International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed (original) (raw)

Papers by International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

Research paper thumbnail of Submit Your Research Articles - January Issue - International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA), 2025

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Research paper thumbnail of PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY ALGORITHM FOR SECURE INTEGRATED CIRCUITS USING VERILOG HDL

International Journal of Network Security & Its Applications (IJNSA), 2017

Computer data communication is the order of the day with Information Communication Technology (IC... more Computer data communication is the order of the day with Information Communication Technology (ICT) playing major role in everyone’s life, communicating with smart phones, tabs, laptops and desktops using internet. Security of the data transferred over the computer networks is most important as for as an organization is concerned. Hackers attempt hard to crack the software key and indulge in cyber crimes. In this paper, the main concern is not only to provide security to the data transferred at the software level but it provides the security at hardware level by the modified Blowfish Encryption and Decryption Algorithms. It results minimum delay, high speed, high throughput] and effective memory utilization compared to Blowfish (BF) and Triple Data Encryption Standard (TDES) algorithms. The implementation of Blowfish with modulo adder and Wave Dynamic Differential Logic (WDDL) is to provide security against Differential power analysis (DPA). In the proposed four implementations, BF with constant delay n-bit adder (BFCDNBA) yielded minimum delay, maximum frequency, high memory utilization and high throughput compared to BF with modulo adder and WDDL logic (BFMAWDDL), BF with modulo adder (BFMA) and TDES algorithms. The VLSI implementation of Blowfish and TDES algorithms is done using Verilog HDL.

Research paper thumbnail of Call for Papers - International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA), 2025

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Research paper thumbnail of December 2024 - Top 10 Read Articles in Network Security & Its Applications

International Journal of Network Security & Its Applications (IJNSA), 2024

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Research paper thumbnail of A COMPREHENSIVE ANALYSIS OF NETWORK SCANNING AND SECURITY ASSESSMENT TOOL

International Journal of Network Security & Its Applications (IJNSA), 2024

An essential component of any network pen testing effort is network reconnaissance. Gaining addit... more An essential component of any network pen testing effort is network reconnaissance. Gaining additional knowledge about the target's network will help us understand its infrastructure as well as any potential attack routes and exploits that could expose vulnerabilities. By employing both passive and active reconnaissance methods and tools, an attacker can possess substantial volumes of data with a reduced likelihood of being discovered. NMAP, short for Network Mapper, is a widely recognized and powerful open-source network scanning and security assessment tool. This research study analyzes NMAP, including its background, features, usage, and impact on network security. The research also explores the ethical issues of employing NMAP and suggests strategies to avoid such hazards.

Research paper thumbnail of PROFITABLE USES OF ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING TO SECURE OUR DATA

International Journal of Network Security & Its Applications (IJNSA), 2024

The author used this paper to discuss the techniques, strategies, and concepts of artificial inte... more The author used this paper to discuss the techniques, strategies, and concepts of artificial intelligence and machine learning to learn their uses in providing security and other essential features. The author also discusses the advantages, drawbacks, or limitations of using artificial intelligence and machine learning. Any technology or development comes with certain advantages and limitations. This scenario applies to artificial intelligence and machine learning. By emphasizing the importance of artificial intelligence and machine learning, the author attempts to educate the users and readers about the significant concepts within the study, as this could help many users and organizations to identify the critical factors about these concepts.

Research paper thumbnail of HYBRID DEEP LEARNING APPROACH FOR ENHANCED DETECTION AND MITIGATION OF DDOS ATTACK IN SDN NETWORKS

International Journal of Network Security & Its Applications (IJNSA), 2024

The pervasiveness of (DDoS) Distributed Denial of Service attacks has intensified the demand for ... more The pervasiveness of (DDoS) Distributed Denial of Service attacks has intensified the demand for effective and dependable detection methods in Software-Defined Networks (SDNs).This proposed study introduces a hybrid Deep Learning framework designed to identify and address DDoS attacks in Software-Defined Networking (SDN) contexts. Due to the centralization of SDN control planes, these networks are especially susceptible to DDoS attacks, which can saturate system resources and disrupt critical services. Utilizing the CICDDoS2019 dataset, this research integrates Recurrent Neural Networks (RNN), Deep Belief Networks (DBN), and Adaptive Feature Dimensionality Learning (AFDL) to improve detection accuracy and efficiency. In order to appropriately differentiate between attack and normal traffic, the proposed hybrid model combines both temporal dependencies and feature correlations achieving an accuracy of 99%. This research enhances SDN security by offering a scalable and reliable DDoS detection solution capable of adapting to real-time network requirements, addressing the prospective of DL in protecting network infrastructures.

Research paper thumbnail of BLOCKMEDCARE: ADVANCING HEALTHCARE THROUGH BLOCKCHAIN INTEGRATION WITH AI AND IOT

International Journal of Network Security & Its Applications (IJNSA), 2024

This research explores the integration of blockchain technology in healthcare, focusing on enhanc... more This research explores the integration of blockchain technology in healthcare, focusing on enhancing the security and efficiency of Electronic Health Record (EHR) management. We propose a novel Ethereum-based system that empowers patients with secure control over their medical data. Our approach addresses key challenges in healthcare blockchain implementation, including scalability, privacy, and regulatory compliance. The system incorporates digital signatures, Role-Based Access Control, and a multi-layered architecture to ensure secure, controlled access. We developed a decentralized application (dApp) with user-friendly interfaces for patients, doctors, and administrators, demonstrating the practical application of our solution. A survey among healthcare professionals and IT experts revealed strong interest in blockchain adoption, while also highlighting concerns about integration costs. The study explores future enhancements, including integration with IoT devices and AI-driven analytics, contributing to the evolution of secure, efficient, and interoperable healthcare systems that leverage cutting-edge technologies for improved patient care.

Research paper thumbnail of A THOROUGH STUDY OF THE INTERNET OF THINGS: FROM CORE COMPONENTS TO SECURITY AND APPLICATIONS

International Journal of Network Security & Its Applications (IJNSA), 2024

The Internet of Things (IoT) is a rapidly evolving technology that is disrupting industries and t... more The Internet of Things (IoT) is a rapidly evolving technology that is disrupting industries and transforming lifestyles. This promising technology offers numerous benefits, but it also raises important questions and challenges. This article aims to explore how IoT can revolutionize connectivity and automation in different domains, as well as the challenges and implications to consider for responsible development and adoption of this technology. It provides an in-depth exploration of IoT technology, from its definition and components to its current applications. It also addresses potential security issues associated with IoT and the measures that can be taken to mitigate them. Finally, it explores the various ways in which IoT can be applied to improve our lives. This research aims to contribute to the understanding of the IoT and its potential impact on society.

Research paper thumbnail of IMPROVING INTRUSION DETECTION SYSTEM USING THE COMBINATION OF NEURAL NETWORK AND GENETIC ALGORITHM

International Journal of Network Security & Its Applications (IJNSA), 2024

One of the essential issues in network-based systems is a fault attack which is caused by intrusi... more One of the essential issues in network-based systems is a fault attack which is caused by intrusion. It is the responsibility of intrusion detection to provide capabilities such as adaptation, fault tolerance, high computational speed, and error resilience in the face of noisy information. Thus, the construction of an efficient intrusion detection model is highly appreciated to increase the detection rates as well as to decrease false detection. Currently, researchers are more focusing on abnormal behaviour of network as this system can easily recognize new attacks without updating the daily recognized databases. However, the capability of current developing machine learning algorithms suffers from inefficient use of intrusion detection particularly once it involved some huge datasets of irrelevant and redundant features. The main objective of this thesis is to achieve the higher detection rate with lower false detection for attack recognition in order to support efficient application of intrusion detection. To achieve this goal, a new machine learning model was designed and developed to provide intelligent recognition with new attack patterns. New proposed and improved algorithm GA-ANN is constructed to support the proof of concept. For evaluation, five datasets namely KDD CUP 99 from the online data repositories are used in the experiment. In the above scenarios, GA-ANN provides the highest detection rate for pattern recognition which was 98.98% based on 18 selected features. This means that the proposed IDS model is significant and increases the network security.

Research paper thumbnail of DEEP LEARNING APPROACH FOR DETECTION OF PHISHING ATTACK TO STRENGTHEN NETWORK SECURITY

International Journal of Network Security & Its Applications (IJNSA), 2024

Phishing attacks are one of the most aggressive vulnerabilities in cybersecurity networks, typica... more Phishing attacks are one of the most aggressive vulnerabilities in cybersecurity networks, typically carried out through social engineering and URL obfuscation. Traditional detection methods struggle to combat advanced techniques applied. In this paper, a deep learning-based approach is proposed to increase the accuracy of phishing detection while reducing the number of false positives. Four models: CNN-BLSTM, SNN, Transformer, and DBN, are developed and evaluated on a phishing dataset that includes critical features such as URL structure, domain age, and presence of HTTPS. The other model, CNN-BLSTM, achieved 98.9% better accuracy, effectively linking URL sequences in space and time. It is found that although deep learning models have a significant improvement over traditional methods in detecting phishing attacks, the level of computational resources still prevents them from real-time applications. Further research includes hybrid models and adversarial approaches to improve state-ofthe-art and practical solutions to address phishing threats. This study highlights a new technological application to Internet security concerns, particularly in the area of combating phishing.

Research paper thumbnail of International Journal of Network Security & Its Applications (IJNSA) - Current Issue: November 2024, Volume 16, Number 6

International Journal of Network Security & Its Applications (IJNSA), 2024

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Research paper thumbnail of PRACTICAL APPROACH FOR SECURING WINDOWS ENVIRONMENT: ATTACK VECTORS AND COUNTERMEASURES

International Journal of Network Security & Its Applications (IJNSA), 2017

Today, with the advancement of information technology, companies need to use many technologies, p... more Today, with the advancement of information technology, companies need to use many technologies, platforms, systems and applications to effectively maintain their daily operations. This technology dependence has created a serious complexity in the business network which increases the attack surface and attracts cyber criminal’s attention. As a result, the number of cyber-attacks targeting corporate environment is dramatically increased. To identify security holes in a network, penetration tests are performed by internal sources (employees) and external sources (outsource companies or third parties). Microsoft domain penetration testing,is one of the most important scopes of penetration testing, which aims to expose the weaknesses in Microsoft domain environment. If the domain environment is not structured securely, it can be abused by attackers and causes serious damage to the organization. In this study, we present a penetration methodology for Windows domain environment called MSDEPTM providing key metrics for Microsoft domain penetration testing. More specifically, the fundamental steps of the attack vectors from the hacker point of view, root causes of these attacks, and countermeasures against the attacks are discussed.

Research paper thumbnail of EFFECTIVENESS AND WEAKNESS OF QUANTIFIED/AUTOMATED ANOMALY BASED IDS

International Journal of Network Security & Its Applications (IJNSA), 2017

We shall discuss new problems of quantification/automation of anomaly-based Intrusion Detection S... more We shall discuss new problems of quantification/automation of anomaly-based Intrusion Detection System(IDS). We shall analyze effectiveness and weakness using our proposal method as an example, and derive new attack scenario. Development of anomaly-based IDS is necessary for correspondence to a high network attack, however, we shall show that it makes new different problems at the same time. In this paper, we shall discuss some attack scenario which makes invalidate our detection. As the result, we conclude that it is difficult to prevent such attacks technically, and security requirements for operation side become serious.

Research paper thumbnail of November 2024 - Top 10 Read Articles in Network Security & Its Applications

International Journal of Network Security & Its Applications (IJNSA), 2024

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Research paper thumbnail of PROTOCOL SAFETY OF VOIP USING THE CRYPTOSYSTEMS BASED ON ELLIPTIC CURVE

International Journal of Network Security & Its Applications (IJNSA), 2017

VoIP (Voice over Internet Protocol) is used for peer-to-peer or multi-points communications. SRTP... more VoIP (Voice over Internet Protocol) is used for peer-to-peer or multi-points communications. SRTP (Secure Real-Time protocol) is used for peer-to-peer communications which are no longer suitable when you want to do multi-point of VoIP. SRTP uses DH (Diffie Hellman) for key exchange but does not make the certification. This means that SRTP does not guarantee non-repudiation service and presents security vulnerabilities during exchanges of keys. In this work, we propose ECMSRTP (Elliptic curve Multi-point Secure Real Time Protocol) which is a new VoIP security protocol for multi-point communications. It uses the certification mechanism, ensures non-repudiation and makes encryption using El-Gamal based on elliptic curves. Performance analysis shows that this new protocol has a latency time better than SRTP. It has a complexity of O(n2) for key exchange against O(n ) for SRTP, O(n2) for encryption against O(2n) for SRTP and O( ) for signature against O(n2) for SRTP.

Research paper thumbnail of A COMPARATIVE STUDY OF THE APPROACH PROVIDED FOR PREVENTING THE DATA LEAKAGE

International Journal of Network Security & Its Applications (IJNSA), 2017

Data is the most valuable assets of an organization that need to be secured. Due to limited compu... more Data is the most valuable assets of an organization that need to be secured. Due to limited computational resources, Customers outsource their workload to cloud and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in a pay-per-use manner. Despite tremendous benefits of cloud computing, protection of customers’ confidential data is a major concern. Data leakage involves the intentional or unintentional release of secure or confidential information to the non-trusted environment. Data leakage poses a serious issue for companies as the number of incidents and the cost to those experiencing them continue to increase. Data leakage is enhanced by the fact that transmitted data (both inbound and outbound); including emails, instant messaging, website forms and file transfers. Data leakage prevention system (DLPS) is a strategy for making sure that end users do not send the confidential data or information outside the corporate network. This review paper aims to study data leakage prevention through some challenges and data protection approaches as well as considering some limitations. This survey of DLPS can benefit academics as well as professionals.

Research paper thumbnail of ARCHITECTURE AND DESIGN OF MICROKNOWLEDGE AND MICRO-MEDICAL PROCESSING UNITS

International Journal of Network Security & Its Applications (IJNSA) , 2017

In this article, we briefly present the evolution of conventional processor over the last four de... more In this article, we briefly present the evolution of conventional processor over the last four decades as a prelude to the evolution of knowledge processors. A system of specially designed chipsets from the traditional computer architectures facilitates the solution of most generic problems in sciences and in the society. The design of such chipsets permits the micro knowledge processor unit (µkpu) lodged in a generic knowledge machine to “understand” the context of the problem in reference to the global knowledge of such problems in the world wide web. Micro-processing within the more complex procedures such as knowledge and library functions is thus reduced to logical and then into consecutive hardware functions in the knowledge processors. Medical procedures are used for illustration of the potential of the µkpus. Such medical procedures, sub-procedures and micro-procedures can be performed upon medical super objects, objects, subordinate objects and micro-objects.procedures fragmented sufficiently for the µkpus, execute assembly level type of knowledge micro instructions. Conversely, the micro instructions reassembled vertically, in a hierarchy perform major procedures. Major medical procedures such as removing malignant tissues, curing a patient, performing surgeries, etc., bring about profound changes in patients. Minor procedures represent minor effects such as authorizing a prescription, recording the temperature or blood pressure, etc.

Research paper thumbnail of A PLAIN- IMAGE DEPENDENT IMAGE ENCRYPTION SCHEME USING HALF-PIXEL-LEVEL INTERCHANGE PERMUTATION OPERATION

International Journal of Network Security & Its Applications (IJNSA), 2017

In this paper, a chaos-based image encryption scheme with half-pixel-level interchange permutatio... more In this paper, a chaos-based image encryption scheme with half-pixel-level interchange permutation strategy and plain-image dependence is proposed. The proposed image encryption scheme consists of a confusion process and a diffusion process. In the confusion process, a pixel-swapping operation between higher bit planes and lower bit planes is employed to replace the traditional confusion operation. The half pixel-level interchange permutation strategy between the higher 4-bit plane part and the lower 4-bit plane part not only improves the conventional permutation efficiency within the plain-image, but also changes all the pixel gray values. The system parameters of generalized Arnold map applied for the permutation operation relies on the plain-image content and consequently can resist chosen-plaintext and known plaintext attacks effectively. To enhance the security of the proposed image encryption, one multimodal skew tent map is utilized to generate pseudo-random gray value sequence for diffusion operation. Simulations have been carried out thoroughly with comparisons with some other existing image encryption schemes. The experimental results demonstrate that the proposed image encryption scheme is highly secure thanks to its large key space and efficient permutation-diffusion operations.

Research paper thumbnail of ENHANCING EFFICIENCY OF EAP-TTLS PROTOCOL THROUGH THE SIMULTANEOUS USE OF ENCRYPTION AND DIGITAL SIGNATURE ALGORITHMS

International Journal of Network Security & Its Applications (IJNSA), 2017

Security and its subcategory authentication are among the important subjects of cloud computing. ... more Security and its subcategory authentication are among the important subjects of cloud computing. In this system, user authentication mechanisms are carried out before providing access to resources. It is noteworthy that this input gate is actually the pathway of many attacks. Therefore, designing a secure user authentication mechanism significantly contributes to the overall security of the system. This process blocks attacks where the objective is to authenticate a user and when the user requests for cloud computing services. As a result, this article aimed to introduce a new security solution for cloud computing environments through employing the EAP-TTLS protocol, replacing the common Data Encryption Algorithm (DEA) with a new one, and adding a digital signature to the authentication process. After implementation of the proposed method in matlab, its performance was evaluated with RSA and ECDSA algorithms. The results of simulation showed the improvement of performance in terms of memory usage, authentication time, and verification delay. The proposed method [digital signature], along with username and password, is used to improve security in user authentication process.

Research paper thumbnail of Submit Your Research Articles - January Issue - International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA), 2025

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Research paper thumbnail of PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY ALGORITHM FOR SECURE INTEGRATED CIRCUITS USING VERILOG HDL

International Journal of Network Security & Its Applications (IJNSA), 2017

Computer data communication is the order of the day with Information Communication Technology (IC... more Computer data communication is the order of the day with Information Communication Technology (ICT) playing major role in everyone’s life, communicating with smart phones, tabs, laptops and desktops using internet. Security of the data transferred over the computer networks is most important as for as an organization is concerned. Hackers attempt hard to crack the software key and indulge in cyber crimes. In this paper, the main concern is not only to provide security to the data transferred at the software level but it provides the security at hardware level by the modified Blowfish Encryption and Decryption Algorithms. It results minimum delay, high speed, high throughput] and effective memory utilization compared to Blowfish (BF) and Triple Data Encryption Standard (TDES) algorithms. The implementation of Blowfish with modulo adder and Wave Dynamic Differential Logic (WDDL) is to provide security against Differential power analysis (DPA). In the proposed four implementations, BF with constant delay n-bit adder (BFCDNBA) yielded minimum delay, maximum frequency, high memory utilization and high throughput compared to BF with modulo adder and WDDL logic (BFMAWDDL), BF with modulo adder (BFMA) and TDES algorithms. The VLSI implementation of Blowfish and TDES algorithms is done using Verilog HDL.

Research paper thumbnail of Call for Papers - International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA), 2025

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Research paper thumbnail of December 2024 - Top 10 Read Articles in Network Security & Its Applications

International Journal of Network Security & Its Applications (IJNSA), 2024

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Research paper thumbnail of A COMPREHENSIVE ANALYSIS OF NETWORK SCANNING AND SECURITY ASSESSMENT TOOL

International Journal of Network Security & Its Applications (IJNSA), 2024

An essential component of any network pen testing effort is network reconnaissance. Gaining addit... more An essential component of any network pen testing effort is network reconnaissance. Gaining additional knowledge about the target's network will help us understand its infrastructure as well as any potential attack routes and exploits that could expose vulnerabilities. By employing both passive and active reconnaissance methods and tools, an attacker can possess substantial volumes of data with a reduced likelihood of being discovered. NMAP, short for Network Mapper, is a widely recognized and powerful open-source network scanning and security assessment tool. This research study analyzes NMAP, including its background, features, usage, and impact on network security. The research also explores the ethical issues of employing NMAP and suggests strategies to avoid such hazards.

Research paper thumbnail of PROFITABLE USES OF ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING TO SECURE OUR DATA

International Journal of Network Security & Its Applications (IJNSA), 2024

The author used this paper to discuss the techniques, strategies, and concepts of artificial inte... more The author used this paper to discuss the techniques, strategies, and concepts of artificial intelligence and machine learning to learn their uses in providing security and other essential features. The author also discusses the advantages, drawbacks, or limitations of using artificial intelligence and machine learning. Any technology or development comes with certain advantages and limitations. This scenario applies to artificial intelligence and machine learning. By emphasizing the importance of artificial intelligence and machine learning, the author attempts to educate the users and readers about the significant concepts within the study, as this could help many users and organizations to identify the critical factors about these concepts.

Research paper thumbnail of HYBRID DEEP LEARNING APPROACH FOR ENHANCED DETECTION AND MITIGATION OF DDOS ATTACK IN SDN NETWORKS

International Journal of Network Security & Its Applications (IJNSA), 2024

The pervasiveness of (DDoS) Distributed Denial of Service attacks has intensified the demand for ... more The pervasiveness of (DDoS) Distributed Denial of Service attacks has intensified the demand for effective and dependable detection methods in Software-Defined Networks (SDNs).This proposed study introduces a hybrid Deep Learning framework designed to identify and address DDoS attacks in Software-Defined Networking (SDN) contexts. Due to the centralization of SDN control planes, these networks are especially susceptible to DDoS attacks, which can saturate system resources and disrupt critical services. Utilizing the CICDDoS2019 dataset, this research integrates Recurrent Neural Networks (RNN), Deep Belief Networks (DBN), and Adaptive Feature Dimensionality Learning (AFDL) to improve detection accuracy and efficiency. In order to appropriately differentiate between attack and normal traffic, the proposed hybrid model combines both temporal dependencies and feature correlations achieving an accuracy of 99%. This research enhances SDN security by offering a scalable and reliable DDoS detection solution capable of adapting to real-time network requirements, addressing the prospective of DL in protecting network infrastructures.

Research paper thumbnail of BLOCKMEDCARE: ADVANCING HEALTHCARE THROUGH BLOCKCHAIN INTEGRATION WITH AI AND IOT

International Journal of Network Security & Its Applications (IJNSA), 2024

This research explores the integration of blockchain technology in healthcare, focusing on enhanc... more This research explores the integration of blockchain technology in healthcare, focusing on enhancing the security and efficiency of Electronic Health Record (EHR) management. We propose a novel Ethereum-based system that empowers patients with secure control over their medical data. Our approach addresses key challenges in healthcare blockchain implementation, including scalability, privacy, and regulatory compliance. The system incorporates digital signatures, Role-Based Access Control, and a multi-layered architecture to ensure secure, controlled access. We developed a decentralized application (dApp) with user-friendly interfaces for patients, doctors, and administrators, demonstrating the practical application of our solution. A survey among healthcare professionals and IT experts revealed strong interest in blockchain adoption, while also highlighting concerns about integration costs. The study explores future enhancements, including integration with IoT devices and AI-driven analytics, contributing to the evolution of secure, efficient, and interoperable healthcare systems that leverage cutting-edge technologies for improved patient care.

Research paper thumbnail of A THOROUGH STUDY OF THE INTERNET OF THINGS: FROM CORE COMPONENTS TO SECURITY AND APPLICATIONS

International Journal of Network Security & Its Applications (IJNSA), 2024

The Internet of Things (IoT) is a rapidly evolving technology that is disrupting industries and t... more The Internet of Things (IoT) is a rapidly evolving technology that is disrupting industries and transforming lifestyles. This promising technology offers numerous benefits, but it also raises important questions and challenges. This article aims to explore how IoT can revolutionize connectivity and automation in different domains, as well as the challenges and implications to consider for responsible development and adoption of this technology. It provides an in-depth exploration of IoT technology, from its definition and components to its current applications. It also addresses potential security issues associated with IoT and the measures that can be taken to mitigate them. Finally, it explores the various ways in which IoT can be applied to improve our lives. This research aims to contribute to the understanding of the IoT and its potential impact on society.

Research paper thumbnail of IMPROVING INTRUSION DETECTION SYSTEM USING THE COMBINATION OF NEURAL NETWORK AND GENETIC ALGORITHM

International Journal of Network Security & Its Applications (IJNSA), 2024

One of the essential issues in network-based systems is a fault attack which is caused by intrusi... more One of the essential issues in network-based systems is a fault attack which is caused by intrusion. It is the responsibility of intrusion detection to provide capabilities such as adaptation, fault tolerance, high computational speed, and error resilience in the face of noisy information. Thus, the construction of an efficient intrusion detection model is highly appreciated to increase the detection rates as well as to decrease false detection. Currently, researchers are more focusing on abnormal behaviour of network as this system can easily recognize new attacks without updating the daily recognized databases. However, the capability of current developing machine learning algorithms suffers from inefficient use of intrusion detection particularly once it involved some huge datasets of irrelevant and redundant features. The main objective of this thesis is to achieve the higher detection rate with lower false detection for attack recognition in order to support efficient application of intrusion detection. To achieve this goal, a new machine learning model was designed and developed to provide intelligent recognition with new attack patterns. New proposed and improved algorithm GA-ANN is constructed to support the proof of concept. For evaluation, five datasets namely KDD CUP 99 from the online data repositories are used in the experiment. In the above scenarios, GA-ANN provides the highest detection rate for pattern recognition which was 98.98% based on 18 selected features. This means that the proposed IDS model is significant and increases the network security.

Research paper thumbnail of DEEP LEARNING APPROACH FOR DETECTION OF PHISHING ATTACK TO STRENGTHEN NETWORK SECURITY

International Journal of Network Security & Its Applications (IJNSA), 2024

Phishing attacks are one of the most aggressive vulnerabilities in cybersecurity networks, typica... more Phishing attacks are one of the most aggressive vulnerabilities in cybersecurity networks, typically carried out through social engineering and URL obfuscation. Traditional detection methods struggle to combat advanced techniques applied. In this paper, a deep learning-based approach is proposed to increase the accuracy of phishing detection while reducing the number of false positives. Four models: CNN-BLSTM, SNN, Transformer, and DBN, are developed and evaluated on a phishing dataset that includes critical features such as URL structure, domain age, and presence of HTTPS. The other model, CNN-BLSTM, achieved 98.9% better accuracy, effectively linking URL sequences in space and time. It is found that although deep learning models have a significant improvement over traditional methods in detecting phishing attacks, the level of computational resources still prevents them from real-time applications. Further research includes hybrid models and adversarial approaches to improve state-ofthe-art and practical solutions to address phishing threats. This study highlights a new technological application to Internet security concerns, particularly in the area of combating phishing.

Research paper thumbnail of International Journal of Network Security & Its Applications (IJNSA) - Current Issue: November 2024, Volume 16, Number 6

International Journal of Network Security & Its Applications (IJNSA), 2024

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Research paper thumbnail of PRACTICAL APPROACH FOR SECURING WINDOWS ENVIRONMENT: ATTACK VECTORS AND COUNTERMEASURES

International Journal of Network Security & Its Applications (IJNSA), 2017

Today, with the advancement of information technology, companies need to use many technologies, p... more Today, with the advancement of information technology, companies need to use many technologies, platforms, systems and applications to effectively maintain their daily operations. This technology dependence has created a serious complexity in the business network which increases the attack surface and attracts cyber criminal’s attention. As a result, the number of cyber-attacks targeting corporate environment is dramatically increased. To identify security holes in a network, penetration tests are performed by internal sources (employees) and external sources (outsource companies or third parties). Microsoft domain penetration testing,is one of the most important scopes of penetration testing, which aims to expose the weaknesses in Microsoft domain environment. If the domain environment is not structured securely, it can be abused by attackers and causes serious damage to the organization. In this study, we present a penetration methodology for Windows domain environment called MSDEPTM providing key metrics for Microsoft domain penetration testing. More specifically, the fundamental steps of the attack vectors from the hacker point of view, root causes of these attacks, and countermeasures against the attacks are discussed.

Research paper thumbnail of EFFECTIVENESS AND WEAKNESS OF QUANTIFIED/AUTOMATED ANOMALY BASED IDS

International Journal of Network Security & Its Applications (IJNSA), 2017

We shall discuss new problems of quantification/automation of anomaly-based Intrusion Detection S... more We shall discuss new problems of quantification/automation of anomaly-based Intrusion Detection System(IDS). We shall analyze effectiveness and weakness using our proposal method as an example, and derive new attack scenario. Development of anomaly-based IDS is necessary for correspondence to a high network attack, however, we shall show that it makes new different problems at the same time. In this paper, we shall discuss some attack scenario which makes invalidate our detection. As the result, we conclude that it is difficult to prevent such attacks technically, and security requirements for operation side become serious.

Research paper thumbnail of November 2024 - Top 10 Read Articles in Network Security & Its Applications

International Journal of Network Security & Its Applications (IJNSA), 2024

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Research paper thumbnail of PROTOCOL SAFETY OF VOIP USING THE CRYPTOSYSTEMS BASED ON ELLIPTIC CURVE

International Journal of Network Security & Its Applications (IJNSA), 2017

VoIP (Voice over Internet Protocol) is used for peer-to-peer or multi-points communications. SRTP... more VoIP (Voice over Internet Protocol) is used for peer-to-peer or multi-points communications. SRTP (Secure Real-Time protocol) is used for peer-to-peer communications which are no longer suitable when you want to do multi-point of VoIP. SRTP uses DH (Diffie Hellman) for key exchange but does not make the certification. This means that SRTP does not guarantee non-repudiation service and presents security vulnerabilities during exchanges of keys. In this work, we propose ECMSRTP (Elliptic curve Multi-point Secure Real Time Protocol) which is a new VoIP security protocol for multi-point communications. It uses the certification mechanism, ensures non-repudiation and makes encryption using El-Gamal based on elliptic curves. Performance analysis shows that this new protocol has a latency time better than SRTP. It has a complexity of O(n2) for key exchange against O(n ) for SRTP, O(n2) for encryption against O(2n) for SRTP and O( ) for signature against O(n2) for SRTP.

Research paper thumbnail of A COMPARATIVE STUDY OF THE APPROACH PROVIDED FOR PREVENTING THE DATA LEAKAGE

International Journal of Network Security & Its Applications (IJNSA), 2017

Data is the most valuable assets of an organization that need to be secured. Due to limited compu... more Data is the most valuable assets of an organization that need to be secured. Due to limited computational resources, Customers outsource their workload to cloud and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in a pay-per-use manner. Despite tremendous benefits of cloud computing, protection of customers’ confidential data is a major concern. Data leakage involves the intentional or unintentional release of secure or confidential information to the non-trusted environment. Data leakage poses a serious issue for companies as the number of incidents and the cost to those experiencing them continue to increase. Data leakage is enhanced by the fact that transmitted data (both inbound and outbound); including emails, instant messaging, website forms and file transfers. Data leakage prevention system (DLPS) is a strategy for making sure that end users do not send the confidential data or information outside the corporate network. This review paper aims to study data leakage prevention through some challenges and data protection approaches as well as considering some limitations. This survey of DLPS can benefit academics as well as professionals.

Research paper thumbnail of ARCHITECTURE AND DESIGN OF MICROKNOWLEDGE AND MICRO-MEDICAL PROCESSING UNITS

International Journal of Network Security & Its Applications (IJNSA) , 2017

In this article, we briefly present the evolution of conventional processor over the last four de... more In this article, we briefly present the evolution of conventional processor over the last four decades as a prelude to the evolution of knowledge processors. A system of specially designed chipsets from the traditional computer architectures facilitates the solution of most generic problems in sciences and in the society. The design of such chipsets permits the micro knowledge processor unit (µkpu) lodged in a generic knowledge machine to “understand” the context of the problem in reference to the global knowledge of such problems in the world wide web. Micro-processing within the more complex procedures such as knowledge and library functions is thus reduced to logical and then into consecutive hardware functions in the knowledge processors. Medical procedures are used for illustration of the potential of the µkpus. Such medical procedures, sub-procedures and micro-procedures can be performed upon medical super objects, objects, subordinate objects and micro-objects.procedures fragmented sufficiently for the µkpus, execute assembly level type of knowledge micro instructions. Conversely, the micro instructions reassembled vertically, in a hierarchy perform major procedures. Major medical procedures such as removing malignant tissues, curing a patient, performing surgeries, etc., bring about profound changes in patients. Minor procedures represent minor effects such as authorizing a prescription, recording the temperature or blood pressure, etc.

Research paper thumbnail of A PLAIN- IMAGE DEPENDENT IMAGE ENCRYPTION SCHEME USING HALF-PIXEL-LEVEL INTERCHANGE PERMUTATION OPERATION

International Journal of Network Security & Its Applications (IJNSA), 2017

In this paper, a chaos-based image encryption scheme with half-pixel-level interchange permutatio... more In this paper, a chaos-based image encryption scheme with half-pixel-level interchange permutation strategy and plain-image dependence is proposed. The proposed image encryption scheme consists of a confusion process and a diffusion process. In the confusion process, a pixel-swapping operation between higher bit planes and lower bit planes is employed to replace the traditional confusion operation. The half pixel-level interchange permutation strategy between the higher 4-bit plane part and the lower 4-bit plane part not only improves the conventional permutation efficiency within the plain-image, but also changes all the pixel gray values. The system parameters of generalized Arnold map applied for the permutation operation relies on the plain-image content and consequently can resist chosen-plaintext and known plaintext attacks effectively. To enhance the security of the proposed image encryption, one multimodal skew tent map is utilized to generate pseudo-random gray value sequence for diffusion operation. Simulations have been carried out thoroughly with comparisons with some other existing image encryption schemes. The experimental results demonstrate that the proposed image encryption scheme is highly secure thanks to its large key space and efficient permutation-diffusion operations.

Research paper thumbnail of ENHANCING EFFICIENCY OF EAP-TTLS PROTOCOL THROUGH THE SIMULTANEOUS USE OF ENCRYPTION AND DIGITAL SIGNATURE ALGORITHMS

International Journal of Network Security & Its Applications (IJNSA), 2017

Security and its subcategory authentication are among the important subjects of cloud computing. ... more Security and its subcategory authentication are among the important subjects of cloud computing. In this system, user authentication mechanisms are carried out before providing access to resources. It is noteworthy that this input gate is actually the pathway of many attacks. Therefore, designing a secure user authentication mechanism significantly contributes to the overall security of the system. This process blocks attacks where the objective is to authenticate a user and when the user requests for cloud computing services. As a result, this article aimed to introduce a new security solution for cloud computing environments through employing the EAP-TTLS protocol, replacing the common Data Encryption Algorithm (DEA) with a new one, and adding a digital signature to the authentication process. After implementation of the proposed method in matlab, its performance was evaluated with RSA and ECDSA algorithms. The results of simulation showed the improvement of performance in terms of memory usage, authentication time, and verification delay. The proposed method [digital signature], along with username and password, is used to improve security in user authentication process.

Research paper thumbnail of Online Paper Submission - 17th International Conference on Networks & Communications (NeCoM 2025)

NeCoM, 2025

17th International Conference on Networks & Communications (NeCoM 2025) will provide an excellent... more 17th International Conference on Networks & Communications (NeCoM 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Networks & Data Communications. The conference looks for significant contributions to the Computer Networks & Communications for wired and wireless networks in theoretical and practical aspects. Original papers are invited on computer Networks, Network Protocols and Wireless Networks, Data communication Technologies, and Network Security. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to: