This document summarizes a research paper that classifies different types of networks and discusses their associated security issues. It categorizes networks based on size (LAN, MAN, WAN), design (peer-to-peer, client-server, standalone), layering (layered, non-layered), and provides examples such as Ethernet, Wi-Fi, VPNs. It also discusses common security threats for different network types like viruses, denial of service attacks, and evaluates security measures including encryption, firewalls, access control. The paper aims to provide a comprehensive classification of networks and analyze how security needs vary depending on the network and software development stages.
A Data Hiding Techniques Based on Length of English Text using DES and Attack...IJORCS
The comparing recent proposal for multimedia applications network security remains an important topic for researchers. The security deals with both wired and wireless communication. Network is defined as it is a large system consisting of many similar parts that are connected together to allow the movement or communication between or along the parts or between the parts and a control center. There are the main components of the network information system such as end systems (terminals, servers) and intermediate systems (hubs, switches, gateways). Every node has its own set of vulnerabilities that can be related to hardware, software, protocol stack etc. Nodes are interconnected by physical supports in a network for example connected with cables in wired Local Area Network (LAN) or radio waves (Wi-Fi) in Wireless Local Area Network (WLAN). Some nodes are able to provide services (FTP, HTTP browsing, database access). If two nodes want to communicate together, they must be interconnected physically and logically. Network security deals with also information hiding technique. Now day’s security deals with heterogeneous networks. The use of different wireless and wired network which are working on different platform is heterogeneous. So design of network security for such type of heterogeneous network is difficult task.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8-security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manages to ensure more secure packets transmission by taking all the necessary security measures.
A Survey of Key Management Framework for Wireless Mobile EnvironmentAM Publications,India
Security has become a primary concern in mobile ad hoc networks (MANETs). The characteristics of MANETs pose both challenges and opportunities in achieving security goals, such as confidentiality, authentication, integrity, availability, access control, and non-repudiation. Cryptographic techniques are widely used for secure communications in wired and wireless networks. Most cryptographic mechanisms, such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key management is weak. Key management is also a central component in MANET security. The purpose of key management is to provide secure procedures for handling cryptographic keying materials. The tasks of key management include key generation, key distribution, and key maintenance. Key maintenance includes the procedures for key storage, key update, key revocation, key archiving, etc. In MANETs, the computational load and complexity for key management are strongly subject to restriction by the node’s available resources and the dynamic nature of network topology. A number of key management schemes have been proposed for MANETs. In this article, we present a survey of the research work on key management in MANETs according to recent literature.
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPIJNSA Journal
In emerging technology of Internet, security issues are becoming more challenging. In case of wired LAN it is somewhat in control, but in case of wireless networks due to exponential growth in attacks, it has made difficult to detect such security loopholes. Wireless network security is being addressed using firewalls, encryption techniques and wired IDS (Intrusion Detection System) methods. But the approaches which were used in wired network were not successful in producing effective results for wireless networks. It is so because of features of wireless network such as open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense etc. So, there is need for new approach which will efficiently detect intrusion in wireless network. Efficiency can be achieved by implementing distributive, co-operative based, multi-agent IDS. The proposed system supports all these three features. It includes mobile agents for intrusion detection which uses SNMP (Simple network Management Protocol) and MIB (Management Information Base) variables for mobile wireless networks.
Whenyour computer isconnected to the Internet, you expose your computer to a variety of potentialthreats. The Internet isdesigned in such a waythat if you have access to the Internet, all other computers on the Internet canconnect to yourcomputer.Thisleavesyouvulnerable to variouscommonattacks. This isespeciallytroubling as severalpopular programs open services on your computer thatallowothers to view files on your computer! Whilethisfunctionalityisexpected, the difficultyisthatsecurityerrors are detectedthatalwaysallow hackers to attackyour computer with the ability to view or destroy sensitive information stored on your computer. To protectyour computer fromsuchattacksyouneed to "teach" your computer to ignore or resistexternaltestingattempts. The commonname for such a program is Firewall. A firewall is software thatcreates a secureenvironmentwhosefunctionis to block or restrictincoming and outgoing information over a network. These firewalls actually do not work and are not suitable for business premises to maintain information securitywhilesupporting free exchange of ideas. Firewall are becoming more and more sophisticated in the day, and new features are beingadded all the time, sothat, despitecriticism and intimidatingdevelopmentmethods, they are still a powerfuldefense. In thispaper, weread a network firewall thathelps the corporateenvironment and other networks thatwant to exchange information over the network. The firewall protects the flow of trafficthrough the internet and limits the amount of external and internal information and provides the internal user with the illusion of anonymous FTP and www online communications.
A Data Hiding Techniques Based on Length of English Text using DES and Attack...IJORCS
The comparing recent proposal for multimedia applications network security remains an important topic for researchers. The security deals with both wired and wireless communication. Network is defined as it is a large system consisting of many similar parts that are connected together to allow the movement or communication between or along the parts or between the parts and a control center. There are the main components of the network information system such as end systems (terminals, servers) and intermediate systems (hubs, switches, gateways). Every node has its own set of vulnerabilities that can be related to hardware, software, protocol stack etc. Nodes are interconnected by physical supports in a network for example connected with cables in wired Local Area Network (LAN) or radio waves (Wi-Fi) in Wireless Local Area Network (WLAN). Some nodes are able to provide services (FTP, HTTP browsing, database access). If two nodes want to communicate together, they must be interconnected physically and logically. Network security deals with also information hiding technique. Now day’s security deals with heterogeneous networks. The use of different wireless and wired network which are working on different platform is heterogeneous. So design of network security for such type of heterogeneous network is difficult task.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8-security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manages to ensure more secure packets transmission by taking all the necessary security measures.
A Survey of Key Management Framework for Wireless Mobile EnvironmentAM Publications,India
Security has become a primary concern in mobile ad hoc networks (MANETs). The characteristics of MANETs pose both challenges and opportunities in achieving security goals, such as confidentiality, authentication, integrity, availability, access control, and non-repudiation. Cryptographic techniques are widely used for secure communications in wired and wireless networks. Most cryptographic mechanisms, such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key management is weak. Key management is also a central component in MANET security. The purpose of key management is to provide secure procedures for handling cryptographic keying materials. The tasks of key management include key generation, key distribution, and key maintenance. Key maintenance includes the procedures for key storage, key update, key revocation, key archiving, etc. In MANETs, the computational load and complexity for key management are strongly subject to restriction by the node’s available resources and the dynamic nature of network topology. A number of key management schemes have been proposed for MANETs. In this article, we present a survey of the research work on key management in MANETs according to recent literature.
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPIJNSA Journal
In emerging technology of Internet, security issues are becoming more challenging. In case of wired LAN it is somewhat in control, but in case of wireless networks due to exponential growth in attacks, it has made difficult to detect such security loopholes. Wireless network security is being addressed using firewalls, encryption techniques and wired IDS (Intrusion Detection System) methods. But the approaches which were used in wired network were not successful in producing effective results for wireless networks. It is so because of features of wireless network such as open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense etc. So, there is need for new approach which will efficiently detect intrusion in wireless network. Efficiency can be achieved by implementing distributive, co-operative based, multi-agent IDS. The proposed system supports all these three features. It includes mobile agents for intrusion detection which uses SNMP (Simple network Management Protocol) and MIB (Management Information Base) variables for mobile wireless networks.
Whenyour computer isconnected to the Internet, you expose your computer to a variety of potentialthreats. The Internet isdesigned in such a waythat if you have access to the Internet, all other computers on the Internet canconnect to yourcomputer.Thisleavesyouvulnerable to variouscommonattacks. This isespeciallytroubling as severalpopular programs open services on your computer thatallowothers to view files on your computer! Whilethisfunctionalityisexpected, the difficultyisthatsecurityerrors are detectedthatalwaysallow hackers to attackyour computer with the ability to view or destroy sensitive information stored on your computer. To protectyour computer fromsuchattacksyouneed to "teach" your computer to ignore or resistexternaltestingattempts. The commonname for such a program is Firewall. A firewall is software thatcreates a secureenvironmentwhosefunctionis to block or restrictincoming and outgoing information over a network. These firewalls actually do not work and are not suitable for business premises to maintain information securitywhilesupporting free exchange of ideas. Firewall are becoming more and more sophisticated in the day, and new features are beingadded all the time, sothat, despitecriticism and intimidatingdevelopmentmethods, they are still a powerfuldefense. In thispaper, weread a network firewall thathelps the corporateenvironment and other networks thatwant to exchange information over the network. The firewall protects the flow of trafficthrough the internet and limits the amount of external and internal information and provides the internal user with the illusion of anonymous FTP and www online communications.
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection
system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.
A technical review and comparative analysis of machine learning techniques fo...IJECEIAES
Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices, because of the properties such as node mobility, lack of centralized management and limited bandwidth. To tackle these security issues, traditional cryptography schemes can-not completely safeguard MANETs in terms of novel threats and vulnerabilities, thus by applying Deep learning methods techniques in IDS are capable of adapting the dynamic environments of MANETs and enables the system to make decisions on intrusion while continuing to learn about their mobile environment. An IDS in MANET is a sensoring mechanism that monitors nodes and network activities in order to detect malicious actions and malicious attempt performed by Intruders. Recently, multiple deep learning approaches have been proposed to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of three models, Inceprtion architecture convolutional neural network (Inception-CNN), Bidirectional long short-term memory (BLSTM) and deep belief network (DBN) on the deep learning-based intrusion detection systems, using the NSL-KDD dataset containing information about intrusion and regular network connections, the goal is to provide basic guidance on the choice of deep learning models in MANET.
The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute
challenges and weaknesses before the security progress in MANET network. It causes weakness in security,
which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten
MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between
them will be concluded and architectural security solutions in MANET will beproposed.
Security Key Management Model for Low Rate Wireless Personal Area NetworksCSCJournals
IEEE 802.15.4-based devices networks known by the name of LR-WPAN (Low Rate Wireless Personal Area Network) are characterized by low computation, memory and storage space, and they do not possess an infrastructure. This makes them dynamic and easy to deploy, but in the other hand, this makes them very vulnerable to security issues, as they are low energy so they cant implement current security solutions, and they are deployed in non-secure environments that makes them susceptible to eavesdropping attacks. Most proposed solutions draw out the security of the bootstrapping and commissioning phases as the percentage of existing of an intruder in this time is very low. In this paper, we propose a security model for LR-WPANs based on symmetric cryptography, which takes into account securing the bootstrapping phase, with an analysis of the effectiveness of this proposal and the measures of its implementation.
As the Supervisory Control and Data Acquisition (SCADA) system are deployed in infrastructures which are critical to the survival of a nation, they have emerged as a potential terrain for cyber-war, thus attracting the considered attention of ‘nation-states’. The analysis of worms like ‘stuxnet’ ‘flame’ and ‘duqu’ reveals the hand of a ‘nation-state’ in their design and deployment. Hence, the necessity to understand various issues in the defence of SCADA systems arises. The forensics of the SCADA system provide deep insight into the design and deployment of the worm (the malware) once the system is attacked. This is precisely the scope of this essay.
Privacy & Security Aspects in Mobile NetworksDefCamp
Mobile communication is constantly present in our daily life to facilitate personal and business needs. In this context, the security of mobile communication is of great importance.
The talk will introduce the audience into the security of mobile networks, with a focus on individuals' privacy. It will discuss aspects related to privacy and security in different generations of networks from both a theoretical and a practical perspective.
This presentation was showcased during Ladies in Cyber Security, an event organised by DefCamp and Cyber Security Research Center from Romania - CCSIR.
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs
have a wide range of potential applications, including security and surveillance, control, actuation and
maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However
security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor
nodes. Those networks are facing several threats that affect their functioning and their life. In this paper we
present security attacks in wireless sensor networks, and we focus on comparison and analysis of recent
Intrusion Detection schemes in WSNs.
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Coming to this issue we have Network Security in Tool Gyan which will put light on how to set up a secured network, Who wants to be a Millionaire in Tool Gyan, check out yourself of what exactly its all about ;)TOR in Mom's guide for all those who thought 'It sounds very complicated to use, I’m not a hacker! I can’t use it!' by our Author- Federico from Italy.
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...IJCNCJournal
After tightening up network perimeter for dealing with external threats, organizations have woken up to the
threats from inside Local Area Networks (LAN) over the past several years. It is thus important to design
and implement LAN security strategies in order to secure assets on LAN by filtering traffic and thereby
protecting them from malicious access and insider attacks. Banking Financial Services and Insurance
(BFSI) industry is one such segment that faces increased risks and security challenges. The typical
architecture of this segment includes several thousands of users connecting from various branches over
Wide Area Network (WAN) links crossing national and international boundaries with varying network
speed to access data center resources. The objective of this work is to deploy LAN security solution to
protect the data center located at headquarters from the end user machines. A LAN security solution should
ideally provide Network Access Control (NAC) along with cleaning (securing) the traffic going through it.
Traffic cleaning itself includes various features like firewall, intrusion detection/prevention, traffic anomaly
detection, validation of asset ownership etc. LANenforcer (LE) is a device deployed in front of the data
center such that the traffic from end-user machines necessarily passes through it so that it can enforce
security. The goal of this system is to enhance the security features of a LANenforcer security system with
Intrusion Prevention System (IPS) to enable it to detect and prevent malicious network activities. IPS is
plugged into the packet path based on the configuration in such a way that the entire traffic passes through
the IPS on LE.
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
: While conventional cryptographic security mechanisms are essential to the overall problem, of securing wireless networks, the wireless medium is a powerful source of domain-specific information, that can complement and enhancetraditional security mechanisms . In this work a security paradigms, which exploit physical layer properties of the wireless medium, can enhance confidentiality and authentication services.In essence using the physical layer information available , we are able to continuously authenticate packets at the same layer. However ,this form of security is only possible through physical layer security mechanisms. An approach where wireless devices, interested in establishing a secret key, sample the link signature space in a physical area to collect and combine uncorrelated measurements channel based secrecy algorithms ,based on ITS key derivation protocol, in order to improve existing wireless security system had been laid down and modified as appropriate algorithms.
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection
system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.
A technical review and comparative analysis of machine learning techniques fo...IJECEIAES
Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices, because of the properties such as node mobility, lack of centralized management and limited bandwidth. To tackle these security issues, traditional cryptography schemes can-not completely safeguard MANETs in terms of novel threats and vulnerabilities, thus by applying Deep learning methods techniques in IDS are capable of adapting the dynamic environments of MANETs and enables the system to make decisions on intrusion while continuing to learn about their mobile environment. An IDS in MANET is a sensoring mechanism that monitors nodes and network activities in order to detect malicious actions and malicious attempt performed by Intruders. Recently, multiple deep learning approaches have been proposed to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of three models, Inceprtion architecture convolutional neural network (Inception-CNN), Bidirectional long short-term memory (BLSTM) and deep belief network (DBN) on the deep learning-based intrusion detection systems, using the NSL-KDD dataset containing information about intrusion and regular network connections, the goal is to provide basic guidance on the choice of deep learning models in MANET.
The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute
challenges and weaknesses before the security progress in MANET network. It causes weakness in security,
which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten
MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between
them will be concluded and architectural security solutions in MANET will beproposed.
Security Key Management Model for Low Rate Wireless Personal Area NetworksCSCJournals
IEEE 802.15.4-based devices networks known by the name of LR-WPAN (Low Rate Wireless Personal Area Network) are characterized by low computation, memory and storage space, and they do not possess an infrastructure. This makes them dynamic and easy to deploy, but in the other hand, this makes them very vulnerable to security issues, as they are low energy so they cant implement current security solutions, and they are deployed in non-secure environments that makes them susceptible to eavesdropping attacks. Most proposed solutions draw out the security of the bootstrapping and commissioning phases as the percentage of existing of an intruder in this time is very low. In this paper, we propose a security model for LR-WPANs based on symmetric cryptography, which takes into account securing the bootstrapping phase, with an analysis of the effectiveness of this proposal and the measures of its implementation.
As the Supervisory Control and Data Acquisition (SCADA) system are deployed in infrastructures which are critical to the survival of a nation, they have emerged as a potential terrain for cyber-war, thus attracting the considered attention of ‘nation-states’. The analysis of worms like ‘stuxnet’ ‘flame’ and ‘duqu’ reveals the hand of a ‘nation-state’ in their design and deployment. Hence, the necessity to understand various issues in the defence of SCADA systems arises. The forensics of the SCADA system provide deep insight into the design and deployment of the worm (the malware) once the system is attacked. This is precisely the scope of this essay.
Privacy & Security Aspects in Mobile NetworksDefCamp
Mobile communication is constantly present in our daily life to facilitate personal and business needs. In this context, the security of mobile communication is of great importance.
The talk will introduce the audience into the security of mobile networks, with a focus on individuals' privacy. It will discuss aspects related to privacy and security in different generations of networks from both a theoretical and a practical perspective.
This presentation was showcased during Ladies in Cyber Security, an event organised by DefCamp and Cyber Security Research Center from Romania - CCSIR.
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs
have a wide range of potential applications, including security and surveillance, control, actuation and
maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However
security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor
nodes. Those networks are facing several threats that affect their functioning and their life. In this paper we
present security attacks in wireless sensor networks, and we focus on comparison and analysis of recent
Intrusion Detection schemes in WSNs.
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Coming to this issue we have Network Security in Tool Gyan which will put light on how to set up a secured network, Who wants to be a Millionaire in Tool Gyan, check out yourself of what exactly its all about ;)TOR in Mom's guide for all those who thought 'It sounds very complicated to use, I’m not a hacker! I can’t use it!' by our Author- Federico from Italy.
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...IJCNCJournal
After tightening up network perimeter for dealing with external threats, organizations have woken up to the
threats from inside Local Area Networks (LAN) over the past several years. It is thus important to design
and implement LAN security strategies in order to secure assets on LAN by filtering traffic and thereby
protecting them from malicious access and insider attacks. Banking Financial Services and Insurance
(BFSI) industry is one such segment that faces increased risks and security challenges. The typical
architecture of this segment includes several thousands of users connecting from various branches over
Wide Area Network (WAN) links crossing national and international boundaries with varying network
speed to access data center resources. The objective of this work is to deploy LAN security solution to
protect the data center located at headquarters from the end user machines. A LAN security solution should
ideally provide Network Access Control (NAC) along with cleaning (securing) the traffic going through it.
Traffic cleaning itself includes various features like firewall, intrusion detection/prevention, traffic anomaly
detection, validation of asset ownership etc. LANenforcer (LE) is a device deployed in front of the data
center such that the traffic from end-user machines necessarily passes through it so that it can enforce
security. The goal of this system is to enhance the security features of a LANenforcer security system with
Intrusion Prevention System (IPS) to enable it to detect and prevent malicious network activities. IPS is
plugged into the packet path based on the configuration in such a way that the entire traffic passes through
the IPS on LE.
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
: While conventional cryptographic security mechanisms are essential to the overall problem, of securing wireless networks, the wireless medium is a powerful source of domain-specific information, that can complement and enhancetraditional security mechanisms . In this work a security paradigms, which exploit physical layer properties of the wireless medium, can enhance confidentiality and authentication services.In essence using the physical layer information available , we are able to continuously authenticate packets at the same layer. However ,this form of security is only possible through physical layer security mechanisms. An approach where wireless devices, interested in establishing a secret key, sample the link signature space in a physical area to collect and combine uncorrelated measurements channel based secrecy algorithms ,based on ITS key derivation protocol, in order to improve existing wireless security system had been laid down and modified as appropriate algorithms.
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSIJNSA Journal
This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8-security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manages to ensure more secure packets transmission by taking all the necessary security measures.
Security Technique and Congestion Avoidance in Mesh Networkijtsrd
Security in wireless network is one of the prime concern in todays Information Age, where information is an asset not only to an organisation but also to an individual. Security to a great extent is able to protect the network from various unauthorized attacks. On the other side implementation of security mechanisms also causes an overhead in terms of increased load in the network. Further the increased load in the network paves path to congestion which degrades the performance of the wireless network. In this paper we try to highlight various challenges pertaining to security in mesh networks and the ways of reducing security threats. We propose an improved version of AODV which has a congestion avoidance mechanism. We also use a security technique called PGP for enhanced security of Mesh network. Mankiran Kaur | Jagjit Kaur"Security Technique and Congestion Avoidance in Mesh Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd4690.pdf http://www.ijtsrd.com/engineering/computer-engineering/4690/security-technique-and-congestion-avoidance-in-mesh-network/mankiran-kaur
Firewall is a device or set of instruments designed to permit or deny network transmissions based upon a set of rules and regulation is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass or during the sensitive data transmission. Distributed firewalls allow enforcement of security policies on a network without restricting its topology on an inside or outside point of view. Use of a policy language and centralized delegating its semantics to all members of the networks domain support application of firewall technology for organizations, which network devices communicate over insecure channels and still allow a logical separation of hosts in- and outside the trusted domain. We introduce the general concepts of such distributed firewalls, its requirements and implications and introduce its suitability to common threats on the Internet, as well as give a short discussion on contemporary implementations.
Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive document lists the security issues and the threat models which pose unique threats to the wireless sensor networks. In this paper we have made an effort to document all the known security issues in wireless sensor networks and have provided the research direction towards countermeasures against the threats posed by these issues
Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive document lists the security issues and the threat models which pose unique threats to the wireless sensor networks. In this paper we have made an effort to document all the known security issues in wireless sensor networks and have provided the research direction towards countermeasures against the threats posed by these issues
Next Generation Network: Security and Architectureijsrd.com
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. Wireless Sensor Networks (WSN) are a most challenging and emerging technology for the Research due to their vital scope in the field coupled with their low processing power and associated low energy. As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design staring with a brief overview of the sensor networks security, a review is made of and how to provide the security in the wireless sensor networks. This paper studies the security problems, Requirement, Architecture of WSN and different platform, characterized by severely constrained computational and energy resources, and an ad hoc operational environment.
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYijcsit
The security in wireless sensor networks (WSNS) is a very important issue. These networks may be exposed
it different attacks. With this in mind, researchers propose in this area variety of security techniques for
this purpose, and this article describes security in wireless sensor networks. Discussed threats and attacks
of wireless sensor networks. The article also aims to provide the basic information related to determining
essential requirements for the protection WSNs. Lastly, we mention some security mechanisms against
these threats and attacks in Wireless Sensor Network.
The security in wireless sensor networks (WSNS) is a very important issue. These networks may be exposed
it different attacks. With this in mind, researchers propose in this area variety of security techniques for
this purpose, and this article describes security in wireless sensor networks. Discussed threats and attacks
of wireless sensor networks. The article also aims to provide the basic information related to determining
essential requirements for the protection WSNs. Lastly, we mention some security mechanisms against
these threats and attacks in Wireless Sensor Network.
Types of Networks Week7 Part4-IS RevisionSu2013 .docxwillcoxjanay
Types of Networks
Week7 Part4-IS
RevisionSu2013
Types of Networks
There are different types of networks. Each type has different characteristics and
therefore different security needs. Some of the fundamental differentiating attributes of
the various types of networks are:
the physical distance the network spans
the topology of the network nodes
the types of media used for communication between nodes in the network
the different devices supported on the network
the different applications supported on the network
the different groups of users permitted on the network
the different protocols supported on each network
Depending on the type of network there may be different information security
requirements requiring that various protocols, security services, security mechanisms are
used in a fashion to support that type of network.
While each network environment has some characteristics and security needs unique to
that environment, there are many security techniques that should be universally applied to
all environments. For example; sound policies and procedures, risk assessment of the
assets, user awareness training, encryption technology, authentication technology, sound
credential (password) selection and protection, malware protection, firewalls are a few
security techniques that need to be applied in all of the networks albeit in configurations
that best suits a particular environment.
Local Area Network (LAN)
A LAN network covers a small geographic area that takes advantage of high speed data
transfers usually implemented through Ethernet or fiber. A LAN could be a home, office,
group of building with local proximity (university, business). LANs typically share
resources such as file servers and printers.
Wide Area Network (WAN)
A WAN covers a large geographic area that may require connection through satellite,
high speed dedicated lines and other means. The internet is a WAN. WANs can connect
LANs together into a larger organizational structure that can be used to share resources
such as file, email, dns servers to name a few. Resources can be shared using slower
connections on geographically separated areas across the WAN.
Wireless Networks and Mobile Networks
The movement to laptop systems at home and workplaces accelerated the mobility of
computing.
As employees traveled between offices, client sites, home and various other remote
locations they could remain connected to company servers as long as the remote site had
connectivity to the companies’ intranet. Initially this connectivity was provided by
having Ethernet cabling available for remote users to physically plug their laptops into.
Eventually, companies started installing wireless hotspots that could be automatically
detected by systems that had wireless cards.
The proliferation of wireless connectivity and internet use spread from the workplace to
genera ...
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
The paper addresses the importance of welding design to prevent corrosion at steel. Welding is
used to join pipe, profiles at bridges, spindle, and a lot more part of engineering construction. The
problems happened associated with welding are common issues in these fields, especially corrosion.
Corrosion can be reduced with many methods, they are painting, controlling humidity, and also good
welding design. In the research, it can be found that reducing residual stress on the welding can be
solved in corrosion rate reduction problem.
Preheating on 500oC and 600oC give better condition to reduce corosion rate than condition after
preheating 400oC. For all welding groove type, material with 500oC and 600oC preheating after 14 days
corrosion test is 0,5%-0,69% lost. Material with 400oC preheating after 14 days corrosion test is 0,57%-0,76%
lost.
Welding groove also influence corrosion rate. X and V type welding groove give better condition to reduce
corrosion rate than use 1/2V and 1/2 X welding groove. After 14 days corrosion test, the samples with
X welding groove type is 0,5%-0,57% lost. The samples with V welding groove after 14 days corrosion test is
0,51%-0,59% lost. The samples with 1/2V and 1/2X welding groove after 14 days corrosion test is 0,58%-
0,71% lost.
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
One of the major environmental concerns is the disposal of the waste materials and utilization of
industrial by products. Lime stone quarries will produce millions of tons waste dust powder every year. Having
considerable high degree of fineness in comparision to cement this material may be utilized as a partial
replacement to cement. For this purpose an experiment is conducted to investigate the possibility of using lime
stone powder in the production of SCC with combined use GGBS and how it affects the fresh and mechanical
properties of SCC. First SCC is made by replacing cement with GGBS in percentages like 10, 20, 30, 40, 50 and
by taking the optimum mix with GGBS lime stone powder is blended to mix in percentages like 5, 10, 15, 20 as
a partial replacement to cement. Test results shows that the SCC mix with combination of 30% GGBS and 15%
limestone powder gives maximum compressive strength and fresh properties are also in the limits prescribed by
the EFNARC.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
www.ijerd.com
1. International Journal of Engineering Research and Development
ISSN: 2278-067X, Volume 1, Issue 3 (June 2012), PP.45-54
www.ijerd.com
Dominance of Security in an Umbrella of Networks
Smriti Jain1, Maya Ingle2
1
MCA Department, SRGPGPI
2
Maya Ingle, SCSIT, DAVV, Indore, M.P., India
Abstract—Attacks against networked system are common and increasing, therefore, IT practitioners need to secure the
system. Hence, security is recognized as a key feature for sharing data among enterprises and the semantic web. Sharing
increases the risk like viruses, fraud, and misuse of data. Data can be secured internally by a secured product and secure
settings, as well as externally by using encryption, firewalls, antivirus etc. This paper classifies the networks and their
security issues. The paper also judges the dominance of security during development of software meant for different
types of networks. The dominance is further verified by the IT professionals from industry.
Keywords—Networks, Client Server, Internet, Intranet, TCP/ IP
I. INTRODUCTION
Networks play a major role in the business software and are entry point for a system. Networks are supposed to
allow free flow and share the information. The sharing leads to increase in the susceptibility of viruses, fraud, misuse of
resources etc. This leads to one of the important aspects of any network i.e. security management. Data security can be
maintained by ensuring confidentiality, availability and integrity. Availability can be maintained by fighting against
denial of service, integrity ensures trust of data and data source whereas confidentiality refers to the guarantee against
eavesdropping [1].
Networks can be classified according to wide variety of characteristics like data transport medium,
communications protocol used, scale, topology, and organizational scope. According to the medium, networks can be
wired or wireless. Another classification of networks is based on use of communication protocols like Ethernet, Internet
Protocol Suite (TCP/ IP) etc. The networks defined on the basis of scale are Local Area Network (LAN), Metropolitan
Area Network (MAN), Wide Area Network (WAN), Enterprise Private Network (EPN), Virtual Private Network (VPN)
etc. Organizational scope defines networks to be Internet, Intranet and Extranet [2]. Networks are also categorized
according to different criteria viz. geographic spread (LAN, MAN and WAN), access restrictions (public, private and
value added networks), communications model (point-to-point and broadcast model), and switching model (circuit
switching and packet switching) [3][4][5]. Network architectures are also defined as peer-to-peer networks and client/
server networks. The layered network architecture makes the introduction of new protocol, technologies and standards
difficult. To resolve such problems, non-layered network architectures called Service Unit based Network Architecture
(SUNA), Role-Based network Architecture (RBA) and Object-Oriented Network Architecture were introduced [6].
Reference model for Object-Oriented Network Architecture is Modular Communication Systems (MCS) that eases the
design of composable, extendable, and reusable network communication systems[7][8]. SUNA has a modularized
architecture where a “service unit” (SU) is used as the basic module, and is efficient and easy to expand. The SU is the
smallest entity that provides services and hides its internal details. The SU provides services for the application layer and
the whole network and doesn’t receive any services. The literature reveals that the types of networks have been classified
in various ways but not have been categorized under one umbrella. Further, security issues of the various types of
networks having layered architecture are covered in the literature, but have no indication of security issues of non-layered
architecture as they are still in nascent stage. Literature also indicates that the networks are classified according to
different perspectives; still there is a scope to classify the networks in different domains more rigorously. The networks
being classified do not discuss security issues according to the development of software.
To understand the umbrella of networks, the paper presents classification of networks and their security issues.
It also discusses the dominance of security in various life cycle stages of software development. The rest of the paper is
described as follows. Section II presents the network classification according to different domains and the security issues
and threats. Section III discusses the dominance of security considerations on the various Software Development
Lifecycle (SDL) stages to be implemented on the certain type of network. Section IV presents case study to analyse the
dominance of software development life cycle phases on various networks. Finally, Section V concludes with results and
conclusion.
II. CLASSIFICATION OF NETWORKS
The following subsections classify networks, as shown in Figure 1, in detail and understand the various security
issues associated with them. All the types of networks are protected by firewalls to some extent. The use of networks is
also restricted through logons and passwords. The other security measures are discussed along with the classification
45
2. Dominance of Security in an Umbrella of Networks
A. Networks Based on Size
The networks can be classified according to the geographical area or size (Figure 1-a). It is mainly classified as
LAN, MAN, and WAN where LAN can be wired or wireless. LAN can be based on Ethernet or ARCNET (Attached
Resources Computing NETwork) supporting bus and star network.
1) Local Area Network: LAN mainly suffers from insider threats that include risk to distributed file system, remote
services access, inadequately protected message services etc. It also suffers from outside threats like viruses if connected
to Internet. LANs can be secured by adequate access policies, training, and protection mechanisms in the workstation
environment as well as during transmission. The security mechanisms for LAN include authentication and authorization,
access control, data and message confidentiality, data and message integrity, non-repudiation, and logging and
monitoring [9]. Depending on the media used to connect devices, LAN can be wired or wireless.
1.1) Wired LAN: Security can be achieved in wired LAN by access permissions for LAN and as well as computer.
Perimeter defense for any wired LAN connected to Internet is implemented by installing firewall software product as
wired Ethernet hubs and switches do not support firewalls [11]. Many devices like Virtual Private Network (VPN)
concentrators, VPN routers, Dial-in-Servers, etc. that act as gateway to LANs offering remote access must be secured.
Remote access authentication, authorization and accounting can be done using remote access server that can act as central
control to monitor network access. The most popular wired LAN is Ethernet. Ethernet has the advantage that all systems
can monitor the transmission of all other network and this is also the biggest reason for security breaches. The system can
be configured to read all details by network administrator and keep track of system usage.
1.2) Wireless LAN: Some of the threats associated with WLANs include rouge access points, denial-of-service attacks,
passive capturing etc. 802.11 describe spread spectrum code publicly, and most access points broadcasts SSID multiple
times per second; hence provide weak form of security. By default, data transmissions on WLANs are insecure. WLANs
can use Wired Equivalent Privacy (WEP) protocol to encrypt data sent over network. It uses 64 bit or 128 bit key entered
by user to encrypt the data. The vulnerability with this protocol is that the key is sent prior to the data to be encrypted
over the network and the same key is used to encrypt every data packet. Another method used in wireless networks is
Wi-Fi Protected Access (WPA) protocol developed by Wi-Fi addressed some weaknesses of WEP. Here individual
packets are encrypted separately, but all the devices in the network must use WPA. Another way to add security is by
enabling Media Access Control (MAC) address which is printed on Network Interface Card by the manufacturer.
Enabling the MAC address filtering will allow to accept connections of the devices with MAC addresses being permitted
[11]. Other ways to protect devices is by setting password.
2) Metropolitan Area Network: Security can be attained through VPN which segments private data from other traffic.
VPN also encrypts the data between all physical sites. To protect the data during transmission, encryption technology like
SSL can be used. A firewall can be installed to restrict unauthorized sites and data. The network managers must carefully
manage the VPN user access policies which gets difficult if VPN is provided by ISP [12]. Various VPN solutions are
available and are discussed and analyzed in [13].
3) Wide Area Network: WAN connects computers along large distances at various sites. Security can be attained by
following the compliance available like HIPPA for healthcare services, Sarbanes-Oxley (SOX) for integrity and privacy
in financial world, Family Educational Rights and Privacy Act (FERPA), which controls privacy of student records,
grades and related information. Depending on the equipment used in a given wireless system, encryption may be
implemented on the transmitter/ receiver, at the point of any firewalls, or by using an additional encryption or VPN
device. Security can be implemented by dedicated encryption devices, routers to filter unnecessary traffic, physical
controls, authentication policy for the external devices, signatures, monitoring network traffic etc. [1][14].
B. Networks Based on Design
Based on the network design, the networks can be classified as stand-alone systems, peer-to-peer networks,
client/ server networks, and application/ server networks. The client/ server systems can be further classified as 2-tier, 3-
tier, 4 tier and web-based architectures (Figure 1-b).
1) Stand alone systems (no server-single user): A unique id and password shall identify the user. The password can
be set via BIOS settings, operating system settings, and the software settings.
2) Peer-to-peer networks: P2P network do not have a server to control and monitor the network. Hence, such a
network cannot be secured instead each workstation is responsible for securing itself by authenticating the users through
logon and passwords. P2P systems face DoS service attack, sybil attack where the intruder acquires multiple identifiers
to undermine some function of the system. The documents can be secured by signature verification key rather than key
based on specific words as these are vulnerable to dictionary attack [15]. If the network is also connected to Internet,
then it needs to be secured by installing anti virus software and by restricting the unwanted sites.
3) Client/ Server networks: The client server system consists of three components viz. client, server and network. The
clients (PCs) are the least secured and are not having same considerations as the mainframes. The clients are easy to use
46
3. Dominance of Security in an Umbrella of Networks
and are easily accessible. Once the client is logged on, even by malicious user, all the services of the client are then
available to the logged user. Hence, the client machines can mostly be protected physically, say, disk drive locks,
biometric identification, logons and passwords, and other security mechanisms offered by the client platform or installed.
Security holes like session hijacking, disclosing of private data, cross-site scripting (XSS) attacks are opened to attackers
when configuring Web.config (ASP.NET) incorrectly. A server must guarantee authentication, authorization and data
security. XSS and SQL injection attacks are mainly the concerns for server side coding while DOM based XSS in a
major concern at client-side. Default operating system settings like remote registry services, print server service etc. are
mostly not secure, hence such services should be disabled if not required. More the services provided, more ports are left
open for the intruders. Remote access should be restricted to specific IPs. The development and testing should not be
done on real life databases as this will open the doors for intruders during testing of the system. The permissions and
privileges should be updated from time to time by the administrator. To check unauthorized usage, various log files like
for OS, web server, network usage, etc should be used. Moreover, security tools provided with the servers should be
used. The detailed description on server security is also provided in [16]. The client server networks can be further
classified on architectures, file servers, and classes of applications.
3.1) Networks based on client/ server architecture: Client/ server model is targeted to support user access to data bases
and hence has three levels - user-interface level, processing level, and data level. The user interface level contains
interface to the user and permits display management, processing level contains the applications, and data level contains
the actual data. Based on the placement of the programs for the three levels on client and server machine, the client server
defines two-tier and three-tier architecture (multi-tier architecture). The other architectures defined are four-tier and web-
based.
3.1.1) Two-tier Architecture: It has high performance with less number of users as it is easy to use and maintain but
has less flexibility and scalability. The two tiers of a client/ server architecture can be divided among client and server in
five different ways as discussed in [17].In a 2-tierd structure, the web server communicates directly with database server
and other network resources, which makes the system more vulnerable. Attacking a web server will make all the network
resources available to the intruders. 2-tier can have fat client (the client has application logic layer and presentation layer)
or thin client (the client has only presentation layer). Thin clients can be preferred to fat clients as it does not have the
ability to become zombie hosts. It is also easier to control application installations downloaded from web and restrict
access to websites as compared to fat client [18].
3.1.2) Three-tier Architecture: It provides higher security as there is less software on the client. The middle tier
between user interface and database server can either be Message server, Application server or Transaction processing
monitors. The security issues include where to implement security i.e at the database level or at the shared business
components. But managing overall security is comparatively easier as the application layer (middle-tier) is centralized.
3.1.3) Four-tier Architecture: Four-tier CS architecture may consists of presentation, application, domain and database
layers. Four tiers in a web application can be thin client, web servers, application servers, and database servers.
3.1.4) Web based Architecture: A Web based architecture is client server architecture based on WWW technologies,
that can be 3-tier architecture having web browser for client, web server for server and database server; or a 4-tier
architecture in which presentation tier is split into web services tier and web browser [19].
3.2) Client/ server with file servers: The client server architecture with file servers is divided into three categories viz.
centralized computing and distributed processing.
3.2.1) Centralized computing: Centralized computing is considered to be more secure from the standpoint that there
are less access points. Thus the authentication, authorization etc. can be controlled via server.
3.2.2) Distributed processing: JAVA offers security through security APIs and also allows development of security
manager. CORBA can also help implement identification and authentication, authorization and access control, security
auditing, non-repudiation, and administration [20].
3.3) Client/ Server with classes of Applications: Such systems are mainly classified as host based system, client based
system, cooperative processing system, and server based processing systems.
3.3.1) Host Based System: Also called Terminal Server based system, is not a true client/ server based system but is
like a traditional mainframe environment where the clients acts as dumb terminals and all the processing power lies with
server. The only job the terminals have is to provide input and show the display on the monitor [21]. Such types of
systems are quite secure as the entire system is controlled via central unit but it suffers from server bottlenecks.
3.3.2) Client Based System: In the client based processing system, all application processing is done at the client
whereas all data validation and other data logic functions are implemented at server.
47
4. Dominance of Security in an Umbrella of Networks
3.3.3) Cooperative Processing system: Application processing is done at both client and server to achieve optimization.
Such processing is complex to set up and hence the security concerns.
3.3.4) Server Based Processing: In server based systems, all processing is done at server and the client provides the
graphical user interface. Hence, all the major security concerns lie with the server.
C. Network Architectures Based on Layering
The networks can be based on no layer, layered architecture or non-layered architecture as shown in Figure 1-c.
The layered architectures classified are TCP/ IP and SNA whereas non-layered architecture is categorized as object
oriented network architectures, Role-Based Network Architecture (RBA) and Service Unit based Network Architecture
(SUNA).
1) No layer: Such type of system is a standalone system and requires security applicable for any single user system
like user id, password, biometric identification, firewall etc.
2) Layered Architecture: Most of the network structures have the foundation on layered architectures. Some of the
layered architectures include TCP/ IP and SNA and are discussed below.
2.1) TCP/ IP: TCP/IP protocol suite is required for establishing any communication on the network. TCP uses
sequence numbers to ensure that the data is given in correct order and are established during the initial three-way
handshake. It gives maximum of 75 seconds to establish connection considering longer delays. The malicious host keeps
sending SYN request and fills the listen queue which leads to Denial of Service (DoS) attack or can be used as a tool for
IP spoofing. The administrator has to apply some security levels else the flaw could allow remote attackers to cause
vulnerable systems to repeatedly restart when processing specific SNMP requests leading to DoS conditions. To
accomplish the benefits of TCP/IP, the users and connections must be authenticated and the data traveled must be secured
[22][23].
2.2) SNA: System Network Architecture is not so safe anymore hence IBM recommends that number of policy based
security like firewall must be applied. SNA threats can even go undetected by intrusion detectors. One of the main
reasons for threats is improper configuring the parameters. This is mainly because the SNA mainframe applications were
developed when there were not many security threats. Some of the common attacks are spoofing, man-in-the-middle
attack, pishing, session forwarding, DoS attack etc.[24].
3) Non-layered Architectures: – The layered architecture makes the introduction of new technologies difficult, hence
non-layered architectures are introduced [6]. The three architectures are Object-Oriented Network Architecture, RBA and
SUNA are discussed below.
3.1) Object Oriented Network Architectures: It eases the design of composable, extendable, and reusable systems in
modular network communication systems and the collaboration with systems dealing with other networking aspects such
as network management and open distributed processing.
3.2) RBA: In the layered architecture, a number of unexpected interactions are introduced like firewall, proxies etc.
which were not considered during the initial development of Internet. To overcome communication through layered
architecture, RBA organized communication using modular protocol unit called roles. The roles are not organized
hierarchically and hence provide better communication.
3.3) SUNA: SUNA overcomes the limitation of layered architecture like functional duplication, error detection in
multi-layers and the repetition of addresses etc. It uses “service unit” which is the smallest unit that provides services to
whole network and doesn’t receive any services.
D. Networks Based on Organizational Scope
The networks can also be classified according to organizational scope as public and private (Figure 1-d).
Internet is a public network whereas Intranet and Extranet are private to an organization. The security issues of the
networks are discussed below.
1) Public Network: The networks that are owned by any organization and are accessible for all are public networks.
Internet is categorised under public network.
1.1) Internet: TCP/IP can be made secure with the help of cryptographic methods and protocols that have been
developed for securing communications on the Internet. These protocols include Secure Socket Layer (SSL) and
Transport Layer Security (TLS) for web traffic, Pretty Good Service (PGP) for email, and IPsec for the network layer
security [25]. IPSec provides security and authentication by cryptography. IPSec protocols, Authentication header (AH)
and Encapsulating Security Payload (ESP) provide data integrity, data origin authentication, and anti-replay service.
PGP provides confidentiality by encrypting messages to be transmitted or data files to be stored using an encryption
48
5. Dominance of Security in an Umbrella of Networks
algorithm such 3DES or CAST-128 if required by the communicating organizations. Other mechanisms include using
firewalls that can be implemented using firewall gateway and filters, malware, and antivirus software. [26]
2) Private Network: Private networks are owned by an organization and are accessible by their employees, vendors,
dealers, customers etc. Intranet and Extranet are the privately owned networks based on Internet technology.
2.1) Intranet: Intranet is based on standard Internet technology using a connectionless protocol TCP/ IP, and is hence
easy to deploy as compared to WAN. Firewalls and passwords are common mechanisms used for protecting the data, but
it does not ensure the security of data “in the wires” unless proper mechanisms are considered. Firewall is a peri meter
defence and hence cannot secure the system from insiders. Most of the passwords are easy to guess and hence cannot
provide complete security especially from insiders’ attacks. The data passing through wires can be “sniffed” and hence
can be intercepted. The security goals of Intranet include authentication, privacy, content integrity, non-repudiation, and
ease of use. The ease of use is important in the sense that if security system is too cumbersome for users, they may try to
circumvent it. These security objectives can be attained through use of Public Key Infrastructure (PKI) using digital
certificate technology. PKI is suited for organizations using open networks like TCP/ IP [27]. Data encryption can be
used for added security of data. Virtual Private Network (VPN) can be further used to secure the Intranet from the other
networks.
2.2) Extranet: Extranet also covers almost the same security issues as that of Intranet. Extranet is more viable to the
security breaches and hence each user must be uniquely identified using authentication techniques. A real-time
monitoring, altering and auditing facilities must be employed to detect fraud and abuse. A VPN can be used for securing
the private network from other networks [28][29].
E. Networks Based on Computing Models
Networks classified on the basis of computing model are distributed computing model, centralized computing model
and collaborative computing model (Figure 1-e). The computing models discussed below share almost the same security
issues as client server model.
1) Distributed computing systems models: – Processes run on processors. There are various models that show how the
processors can be organized and are mainly minicomputer model, workstation model, workstation server model,
processor-pool model, and hybrid model and are discussed below [30].
1.1) Minicomputer model: It is an extension of centralized time-sharing systems. In this model, each minicomputer has
several users logged on to it where each user is logged on to a specific minicomputer, with remote access to other
minicomputers. Early ARPAnet is an example of minicomputer model.
1.2) Workstation model: In this model, several workstations are interconnected by a communication network. For
example, university department may have several workstations scattered throughout a building or campus, each
workstation equipped with its own disk and serving as a single-user computer. Since lot of CPU time is wasted during
idle time like night, these workstations are connected by a high speed LAN so that idle workstations may process jobs of
other users logged onto other workstations that are busy. Thus, it is a network of personal workstations. The network can
have diskful workstation i.e. each workstation with its own disk and local file system, or diskless workstation i.e.
workstation without local disk.
1.3) Workstation-server model: It consists of few minicomputers and several workstations that can be either diskless
or diskful. Minicomputers are used for implementing file systems for diskless workstations. Thus each minicomputer is
used as server machine that provides one or more services. Servers run server process for managing and providing access
to shared resources. Processor is allocated to each user. For example, V-System.
1.4) Processor-Pool model: Processors are pooled together to be shared by all the users as needed. Pool of processors
consists of large number of microcomputers and minicomputers attached to a network. Each processor has its own
memory to load and run a system program or application program of distributed computing system. Here the user does
not log to a particular machine but to the system as a whole. Some of the examples include Amoeba, Plan 9, and the
Cambridge Distributed Computing System.
1.5) Hybrid Model: It takes advantages of both workstation-server model and processor pool model. In the distributed
models, the resources on computer must be protected against destruction and unauthorized access. The network can be
attacked passively or actively. Some of the passive attacks are browsing, leaking, inferencing, and masquerading. The
active attacks include viruses, worms, logic bombs, integrity, authenticity, denial, delay, and reply attack. Enforcing
security is difficult as there is no single point of control and data travels through insecure communication networks.
Encryption is the only means to secure data travelling across the net [30].
2) Centralized Processing Model: This model is also known as thin client computing model and is more secure
compared to distributed computing model. This model is again in use with web technology as thin clients are used that
work as almost diskless workstation with technology as AJAX.
49
6. Dominance of Security in an Umbrella of Networks
3) Collaborative Computing Network Model: In this model, nodes also share processing capabilities apart from
sharing data, resources, and other services thereby increasing the processing speeds.
F. Networks Based on Topologies
Networks are also classified on the basis of the topologies used (Figure 1-f). Topologies can be ring, star, bus, mesh
etc.
1) Bus: In bus topology, the packet is send to all the nodes on the network. If the packet is not for the particular
system, it is discarded. This leads to security implications as the hacker may use packet sniffer and receive a packet not
intended for its use.
2) Star: In star topology all nodes are connected to single point which means single point of attack. Such systems may
be attacked by DoS attack and the entire system may crash by single device.
3) Ring: Data travels many numbers of points before reaching the final destination. But it is harder to tap without
altering the network administrator. It is more secure than bus as it has no terminators
III. SECURITY DOMINANCE
The various types of networked systems and the dominance of security in software life cycle stages are shown
in Table I. It illustrates that most of the client server based software must consider security especially during design,
coding and deployment stages of software development. Most of the multi-user systems are based on client/ server
technology. The client and server side software security has to be incorporated during coding stage of system
development and further, client and server can be secured during deployment stage.
Network types
Based on
size network network architectures organizational scope computing models topologies
design on layering
Fig 1: Network classification
Based on size
LAN MAN WAN
Wired Wireless
Ethernet ARCNET
Fig 1 (a): Networks Classification based on Size
Based on Network design
Stand alone Peer-to-peer Client/ Server
Architecture file servers Classes of Applns.
2-tier 3-tier Web Based Architecture 4-tier Host Server Cooperative Client
(database server) Based Based Processing Based
Centralized Distributed
Fig 1 (b): Classification of Networks based on Network Design
50
7. Dominance of Security in an Umbrella of Networks
Network architectures on layering
No layer layered non-layered (OO)
TCP/ IP SNA OONA RNA SUNA
Fig 1 (c): Networks Classification based on Layering
Organizational scope
Public private
Internet Intranet Extranet
Fig 1(d): Networks Classification based on Organizational Scope
Computing Models
Distributed Processing model Centralized Processing Model Collaborative computing model
Minicomputer model Mainframe Based
Workstation Model Client/ Server Based
Workstation server model
Processor-Pool model
Hybrid model
Fig 1(e): Classification of Networks based on Computing Models
Topologies
Ring Bus Star
Fig 1(f): Classification of Networks on the basis of Topologies
The security at deployment stage has to be considered from planning itself. Other ways include encryption that
provides secure transaction and, firewalls secure the perimeter. Client/ server (C/ S) with centralized server use SSL for
server and client authentication. The server must be configured properly to avoid a number of security attacks like XSS,
DoS, session hijacking etc. C/ S systems can be designed having thin or thick client. The thin client provides more
security as the clients can be diskless or even stateless. The decision regarding type of client has to be incorporated
during the design of the system. The responsibilities of client and server will help decide the security measures to be
considered for developing the system. During deployment, mapping of drives to users can be enforced to enhance
security. Further, Kerberos can be used for network key authentication. During the testing of C/ S based systems, live
data should not be used to test the system as this leave doors open for the intruders for that time period.
The most obvious requirement to safeguard a system is through access control. This can be implemented
through proper design and implementing it during deployment. In LAN, WLAN, MAN and peer-to-peer networks based
applications, authentication and authorization can be attained through logons and passwords whereas confidentiality and
privacy through encryption. During deployment, VPNs, PKI etc. can be used for securing the system. Internet, Intranet
and Extranet based applications use PKI for authentication, authorization, confidentiality, non-repudiation, and data
integrity for users and data while in transmission. Security aspect is weak in P2P systems. Hence, firewalls are used to
safeguard network data that can be implemented during deployment.
51
8. Dominance of Security in an Umbrella of Networks
IV. CASE STUDY
The following section presents case to study the dominance of security on the umbrella of networks during
software development process.
A. Data Collection
The data has been collected using a self designed questionnaire to examine the research questions. The
questionnaire consists of questions regarding the dominance of security on SDL phases related to different types of
networks. The sample consists of 35 software professionals with moderate and high experience with designations as
directors, project managers, project leads, senior software engineer etc. Based on the data, percentage analysis was
conducted to validate the data.
B. Data Analysis
Percentage analysis was conducted to check the dominance of security on SDL stages during development of
software for different types of networks. As seen from the Table II, the dominance of deployment stage was accepted by
the respondents when a software is meant to be deployed on any kind of network like LAN, MAN, WAN, P2P, Internet,
Intranet, Extranet and Client/ Server. The requirements gathering phase was not given dominance by the respondents as
security is more of an implementation issue rather than customer concern. Security is more of design issue of network
Administrator than the software issue for LAN, WAN, MAN, P2P, Intranet, Intranet, and Extranet, hence it is also not
considered for implementation and testing phase. Most of the respondents accepted that security must be implemented
during the deployment phase for any kind of network. The OS considered for client side include Windows NT, Windows
XP, Linux etc. can be configured for security during deployment. Network monitoring and management tools like Nagios,
MRTG, Kismet, JFFNMS etc. can also be installed. When asked for security dominance on other phases of SDL, more
than 85% of the IT professionals agreed that for the software based on client/ server architecture, security plays a major
aspect to be considered during phases like design, coding, testing and deployment. Less than 60% response for networks
except client/ server systems for design, implementation, and testing phases of SDL shows that major security
consideration is login and passwords and hence not given sufficient dominance as it is the basic security requirement.
Backups can secure data during maintenance phase. The corrective actions should be taken to prevent further access
violations and isolating the violated systems. The amount of violation can be detected by obtaining sniffer traces, copy
of log files etc. Hence maintenance was not ranked high as such remedies are obvious security mechanisms adopted by
the security administrator.
Table I: Network’s security dominance on SDL phases
Types of networks Req. Design Impl/ Testing Deployment Maintenance
Gathering Coding
and
Analysis
1 Ethernet LAN X
2 Wireless LAN X
3 MAN X
4 WAN X
5 P2P X
6 2- tier Client/ Server X X X X
7 3 - tier Client/ Server X X X X
8 4 - tier Client/ Server X X X X
9 Web Based C/ S X X X X
10 C/ S with centralized X X X X
server
11 C/ S with distributed X X X X
server
12 Host Based C/ S X X X X
13 Server Based C/ S X X X X
14 Client Based C/ S X X X X
15 Internet X
16 Intranet X
17 Extranet X
52
9. Dominance of Security in an Umbrella of Networks
Table II: Impact of Network Type on SDL Phases
Types of networks Req. Design Impl/ Testing Deployment Maintenance
Gathering Coding
and
Analysis
1 Ethernet LAN 14% 28% 14% 14% 91% 14%
2 Wireless LAN 14% 40% 31% 57% 97% 28%
3 MAN 40% 40% 57% 57% 100% 31%
4 WAN 40% 57% 57% 57% 100% 40%
5 P2P 14% 14% 28% 28% 85.7% 14%
6 2- tier Client/ Server 40% 85.7% 88.5% 94% 100% 48.5%
7 3 - tier Client/ Server 48.5% 85.7% 88.5% 94% 100% 48.5%
8 4 - tier Client/ Server 40% 85.7% 85.7% 91% 97% 48.5%
9 Web Based C/ S 40% 91% 85.7% 94% 100% 48.5%
10 C/ S with centralized 57% 80% 88.5% 97% 100% 40%
server
11 C/ S with distributed 57% 91% 94% 94% 100% 40%
server
12 Host Based C/ S 40% 91% 91% 94% 97% 48.5%
13 Server Based C/ S 40% 94% 97% 97% 100% 48.5%
14 Client Based C/ S 40% 94% 97% 97% 100% 48.5%
15 Internet 37% 28.5% 31% 48.5% 100% 57%
16 Intranet 37% 57% 48.5% 57% 100% 57%
17 Extranet 37% 57% 48.5% 57% 100% 57%
V. RESULTS AND CONCLUSION
There are a number of views of the IT professionals regarding the dominance of security on networks during
software development process as illustrated in Table II. The requirements gathering and maintenance phases are not
given acceptance by the respondents as network security is more of deployment issue rather project inception issue for all
kinds of projects. During the development of the projects based on client/ server architecture, security needs to be
considered during design, implementation, testing and deployment stages. Security implementation during deployment
of the project is considered for all kinds of networks.
Communication and data access via networks is key requirement to any business; hence most of the software
systems deal with the challenges faced by the security issues. Although network administrators can deal with most of the
risks associated with the system being deployed, but major security lies in building the software right. Hence the
software system developers must also consider security aspect during SDL for any networked system and incorporate the
security within the system. In this paper, we have classified the various types of networks and discussed their security
issues to assist system designers and developers assess security considerations in networks. The paper also elaborates on
security considerations while developing software intended for a particular type of network. From the software
development point of view, the paper will help consider security types in the various sorts of networks.
REFERENCES
[1] (2012) “Ethernet WAN Security How to Protect Business-Critical Data over High-Speed Ethernet Networks,” White paper
by SafeNet. [Online] Available:
http://www.infosec.co.uk/ExhibitorLibrary/88/High_Speed_Ethernet_Security_White_Paper_by_SafeNet_v4_0_20.pdf
[2] (2012) Computer Networks. [Online] Available: http://en.wikipedia.org/wiki/Computer_network
[3] Sharam Hekmat, Communication Networks, PragSoft Corporation,. [Online] Available:
www.pragsoft.com/books/CommNetwork.pdf.
[4] R.S.Rajesh, K.S.Easwarakumar and R.Balasubramanian. Computer Networks – Fundamentals and Applications, Vikas
Publishing House Pvt. Ltd., 2002.
[5] Uyless D. Black. Data Communication and Distributed Networks. PHI, 2002.
[6] Y. Wang, M. Xia, F. Yi and J. Zeng. “Research on New Types of Network Architecture,” In the Proc. of the Sixth
International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT’05), IEEE, 2005.
[7] Stefan Boecking. “Object oriented network protocol”, Beijing, Machinery Industrial Press (ISBN 7-111-08076-9/TP ), 2000.
[8] Stefan Boecking, et al. “A Run-Time System for Multimedia Protocols”, Fourth International Conference on Computer
Communications and Networks (ICCCN'1995), pp.178-185, Sep 1995.
[9] Specifications for Guideline for The Analysis Local Area Network Security, Federal Information Processing Standards
Publication 191, Nov, 1994.
[10] (2012) Wired and Wireless Networks [Online] Available:
http://compnetworking.about.com/cs/homenetworking/a/homewiredless.htm
[11] (2012) Slides on “New Perspectives on Internet,” The Internet, 7th Ed. [Online] Available:
http://www.slideshare.net/dpd/tutorial-7-wireless-networking-and-security-presentation
[12] Sixto Ortiz Jr . Virtual Private Networks: Leveraging the Internet, Computer, Nov. 1997, pp. 18-20.
53
10. [13] Ahmed A. Jaha, Fathi Ben Shatwan, and Majdi Ashibani. “Proper Virtual Private Network (VPN) Solution,” In the Proc. of
the Second International Conference on Next Generation Mobile Applications, Services, and Technologies, IEEE Computer
Society, 2008, pp. 309-314.
[14] Dan McDonald. Wireless LAN Security, 2010. [Online] Available: http://www.smslp.com/knowledge/wireless-wan-security/
[15] Allan Friedman and L Jean Camp. “Peer-to-Peer Security”, Telecommunications Policy Research Conference, Sep. 2003.
[Online] Available: citeseerx.ist.psu.edu/viewdoc/
[16] Karen Scarfone, Wayne Jansen, Miles Tracy. Guide to General Server Security, NIST, Special Publication 800-123, July
2008.
[17] A.S. Tanenbaum. Distributed Systems – Principles and Paradigms, Pearson Education, 2007.
[18] Paul A. Strassman. 5 Secure reasons for Thin Clients, Baseline, [Online] Available:
http://www.baselinemag.com/c/a/Projects-Security/5-Secure-Reasons-for-Thin-Clients-%5B2%5D/
[19] Gagnesh Arora, Deepika Arora. “Web Based Client Server Technology – A Three Tier Architecture” [Online] Available:
gagnesharora.com/ieee2.pdf.
[20] April L. Moreno. “Distributed Systems Security: Java, CORBA, and COM+,” SANS Reading Room, SANS Institute, 2002.
[21] (2012) Basic Network types. [Online] Available: http://www.pcc-services.com/network_types.html
[22] Jay Nanavati. “Security Issues of 802.11i & TCP/IP”, [Online] Available: http://tifac.velammal.org/CoMPC/articles/38.pdf
[23] Chris Chambers, Justin Dolske, and Jayaraman Iyar. TCP/IP Security, [Online] Available:
http://www.linuxsecurity.com/resource_files/documentation/tcpip-security.html
[24] Anura Guruge. SNA Mainframe Security, Software Diversified Services, June, 2009. [Online] Available:
http://www.sdsusa.com/netqdocs/SNA.Security.090721.pdf
[25] (2012) Internet Security,. [Online] Available: http://en.wikipedia.org/wiki/Internet_security.
[26] Acunetix – Web Application Security. [Online] Available] http://www.acunetix.com/websitesecurity/webserver-security.htm
[27] (2012) Guide to Securing Intranet and Extranet. [Online] Available:
http://www.windowsecurity.com/whitepapers/guide_to_securing_intranet_and_extranet_servers.html#goals
[28] Karen A. Korow Diks. Security Considerations of Extranet. SANS Institute, 2001. [Online] Available:
http://www.sans.org/reading_room/whitepapers/basics/security-considerations-extranets_527
[29] Jennifer Jordan. Extranet Security - A technical overview from a Business Perspectives, 1997. [Online] Available:
http://csrc.nist.gov/nissc/1997/proceedings/053.pdf
[30] Pradeep K.Sinha. Distributed Operating Systems: Design and Concepts, IEEE Computer Society Press, Prentice Hall of India
Private Ltd., New Delhi, 2004.
54