce SIP authentication, a large community has been participated by proposing different protocols based on various mechanisms. In this paper we have analysed the proposed protocols based on security offred and total ranning time; the comparison between those protocols can helped as to determinate based on elliptic curve cryptography. The remainder of this paper is organized as follows. Section 2 delivers general information on the architecture and the original SIP authentication protocol. In section 3, we analyze the performance security of proposed protocols. A comparison between the proposed protocols in terms of security and computational cost consideration are presented in section 4. Finally, section 5 concludes this research.
The network security is the process of preventing and detecting unauthorized use of the networks ... more The network security is the process of preventing and detecting unauthorized use of the networks and stopping unauthorized users from accessing any part of systems. So, the network monitoring is demanding task. It is an essential part in the use of network administrators who are trying to maintain the good operating of their networks and need to monitor the traffic movements and the network performances. The needs of data analysis and classification are significantly increased to categorize data and make decisions by implementation of standardization and information extraction techniques. The design of an efficient classifier is one of the fundamental issues of automatic training. The actual network monitoring systems suffer from many constraints at the level of analysis and classification of data. To overcome this problem, it was necessary to define reliable methods of analysis to implement a relevant system to monitor the circulated traffic. The main goal of this paper is to model and validate a new traffic classifier able to categorize the collected data within the networks. This new proposed model is based on multilayer perceptron that composed of three layers. An efficient training algorithm is proposed to optimize the weights but also a recognition algorithm to validate the model.
Testing water quality has a significant role in environment controlling. Whenever, the water qual... more Testing water quality has a significant role in environment controlling. Whenever, the water quality is bad it can affect the aquatic life and surrounding environment. Due to the importance of some parameters to show the quality of water, we have designed an intelligent system that can measures remotely five parameters of water. The captured values are sent to the database which is connected to the platform. The platform can process the received values. The user can connect to the application via Internet Protocol for monitoring the measured parameters. The outcomes demonstrate that with fitting alignment, a dependable observing framework can be built up. This will enable catchment administrators to consistently observing the nature of the water at higher spatial goals than has recently been doable, and to keep up this reconnaissance over an all-inclusive timeframe. Moreover, it comprehends the conduct of seagoing creatures in respect to water contamination utilizing information investigation.
In today s communications over Internet Protocol (IP), Session Initiation Protocol (SIP) is using... more In today s communications over Internet Protocol (IP), Session Initiation Protocol (SIP) is using establish, modify and terminate the sessions multimedia among participants. Authentication is the most security service required for SIP. Authentication HTTP Digest is the original authentication protocol proposed for SIP. However, this protocol is demonstrated insecure against different attacks. To improve the authentication, a different authen-tication protocols have being proposed. Very recently, Jiang et al. demonstrate that Zhang et al.'s scheme cannot resist to impersonation attack. Then, Jiang et al. proposed their protocol. However, in this paper we show that Jiang et al.'s protocol suffer from server spoofing attack. In order to overcome this problem we propose an improved SIP authentication protocol. The security analysis shows that the proposed protocol is more secure and can deal with several attacks.
In today s communications over Internet Protocol (IP), Session Initiation Protocol (SIP) is using... more In today s communications over Internet Protocol (IP), Session Initiation Protocol (SIP) is using establish, modify and terminate the sessions multimedia among participants. Authentication is the most security service required for SIP. Authentication HTTP Digest is the original authentication protocol proposed for SIP. However, this protocol is demonstrated insecure against different attacks. To improve the authentication, a different authen-tication protocols have being proposed. Very recently, Jiang et al. demonstrate that Zhang et al.'s scheme cannot resist to impersonation attack. Then, Jiang et al. proposed their protocol. However, in this paper we show that Jiang et al.'s protocol suffer from server spoofing attack. In order to overcome this problem we propose an improved SIP authentication protocol. The security analysis shows that the proposed protocol is more secure and can deal with several attacks.
Session Initiation Protocol (SIP) is the most popular signaling protocol using in order to establ... more Session Initiation Protocol (SIP) is the most popular signaling protocol using in order to establish, modify and terminate the session multimedia between different participants. It was selected by the Third Generation Project Partnership (3GPP) as a multimedia application protocol in 3G mobile networks. SIP is the protocol currently used for signaling ToIP calls. The security of SIP is becoming more and more important. Authentication is the most important security service required by SIP. To ensure a secured communication, many SIP authentication protocols have been proposed. This work provides an overview of the proposed schemes based on elliptic curve cryptography. Those proposed schemes are analyzed in security consideration and the computational cost. 1. Introduction Telephony over IP (ToIP) is a service that allows you to transfer voice communications flow on IP (Internet Protocol). This is the application that will require the IP infrastructure as the standard for all types of information or media. The Session Initiation Protocol (SIP) is a signaling protocol used to manage, establish and terminate the communication sessions between two or more participants. SIP is not limited to telephone calls, but it can be used for multimedia conferencing [1], instant messaging and online games,... View this popularity and use in public networks, SIP security becomes more and more important. Authentication is the most security service required for SIP. The original SIP authentication protocol is HTTP Digest Authentication [2]. However, this protocol was found vulnerable to deferent attacks. In order to reinforce SIP authentication, a large community has been participated by proposing different protocols based on various mechanisms. In this paper we have analysed the proposed protocols based on security offred and total ranning time; the comparison between those protocols can helped as to determinate based on elliptic curve cryptography. The remainder of this paper is organized as follows. Section 2 delivers general information on the architecture and the original SIP authentication protocol. In section 3, we analyze the performance security of proposed protocols. A comparison between the proposed protocols in terms of security and computational cost consideration are presented in section 4. Finally, section 5 concludes this research.