ISSN 2321 – 8517 (Jan - April 2014)
Journal of
Network Security (JoNS)
STM JOURNALS Scientific
Technical
Medical
STM Publication(s) STM Publication, a strong initiative by Consortium E-Learning Network Private ltd.(Estd. 2006) was launched in the year 2010 under the support and guidance by our esteemed Editorial and Advisory board members from renowned institutes. Objectives of STM Publication(s): ? Scientific, Technical and Medical research promotions. ? Publication of genuine Research/Review, Short Articles and Case Studies through proper review
process. ? Publishing Special Issues on Conferences. ? Preparing online platform for other print Journals. ? Empowering the libraries with online and print Journals in Scientific, Technical and Medical
domains. ? Publishing and distribution of books on various subjects which mainly falls in the category of
Nanotechnology, Scientific and technical writing & Environment, Health and Safety. Salient Features: ? A bouquet of 100+ Journals that fall under Science, Technical & Medical domains. ? Employs Open Journals System (OJS) A Journal Management & Publishing System. ? The first and one of the fastest growing publication website in India as well as in abroad for its quality
and coverage. ? Rapid online submission and publication of papers, soon after their formal acceptance/ finalization. ? Facilitates linking with the other authors or professionals. ? Worldwide circulation and visibility.
Journal of Network Security (ISSN: 2321-8517) Focus and Scope Covers ? Internet, Network and Wireless Network Security& Applications ? Mobile, Sensor Network, Database and System Security ? Virus, worms, Trojan Protection, E-mail security, Spam, Phishing and E-mail fraud ? Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,) ? Cryptographic protocols ? Intrusion Detection and Prevention Journal of Network Security is published (frequency: three times a year) in India by STM Journals (division of Consortium e-Learning Network Private Ltd. Pvt.) The views expressed in the articles do not necessarily reflect of the Publisher. The publisher does not endorse the quality or value of the advertised/sponsored products described therein. Please consult full prescribing information before issuing a prescription for any products mentioned in this publication. No part of this publication may be reproduced, stored in retrieval system or transmitted in any from without written permission of the publisher. To cite any of the material contained in this Journal, in English or translation, please use the full English reference at the beginning of each article. To reuse any of the material, please contact STM Journals (info@stmjournals.com)
STM Journals (division of Consortium e-Learning Network Private Ltd. ) having its Marketing office located at Office No. 4, First Floor, CSC pocket E Market, Mayur Vihar Phase II, New Delhi-110091, India is the Publisher of Journal. Statements and opinions expressed in the Journal reflect the views of the author(s) and are not the opinion of STM Journals unless so stated. Subscription Information and Order: Cost of Journal: ? National Subscription: Rs. 3750/- per Journal (includes 3 print issues), Single Issue copy purchase Rs.1500/copy ? International Subscription: ? Online Only- $99, Print Only-$149 (includes 3 print issues) ? Online + Print-$199 (includes 3 print issues + online access of published back volumes )
To purchase print compilation of back issues please send your query at info@stmjournals.com Subscription must be prepaid. Rates outside the India includes speed delivery charges. Prices subject to change without notice. Mode of Payment: At par cheque, Demand draft, and RTGS (payment to be made in favor of Consortium E-Learning Network. Pvt. ltd., payable at Delhi/New Delhi. Online Access Policy A). For Authors: In order to provide maximum citation and wide publicity to the authors work, STM Journals also have Open Access Policy, authors who would like to get their work open access can opt for Optional Open Access publication at nominal cost as follows India, SARC and African Countries: INR 2500 or 100 USD including single hard copy of Author's Journal. Other Countries: USD 200 including single hard copy of Author's Journal. B). For Subscribers: ? Online access will be activated within 72 hours of receipt of the payment (working days), subject to receipt of
correct information on user details/Static IP address of the subscriber. ? The access will be blocked: ? If the user requests for the same and furnishes valid reasons for blocking. ? Due to technical issue. ? Misuse of the access rights as per the access policy.
Advertising and Commercial Reprint Inquiries: STM Journals with wide circulation and visibility offer an excellent media for showcasing/promotion of your products/services and the events-namely, Conferences, Symposia/Seminars etc. These journals have very high potential to deliver the message across the targeted audience regularly with each published issue. The advertisements on bulk subscriptions, gift subscriptions or reprint purchases for distribution etc. are also very welcome. Lost Issue Claims: Please note the following when applying for lost or missing issues: ? Claims for print copies lost will be honored only after 45 days of the dispatch date and before publication of the
next issue as per the frequency. ? Tracking id for the speed post will be provided to all our subscribers and the claims for the missing Journals will
be entertained only with the proofs which will be verified at both the ends. ? Claims filed due to insufficient (or no notice) of change of address will not be honored. ? Change of Address of Dispatch should be intimated to STM Journals at least 2 months prior to the dispatch
schedule as per the frequency by mentioning subscriber id and the subscription id. ? Refund requests will not be entertained.
Legal Disputes All the legal disputes are subjected to Delhi Jurisdiction only. If you have any questions, please contact the Publication Management Team: info@stmjournals.com; Tel : +91 0120-4781211.
Publication Management Team Chairman Mr. Puneet Mehrotra Managing Director STM Journals, Consortium eLearning Network Pvt. Ltd.(CELNET) Noida ,India
Group Managing Editor Dr. Archana Mehrotra Director CELNET, Delhi, India
Internal Members Puneet Pandeya Manager Associate Editors Gargi Asha Jha Nupur Anand
Monika Malhotra Assistant Manager Assistant Editors Priyanka Aswal Aditya Sanyal Sona Chahal Himani Garg Himani Pandey
External Members
Dr. Bimlesh Lochab Industrial Tribology Machine Dynamics & Maintenance Engineering Centre (ITMMEC) Indian Institute of Technology Delhi, India
Dr. Rajiv Prakash School of Materials Science and Technology, Institute of Technology, Banaras Hindu University, Varanasi, India
Prof. S. Ramaprabhu Alternative Energy Technology Laboratory, Department of Physics, Indian Institute of Technology, Chennai, India
Dr. Rakesh Kumar Assistant Professor, Department of Applied Chemistry, BIT Mesra, Patna, India
STM Journal (s) Advisory Board
Dr. Ashish Runthala Lecturer, Biological Sciences Group, Birla Institute of Technology & Science, Pilani Rajasthan, India.
Prof. Bankim Chandra Ray Professor and Head, Department of Metallurgical and Materials Engineering National Institute of Technology, Rourkela, India.
Dr. Baldev Raj Distinguished Scientist & Director, Indira Gandhi Centre for Atomic Research (ICGAR)Kalpakkam, India.
Prof. D. N. Rao Professor, Department of Biochemistry, AIIMS, New Delhi, India.
Dr. Baskar Kaliyamoorthy Associate Professor, Department of Civil Engineering National Institute of Technology Trichy, India.
Prof. Jugal Kishore Professor, Department of Community Medicine, Maulana Azad Medical College, New Delhi, India.
Dr. Hardev Singh Virk Professor Emeritus, Eternal University, Baru Sahib, India.
Dr. Pankaj Poddar Scientist, Physical & Materials Chemistry Division, National Chemical Laboratory, Pune, India.
Dr. Nandini Chatterjee Singh Associate Professor, National Brain Research Centre, Manesar, India.
STM Journal (s) Advisory Board
Dr. Priyavrat Thareja
Dr. Rakesh Kumar
Head, Materials and Metallurgical Engineering department, PEC University of Technology, Chandigarh, India.
Assistant Professor, Department of Applied Chemistry, BIT Mesra, Patna, India.
Dr. Shankargouda Patil
Dr. Shrikant Balkisan Dhoot
Asst. Prof., Department of Oral Pathology, KLE Society's Institute of Dental Sciences, Bangalore, India.
Head Research & Development, Nurture Earth R&D Pvt Ltd MIT Campus, Beed bypass road, Aurangabad, India.
Prof. Subash Chandra Mishra
Prof. Sundara Ramaprabhu
Professor, Metallurgical & Materials Engineering Department, NIT, Rourkela, India.
Professor, Department of Physics Indian Institute of Technology Madras, India.
Prof. Yuwaraj Marotrao Ghugal Professor and Head Department, Govt. College of Engineering Station Road, Osmanpura, Aurangabad, India.
Editorial Board
Dr. Divakar Singh Yadav Dept. of Computer Science & Engineering, Institute of Engineering and Technology UP Technical University, Lucknow, India
Maj. Gen Anil kumar Jain Amity University, India
Senthil Kumar A.V. Hindusthan College of Arts and Science, Coimbatore, India
Prof. Prasanta K. Jana Indian School of Mines, Dhanbad
Dr. Gunamani Jena ME CSE, PhD, FIE, MIEEE, LMISTE, MCSI, India
Yaduvir Singh Department of Electrical and Instrumentation Engineering, Thapar University, Patiala Punjab, India
Dr. Mark Burgin Dept. of Mathematics, UCLA, Los Angeles, CA 90095, USA, United States
Dr. Adesh Kumar Sharma National Dairy Research Institute (Deemed University), Indian Council of Agriculture, Haryana, India
Dr. B.L. Shivakumar Assoc. Prof., Dept. of Computer Applications, Sri Ramakrishna Engineering College, NGGO Colony Post, Coimbatore, India
Director's Desk
STM JOURNALS
I take the privilege to present the hard copy compilation for the [Volume 2 Issue (1)] Journal of Network Security (JoNS). The intension of JoNS is to create an atmosphere that stimulates creativeness, research and growth in the area of Network Security . The development and growth of the mankind is the consequence of brilliant Research done by eminent Scientists and Engineers in every field. JoNS provides an outlet for Research findings and reviews in areas of Network Security found to be relevant for National and International recent developments & research initiative. The aim and scope of the Journal is to provide an academic medium and an important reference for the advancement and dissemination of Research results that support high level learning, teaching and research in the domain of Network Security . Finally, I express my sincere gratitude and thanks to our Editorial/ Reviewer board and Authors for their continued support and invaluable contributions and suggestions in the form of authoring writeups/ reviewing and providing constructive comments for the advancement of the journals. With regards to their due continuous support and co-operation, we have been able to publish quality Research/Review findings for our customers base. I hope you will enjoy reading this issue and we welcome your feedback on any aspect of the Journal.
Dr. Archana Mehrotra Director STM Journals
Journal of Network Security
Contents
1. An Approach to Develop Secure Ear Biometric System Md. Rabiul Islam, Md. Mostafizur Rahman, Rizoan Toufiq
1
2. Behavioral Prediction of Network Attacks Using Honeypot Rules Saranya K
7
3. Detection of Distributed Denial of Service Attack by Hidden Markov Model through Web Proxy System A. Aafreen, Kannan Balasubramanian
13
4. Performance Analysis of AODV, DSR and CGSR Routing Protocol in MANET based on Energy Consumption Priyanka Bansal, Jawahar Thakur
21
5. Prediction of Phishing Website using Visual Cryptography P. Suryaprabha, A. Anny Leema
28
Journal of Network Security ISSN: 2321-8517 Volume 2, Issue 1 www.stmjournals.com
An Approach to Develop Secure Ear Biometric System Md. Rabiul Islam*, Md. Mostafizur Rahman, Rizoan Toufiq Department of Computer Science & Engineering, Rajshahi University of Engineering and Technology, Rajshahi, Bangladesh Abstract Biometrics is now the significant identification process for security system. The future of biometrics is surely leads to a system because the acquisition process for biometrics is very simple. Ear biometrics has an important role on biometrics system. Because it is a passive biometrics system which means that the user does not have to take active part in the whole process. The most interesting human anatomical parts for such passive, physiological biometrics systems based on images acquired from cameras are face and ear. This paper introduces to ear biometrics as a passive human identification systems. Using two different methods and comparison between them help anyone to find the best ear biometrics method. Geometrical method of feature extraction from human ear images in order to perform human identification is presented with the help of two different edge detection algorithms. Keywords: Biometrics, ear identification, passive biometrics, geometrical method
JoNS (2014)Š STM Journals 2014. All Rights Reserved
Journal of Network Security ISSN: 2321-8517 Volume 2, Issue 1 www.stmjournals.com
Behavioral Prediction of Network Attacks Using Honeypot Rules Saranya K* B. S. Abdur Rahman University, Vandlur, Chennai, India
Abstract In this paper is presented an approach for behavioral prediction of network attacks using honeypot rules using support physical machine as a classification technique. The proposed honeypot is used to trap delay and gather information about the attackers. These systems are centralized at a strategic point in the network and collect data into a log file that is subsequently analyzed as main vulnerability. Honeypots can generate the signature with the help of attack classifier, and it can detect and record known and unknown attacks in addition. Signature-based classifier uses Bayesian classification algorithm to represent malicious file or normal file. Therefore, the IP addresses correspond to higher chances for detecting intruders as more fake systems would be mined in the network.
Keywords: Honeypot, attacks defined, signature generation, malicious, nonmalicious, IP blacklisting
JoNS (2014) STM Journals 2014. All Rights Reserved
Journal of Network Security ISSN: 2321-8517 Volume 2, Issue 1 www.stmjournals.com
Detection of Distributed Denial of Service Attack by Hidden Markov Model through Web Proxy System A. Aafreen*, Kannan Balasubramanian Mepco Schlenk Engineering College, Mepco Schlenk Engineering College, Sivakasi, Tamilnadu, India Abstract Nowadays the attack against the computer system is becoming very common and vulnerable. Indirect web proxy distributed denial of service attack is an increasingly common internet phenomenon and is capable of making the internet services unavailable. Such type of attacks cannot be easily discovered by most existing defense systems since malicious traffic is hidden in the aggregated traffic. Also the source of the attack traffic and normal traffic cannot be distinguished because both of them share the same IP of the proxy server. To overcome this problem, a new improved hidden semi-Markov model is proposed. Therefore, applying this proposed method protects the origin server from the web proxy-based HTTP attacks. Web proxy’s access behavior can be regarded as the combination of the externally observable behavior and the internal driving mechanism. The internal driving mechanism can be estimated by the observable features of proxy-toserver traffic through the hidden semi-Markov model. Hidden semi-Markov model describes the dynamic behavior process of the aggregated traffic. The false positive rate is also detected with respect to the incoming traffic.
Keywords: Traffic analysis, traffic modeling, distributed denial of service attack, attack detection, attack response
JoNS (2014) 13-20 Š STM Journals 2014. All Rights Reserved
Page 13
Journal of Network Security ISSN: 2321-8517 Volume 2, Issue 1 www.stmjournals.com
Performance Analysis of AODV, DSR and CGSR Routing Protocol in MANET based on Energy Consumption Priyanka Bansal*, Jawahar Thakur Department of Computer Science, HPU Shimla, India
Abstract Mobile Ad-hoc networks (MANET) have gained lots of attention in researches in recent years, especially in routing protocols due to their dynamic nature. There are number of routing protocols in MANET networks and performance of these routing protocols have been evaluated focusing on metrics such as delay, packet delivery, routing overhead, throughput. However, not much work has been done to evaluate energy aspect of these routing protocols. Design new energy efficient routing algorithms are based on this basic MANET routing protocols is the latest research area in MANET and WSN. This paper will discuss the performance analysis of Dynamic Source Routing (DSR),Ad-hoc On-Demand Distance Vector(AODV) and Cluster-Gate routing protocol(CGSR) routing protocol in MANET based on energy consumption. A detailed simulation model using OMNeT++4.3 with different mobility and traffic models are used to study their energy consumption. Finally, an evaluation of these routing protocols based on energy consumption is presented.
Keywords: Mobile Ad hoc network (MANET), routing protocols, energy consumption, AODV, DSR, CGSR
JoNS (2014)Š STM Journals 2014. All Rights Reserved
Journal of Network Security ISSN: 2321-8517 Volume 2, Issue 1 www.stmjournals.com
Prediction of Phishing Website using Visual Cryptography P. Suryaprabha*, A. Anny Leema BS Abdur Rahman University, Chennai, India Abstract Phishing is a new type of social network attack. It is the act of attempting to acquire the information such as username, password, credit card details, etc. In this project, a new approach named as “Image Captcha Based Authentication Using Visual Cryptography” to solve the problem of phishing is proposed. The string is converted into image captcha using the extracting and embedding method. The visual cryptography is used to preserve the privacy of image captcha by decomposing the original image captcha into two shares using VCS (2*2). One of the shares is kept with the user and the other is kept in the server side. The user has to enter the user name and upload his share in the login phase. If the site is legitimate, it will display the image captcha and on the other hand image captcha will not be displayed if the website is fraudulent. This work is implemented in Java as front-end and SQL as backend. This work helps to identify the phishing site and the textual keyword validation along with visual cryptography.
Keywords: Phishing, embedded EVCS, luminance method, visual cryptography scheme
JoNS (2014) © STM Journals 2014. All Rights Reserved