International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed (original) (raw)
Papers by International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
International Journal of Network Security & Its Applications (IJNSA), 2025
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
International Journal of Network Security & Its Applications (IJNSA), 2017
Computer data communication is the order of the day with Information Communication Technology (IC... more Computer data communication is the order of the day with Information Communication Technology (ICT) playing major role in everyone’s life, communicating with smart phones, tabs, laptops and desktops using internet. Security of the data transferred over the computer networks is most important as for as an organization is concerned. Hackers attempt hard to crack the software key and indulge in cyber crimes. In this paper, the main concern is not only to provide security to the data transferred at the software level but it provides the security at hardware level by the modified Blowfish Encryption and Decryption Algorithms. It results minimum delay, high speed, high throughput] and effective memory utilization compared to Blowfish (BF) and Triple Data Encryption Standard (TDES) algorithms. The implementation of Blowfish with modulo adder and Wave Dynamic Differential Logic (WDDL) is to provide security against Differential power analysis (DPA). In the proposed four implementations, BF with constant delay n-bit adder (BFCDNBA) yielded minimum delay, maximum frequency, high memory utilization and high throughput compared to BF with modulo adder and WDDL logic (BFMAWDDL), BF with modulo adder (BFMA) and TDES algorithms. The VLSI implementation of Blowfish and TDES algorithms is done using Verilog HDL.
International Journal of Network Security & Its Applications (IJNSA), 2025
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
International Journal of Network Security & Its Applications (IJNSA), 2024
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
International Journal of Network Security & Its Applications (IJNSA), 2024
An essential component of any network pen testing effort is network reconnaissance. Gaining addit... more An essential component of any network pen testing effort is network reconnaissance. Gaining additional knowledge about the target's network will help us understand its infrastructure as well as any potential attack routes and exploits that could expose vulnerabilities. By employing both passive and active reconnaissance methods and tools, an attacker can possess substantial volumes of data with a reduced likelihood of being discovered. NMAP, short for Network Mapper, is a widely recognized and powerful open-source network scanning and security assessment tool. This research study analyzes NMAP, including its background, features, usage, and impact on network security. The research also explores the ethical issues of employing NMAP and suggests strategies to avoid such hazards.
International Journal of Network Security & Its Applications (IJNSA), 2024
The author used this paper to discuss the techniques, strategies, and concepts of artificial inte... more The author used this paper to discuss the techniques, strategies, and concepts of artificial intelligence and machine learning to learn their uses in providing security and other essential features. The author also discusses the advantages, drawbacks, or limitations of using artificial intelligence and machine learning. Any technology or development comes with certain advantages and limitations. This scenario applies to artificial intelligence and machine learning. By emphasizing the importance of artificial intelligence and machine learning, the author attempts to educate the users and readers about the significant concepts within the study, as this could help many users and organizations to identify the critical factors about these concepts.
International Journal of Network Security & Its Applications (IJNSA), 2024
The pervasiveness of (DDoS) Distributed Denial of Service attacks has intensified the demand for ... more The pervasiveness of (DDoS) Distributed Denial of Service attacks has intensified the demand for effective and dependable detection methods in Software-Defined Networks (SDNs).This proposed study introduces a hybrid Deep Learning framework designed to identify and address DDoS attacks in Software-Defined Networking (SDN) contexts. Due to the centralization of SDN control planes, these networks are especially susceptible to DDoS attacks, which can saturate system resources and disrupt critical services. Utilizing the CICDDoS2019 dataset, this research integrates Recurrent Neural Networks (RNN), Deep Belief Networks (DBN), and Adaptive Feature Dimensionality Learning (AFDL) to improve detection accuracy and efficiency. In order to appropriately differentiate between attack and normal traffic, the proposed hybrid model combines both temporal dependencies and feature correlations achieving an accuracy of 99%. This research enhances SDN security by offering a scalable and reliable DDoS detection solution capable of adapting to real-time network requirements, addressing the prospective of DL in protecting network infrastructures.
International Journal of Network Security & Its Applications (IJNSA), 2024
This research explores the integration of blockchain technology in healthcare, focusing on enhanc... more This research explores the integration of blockchain technology in healthcare, focusing on enhancing the security and efficiency of Electronic Health Record (EHR) management. We propose a novel Ethereum-based system that empowers patients with secure control over their medical data. Our approach addresses key challenges in healthcare blockchain implementation, including scalability, privacy, and regulatory compliance. The system incorporates digital signatures, Role-Based Access Control, and a multi-layered architecture to ensure secure, controlled access. We developed a decentralized application (dApp) with user-friendly interfaces for patients, doctors, and administrators, demonstrating the practical application of our solution. A survey among healthcare professionals and IT experts revealed strong interest in blockchain adoption, while also highlighting concerns about integration costs. The study explores future enhancements, including integration with IoT devices and AI-driven analytics, contributing to the evolution of secure, efficient, and interoperable healthcare systems that leverage cutting-edge technologies for improved patient care.
International Journal of Network Security & Its Applications (IJNSA), 2024
The Internet of Things (IoT) is a rapidly evolving technology that is disrupting industries and t... more The Internet of Things (IoT) is a rapidly evolving technology that is disrupting industries and transforming lifestyles. This promising technology offers numerous benefits, but it also raises important questions and challenges. This article aims to explore how IoT can revolutionize connectivity and automation in different domains, as well as the challenges and implications to consider for responsible development and adoption of this technology. It provides an in-depth exploration of IoT technology, from its definition and components to its current applications. It also addresses potential security issues associated with IoT and the measures that can be taken to mitigate them. Finally, it explores the various ways in which IoT can be applied to improve our lives. This research aims to contribute to the understanding of the IoT and its potential impact on society.
International Journal of Network Security & Its Applications (IJNSA), 2024
One of the essential issues in network-based systems is a fault attack which is caused by intrusi... more One of the essential issues in network-based systems is a fault attack which is caused by intrusion. It is the responsibility of intrusion detection to provide capabilities such as adaptation, fault tolerance, high computational speed, and error resilience in the face of noisy information. Thus, the construction of an efficient intrusion detection model is highly appreciated to increase the detection rates as well as to decrease false detection. Currently, researchers are more focusing on abnormal behaviour of network as this system can easily recognize new attacks without updating the daily recognized databases. However, the capability of current developing machine learning algorithms suffers from inefficient use of intrusion detection particularly once it involved some huge datasets of irrelevant and redundant features. The main objective of this thesis is to achieve the higher detection rate with lower false detection for attack recognition in order to support efficient application of intrusion detection. To achieve this goal, a new machine learning model was designed and developed to provide intelligent recognition with new attack patterns. New proposed and improved algorithm GA-ANN is constructed to support the proof of concept. For evaluation, five datasets namely KDD CUP 99 from the online data repositories are used in the experiment. In the above scenarios, GA-ANN provides the highest detection rate for pattern recognition which was 98.98% based on 18 selected features. This means that the proposed IDS model is significant and increases the network security.
International Journal of Network Security & Its Applications (IJNSA), 2024
Phishing attacks are one of the most aggressive vulnerabilities in cybersecurity networks, typica... more Phishing attacks are one of the most aggressive vulnerabilities in cybersecurity networks, typically carried out through social engineering and URL obfuscation. Traditional detection methods struggle to combat advanced techniques applied. In this paper, a deep learning-based approach is proposed to increase the accuracy of phishing detection while reducing the number of false positives. Four models: CNN-BLSTM, SNN, Transformer, and DBN, are developed and evaluated on a phishing dataset that includes critical features such as URL structure, domain age, and presence of HTTPS. The other model, CNN-BLSTM, achieved 98.9% better accuracy, effectively linking URL sequences in space and time. It is found that although deep learning models have a significant improvement over traditional methods in detecting phishing attacks, the level of computational resources still prevents them from real-time applications. Further research includes hybrid models and adversarial approaches to improve state-ofthe-art and practical solutions to address phishing threats. This study highlights a new technological application to Internet security concerns, particularly in the area of combating phishing.
International Journal of Network Security & Its Applications (IJNSA), 2024
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
International Journal of Network Security & Its Applications (IJNSA), 2017
Today, with the advancement of information technology, companies need to use many technologies, p... more Today, with the advancement of information technology, companies need to use many technologies, platforms, systems and applications to effectively maintain their daily operations. This technology dependence has created a serious complexity in the business network which increases the attack surface and attracts cyber criminal’s attention. As a result, the number of cyber-attacks targeting corporate environment is dramatically increased. To identify security holes in a network, penetration tests are performed by internal sources (employees) and external sources (outsource companies or third parties). Microsoft domain penetration testing,is one of the most important scopes of penetration testing, which aims to expose the weaknesses in Microsoft domain environment. If the domain environment is not structured securely, it can be abused by attackers and causes serious damage to the organization. In this study, we present a penetration methodology for Windows domain environment called MSDEPTM providing key metrics for Microsoft domain penetration testing. More specifically, the fundamental steps of the attack vectors from the hacker point of view, root causes of these attacks, and countermeasures against the attacks are discussed.
International Journal of Network Security & Its Applications (IJNSA), 2017
We shall discuss new problems of quantification/automation of anomaly-based Intrusion Detection S... more We shall discuss new problems of quantification/automation of anomaly-based Intrusion Detection System(IDS). We shall analyze effectiveness and weakness using our proposal method as an example, and derive new attack scenario. Development of anomaly-based IDS is necessary for correspondence to a high network attack, however, we shall show that it makes new different problems at the same time. In this paper, we shall discuss some attack scenario which makes invalidate our detection. As the result, we conclude that it is difficult to prevent such attacks technically, and security requirements for operation side become serious.
International Journal of Network Security & Its Applications (IJNSA), 2024
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
International Journal of Network Security & Its Applications (IJNSA), 2017
VoIP (Voice over Internet Protocol) is used for peer-to-peer or multi-points communications. SRTP... more VoIP (Voice over Internet Protocol) is used for peer-to-peer or multi-points communications. SRTP (Secure Real-Time protocol) is used for peer-to-peer communications which are no longer suitable when you want to do multi-point of VoIP. SRTP uses DH (Diffie Hellman) for key exchange but does not make the certification. This means that SRTP does not guarantee non-repudiation service and presents security vulnerabilities during exchanges of keys. In this work, we propose ECMSRTP (Elliptic curve Multi-point Secure Real Time Protocol) which is a new VoIP security protocol for multi-point communications. It uses the certification mechanism, ensures non-repudiation and makes encryption using El-Gamal based on elliptic curves. Performance analysis shows that this new protocol has a latency time better than SRTP. It has a complexity of O(n2) for key exchange against O(n ) for SRTP, O(n2) for encryption against O(2n) for SRTP and O( ) for signature against O(n2) for SRTP.
International Journal of Network Security & Its Applications (IJNSA), 2017
Data is the most valuable assets of an organization that need to be secured. Due to limited compu... more Data is the most valuable assets of an organization that need to be secured. Due to limited computational resources, Customers outsource their workload to cloud and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in a pay-per-use manner. Despite tremendous benefits of cloud computing, protection of customers’ confidential data is a major concern. Data leakage involves the intentional or unintentional release of secure or confidential information to the non-trusted environment. Data leakage poses a serious issue for companies as the number of incidents and the cost to those experiencing them continue to increase. Data leakage is enhanced by the fact that transmitted data (both inbound and outbound); including emails, instant messaging, website forms and file transfers. Data leakage prevention system (DLPS) is a strategy for making sure that end users do not send the confidential data or information outside the corporate network. This review paper aims to study data leakage prevention through some challenges and data protection approaches as well as considering some limitations. This survey of DLPS can benefit academics as well as professionals.
International Journal of Network Security & Its Applications (IJNSA) , 2017
In this article, we briefly present the evolution of conventional processor over the last four de... more In this article, we briefly present the evolution of conventional processor over the last four decades as a prelude to the evolution of knowledge processors. A system of specially designed chipsets from the traditional computer architectures facilitates the solution of most generic problems in sciences and in the society. The design of such chipsets permits the micro knowledge processor unit (µkpu) lodged in a generic knowledge machine to “understand” the context of the problem in reference to the global knowledge of such problems in the world wide web. Micro-processing within the more complex procedures such as knowledge and library functions is thus reduced to logical and then into consecutive hardware functions in the knowledge processors. Medical procedures are used for illustration of the potential of the µkpus. Such medical procedures, sub-procedures and micro-procedures can be performed upon medical super objects, objects, subordinate objects and micro-objects.procedures fragmented sufficiently for the µkpus, execute assembly level type of knowledge micro instructions. Conversely, the micro instructions reassembled vertically, in a hierarchy perform major procedures. Major medical procedures such as removing malignant tissues, curing a patient, performing surgeries, etc., bring about profound changes in patients. Minor procedures represent minor effects such as authorizing a prescription, recording the temperature or blood pressure, etc.
International Journal of Network Security & Its Applications (IJNSA), 2017
In this paper, a chaos-based image encryption scheme with half-pixel-level interchange permutatio... more In this paper, a chaos-based image encryption scheme with half-pixel-level interchange permutation strategy and plain-image dependence is proposed. The proposed image encryption scheme consists of a confusion process and a diffusion process. In the confusion process, a pixel-swapping operation between higher bit planes and lower bit planes is employed to replace the traditional confusion operation. The half pixel-level interchange permutation strategy between the higher 4-bit plane part and the lower 4-bit plane part not only improves the conventional permutation efficiency within the plain-image, but also changes all the pixel gray values. The system parameters of generalized Arnold map applied for the permutation operation relies on the plain-image content and consequently can resist chosen-plaintext and known plaintext attacks effectively. To enhance the security of the proposed image encryption, one multimodal skew tent map is utilized to generate pseudo-random gray value sequence for diffusion operation. Simulations have been carried out thoroughly with comparisons with some other existing image encryption schemes. The experimental results demonstrate that the proposed image encryption scheme is highly secure thanks to its large key space and efficient permutation-diffusion operations.
International Journal of Network Security & Its Applications (IJNSA), 2017
Security and its subcategory authentication are among the important subjects of cloud computing. ... more Security and its subcategory authentication are among the important subjects of cloud computing. In this system, user authentication mechanisms are carried out before providing access to resources. It is noteworthy that this input gate is actually the pathway of many attacks. Therefore, designing a secure user authentication mechanism significantly contributes to the overall security of the system. This process blocks attacks where the objective is to authenticate a user and when the user requests for cloud computing services. As a result, this article aimed to introduce a new security solution for cloud computing environments through employing the EAP-TTLS protocol, replacing the common Data Encryption Algorithm (DEA) with a new one, and adding a digital signature to the authentication process. After implementation of the proposed method in matlab, its performance was evaluated with RSA and ECDSA algorithms. The results of simulation showed the improvement of performance in terms of memory usage, authentication time, and verification delay. The proposed method [digital signature], along with username and password, is used to improve security in user authentication process.
International Journal of Network Security & Its Applications (IJNSA), 2025
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
International Journal of Network Security & Its Applications (IJNSA), 2017
Computer data communication is the order of the day with Information Communication Technology (IC... more Computer data communication is the order of the day with Information Communication Technology (ICT) playing major role in everyone’s life, communicating with smart phones, tabs, laptops and desktops using internet. Security of the data transferred over the computer networks is most important as for as an organization is concerned. Hackers attempt hard to crack the software key and indulge in cyber crimes. In this paper, the main concern is not only to provide security to the data transferred at the software level but it provides the security at hardware level by the modified Blowfish Encryption and Decryption Algorithms. It results minimum delay, high speed, high throughput] and effective memory utilization compared to Blowfish (BF) and Triple Data Encryption Standard (TDES) algorithms. The implementation of Blowfish with modulo adder and Wave Dynamic Differential Logic (WDDL) is to provide security against Differential power analysis (DPA). In the proposed four implementations, BF with constant delay n-bit adder (BFCDNBA) yielded minimum delay, maximum frequency, high memory utilization and high throughput compared to BF with modulo adder and WDDL logic (BFMAWDDL), BF with modulo adder (BFMA) and TDES algorithms. The VLSI implementation of Blowfish and TDES algorithms is done using Verilog HDL.
International Journal of Network Security & Its Applications (IJNSA), 2025
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
International Journal of Network Security & Its Applications (IJNSA), 2024
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
International Journal of Network Security & Its Applications (IJNSA), 2024
An essential component of any network pen testing effort is network reconnaissance. Gaining addit... more An essential component of any network pen testing effort is network reconnaissance. Gaining additional knowledge about the target's network will help us understand its infrastructure as well as any potential attack routes and exploits that could expose vulnerabilities. By employing both passive and active reconnaissance methods and tools, an attacker can possess substantial volumes of data with a reduced likelihood of being discovered. NMAP, short for Network Mapper, is a widely recognized and powerful open-source network scanning and security assessment tool. This research study analyzes NMAP, including its background, features, usage, and impact on network security. The research also explores the ethical issues of employing NMAP and suggests strategies to avoid such hazards.
International Journal of Network Security & Its Applications (IJNSA), 2024
The author used this paper to discuss the techniques, strategies, and concepts of artificial inte... more The author used this paper to discuss the techniques, strategies, and concepts of artificial intelligence and machine learning to learn their uses in providing security and other essential features. The author also discusses the advantages, drawbacks, or limitations of using artificial intelligence and machine learning. Any technology or development comes with certain advantages and limitations. This scenario applies to artificial intelligence and machine learning. By emphasizing the importance of artificial intelligence and machine learning, the author attempts to educate the users and readers about the significant concepts within the study, as this could help many users and organizations to identify the critical factors about these concepts.
International Journal of Network Security & Its Applications (IJNSA), 2024
The pervasiveness of (DDoS) Distributed Denial of Service attacks has intensified the demand for ... more The pervasiveness of (DDoS) Distributed Denial of Service attacks has intensified the demand for effective and dependable detection methods in Software-Defined Networks (SDNs).This proposed study introduces a hybrid Deep Learning framework designed to identify and address DDoS attacks in Software-Defined Networking (SDN) contexts. Due to the centralization of SDN control planes, these networks are especially susceptible to DDoS attacks, which can saturate system resources and disrupt critical services. Utilizing the CICDDoS2019 dataset, this research integrates Recurrent Neural Networks (RNN), Deep Belief Networks (DBN), and Adaptive Feature Dimensionality Learning (AFDL) to improve detection accuracy and efficiency. In order to appropriately differentiate between attack and normal traffic, the proposed hybrid model combines both temporal dependencies and feature correlations achieving an accuracy of 99%. This research enhances SDN security by offering a scalable and reliable DDoS detection solution capable of adapting to real-time network requirements, addressing the prospective of DL in protecting network infrastructures.
International Journal of Network Security & Its Applications (IJNSA), 2024
This research explores the integration of blockchain technology in healthcare, focusing on enhanc... more This research explores the integration of blockchain technology in healthcare, focusing on enhancing the security and efficiency of Electronic Health Record (EHR) management. We propose a novel Ethereum-based system that empowers patients with secure control over their medical data. Our approach addresses key challenges in healthcare blockchain implementation, including scalability, privacy, and regulatory compliance. The system incorporates digital signatures, Role-Based Access Control, and a multi-layered architecture to ensure secure, controlled access. We developed a decentralized application (dApp) with user-friendly interfaces for patients, doctors, and administrators, demonstrating the practical application of our solution. A survey among healthcare professionals and IT experts revealed strong interest in blockchain adoption, while also highlighting concerns about integration costs. The study explores future enhancements, including integration with IoT devices and AI-driven analytics, contributing to the evolution of secure, efficient, and interoperable healthcare systems that leverage cutting-edge technologies for improved patient care.
International Journal of Network Security & Its Applications (IJNSA), 2024
The Internet of Things (IoT) is a rapidly evolving technology that is disrupting industries and t... more The Internet of Things (IoT) is a rapidly evolving technology that is disrupting industries and transforming lifestyles. This promising technology offers numerous benefits, but it also raises important questions and challenges. This article aims to explore how IoT can revolutionize connectivity and automation in different domains, as well as the challenges and implications to consider for responsible development and adoption of this technology. It provides an in-depth exploration of IoT technology, from its definition and components to its current applications. It also addresses potential security issues associated with IoT and the measures that can be taken to mitigate them. Finally, it explores the various ways in which IoT can be applied to improve our lives. This research aims to contribute to the understanding of the IoT and its potential impact on society.
International Journal of Network Security & Its Applications (IJNSA), 2024
One of the essential issues in network-based systems is a fault attack which is caused by intrusi... more One of the essential issues in network-based systems is a fault attack which is caused by intrusion. It is the responsibility of intrusion detection to provide capabilities such as adaptation, fault tolerance, high computational speed, and error resilience in the face of noisy information. Thus, the construction of an efficient intrusion detection model is highly appreciated to increase the detection rates as well as to decrease false detection. Currently, researchers are more focusing on abnormal behaviour of network as this system can easily recognize new attacks without updating the daily recognized databases. However, the capability of current developing machine learning algorithms suffers from inefficient use of intrusion detection particularly once it involved some huge datasets of irrelevant and redundant features. The main objective of this thesis is to achieve the higher detection rate with lower false detection for attack recognition in order to support efficient application of intrusion detection. To achieve this goal, a new machine learning model was designed and developed to provide intelligent recognition with new attack patterns. New proposed and improved algorithm GA-ANN is constructed to support the proof of concept. For evaluation, five datasets namely KDD CUP 99 from the online data repositories are used in the experiment. In the above scenarios, GA-ANN provides the highest detection rate for pattern recognition which was 98.98% based on 18 selected features. This means that the proposed IDS model is significant and increases the network security.
International Journal of Network Security & Its Applications (IJNSA), 2024
Phishing attacks are one of the most aggressive vulnerabilities in cybersecurity networks, typica... more Phishing attacks are one of the most aggressive vulnerabilities in cybersecurity networks, typically carried out through social engineering and URL obfuscation. Traditional detection methods struggle to combat advanced techniques applied. In this paper, a deep learning-based approach is proposed to increase the accuracy of phishing detection while reducing the number of false positives. Four models: CNN-BLSTM, SNN, Transformer, and DBN, are developed and evaluated on a phishing dataset that includes critical features such as URL structure, domain age, and presence of HTTPS. The other model, CNN-BLSTM, achieved 98.9% better accuracy, effectively linking URL sequences in space and time. It is found that although deep learning models have a significant improvement over traditional methods in detecting phishing attacks, the level of computational resources still prevents them from real-time applications. Further research includes hybrid models and adversarial approaches to improve state-ofthe-art and practical solutions to address phishing threats. This study highlights a new technological application to Internet security concerns, particularly in the area of combating phishing.
International Journal of Network Security & Its Applications (IJNSA), 2024
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
International Journal of Network Security & Its Applications (IJNSA), 2017
Today, with the advancement of information technology, companies need to use many technologies, p... more Today, with the advancement of information technology, companies need to use many technologies, platforms, systems and applications to effectively maintain their daily operations. This technology dependence has created a serious complexity in the business network which increases the attack surface and attracts cyber criminal’s attention. As a result, the number of cyber-attacks targeting corporate environment is dramatically increased. To identify security holes in a network, penetration tests are performed by internal sources (employees) and external sources (outsource companies or third parties). Microsoft domain penetration testing,is one of the most important scopes of penetration testing, which aims to expose the weaknesses in Microsoft domain environment. If the domain environment is not structured securely, it can be abused by attackers and causes serious damage to the organization. In this study, we present a penetration methodology for Windows domain environment called MSDEPTM providing key metrics for Microsoft domain penetration testing. More specifically, the fundamental steps of the attack vectors from the hacker point of view, root causes of these attacks, and countermeasures against the attacks are discussed.
International Journal of Network Security & Its Applications (IJNSA), 2017
We shall discuss new problems of quantification/automation of anomaly-based Intrusion Detection S... more We shall discuss new problems of quantification/automation of anomaly-based Intrusion Detection System(IDS). We shall analyze effectiveness and weakness using our proposal method as an example, and derive new attack scenario. Development of anomaly-based IDS is necessary for correspondence to a high network attack, however, we shall show that it makes new different problems at the same time. In this paper, we shall discuss some attack scenario which makes invalidate our detection. As the result, we conclude that it is difficult to prevent such attacks technically, and security requirements for operation side become serious.
International Journal of Network Security & Its Applications (IJNSA), 2024
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
International Journal of Network Security & Its Applications (IJNSA), 2017
VoIP (Voice over Internet Protocol) is used for peer-to-peer or multi-points communications. SRTP... more VoIP (Voice over Internet Protocol) is used for peer-to-peer or multi-points communications. SRTP (Secure Real-Time protocol) is used for peer-to-peer communications which are no longer suitable when you want to do multi-point of VoIP. SRTP uses DH (Diffie Hellman) for key exchange but does not make the certification. This means that SRTP does not guarantee non-repudiation service and presents security vulnerabilities during exchanges of keys. In this work, we propose ECMSRTP (Elliptic curve Multi-point Secure Real Time Protocol) which is a new VoIP security protocol for multi-point communications. It uses the certification mechanism, ensures non-repudiation and makes encryption using El-Gamal based on elliptic curves. Performance analysis shows that this new protocol has a latency time better than SRTP. It has a complexity of O(n2) for key exchange against O(n ) for SRTP, O(n2) for encryption against O(2n) for SRTP and O( ) for signature against O(n2) for SRTP.
International Journal of Network Security & Its Applications (IJNSA), 2017
Data is the most valuable assets of an organization that need to be secured. Due to limited compu... more Data is the most valuable assets of an organization that need to be secured. Due to limited computational resources, Customers outsource their workload to cloud and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in a pay-per-use manner. Despite tremendous benefits of cloud computing, protection of customers’ confidential data is a major concern. Data leakage involves the intentional or unintentional release of secure or confidential information to the non-trusted environment. Data leakage poses a serious issue for companies as the number of incidents and the cost to those experiencing them continue to increase. Data leakage is enhanced by the fact that transmitted data (both inbound and outbound); including emails, instant messaging, website forms and file transfers. Data leakage prevention system (DLPS) is a strategy for making sure that end users do not send the confidential data or information outside the corporate network. This review paper aims to study data leakage prevention through some challenges and data protection approaches as well as considering some limitations. This survey of DLPS can benefit academics as well as professionals.
International Journal of Network Security & Its Applications (IJNSA) , 2017
In this article, we briefly present the evolution of conventional processor over the last four de... more In this article, we briefly present the evolution of conventional processor over the last four decades as a prelude to the evolution of knowledge processors. A system of specially designed chipsets from the traditional computer architectures facilitates the solution of most generic problems in sciences and in the society. The design of such chipsets permits the micro knowledge processor unit (µkpu) lodged in a generic knowledge machine to “understand” the context of the problem in reference to the global knowledge of such problems in the world wide web. Micro-processing within the more complex procedures such as knowledge and library functions is thus reduced to logical and then into consecutive hardware functions in the knowledge processors. Medical procedures are used for illustration of the potential of the µkpus. Such medical procedures, sub-procedures and micro-procedures can be performed upon medical super objects, objects, subordinate objects and micro-objects.procedures fragmented sufficiently for the µkpus, execute assembly level type of knowledge micro instructions. Conversely, the micro instructions reassembled vertically, in a hierarchy perform major procedures. Major medical procedures such as removing malignant tissues, curing a patient, performing surgeries, etc., bring about profound changes in patients. Minor procedures represent minor effects such as authorizing a prescription, recording the temperature or blood pressure, etc.
International Journal of Network Security & Its Applications (IJNSA), 2017
In this paper, a chaos-based image encryption scheme with half-pixel-level interchange permutatio... more In this paper, a chaos-based image encryption scheme with half-pixel-level interchange permutation strategy and plain-image dependence is proposed. The proposed image encryption scheme consists of a confusion process and a diffusion process. In the confusion process, a pixel-swapping operation between higher bit planes and lower bit planes is employed to replace the traditional confusion operation. The half pixel-level interchange permutation strategy between the higher 4-bit plane part and the lower 4-bit plane part not only improves the conventional permutation efficiency within the plain-image, but also changes all the pixel gray values. The system parameters of generalized Arnold map applied for the permutation operation relies on the plain-image content and consequently can resist chosen-plaintext and known plaintext attacks effectively. To enhance the security of the proposed image encryption, one multimodal skew tent map is utilized to generate pseudo-random gray value sequence for diffusion operation. Simulations have been carried out thoroughly with comparisons with some other existing image encryption schemes. The experimental results demonstrate that the proposed image encryption scheme is highly secure thanks to its large key space and efficient permutation-diffusion operations.
International Journal of Network Security & Its Applications (IJNSA), 2017
Security and its subcategory authentication are among the important subjects of cloud computing. ... more Security and its subcategory authentication are among the important subjects of cloud computing. In this system, user authentication mechanisms are carried out before providing access to resources. It is noteworthy that this input gate is actually the pathway of many attacks. Therefore, designing a secure user authentication mechanism significantly contributes to the overall security of the system. This process blocks attacks where the objective is to authenticate a user and when the user requests for cloud computing services. As a result, this article aimed to introduce a new security solution for cloud computing environments through employing the EAP-TTLS protocol, replacing the common Data Encryption Algorithm (DEA) with a new one, and adding a digital signature to the authentication process. After implementation of the proposed method in matlab, its performance was evaluated with RSA and ECDSA algorithms. The results of simulation showed the improvement of performance in terms of memory usage, authentication time, and verification delay. The proposed method [digital signature], along with username and password, is used to improve security in user authentication process.
NeCoM, 2025
17th International Conference on Networks & Communications (NeCoM 2025) will provide an excellent... more 17th International Conference on Networks & Communications (NeCoM 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Networks & Data Communications. The conference looks for significant contributions to the Computer Networks & Communications for wired and wireless networks in theoretical and practical aspects. Original papers are invited on computer Networks, Network Protocols and Wireless Networks, Data communication Technologies, and Network Security. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to: