International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed (original) (raw)

Papers by International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

Research paper thumbnail of COMPARATIVE ANALYSIS OF FEATURE SELECTION TECHNIQUES FOR LSTM BASED NETWORK INTRUSION DETECTION MODELS

International Journal of Network Security & Its Applications (IJNSA), 2024

Network intrusion systems are inevitable in protecting enterprise assets and improving cybersecur... more Network intrusion systems are inevitable in protecting enterprise assets and improving cybersecurity. The research community is always on the lookout for new approaches to improve network intrusion detection. Network intrusion systems with deep learning models are the major advancement in this field. There are many varieties of network intrusion detection systems with deep learning models that are used nowadays. Even though researchers are investing heavily in their efforts on developing better network intrusion detection systems, rapid advancement in network intrusion attempts warrant further studies in this area. In this study, I am trying to explore the impact of the different most common feature selection methods on the performance of the LSTM-based network intrusion detection system. Benchmark network intrusion dataset UNSW-NB15 was explored for this study. This study explored 8 types of LSTM models in combination with different feature selection methods. The outcome of the study was very interesting as the LSTM model without applying any feature selection method, outperformed other combinations of models.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Submit Your Research Articles - November Issue - International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA), 2024

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of MODELLING CYBER ATTACKS

International Journal of Network Security & Its Applications (IJNSA), 2017

In this article, we present a model of cyber attacks which can be used to represent a cyber attac... more In this article, we present a model of cyber attacks which can be used to represent a cyber attack in an intuitive and concise way. With ever-increasing popularities of online services, we have seen a growing number of cyber attacks targeted towards large online service providers as well as individuals and the IoT devices. To mitigate these attacks, there is a strong urge to understand their different aspects. Creating a model is a widely used method towards this goal. Unfortunately, the number of models for cyber attacks is pretty low and even the existing models are not comprehensive. In this paper, we aim to fill this gap by presenting a comprehensive cyber attacks model. We have used this model to represent a wide range of cyber attacks and shown its applicability and usefulness. We believe that our model will be a useful tool for the formal analysis of cyber attacks.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Call for Papers - International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA), 2024

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of September 2024 - Top 10 Read Articles in Network Security and Its Applications

International Journal of Network Security & Its Applications (IJNSA), 2024

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of PERFORMANCE EVALUATION OF J48 AND BAYES ALGORITHMS FOR INTRUSION DETECTION SYSTEM

International Journal of Network Security & Its Applications (IJNSA) , 2017

Recent advances in the field of Artificial Intelligence has urged many security experts to follow... more Recent advances in the field of Artificial Intelligence has urged many security experts to follow this novel area. Extensive work has already been done, and much more efforts are being put to use the techniques of AI to improve the real time security. With lot of algorithms and techniques already in the market, it has become quite difficult to choose a particular algorithm, judging the fact that none proves to be accurate and efficient than the others. During the detailed study of major machine learning algorithms, we found certain algorithms more accurate than the other. In this paper, we have chosen two different techniques of differentiating the normal traffic from the intrusions. The results show J48 more efficient and accurate than the Naïve Bayes algorithm.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECHNIQUES

International Journal of Network Security & Its Applications (IJNSA), 2017

The financial world has gotten more sophisticated. People need to make informed financial decisio... more The financial world has gotten more sophisticated. People need to make informed financial decisions, so they seek out efficient tools to help them manage their finances. Traditionally, money management software has been available for individuals to use in their homes on their personal computers. These tools were a local install, often expensive, and required a learning curve to use them effectively. With a paradigm shift to cloud computing and storage, users are looking for inexpensive alternatives that are accessible at home or on their mobile devices. As a result, third-party companies have been forming over the last few years to meet this need. However, to access the functionality of these online resources, users are required to divulge their personal financial account login credentials. While third-party companies claim that subscribers’ private information is safely stored on their servers, one cannot ignore the fact that hackers may be able to break into their system to steal users’ information. Once hackers manage to compromise users’ login credentials, they have complete control over their accounts. Therefore, there is a need to have a holistic approach that incorporates security elements to protect users’ accounts from hackers.
We present a novel, holistic model with a new handshake protocol and online account access control, which authenticate account access and form a sandbox around third-party access to users’ accounts. When utilizing these novel techniques, users’ login credentials can remain private, providing safeguards against unauthorized transactions on their accounts.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A CONCEPTUAL SECURE BLOCKCHAIN- BASED ELECTRONIC VOTING SYSTEM

International Journal of Network Security & Its Applications (IJNSA), 2017

Blockchain is offering new opportunities to develop new types of digital services. While research... more Blockchain is offering new opportunities to develop new types of digital services. While research on the topic is still emerging, it has mostly focused on the technical and legal issues instead of taking advantage of this novel concept and creating advanced digital services. In this paper, we are going to leverage the open source Blockchain technology to propose a design for a new electronic voting system that could be used in local or national elections. The Blockchain-based system will be secure, reliable, and anonymous, and will help increase the number of voters as well as the trust of people in their governments.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A SECURE E- MEDICAL EXEMPTION SYSTEM (E-MES): JORDAN CASE

International Journal of Network Security & Its Applications (IJNSA), 2017

In this paper, a new secure E- Medical Exemption System Based on Elliptic Curve Public Key Crypto... more In this paper, a new secure E- Medical Exemption System Based on Elliptic Curve Public Key Cryptography is proposed. This study specifies the medical exemption system in Jordan. However, the proposed system is summarized into three phases: first, the hospital process for applying the patient's application and producing the medical report. Second, the Royal Hashemite Court (RHC) process, which receives the hospital report, will then send a request to the ministry of health, the income and sales tax department, and the ministry of social development in order to check the patient's condition for a medical exemption. In fact, this aim of this step is to ensure that the patient is not able to bear the cost of treatment. Third, the RHC will send the decision to the patient via a short message. In practice, this E-medical system is more efficient than the traditional medical protocols since the patient can apply for a medical exemption directly from the hospital without suffering of any extra cost. Therefore, the elliptic curve public-key encryption and digital signature system ensures and guarantees the security of the proposed protocol. Nonetheless, to prevent a brute force attack, the choice of the key size becomes crucial.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of August 2024 - Top 10 Read Articles in Network Security and Its Applications

International Journal of Network Security & Its Applications (IJNSA), 2024

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of METRIC FOR EVALUATING AVAILABILITY OF AN INFORMATION SYSTEM: A QUANTITATIVE APPROACH BASED ON COMPONENT DEPENDENCY

International Journal of Network Security & Its Applications (IJNSA), 2017

The purpose of the paper is to present a metric for availability based on the design of the infor... more The purpose of the paper is to present a metric for availability based on the design of the information system. The availability metric proposed in this paper is twofold, based on the operating program and network delay metric of the information system (For the local bound component composition the availability metric is purely based on the software/operating program, for the remote bound component composition the metric incorporates the delay metric of the network). The aim of the paper is to present a quantitative availability metric derived from the component composition of an Information System, based on the dependencies among the individual measurable components of the system. The metric is used for measuring and evaluating availability of an information system from the security perspective, the measurements may be done during the design phase or may also be done after the system is fully functional. The work in the paper provides a platform for further research regarding the quantitative security metric (based on the components of an information system i.e. user, hardware, operating program and the network.) for an information system that addresses all the attributes of information and network security.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS

International Journal of Network Security & Its Applications (IJNSA), 2017

The emergence of wireless sensor networks (WSNs) can be considered one of the most important revo... more The emergence of wireless sensor networks (WSNs) can be considered one of the most important revolutions in the field of information and communications technology (ICT). Recently, there has been a dramatic increase in the use of WSN applications such as surveillance systems, battleground applications, object tracking, habitat monitoring, forest fire detection and patient monitoring. Due to limitations of sensor nodes in terms of energy, storage and computational ability, many security issues have arisen in such applications. As a result, many solutions and approaches have been proposed for different attacks and vulnerabilities to achieve security requirements. This paper surveys different security approaches for WSNs, examining various types of attacks and corresponding techniques for tackling these. The strengths and weaknesses for each technique are also discussed at the conclusion of this paper.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of ENHANCING DIGITAL FORENSICS READINESS IN BIG DATA WIRELESS MEDICAL NETWORKS: A SECURE DECENTRALISED FRAMEWORK

International Journal of Network Security & Its Applications (IJNSA), 2024

Wireless medical networks are pivotal for chronic disease management, yet the sensitive Big Data ... more Wireless medical networks are pivotal for chronic disease management, yet the sensitive Big Data they generate presents administration challenges and cyber vulnerability. This Big Data is valuable within both healthcare and legal contexts, serving as a resource for investigating medical malpractice, civil cases, criminal activities, and network-related incidents. However, the rapid evolution of network technologies and data creates complexities in digital forensics investigations and audits. To address these issues, this paper proposes a secure decentralised framework aimed at bolstering digital forensics readiness (DFR) in Big Data wireless medical networks by identifying security threats, complexities, and gaps in current research efforts. By improving the network's resilience to cyber threats and aiding in medical malpractice investigations, this framework significantly advances digital forensics, wireless networks, and healthcare. It enhances digital forensics readiness, incident response, and the management of medical malpractice incidents in Big Data wireless medical networks. A real-world scenario-based evaluation demonstrated the framework's effectiveness in improving forensic readiness and response capabilities, validating its practical applicability and impact. A comparison of the proposed framework with existing frameworks concluded that it is an advancement in framework design for DFR, especially in regard to Big Data processing, decentralised DFR storage and scalability.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of ENHANCED ALGORITHM FOR REDUCTION OF BLACKHOLE’S RE-JUDGMENT DELAY FOR REAL-TIME TRAFFIC IN MOBILE ADHOC NETWORK

International Journal of Network Security & Its Applications (IJNSA), 2024

Mobile Ad-hoc Network (MANET) is a prominent technology in wireless communication in which mobile... more Mobile Ad-hoc Network (MANET) is a prominent technology in wireless communication in which mobile nodes operate in a distributed manner without having central control devices; This lack of control over network devices and over changing topology aspects of the network allows malicious nodes gain opportunities to join the network. The blackhole attack is one of the security risks that increases the network overhead. In this attack, the malicious node advertises itself as having the shortest path to the destination and falsely replies to the route requests, and drops all receiving packets. Therefore, the paper proposes a trust-level based re-judgment algorithm. Experiments were set up in the NS3 networking simulation tool. Simulations results showed that the proposed trust-level based re-judgment algorithm improves network throughput and packet delivery rate by 82.8% and 146.6 Kbps respectively. Also, reduces the end-to-end delay by an average of 24.17 milliseconds.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of International Journal of Network Security & Its Applications (IJNSA) - Current Issue: July 2024, Volume 16, Number 4

International Journal of Network Security & Its Applications (IJNSA), 2024

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE

International Journal of Network Security & Its Applications (IJNSA), 2017

Application-layer Distributed Denial-of-Service (DDoS) attack takes advantage of the complexity a... more Application-layer Distributed Denial-of-Service (DDoS) attack takes advantage of the complexity and diversity of network protocols and services. This kind of attacks is more difficult to prevent than other kinds of DDoS attacks. This paper introduces a novel detection mechanism for application-layer DDoS attack based on a One-Class Support Vector Machine (OC-SVM). Support vector machine (SVM) is a relatively new machine learning technique based on statistics. OC-SVM is a special variant of the SVM and since only the normal data is required for training, it is effective for detection of application-layer DDoS attack. In this detection strategy, we first extract 7 features from normal users’ sessions. Then, we build normal users’ browsing models by using OC-SVM. Finally, we use these models to detect application-layer DDoS attacks. Numerical results based on simulation experiments demonstrate the efficacy of our detection method.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DISASTER NOTIFICATION SYSTEM

International Journal of Network Security & Its Applications (IJNSA), 2017

The number of disaster occurrences around the world based on the climate changes due to the globa... more The number of disaster occurrences around the world based on the climate changes due to the global warming has been indicating an increase. To prevent and cope with such disaster, a number of researches have been actively conducted to combine the user location service as well as the sensor network technology into the expanded IoT to detect the disaster at early stages. However, due to the appearance of the new technologies, the scope of the security threat to the pre-existing system has been expanding. In this thesis, the D-SASS using the beacon to provide the notification service to the disaster-involved area and the safe service to the users is proposed. The LEA Algorithm is applied to the proposed system to design the beacon protocol collected from the smartphone to safely receive the notification information. In addition, for data protection of a notification system, LEA and SEED algorithms were applied, and a comparative analysis was conducted.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of July 2024 - Top 10 Read Articles in Network Security and Its Applications

International Journal of Network Security & Its Applications (IJNSA), 2024

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)

International Journal of Network Security & Its Applications (IJNSA), 2016

Despite their proven security breaches, text passwords have been dominating all other methods of ... more Despite their proven security breaches, text passwords have been dominating all other methods of human authentication over the web for tens of years, however, the frequent successful attacks that exploit the passwords vulnerable model raises the need to enhance web authentication security. This paper proposes BMBAT; a new authentication technique to replace passwords, that leverages the pervasive user mobile devices, QR codes and the strength of symmetric and asymmetric cryptography. In BMBAT, the user’s mobile device acts as a user identity prover and a verifier for the server; it employs a challenge-response model with a dual mode of encryption using AES and RSA keys to mutually authenticate the client to the server and vice-versa. BMBAT combats a set of attack vectors including phishing attacks, man in the middle attacks, eavesdropping and session hijacking. A prototype of BMBAT has been developed and evaluated; the evaluation results show that BMBAT is a feasible and competitive alternative to passwords.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE

International Journal of Network Security & Its Applications (IJNSA), 2016

When service system is under DDoS attacks, it is important to detect anomaly signature at startin... more When service system is under DDoS attacks, it is important to detect anomaly signature at starting time of attack for timely applying prevention solutions. However, early DDoS detection is difficult task because the velocity of DDoS attacks is very high. This paper proposes a DDoS attack detection method by modeling service system as M/G/R PS queue and calculating monitoring parameters based on the model in odder to early detect symptom of DDoS attacks. The proposed method is validated by experimental system and it gives good results.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of COMPARATIVE ANALYSIS OF FEATURE SELECTION TECHNIQUES FOR LSTM BASED NETWORK INTRUSION DETECTION MODELS

International Journal of Network Security & Its Applications (IJNSA), 2024

Network intrusion systems are inevitable in protecting enterprise assets and improving cybersecur... more Network intrusion systems are inevitable in protecting enterprise assets and improving cybersecurity. The research community is always on the lookout for new approaches to improve network intrusion detection. Network intrusion systems with deep learning models are the major advancement in this field. There are many varieties of network intrusion detection systems with deep learning models that are used nowadays. Even though researchers are investing heavily in their efforts on developing better network intrusion detection systems, rapid advancement in network intrusion attempts warrant further studies in this area. In this study, I am trying to explore the impact of the different most common feature selection methods on the performance of the LSTM-based network intrusion detection system. Benchmark network intrusion dataset UNSW-NB15 was explored for this study. This study explored 8 types of LSTM models in combination with different feature selection methods. The outcome of the study was very interesting as the LSTM model without applying any feature selection method, outperformed other combinations of models.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Submit Your Research Articles - November Issue - International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA), 2024

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of MODELLING CYBER ATTACKS

International Journal of Network Security & Its Applications (IJNSA), 2017

In this article, we present a model of cyber attacks which can be used to represent a cyber attac... more In this article, we present a model of cyber attacks which can be used to represent a cyber attack in an intuitive and concise way. With ever-increasing popularities of online services, we have seen a growing number of cyber attacks targeted towards large online service providers as well as individuals and the IoT devices. To mitigate these attacks, there is a strong urge to understand their different aspects. Creating a model is a widely used method towards this goal. Unfortunately, the number of models for cyber attacks is pretty low and even the existing models are not comprehensive. In this paper, we aim to fill this gap by presenting a comprehensive cyber attacks model. We have used this model to represent a wide range of cyber attacks and shown its applicability and usefulness. We believe that our model will be a useful tool for the formal analysis of cyber attacks.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Call for Papers - International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA), 2024

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of September 2024 - Top 10 Read Articles in Network Security and Its Applications

International Journal of Network Security & Its Applications (IJNSA), 2024

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of PERFORMANCE EVALUATION OF J48 AND BAYES ALGORITHMS FOR INTRUSION DETECTION SYSTEM

International Journal of Network Security & Its Applications (IJNSA) , 2017

Recent advances in the field of Artificial Intelligence has urged many security experts to follow... more Recent advances in the field of Artificial Intelligence has urged many security experts to follow this novel area. Extensive work has already been done, and much more efforts are being put to use the techniques of AI to improve the real time security. With lot of algorithms and techniques already in the market, it has become quite difficult to choose a particular algorithm, judging the fact that none proves to be accurate and efficient than the others. During the detailed study of major machine learning algorithms, we found certain algorithms more accurate than the other. In this paper, we have chosen two different techniques of differentiating the normal traffic from the intrusions. The results show J48 more efficient and accurate than the Naïve Bayes algorithm.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECHNIQUES

International Journal of Network Security & Its Applications (IJNSA), 2017

The financial world has gotten more sophisticated. People need to make informed financial decisio... more The financial world has gotten more sophisticated. People need to make informed financial decisions, so they seek out efficient tools to help them manage their finances. Traditionally, money management software has been available for individuals to use in their homes on their personal computers. These tools were a local install, often expensive, and required a learning curve to use them effectively. With a paradigm shift to cloud computing and storage, users are looking for inexpensive alternatives that are accessible at home or on their mobile devices. As a result, third-party companies have been forming over the last few years to meet this need. However, to access the functionality of these online resources, users are required to divulge their personal financial account login credentials. While third-party companies claim that subscribers’ private information is safely stored on their servers, one cannot ignore the fact that hackers may be able to break into their system to steal users’ information. Once hackers manage to compromise users’ login credentials, they have complete control over their accounts. Therefore, there is a need to have a holistic approach that incorporates security elements to protect users’ accounts from hackers.
We present a novel, holistic model with a new handshake protocol and online account access control, which authenticate account access and form a sandbox around third-party access to users’ accounts. When utilizing these novel techniques, users’ login credentials can remain private, providing safeguards against unauthorized transactions on their accounts.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A CONCEPTUAL SECURE BLOCKCHAIN- BASED ELECTRONIC VOTING SYSTEM

International Journal of Network Security & Its Applications (IJNSA), 2017

Blockchain is offering new opportunities to develop new types of digital services. While research... more Blockchain is offering new opportunities to develop new types of digital services. While research on the topic is still emerging, it has mostly focused on the technical and legal issues instead of taking advantage of this novel concept and creating advanced digital services. In this paper, we are going to leverage the open source Blockchain technology to propose a design for a new electronic voting system that could be used in local or national elections. The Blockchain-based system will be secure, reliable, and anonymous, and will help increase the number of voters as well as the trust of people in their governments.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A SECURE E- MEDICAL EXEMPTION SYSTEM (E-MES): JORDAN CASE

International Journal of Network Security & Its Applications (IJNSA), 2017

In this paper, a new secure E- Medical Exemption System Based on Elliptic Curve Public Key Crypto... more In this paper, a new secure E- Medical Exemption System Based on Elliptic Curve Public Key Cryptography is proposed. This study specifies the medical exemption system in Jordan. However, the proposed system is summarized into three phases: first, the hospital process for applying the patient's application and producing the medical report. Second, the Royal Hashemite Court (RHC) process, which receives the hospital report, will then send a request to the ministry of health, the income and sales tax department, and the ministry of social development in order to check the patient's condition for a medical exemption. In fact, this aim of this step is to ensure that the patient is not able to bear the cost of treatment. Third, the RHC will send the decision to the patient via a short message. In practice, this E-medical system is more efficient than the traditional medical protocols since the patient can apply for a medical exemption directly from the hospital without suffering of any extra cost. Therefore, the elliptic curve public-key encryption and digital signature system ensures and guarantees the security of the proposed protocol. Nonetheless, to prevent a brute force attack, the choice of the key size becomes crucial.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of August 2024 - Top 10 Read Articles in Network Security and Its Applications

International Journal of Network Security & Its Applications (IJNSA), 2024

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of METRIC FOR EVALUATING AVAILABILITY OF AN INFORMATION SYSTEM: A QUANTITATIVE APPROACH BASED ON COMPONENT DEPENDENCY

International Journal of Network Security & Its Applications (IJNSA), 2017

The purpose of the paper is to present a metric for availability based on the design of the infor... more The purpose of the paper is to present a metric for availability based on the design of the information system. The availability metric proposed in this paper is twofold, based on the operating program and network delay metric of the information system (For the local bound component composition the availability metric is purely based on the software/operating program, for the remote bound component composition the metric incorporates the delay metric of the network). The aim of the paper is to present a quantitative availability metric derived from the component composition of an Information System, based on the dependencies among the individual measurable components of the system. The metric is used for measuring and evaluating availability of an information system from the security perspective, the measurements may be done during the design phase or may also be done after the system is fully functional. The work in the paper provides a platform for further research regarding the quantitative security metric (based on the components of an information system i.e. user, hardware, operating program and the network.) for an information system that addresses all the attributes of information and network security.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS

International Journal of Network Security & Its Applications (IJNSA), 2017

The emergence of wireless sensor networks (WSNs) can be considered one of the most important revo... more The emergence of wireless sensor networks (WSNs) can be considered one of the most important revolutions in the field of information and communications technology (ICT). Recently, there has been a dramatic increase in the use of WSN applications such as surveillance systems, battleground applications, object tracking, habitat monitoring, forest fire detection and patient monitoring. Due to limitations of sensor nodes in terms of energy, storage and computational ability, many security issues have arisen in such applications. As a result, many solutions and approaches have been proposed for different attacks and vulnerabilities to achieve security requirements. This paper surveys different security approaches for WSNs, examining various types of attacks and corresponding techniques for tackling these. The strengths and weaknesses for each technique are also discussed at the conclusion of this paper.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of ENHANCING DIGITAL FORENSICS READINESS IN BIG DATA WIRELESS MEDICAL NETWORKS: A SECURE DECENTRALISED FRAMEWORK

International Journal of Network Security & Its Applications (IJNSA), 2024

Wireless medical networks are pivotal for chronic disease management, yet the sensitive Big Data ... more Wireless medical networks are pivotal for chronic disease management, yet the sensitive Big Data they generate presents administration challenges and cyber vulnerability. This Big Data is valuable within both healthcare and legal contexts, serving as a resource for investigating medical malpractice, civil cases, criminal activities, and network-related incidents. However, the rapid evolution of network technologies and data creates complexities in digital forensics investigations and audits. To address these issues, this paper proposes a secure decentralised framework aimed at bolstering digital forensics readiness (DFR) in Big Data wireless medical networks by identifying security threats, complexities, and gaps in current research efforts. By improving the network's resilience to cyber threats and aiding in medical malpractice investigations, this framework significantly advances digital forensics, wireless networks, and healthcare. It enhances digital forensics readiness, incident response, and the management of medical malpractice incidents in Big Data wireless medical networks. A real-world scenario-based evaluation demonstrated the framework's effectiveness in improving forensic readiness and response capabilities, validating its practical applicability and impact. A comparison of the proposed framework with existing frameworks concluded that it is an advancement in framework design for DFR, especially in regard to Big Data processing, decentralised DFR storage and scalability.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of ENHANCED ALGORITHM FOR REDUCTION OF BLACKHOLE’S RE-JUDGMENT DELAY FOR REAL-TIME TRAFFIC IN MOBILE ADHOC NETWORK

International Journal of Network Security & Its Applications (IJNSA), 2024

Mobile Ad-hoc Network (MANET) is a prominent technology in wireless communication in which mobile... more Mobile Ad-hoc Network (MANET) is a prominent technology in wireless communication in which mobile nodes operate in a distributed manner without having central control devices; This lack of control over network devices and over changing topology aspects of the network allows malicious nodes gain opportunities to join the network. The blackhole attack is one of the security risks that increases the network overhead. In this attack, the malicious node advertises itself as having the shortest path to the destination and falsely replies to the route requests, and drops all receiving packets. Therefore, the paper proposes a trust-level based re-judgment algorithm. Experiments were set up in the NS3 networking simulation tool. Simulations results showed that the proposed trust-level based re-judgment algorithm improves network throughput and packet delivery rate by 82.8% and 146.6 Kbps respectively. Also, reduces the end-to-end delay by an average of 24.17 milliseconds.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of International Journal of Network Security & Its Applications (IJNSA) - Current Issue: July 2024, Volume 16, Number 4

International Journal of Network Security & Its Applications (IJNSA), 2024

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE

International Journal of Network Security & Its Applications (IJNSA), 2017

Application-layer Distributed Denial-of-Service (DDoS) attack takes advantage of the complexity a... more Application-layer Distributed Denial-of-Service (DDoS) attack takes advantage of the complexity and diversity of network protocols and services. This kind of attacks is more difficult to prevent than other kinds of DDoS attacks. This paper introduces a novel detection mechanism for application-layer DDoS attack based on a One-Class Support Vector Machine (OC-SVM). Support vector machine (SVM) is a relatively new machine learning technique based on statistics. OC-SVM is a special variant of the SVM and since only the normal data is required for training, it is effective for detection of application-layer DDoS attack. In this detection strategy, we first extract 7 features from normal users’ sessions. Then, we build normal users’ browsing models by using OC-SVM. Finally, we use these models to detect application-layer DDoS attacks. Numerical results based on simulation experiments demonstrate the efficacy of our detection method.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DISASTER NOTIFICATION SYSTEM

International Journal of Network Security & Its Applications (IJNSA), 2017

The number of disaster occurrences around the world based on the climate changes due to the globa... more The number of disaster occurrences around the world based on the climate changes due to the global warming has been indicating an increase. To prevent and cope with such disaster, a number of researches have been actively conducted to combine the user location service as well as the sensor network technology into the expanded IoT to detect the disaster at early stages. However, due to the appearance of the new technologies, the scope of the security threat to the pre-existing system has been expanding. In this thesis, the D-SASS using the beacon to provide the notification service to the disaster-involved area and the safe service to the users is proposed. The LEA Algorithm is applied to the proposed system to design the beacon protocol collected from the smartphone to safely receive the notification information. In addition, for data protection of a notification system, LEA and SEED algorithms were applied, and a comparative analysis was conducted.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of July 2024 - Top 10 Read Articles in Network Security and Its Applications

International Journal of Network Security & Its Applications (IJNSA), 2024

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open acc... more The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)

International Journal of Network Security & Its Applications (IJNSA), 2016

Despite their proven security breaches, text passwords have been dominating all other methods of ... more Despite their proven security breaches, text passwords have been dominating all other methods of human authentication over the web for tens of years, however, the frequent successful attacks that exploit the passwords vulnerable model raises the need to enhance web authentication security. This paper proposes BMBAT; a new authentication technique to replace passwords, that leverages the pervasive user mobile devices, QR codes and the strength of symmetric and asymmetric cryptography. In BMBAT, the user’s mobile device acts as a user identity prover and a verifier for the server; it employs a challenge-response model with a dual mode of encryption using AES and RSA keys to mutually authenticate the client to the server and vice-versa. BMBAT combats a set of attack vectors including phishing attacks, man in the middle attacks, eavesdropping and session hijacking. A prototype of BMBAT has been developed and evaluated; the evaluation results show that BMBAT is a feasible and competitive alternative to passwords.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE

International Journal of Network Security & Its Applications (IJNSA), 2016

When service system is under DDoS attacks, it is important to detect anomaly signature at startin... more When service system is under DDoS attacks, it is important to detect anomaly signature at starting time of attack for timely applying prevention solutions. However, early DDoS detection is difficult task because the velocity of DDoS attacks is very high. This paper proposes a DDoS attack detection method by modeling service system as M/G/R PS queue and calculating monitoring parameters based on the model in odder to early detect symptom of DDoS attacks. The proposed method is validated by experimental system and it gives good results.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Call for Papers - 5th International Conference on Networks & IOT (NeTIOT 2024)

NeTIOT, 2024

5th International Conference on Networks & IOT (NeTIOT 2024) will provide an excellent internatio... more 5th International Conference on Networks & IOT (NeTIOT 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Networks & IOT. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.

Authors are solicited to contribute to the Conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Computer Science & Technology.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Call for Papers - 10th International Conference on Computer Science, Engineering and Information Technology (CSITY 2024)

CSITY, 2024

10th International Conference on Computer Science, Engineering and Information Technology (CSITY ... more 10th International Conference on Computer Science, Engineering and Information Technology (CSITY 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and Information Technology. The Conference looks for significant contributions to all major fields of the Computer Science, Engineering and Information Technology in theoretical and practical aspects.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Call for Papers - 14th International Conference on Computer Science, Engineering and Applications (ICCSEA 2024)

ICCSEA, 2024

14th International Conference on Computer Science, Engineering and Applications (ICCSEA 2024) wil... more 14th International Conference on Computer Science, Engineering and Applications (ICCSEA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of computer science, engineering and applications. The conference looks for significant contributions to all major fields of the computer science and information technology in theoretical and practical aspects. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Call for Papers - 3rd International Conference on Software Engineering and Automation (SEAU 2024)

SEAU, 2024

3rd International Conference on Software Engineering and Automation (SEAU 2024) will provide an e... more 3rd International Conference on Software Engineering and Automation (SEAU 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Software Engineering and Automation. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts and establishing new collaborations in these areas.

Authors are solicited to contribute to the Conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of software engineering & applications.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Call for Papers - 10th International Conference on Artificial Intelligence and Fuzzy Logic Systems (AIFZ 2024)

AIFZ, 2024

10th International Conference on Artificial Intelligence and Fuzzy Logic Systems (AIFZ 2024) is a... more 10th International Conference on Artificial Intelligence and Fuzzy Logic Systems (AIFZ 2024) is a forum for presenting new advances and research results in the fields of Artificial Intelligence and Fuzzy Logic Systems. The conference will bring together leading researchers, engineers, and scientists in the domain of interest from around the world. The scope of the conference covers all theoretical and practical aspects of the Artificial Intelligence and Fuzzy Logic Systems. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences.

All submissions must describe original research, not published or currently under review for another conference or journal. Topics of interest include but are not limited to the following.

Bookmarks Related papers MentionsView impact