Vol. 13 No. 2 FEB 2015

Vol. 13 No. 2 FEBRUARY 2015 International Journal of Computer Science and Information Security

Publication FEBRUARY 2015, Volume 13 No. 2 (Download Full Journal) (Archive) (Download 2)

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. Paper 30011523: Hybrid Intrusion Detection System Using Artificial Bee Colony Algorithm and Multi-Layer Perceptron (pp. 1-7)

Full Text: PDF

.

Mahmod S. Mahmod & Zakaria A. Hamed Alnaish, College of Science, University of Mosul, Mosul - Iraq

Ismail Ahmed A. Al-Hadi, Amran University, Yemen

.

Abstract — Intrusion detection system (IDS) is a crucial instrument for monitoring the activities that take place in a computer networks. Recently, a large number of algorithms have been proposed which simulate the swarm intelligence which was used by a number of researchers. Intrusion detection system (IDS) is regarded as one of the applications that are based on Swarm Intelligence and the classification techniques such as the neural network. In this study, hybrid Artificial Bee Colony (ABC) algorithm and Multi-layer Perceptron (MLP) were proposed to build an efficient network IDS. The MLP was utilized as a classifier to distinguish the normal and abnormal packets in the network traffic. The structure of MLP has been created relying on the features of (NSL-KDD 99) dataset. In addition, ABC algorithm is employed for training MLP by optimizing the values of linkage weights and bias. Training and Testing were performed by means of using NSL-KDD Dataset, which is the improved version of KDD99 dataset. The experiments results showed that the proposed method provides a high detection accuracy which is about (87.54%) and with (0.124%) error rate.

.

Index Terms — Intrusion detection system (IDS); Artificial Bee Colony (ABC) algorithm; multi-layer perceptron (MLP).

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. Paper 30011524: New Secure Communication Design for Digital Forensics in Cloud Computing (pp. 8-17)

Full Text: PDF

.

Mahmoud M. Nasreldin, Ain Shams University, Cairo, Egypt

Heba K. Aslan, Electronics Research Institute, Cairo, Egypt

Magdy El-Hennawy, Shorouk Academy, Cairo, Egypt

Adel El-Hennawy, Ain Shams University, Cairo, Egypt

.

Abstract — Digital forensics experts are facing new challenges in collecting evidences in cloud computing environment. Evidences are often located in data centers that are geographically separated. Digital forensics experts cannot bear travelling burden to acquire evidences. Moreover, the volume of hosted data is so big and the data is so complex. For the evidence to be admitted in court, evidence collecting process must guarantee evidence integrity, authenticity, non-repudiation, and confidentiality. To achieve a secure cloud forensics process, researchers have proposed many solutions in literature with major drawbacks in security, high communication, and computation overheads. Furthermore, received packets should be analyzed without assuming the availability of the entire original packet stream. Recently, Sign-Encrypt-Sign and Encrypt-Sign-Encrypt techniques were used to provide evidence confidentiality, authenticity, non-repudiation, and integrity. In this paper, we propose an identity-based signcryption protocol to reduce the computation, communication, and implementation overheads in evidence colleting in cloud forensics. Signcryption protocols have the advantage of achieving the basic goals of encryption and signature protocols in more efficient way than Sign-Encrypt-Sign and Encrypt-Sign-Encrypt techniques. Also, a validation of the proposed protocol using BAN logic is illustrated.

.

Keywords- Digital Forensics, Cloud Computing, Evidence Collecting, Authentication, Confidentiality, Signcryption, Identity-Based Cryptography, BAN Logic.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. Paper 30011511: Technical Solutions to Resources Allocation for Distributed Virtual Machine Systems (pp. 18-23)

Full Text: PDF

.

Ha Huy Cuong Nguyen, Departmentof InformationTechnology, Quangnam University, Quang Nam, Viet Nam

Van Thuan Dang, Departmentof InformationTechnology, Industrial University of HCM City, Quang Ngai, Viet Nam

Van Son Le, Departmentof InformationTechnology, Danang University of Education, The university of Danang, Da Nang, Viet Nam

.

Abstract — Virtual machine is built on group of real servers which are scattered globally and connect together through the telecommunications systems, it has an increasingly important role in the operation, providing the ability to exploit virtual resources. The latest technique helps to use computing resources more effectively and has many benefits, such as cost reduction of power, cooling and, hence, contributes to the Green Computing. To ensure the supply of these resources to demand processes correctly and promptly, avoiding any duplication or conflict, especially remote resources, it is necessary to study and propose a reliable solution appropriate to be the foundation for internal control systems in the cloud. In the scope of this paper, we find a way to produce efficient distributed resources which emphasizes solutions preventing deadlock and proposing methods to avoid resource shortage issue.

With this approach, the outcome result is the checklist of resources state which has the possibility of deadlock and lack of resources, by sending messages to the servers, the server would know the situation and have corresponding reaction.

.

Keywords— Virtual machine, best-effort, lease, deadlock detection, distributed environments, virtual resources.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. Paper 30011501: Comparative Analysis of Discrete Logarithm and RSA Algorithm in Data Cryptography (pp. 24-31)

Full Text: PDF

.

Abari Ovye John (1), Simon Philip (2), and P. B Shola (3)

(1) Computer Science Department, Federal University Lokoja, Kogi State, Nigeria.

(2) Computer Science Department, Federal University Kashere, Gombe State, Nigeria.

(3) Computer Science Department, University of Ilorin, Kwara State, Nigeria

.

Abstract - Due to its speed, spread and ease of use, the internet has now become a popular means through which useful data and information are transported from one location to another. This shift in the way data and information is being transported then calls for a new or different approach to security issues to save data in-transit from hackers. Cryptography is one of the approaches that have been explored for data security on the internet. RSA and El-Gamal (based on concepts of discrete logarithm) cryptographic algorithms are mostly employed to handle data security on the internet. This research work present a fair comparison between RSA and Discrete Logarithm algorithms along this direction; efficiency (time and space) by running several encryption setting to process data of different sizes. The efficiency of these algorithms is considered based on key generation speed, encryption speed, decryption speed, and storage requirement of the cipher text. In this paper, simulation has been conducted using Java programming language. Texts of different sizes were encrypted and decrypted using RSA and El-Gamal during the testing. Based on the result of the simulation, El Gamal is faster than RSA in terms of key generation speed but consumes more memory space than RSA. RSA is faster than El-Gamal in terms of encryption and decryption speed.

.

Keywords: Cryptography, Algorithm, RSA, El-Gamal, Encryption, Decryption, Discrete Logarithm, Plain text, Cipher text.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. Paper 30011509: Ensuring Consistent Patient Data Flow in a Low Bandwidth Environment with Mobile Agent (pp. 32-39)

Full Text: PDF

.

Akomolafe, Oladeji Patrick, Department of Computer Science, University of Ibadan, Ibadan, Nigeria

.

Abstract - The present technological advancement in pervasive computing and the widespread of the internet and wireless networks and mobile communication systems can be harnessed by E-health to bring better monitoring of patients to obtain a more efficient health care delivery, cost reduction and reduction in medical errors. Health care applications can take outstanding advantage of the intrinsic characteristics of multi-agent systems because of notable features that most health care applications share. This paper presents a patient monitoring system where context can be easily gathered from patient to caregivers. All the functionalities involved in transmitting data or contextual values from one end (patient) to another end (Doctor or Care givers) were abstracted into a middle ware using mobile agent technologies.

.

Keywords- Mobile data, Local Patient Information, Mobile Agents, Context Aware, Middleware

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

6. Paper 31051401: State of the Art: Vehicle-to-Vehicle Information Exchange (pp. 40-53)

Full Text: PDF

.

Abdelsalam Obeidat, Software Engineering Dpt., College of Information Technology, World Islamic University for Science and Education, Jordan, Amman

Adnan Shaouot, The Electrical and Computer Engineering, The University of Michigan-Dearborn, Dearborn, MI 48128

Atef Nsour, Computer Engineerng Dpt., College of Engineeering, Yarmouk University ,Irbid, Jordan; World Islamic University for Science and Education, Jordan, Amman

Nidal Al-Omari, Software Engineering Dpt., College of Information Technology, World Islamic University for Science and Education, Jordan, Amman

.

Abstract - As with most ‘new’ ideas and technologies, there is not much ‘new’ involved in the basic concept but just with the implementation. The idea of vehicle-to-vehicle communication dates back to the widespread implementation of wireless communication devices and the need for passengers of one vehicle to communicate with those of another. The purpose of this paper is to explore the past, present and potential future application of technologies that enable occupants of two separate vehicles to exchange messages. Whether the intent is safety, courtesy or emergency notifications, there is opportunity to provide this message exchange over a distributed system via a low cost portable device.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

.