Vol. 10 No. 1 JAN 2012

Vol. 10 No. 1 January 2012 International Journal of Computer Science and Information Security
Publication January 2012, Volume 10 No. 1 (Download Full Journal) (Archive) (Download 2)

.
Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
1. Paper 26121101: Adaptive Optical PIC Applied in VLC For Multi-user Access Interference Reduction (pp. 1-6)
Full Text: PDF

.
Peixin Li, Department of Electronics and Radio Engineering, Kyung Hee University, Suwon, Korea
Ying Yi, Department of Electronics and Radio Engineering Kyung Hee University, Suwon, Korea

.
Abstract — Optical wireless data transmission systems for indoor application are usually affected by optical interference induced by sun light and artificial ambient lights. This paper presents a characterization of the optical interference produced in visible light communication (VLC) systems and proposes an effective scheme to solve it. Regarding the sun light noise and some artificial light noises reduction, the common method is to adapt the optical bandpass filter which can distinguish the wavelength between interference lights and information lights. However, for some photo-electric systems, the visible lights from the transmitters occupy the same wavelength range, in this case, the optical bandpass filter would not reduce the interference noise from the other user, for example, the optical interference caused by multi-user access of the optical medium. Therefore, we proposed a novel scheme, adaptive optical parallel interference cancellation (AOPIC) to reduce the multiple access interference (MAI) and multiple user interference (MUI) induced by multi-user access of the optical medium, the conventional parallel interference cancellation (PIC) is analyzed as the comparison. Through the simulation results, we can conclude that the AOPIC scheme shows much better bit error rate (BER) performance than the conventional PIC with the increasing number of user.
.
Keywords-component; AOPIC; MAI; MUI;MC-CDMA
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
2. Paper 30121122: Performance Assessment of Tools of the intrusion Detection/Prevention Systems (pp. 7-13)
Full Text: PDF

.
Yousef FARHAOUI, Ahmed ASIMI
LabSiv, Equipe ESCAM, Faculty of sciences Ibn Zohr University B.P 8106, City Dakhla, Agadir, Morocco

.
Abstract — This article aims at providing (i) a general presentation of the techniques and types of the intrusion detection and prevention systems, (ii) an in-depth description of the evaluation, comparison and classification features of the IDS and the IPS and (iii) the implications of such study on how to determinate the features of some more effective IDS and IPS in the commercial domains and open source.
.
Keywords—Intrusion Detection, Intrusion Prevention, Characteristic, Tools.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
3. Paper 31101128: Network Intrusion Detection Types and Computation (pp. 14-21)
Full Text: PDF
.
Purvag Patel, Chet Langin, Feng Yu, and Shahram Rahimi
Southern Illinois University Carbondale, Carbondale, IL, USA

.
Abstract — Our research created a network Intrusion Detection Math (ID Math) consisting of two components: (1) a way of specifying intrusion detection types in a manner which is more suitable for an analytical environment; and (2) a computational model which describes methodology for preparing intrusion detection data stepwise from network packets to data structures in a way which is appropriate for sophisticated analytical methods such as statistics, data mining, and computational intelligence. We used ID Math in a production Self-Organizing Map (SOM) intrusion detection system named ANNaBell as well as in the SOM+ Diagnostic System which we developed.
.
Index Terms—Computational intelligence, Data Mining, ID Math, Intrusion Detection Types, Log Analysis
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
4. Paper 31121134: Adaptive Behaviometric for Information Security and Authentication System using Dynamic Keystroke (pp. 22-26)
Full Text: PDF

.
Dewi Yanti Liliana, Department of Computer Science, University of Brawijaya, Malang, Indonesia
Dwina Satrinia, Department of Computer Science, University of Brawijaya, Malang, Indonesia

.
Abstract —The increasing number of information systems requires a reliable authentication technique for information security. Password only is not enough to protect user account because it is still vulnerable to any intrusion. Therefore an authentication system using dynamic keystrokes can be the simplest and the best choice. Dynamic Keystroke Authentication System (DKAS) becomes an effective solution which can be easily implemented to gain a high security information system with the aid of a computer keyboard. DKAS verify users based on their typing rythm. Two main stages of DKAS is the enrollment stage to register user into the system, and the authentication stage to check the authenticity of user. Moreover, we use a local threshold to make it becomes adaptive behaviometric for each user. From the experiment conducted, the accuracy rate in distinguishing genuine and impostor user is 91.72%. This shows that the adaptive method of DKAS has a promising result.
.
Keywords- authentication system, behaviometric, dynamic keystroke, local threshold
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
5. Paper 31121137: Denoising Cloud Interference on Landsat Satellite Image Using Discrete Haar Wavelet Transformation (pp. 27-31)
Full Text: PDF

.
Candra Dewi, Department of Mathematic, University of Brawijaya, Malang, Indonesia
Mega Satya Ciptaningrum, Department of Mathematic, University of Brawijaya, Malang, Indonesia
Muh Arif Rahman, Department of Mathematic, University of Brawijaya, Malang, Indonesia

.
Abstract — Satellite imagery is very useful in information acquisition of the earth's surface image, especially the earth's resources. However, in the process of retrieval information from satellite imagery is often found barriers that can obscure or even cover the imaging of an area. One of these barriers is a cloud, which result the image that covered with lots of noise. Wavelet transformation was usually used to enhance the image or to eliminate striping noise on satellite image. In this paper is used Discrete Haar Wavelet transformation to reduce cloud noise on Landsat TM image. The process includes the Haar Wavelet decomposition of image rows and columns. After that, thresholding process is also applied for de-noising. Thresholding results are then reconstructed using the Inverse Discrete Haar Wavelet. The method is applied to the variation of the band image, the type of thresholding (hard and soft), as well as the size of the image convolution. The testing results on the band 1 to band 6 of Landsat TM imagery showed that the lowest error values are calculated by RMSE (Root Mean Square Error) present in band 1. Image signal to noise ratio in band 1 has the highest value, which means most high-power image signal to noise. This mean that band 1 has the highest pixel value similarity between whole testing data.
.
Keywords; Discrete Haar Wavelet, thresholding, image convolution, Landsat TM
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
6. Paper 31121142: Calculating Rank of Nodes in Decentralised Systems from Random Walks and Network Parameters (pp. 32-41)
Full Text: PDF

.
Sunantha Sodsee, Phayung Meesad, Mario Kubek, Herwig Unger
King Mongkut’s University of Technology North Bangkok, Thailand
Fernuniversit¨at in Hagen, Germany

.
Abstract — To use the structure of networks for identifying the importance of nodes in peer-to-peer networks, a distributed linkbased ranking of nodes is presented. Its aim is to calculate the nodes’ PageRank by utilising the local-link knowledge of neighborhood nodes rather than the entire network structure. Thereby, an algorithm to determine the extended PageRank, which is called NodeRank of nodes by distributed random walks that supports dynamic P2P networks is presented here. It takes into account not only the probabilities of nodes to be visited by a set of random walkers but also network parameters as the available bandwidth. NodeRanks calculated this way are then applied for content distribution purposes. The algorithm is validated by numerical simulations. The results show that the nodes suited best to place sharable contents in the community on are the ones with high NodeRanks, which also offer highbandwidth connectivity.
.
Index Terms — Peer-to-peer systems, PageRank, NodeRank, random walks, network parameters, content distribution.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
7. Paper 31121144: Mapping Relational Database into OWL Structure with Data Semantic Preservation (pp. 42-47)
Full Text: PDF

.
Noreddine GHERABI, Hassan 1 University, FSTS, Department of Mathematics and Computer Science
Khaoula ADDAKIRI, Department of Mathematics and Computer Science, Université Hassan 1er, FSTS, LABO LITEN Settat, Morocco
Mohamed BAHAJ, Hassan 1 University, FSTS, Department of Mathematics and Computer Science

.
Abstract— This paper proposes a solution for migrating an RDB into Web semantic. The solution takes an existing RDB as input, and extracts its metadata representation (MTRDB). Based on the MTRDB, a Canonical Data Model (CDM) is generated. Finally, the structure of the classification scheme in the CDM model is converted into OWL ontology and the recordsets of database are stored in owl document. A prototype has been implemented, which migrates a RDB into OWL structure, for demonstrate the practical applicability of our approach by showing how the results of reasoning of this technique can help improve the Web systems.
.
Keywords-component; RDB, RDF, OWL, Web ontology
.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
8. Paper 31121147: A Three-Layer Access Control Architecture Based on UCON for Enhancing Cloud Computing Security (pp. 48-52)
Full Text: PDF

.
Niloofar Rahnamaei, Department of Computer Engineering, Tehran North Branch, Islamic Azad University, Tehran, Iran
Ahmad Khademzadeh, Scientific and International Cooperation Department, Iran Telecommunication Research Center, Tehran, Iran
Ammar Dara, Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran

.
Abstract — By emerging cloud computing, organizations utilize this new technology by consuming cloud services based on-demand. However, they must put their data and processes on a cloud, therefore; they do not have enough control on their data and they must map their access control policies on access control policies of a cloud service. Also, some aspects of this technology like interoperability, multi-tenancy, continuous access control are not supported by traditional approaches. The usage control model with two important specifications like continuous access control and attribute mutability are more compatible with security requirements of cloud computing. In this paper, a three layer access control based on the usage control for could services has been proposed, in which separation of duties can support the multi-tenancy and the least privilege principle.
.
Keywords-Clould Computing; Access Control; Usage Control (UCON); Multi-tenancy; Separation of Duties

.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
9. Paper 31121150: Detection of DoS and DDoS Attacks in Information Communication Networks with Discrete Wavelet Analysis (pp. 53-57)
Full Text: PDF

.
Oleg I. Sheluhin, Department of Information Security, Moscow Tech. Univ. of Communication and Informatics, Moscow, Russia
Aderemi A. Atayero, Department of Electrical and Information Engineering, Covenant University, Ota, Nigeria

.
Abstract — A method based on discrete wavelet decomposition of traffic data and statistical processing algorithms based on Fisher and Cochran criteria are proposed for detection of traffic anomaly in computer and telecommunication networks. Two sliding windows with two different threshold values are employed to reduce the level of false alerts. A high efficiency level of detection of abnormal traffic spikes is thus guaranteed. The paper likewise presents an algorithm developed for detecting DoS and DDoS attacks based on these statistical criteria. Software is developed in Matlab based on the proposed algorithm. Data sets made available by the Lincoln Laboratory of MIT (1999 DARPA Intrusion Detection Evaluation) were analyzed as the test sequence. Analysis of experimental results revealed that the ultimate test for detecting an attack is to check if any one of the statistical criteria exceeds the upper threshold at the stage of coefficients reconstruction.
.
Keywords-Anomaly, Denial of Service, DDoS, Wavelet transform, DWT, FWT

.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
10. Paper 31121154: Developing an Auto-Detecting USB Flash Drives Protector using Windows Message Tracking Technique (pp. 58-61)
Full Text: PDF

.
Rawaa Putros Polos Qasha, Department of Computers Sciences, College of Computer Sciences and Mathematics, University of Mosul, Mosul, Iraq
Zaid Abdulelah Mundher, Department of Computers Sciences, College of Computer Sciences and Mathematics, University of Mosul, Mosul, Iraq

.
Abstract – This paper presents Windows Message Device Change Tracking (WMDCT) program to protect Windows systems from Universal Serial Bus (USB) viruses which use the AutoRun property to execute. The WMDCT program introduces a new method to develop the traditional ways of protecting techniques, which are used by other anti-viruses programs. The main two parts of WMDCT program are monitoring and tracking Windows Message Device Change, which is a message that is sent by the system, in the background, and removing or repairing the infected files in the USB flash drive. WMDCT has been tested in the University of Mosul/ Computer Science Dept. labs and the results have been mentioned in this paper.
.
Keywords-USB; AutoRun; system protection; Windows Messages
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
11. Paper 30121110: Analysis of DelAck based TCP-NewReno with varying window size over Mobile Ad Hoc Networks (pp. 62-67)
Full Text: PDF

.
Parul Puri, Gaurav Kumar , Bhavna Tripathi, Department of Electronics & Communication Engineering, Jaypee Institute of Information Technology, Noida, India,
Dr. Gurjit Kaur, Assistant Professor, Department of Electronics & Communication Engineering, School of ICT, Gautam Buddha University, Greator Noida, India.

.
Abstract — In this paper, we study TCP performance over multi-hop wireless networks that use IEEE 802.11 protocol for access. For such networks NewReno is the most deployed TCP variant that handles multiple packet losses efficiently. It is shown that the delayed ACK scheme substantially increases the TCP throughput. We propose an approach to improve the performance of half-duplex and asymmetric multi hop networks widely employed for mobile communication. Our approach is based on optimizing the timer duration of the delayed ACK scheme and varying the window size. Simulations have been carried on NS2 for TCP-NewReno variant using DSDV and AODV routing protocols.
.
Keywords: Multi-hop wireless networks, TCP, Newreno, DelAck, DSDV, AODV.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
12. Paper 25101111: Distributed Intrusion Detection System for Ad hoc Mobile Networks (pp. 68-73)
Full Text: PDF

.
Muhammad Nawaz Khan, School of Electrical Engineering & Computer Science, National University of Science & Technology (NUST), Islamabad, Pakistan.
Muhammad Ilyas Khatak, Department of Computing, Shaheed Zulfikar Ali Bhutto Institute, Of Science & Technology Islamabad, Pakistan
Ishtiaq Wahid, Department of Computing & Technology, Iqra University Islamabad, Islamabad, Pakistan

.
Abstract - In mobile ad hoc network resource restrictions on bandwidth, processing capabilities, battery life and memory of mobile devices lead tradeoff between security and resources consumption. Due to some unique properties of MANETs, proactive security mechanism like authentication, confidentiality, access control and non-repudiation are hard to put into practice. While some additional security requirements are also needed, like cooperation fairness, location confidentiality, data freshness and absence of traffic diversion. Traditional security mechanism i.e. authentication and encryption, provide a security beach to MANETs. But some reactive security mechanism is required who analyze the routing packets and also check the overall network behavior of MANETs. Here we propose a local-distributed intrusion detection system for ad hoc mobile networks. In the proposed distributed-ID, each mobile node works as a smart agent. Data collect by node locally and it analyze that data for malicious activity. If any abnormal activity discover, it informs the surrounding nodes as well as the base station. It works like a Client-Server model, each node works in collaboration with server, updating its database each time by server using Markov process. The proposed local distributed- IDS shows a balance between false positive and false negative rate. Re-active security mechanism is very useful in finding abnormal activities although proactive security mechanism present there. Distributed local-IDS useful for deep level inspection and is suited with the varying nature of the MANETs.
.
Keyword: MANETs, Intrusion Detection System (IDS), security mechanism, proactive, reactive, Markov process, false negative and false positive.

.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
13. Paper 30121111: Image Retrieval Using Histogram Based Bins of Pixel Counts and Average of Intensities (pp. 74-79)
Full Text: PDF

.
H. B. Kekre, Sr. Professor, Department of Computer Engineering, NMIMS University, Mumbai, Vileparle, India
Kavita Sonawane, Ph. D. Research Scholar, Department of Computer Engineering, NMIMS University, Mumbai, Vileparle, India

.
Abstract —This In this paper we are introducing a novel technique to extract the feature vectors using color contents of the image. These features are nothing but the grouping of similar intensity levels in to bins into three forms. One of its form includes count of number of pixels, and other two are based on bins average intensity levels and the average of average intensities of R, G and B planes of image having some similarity amongst them. These Bins formation is based on the histograms of the R, G and B planes of the image. In this work each image separated into R, G and B planes. Obtain the histogram for each plane which is partitioned into two, three and four parts such that each part will have equal pixel intensity levels. As the 3 histograms are partitioned into 2, 3and 4 parts we could form 8, 27 and 64 bins out of it. We have considered three ways to represent the features of the image. First thing we taken into consideration is the count of the number of pixels in the particular bin. Second thing considered is calculate the average of the R, G and B intensities of the pixels in the particular bin and third form is based on average distribution of the total number of pixels with the average R, G, B intensities in all bins. Further some variations are made while selecting these bins in the process where query and database images will be compared. To compare these bins Euclidean distance and Absolute distance are used as similarity measures. First set of 100 images having less distances between their respective bins which are sorted into ascending order will be selected in the final retrieval set. Performance of the system is evaluated using the plots obtained in the form of cross over points of precision and recall parameters in terms of percentage retrieval for only out of first 100 images retrieved based on the minimum distance. Experimental results are obtained for augmented Wang database of 1000 bmp images from 10 different categories which includes Flowers, Sunset, Mountain, Building, Bus, Dinosaur, Elephant, Barbie, Mickey and Horse images. We have taken 10 randomly selected sample query images from each of the 10 classes. Results obtained for 100 queries are used in the discussion.
.
Keywords-component; Histogram, Bins approach, Image retrieval, CBIR, Euclidean distance, Absolute distance.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
14. Paper 30121113: The Increase Of Network Lifetime By Implementing The Fuzzy Logic In Wireless Sensor Networks (pp. 80-84)
Full Text: PDF

.
Indrit Enesi, Department of Electronic and Telecommunication, Polytechnic University of Tirana, Tirana, Albania
Elma Zanaj, Department of Electronic and Telecommunication, Polytechnic University of Tirana, Tirana, Albania

.
Abstract - Wireless Sensor Networks (WSNs) present a new generation of real-time embedded systems with limited computation, energy and memory resources. They are being used in a wide variety of applications where traditional networking infrastructure is practically infeasible. Appropriate cluster-head node election can drastically reduce the energy consumption enhancing so the network lifetime. In this paper, a fuzzy logic approach to cluster-head election is proposed based on three descriptors - energy, concentration and centrality of nodes. Simulation shows that depending upon network configuration, a substantial increase in network lifetime can be accomplished as compared to probabilistically selecting the nodes as cluster-heads using only local information.
.
Keywords — Wireless Sensor Networks, Network lifetime, Cluster-head, Fuzzy Logic.

.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
15. Paper 30121116: Mathematical Model for Component Selection in Embedded System Design (pp. 85-90)
Full Text: PDF

.
Ashutosh Gupta, Chandan Maity
Ubiquitous Computing Group, Centre for Development of Advanced Computing, Noida, India

.
Abstract — Changes in embedded technologies and market dynamics have made traditional electronic parts selection and management practices inadequate. Component selection is a process designed to evaluate the electronic part, and facilitate informed decisions regarding its selection and future use. Embedded Designers face challenges when they are about to select the electronic component, for new design as it is difficult to compare the parts in terms of quantitative and qualitative terms in absence of any mathematical model. This paper proposes a new hybrid model which combines Linear Weightage and Analytic Hierarchy Process (AHP) Models linear weightage model to assist in the decision making activity and helps to select the best electronic component among a number of potential candidates. The final decision from this new model will help in better selection methodology for assisting embedded designers to make the right decision and select the most suitable component required for the design from the large pool of the components available in the market.
.
Keywords - Mathematical Model, Component Selection, Embedded System Design, Linear Weightage Model, Analytic Hierarchy Process, Microcontroller
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
16. Paper 30121129: Detection and Elimination of Ocular Artifacts from EEG Data Using Wavelet Decomposition Technique (pp. 91-94)
Full Text: PDF

.
Shah Aqueel Ahmed, D. Elizabath Rani, Syed Abdul Sattar
Department of Electronics and Instrumentation Engineering, Royal Institute of technology & Science, Chevella. R R Dist. Hyderabad. A. P. India.

.
Abstract -- This paper presents detection and elimination of ocular artifact from electroencephalographic data using stationary wavelet transform. Usually all the biomedical signals are contaminated with the noise. This noise source increases the difficulty in analyzing the EEG signal. In this paper we are dealing with the EEG signal contaminated with ocular artifacts. Ocular artifacts are more predominant over other artifacts. Since, these ocular artifacts occupy lower frequencies they are difficult to eliminate. Stationary wavelet transform and its inverse are applied in this paper for detection and elimination of ocular artifact.
.
Index Terms--EEG (Electroencephalography), OA (ocular artifact), SWT (Stationary Wavelet Transform) and EOG (Electrooculography).
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
17. Paper 31101132: Cluster-Based Routing Protocol To Improve Qos In Mobile Adhoc Networks (pp. 95-100)
Full Text: PDF

.
Prof. M .N. Doja, Mohd. Amjad
Department of Computer Engineering, Faculty of Engineering & Technology, Jamia Millia Islamia, New Delhi, India

.
Abstract - An Ad Hoc network is a collection of wireless mobile hosts dynamically forming a temporary network without the aid of any existing established infrastructure. Quality of Service (QoS) is a set of service requirements that needs to be met by the network while transporting a packet stream from a source to its destination. QoS support for Mobile Adhoc Networks (MANETs) is a challenging task due to the dynamic topology and limited resources. Characteristics of Mobile Ad Hoc Networks (MANETs) such as lack of central coordination, mobility of hosts, and limited availability of resources make Quality of Service (QoS) provisioning very challenging. Limited resource availability such as battery power, average energy consumption of the network by all of the nodes and insecure medium are some of the major QoS issues to be dealt with. In this paper we have suggested a clustering of participating nodes with minimum energy consumption by the overall network by hierarchical cluster-based routing Algorithm. In this algorithm we have introduced a new metric, next hop availability, which is a combination of two metrics. It maximizes path availability and minimizes travel time of packets and therefore offers a good balance between selection of fast paths and a better use of network resources with minimum energy consumption. In the conclusion it provides simulation result to evaluate the performance on a network simulator.
.
Keywords : - Power saving protocol, clusters, Quality of service support, Ad hoc network.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Paper : (pp. )

Full Text: PDF



Comments