Vol. 11 No. 1 JAN 2013

Vol. 11 No. 1 January 2013 International Journal of Computer Science and Information Security

Publication January 2013, Volume 11 No. 1 (Download Full Journal) (Archive) (Download 2)

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. Paper 31121230: Web Content Extraction A Heuristic Approach (pp. 1-4)

Full Text: PDF

.

Neetu Anand, Asst. Prof., Maharaja Surajmal Institute, Affiliate College of GGSIP University & Research Scholar, Lingayas University

Dr. Mayank Singh, Ass. Prof., Research Guide, Lingayas University

.

Abstract — Internet comprises of huge volume of data but the information it contains, are highly unstructured. There exists a lot of algorithm for extraction and identification of main content of the web page, as along with the main content there exist an irrelevant data, which is of little significance to the user and often distracting in many cases. Web page with only relevant information is of greater significance to the user. We have proposed an algorithm to extract the main contents of web page and store the contents in XML file, which can be utilized for useful purpose.

.

Keywords- Web Data Extraction, DOM tree, Visual Cues, XML

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. Paper 31121224: On Issues of Relay Nodes Assignment (pp. 5-10)

Full Text: PDF

.

Asia Samreen, Department of Computer Science, Bahria University, Karachi Campus, Karachi, Pakistan

Gulnaz Ahmed, Department of Computer Science, Bahria University, Karachi Campus, Karachi, Pakistan

.

Abstract — Wireless sensor Networks are very famous these days due to their coverage and enormous benefits. Cluster making efficiently and dynamically for such networks as to increase the life time of network nodes, is the question in front of researchers. Cooperation among Relay nodes and Edge nodes along with controlled energy consumption requires an efficient way such as LEACH for communication. We have revealed various factors to elaborate the issues relevant to WSNs for instance Cluster-head selection, low data reception rate, relay node placement and number of relay node assignment for optimal power usage.

.

Keywords-Cluster-head; Relay node placement; Relay node; Edge node; Power usage; LEACH

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. Paper 31121222: A New Approach To Monitor Children’s Computer Usage Pattern (pp. 11-14)

Full Text: PDF

.

Neetu Narwal, Asst. Prof., Maharaja Surajmal Institute, Affiliate College of GGSIP University & Research Scholar, Lingayas University

Dr. Mayank Singh, Ass. Prof., Research Guide, Lingayas University

.

Abstract - Each day, the WWW grows by nearly a million electronic pages, adding to the hundreds of millions previously on-line. WWW is a platform for swapping numerous types of information, ranging from research papers, and learning contents, to audio-visual content and various software’s [4]. Mining log data is a very comprehensive research area developed to solve the issues related to usage of computer and internet on single computer or on network of computers. This article provides a analysis of monitoring strategy for computer and internet usage of teenage computer.

.

Keywords: Usage Mining, Mining Technologies, Monitoring Strategy

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. Paper 31071240: Design and Implementation of Security Framework for Cognitive Radio Networks Resource Management (pp. 15-29)

Full Text: PDF

.

Obeten O. Ekabua and Ifeoma U. Ohaeri

Department of Computer Science, North-West University, Mafikeng Campus, Private Bag X2046, Mmabatho 2735, South Africa

.

Abstract: Designing and implementing a secure communication for any network is an important issue for the optimal control of resource usage in a resource constrain network environment. Therefore, in this paper, we design and implement a joint authentication and authorization framework by transforming the framework requirement analysis. The framework is a security infrastructure capable of monitoring and controlling access to the limited spectrum resources, dynamically managing data and information in CRN, for a secured communication and quality of service (QOS). We explained how the various components in the framework interact to ensure a secured communication and effective access control.

.

Keywords: Network Management, Security, Authentication, Authorization, Access Control.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. Paper 25121204: Cyber Crimes Analysis Based-On Open Source Digital Forensics Tools (pp. 30-43)

Full Text: PDF

.

Victor O. Waziri PhD, Department of Cyber Security Science; School of Information and Communication Technology; Federal University of Technology, Minna-Nigeria

Okongwu N. O, Economic and Financial Crimes Commission, Nigeria

Audu Isah PhD, Department of Mathematics/ Statistics, School of Federal University of Technology, Minna-Nigeria

Olawale S. Adebayo, Department of Cyber Security Science; School of Information and Communication Technology; Federal University of Technology, Minna-Nigeria

Shafi’í Mohammed Abdulhamid, Department of Cyber Security Science; School of Information and Communication Technology; Federal University of Technology, Minna-Nigeria

.

Abstract - In this paper, we are present the digital forensic open source tools: Fiwalk, Bulk_Extractor, Foremost, Sleuth Kit, and Autopsy which are all Linux based forensic tools to extract evidences that could be presented in the court of law. Fiwalk reads a disk image and outputs a block of XML containing all the disk image of resident and deleted files. Foremost recovers files by using their headers, footers and data structures. The Sleuth Kit and Autopsy perform various aspects of file system analysis. The Autopsy Forensic Browser is a graphical web interface that presents the results generated by Sleuth Kit. This research project demonstrates the usefulness of the above-mentioned forensic tools for analysis and recovery of obliterated data from hard drives. This paper found that Sleuth Kit, Autopsy Forensic Browser, Fiwalk, Bulk_Extractor, and Foremost all provide effective file system analysis and recovery tool sets. The increasing complexity of storage devices requires that the investigator employs different forensic tool set to complement his arsenal of tools. No single digital forensic tool would be sufficient for an entire digital forensic investigation case. With this consideration, this paper employs various forensic tools. The demonstration of the effectiveness of these digital forensic tools utilized in this paper could serve as an alternative for investigators looking to expand their digital forensic tool set functionality in the court of law. Details of the experiments are fully given at the expense of bulkiness since this works is aim at enhancing the utilities of open source forensics tools applications.

.

Keywords: Digital Forensics, Fiwalk, Foremost, Sleut Kits Bulk_Extractor, Autopsy, Linux, Ontologies

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------