Accepted Papers

  • The cooperation of immune agents for intrusion detection system
    Noria Benyettou1, Abdelkader Benyettou1, Vincent Rodin2,1Laboratoire SIMPA,Universitédes Sciences et Technologie d’Oran,ALGERIE,2European University of Brittany,France
    ABSTRACT

    Nowadays information technology and communication has evolve, computer networks became vulnerable faced to new forms of threats. In this article, a new model of intrusion detection based on multi-agents system and inspired from the biological immune system is presented.
    We begin through a presentation of the biological immune systems , followed by im-mune algorithm, a model of artificial immune system which is integrated in the behavior of distributed agents on the network is proposed in order to ensure a good intrusions detection. the internal structure of the immune agents and their capacity to distinguish between self and not-self is also presented. Agents are able to achieve simul-taneous treatments, they are auto-adaptable to environment evolution and have also the property of distributed coordination.

  • A SECURED AND OPTIMIZED DOCUMENT MANAGEMENT TOOL USING ADVANCED ENCRYPTION STANDARD AND NOSQL
    Armando D Pagkalinawan Jr1 and Dr. Aleta C. Fabregas1,1Polytechnic University of the Philippines
    ABSTRACT

    The study gives an experiment by comparing different encryption algorithms and relational database management system (RDBMS) versus nosql databases in terms of encrypting and decrypting different digital documents. There are a given different sizes and types of documents that was used in the experiment its purpose was to provide a tool that can be used anywhere from an individual person to a school organization that they can used to hide their confidential files. The study also introduces and compare the usage and non-usage of digital signature scheme in the encryption and decryption process of the digital documents. By the experiments provided the study proved that the usage of digital signature with advanced encryption standard algorithm and nosql provides the fastest and most secured way of giving security to a digital document.

  • Enahanced Signature Authentication Approach to Detect DDOS (Distribute Denial Of Service) Attack VANET
    Rajwinder Kaur and Usvir kaur, Sri Guru Granth Sahib World University, India
    ABSTRACT

    Security systems are considered a necessity for the deployment of smart vehicles in our society. Security in vehicular ad hoc networks is crucial to the reliable exchange of information and control data. Vehicular Ad-hoc Network (VANET), an unplanned network formed by vehicles on the road to improve road safety and driving conditions. The vehicle count increases and the roads are becoming more hazardous by the effect of congestion and increased the likelihood of collision. Safety messages are to be routed to the vehicles in a timely and correct manner. Moreover VANET face several security attacks The various security threats are misbehaving nodes give false information, Sybil attacks, selfish driver attacks, and its. The DDOS attack is the active type of attack in which malicious node selects the nodes which will be controlled by the malicious node. Moreover VANET face several security attack The various security threats are misbehaving nodes give false information, Sybil attacks, selfish driver attacks, and etc.The DDOS attack is the active type of attack in which malicious node selects the nodes which will be controlled by the malicious node.The selected nodes are responsible to flood the victim node with the rough data packets. In this paper, threshold based technique is being proposed in which network, which is sending data above the threshold value will be responsible to trigger a DDOS attack in the network. The proposed technique has been implemented in NS2 and it is being analyzed that the proposed technique is performed well in terms of throughput, delay and packet loss.

  • INTRUSION DETECTION SYSTEM: MISUSE DETECTION AND ANOMALY BASED STATISTICAL DETECTION
    CHAMKAR Samir Achraf,RAJAALLAH El Mostafa,Ibn Tofail University,Kenitra, Morocco
    ABSTRACT

    The frequency of malicious actions against computer networks has increased in the last decade. Hence malicious actions used to menace the integrity, confidentiality, and availability of information system resources. The intrusion detection systems (IDSs) play an essential role in detecting and reacting to anomalies and attacks in the network or system. It is a security paradigm attempting to identify various attacks using misuse-detection or anomaly-based detection. Misuse-detection relies on signatures and recognizes only known attacks whereas anomaly-detection establishes a baseline of normal usage patterns, and whatever differs from this get flagged as possible intrusions. In this paper, we survey Snort, Suricata, and Bro as open source misuse-based intrusion detection systems, and evaluate as well PHAD, ALAD, and NETAD as anomaly-based statistical algorithms.

  • A STUDY ON AUTOMOTIVE ATTACK DATABASE AND DATA FLOW DIAGRAM FOR CONCRETIZATION OF HEAVENS, A CAR SECURITY MODEL
    Se-Han Lee1 , Kwang-Woo Go1 , Gwang-Hyun Ahn1 , Hee-Sung Park1, Cheol-Kyu Han1, Jun-Bo Shim1, Geun-Chul Kang1 and Hyun-Jung Lee2,1Information Technology Research Institute, Seoul, Korea,2Security Platform Development Team, Fescaro, Seong-Nam, Republic Of Korea
    ABSTRACT

    The HEAVENS model have emerged since the advent of car hacking that only has a simple process, therefore we propose a way to materialize them.

  • SECURE RFID BASED AUTHENTICATION PROTOCOL FOR SMART HOSPITAL SYSTEM
    Ayimasso Ulrich Samueland Tian Hua,Taiyuan University of Technology,China
    ABSTRACT

    Nowadays, radio frequency identification (RFID) is taking the place of the traditional identification by bar code thus impacting an exponential development of the Internet of Things where the objects are easily identified without a physical contact. Though RFID is becoming popular worldwide, it is susceptible to various attacks and security problems. Since the information is transmitting by air, user privacy may be compromised by malicious people by intercepting the information contained in the RFID tags. Researchers have proposed quite a few security protocols for RFID. But the protocols do not provide such security as they claimed. In this paper we propose an authentication protocol based on hash function which can prevent the most encountered security problems and be applied in RFID based smart hospital system implementation.