submit Opinions CrossRef Open Access Subscribe New Journal Ideal

Click on image to enlarge

Indexed in Scopus

Journal of Cyber Security and Mobility

Hybrid Journal

Ashutosh Dutta, Johns Hopkins University, USA
Ruby Lee, Princeton University, USA
Neeli R. Prasad, International Technological University, San Jose, USA
Wojciech Mazurczyk, Warsaw University of Technology, Poland

ISSN: 2245-1439 (Print Version),

ISSN: 2245-4578 (Online Version)
Vol: 7   Issue: Combined Issue 1 & 2

Published In:   January 2018

Publication Frequency: Quarterly

Articles in 2020

Search Available Volume and Issue for Journal of Cyber Security and Mobility

Journal Description        Read Full Articles        Editorial Board        Subscription        Indexed       Opinions

Digital Watering Hole Attack Detection Using Sequential Pattern

T. Subburaj1 and K. Suthendran2

1Department of Computer Applications, Kalasalingam Academy of Research and Education, Krishnankoil - 626126, Tamilnadu, India
2Department of Information Technology, Kalasalingam Academy of Research and Education, Krishnankoil - 626126, Tamilnadu, India

Abstract: [+]    |    Download File [ 1358KB ]    |   Read Article Online

Abstract: Internet plays a vital role in day to day communication, business transactions etc and thus unavoidable. But many of the users are lagging in using the same in a secured manner which increases the possibility of attack. In 2017, Attackers had targeted dozens of global banks with new malware.Watering hole attacks attempt to infect more than 100 organizations in 31 different countries. It is becoming very difficult to detect and prevent the cyber attacks, since new attacks are increasing day by day.Awatering hole attack is a computer attack in which the attacker aims to victim the kind of websites that the target group go to often and checks these websites for vulnerabilities. After that by injecting Java Script or HTMLredirects the victim to a separate site hosting the exploit code for the chosen vulnerability. In this paper, a novel method is proposed to detect the possibility of watering hole attack using support count and confidence of the sequence pattern mining. Further by analysing the website URL links, alarming the users about the watering hole attack.

Keywords: Watering hole, Relative confidence, Cyber attack, Sequence pattern, Phishing

Chi-Square MapReduce Model for Agricultural Data

S. Rajeswari1 and K. Suthendran2

1 Department of Computer Applications, Kalasalingam Academy of Research and Education, Krishnan koil - 626126, Tamilnadu, India
2 Department of Information Technology, Kalasalingam Academy of Research and Education, Krishnan koil - 626126, Tamilnadu, India

Abstract: [+]    |    Download File [ 549KB ]    |   Read Article Online

Abstract: Nowadays, agriculture plays a very significant role in economic growth. Decision making, crop selection and crop yield are the important issues in agriculture productions. Agricultural automation has lead to an incredible growth of software and applications to access the information. Agriculture database contains the farmer’s details, land details, soil nutrient details, water levels details and etc. When the data set contains irrelevant, redundant and noisy data then it degrades the performance of the classifier model. The feature selection algorithm is used to improve the performance by selecting the relevant attributes and removing the irrelevant attributes from the database. In this paper, a novel idea is proposed by deploying chi-square technique in MapReduce model to handle large amount of agricultural data. The experimental results show that the proposed Chi-Square MapReduce model has high accuracy and less processing time than the existing feature selection methods.

Keywords: Agriculture, Soil fertility, Attribute selection, Data mining algorithm, filter method and wrapper method.

Analytic Hierarchy Process for Resource Allocation in Cloud Environment

C. Revathy1, and G. Sekar2

1P.G. Student, Department of CSE, Adhiparasakthi Engineering College, Melmaruvathur-603319, Tamilnadu, India
2Assistant Professor, Department of CSE, Adhiparasakthi Engineering College, Melmaruvathur-603319, Tamilnadu, India

Abstract: [+]    |    Download File [ 4046KB ]    |   Read Article Online

Abstract: Resource management is the primary issue as the demand grows for provisioning resources and computation in cloud systems. When the resource management fails to meet the QoS parameter (response time) requirements, there occurs the due-date assignment problem leading to “resource allocation problem”. This can be optimized by various scheduling algorithms. In this paper analytic hierarchy process is discussed for resource sharing. The results demonstrates that this approach reduces the execution time of algorithm and effectively handles vertical elasticity by adding resources in cloud server. Moreover, the experimental results shows that proposed method can effectively allocates the resources than any other algorithms. Finally, this algorithm is also focused on how efficiency is effectively handled in cloud computing environment while allocating resources since efficiency based resource allocation scheme has been taken into account.

Keywords: Analytic hierarchy process, Resource sharing, Cloud Computing, QoS, SLA.

Handling Selfishness over Collaborative Mechanism in a Mobile Ad hoc Network

K. Anish Pon Yamini1, Suthendran Kannan2 and Arivoli Thangadurai3

1Research Scholar, Department of Electronics and Communication, Kalasalingam Academy of Research and Education, Krishnankoil - 626 126, Tamilnadu, India
2Associate Professor, Department of Information Technology, Kalasalingam Academy of Research and Education, Krishnankoil - 626126, Tamilnadu, India
3Senior Professor, Dept of Electronics and Communication, Karpagam College of Engineering, Coimbatore - 641032, Tamilnadu, India

Abstract: [+]    |    Download File [ 1663KB ]    |   Read Article Online

Abstract: Major constraint of Mobile ad hoc networks is unpredictable mobility and limited resources like energy consumption which may ultimately end in failure of network connectivity and performance deterioration. Almost all of the suggested techniques presume that every nodes share their memory space with full collaboration. But in realism, few nodes selfishly decide either to cooperate partially only with other nodes, or not at all. Thus, a advanced collaborative mechanism based on dissemination of selfish node awareness is suggested. Numerical results reveal that such mechanism results in better improvement in performance.

Keywords: Adhoc networks, Replication techniques, collaborative mechanism, Detection.

A Secured MANET Using Multicast Routing Protocols and Semi Markov Process

Maragatharajan M. and Balakannan S. P.

Department of Information Technology, Kalasalingam University, Tamilnadu, India

Abstract: [+]    |    Download File [ 2572KB ]    |   Read Article Online

Abstract: Reliable data delivery is essential in the mobile ad hoc network (MANET) and the devices change their positions very frequently since they do not have any fixed infrastructure. In this paper, we have proposed multicast routing protocols for military communications. The military communications with MANET require data security. We using one of the most widely used algorithms Neighbor supporting Ad hoc Multicast routing protocol which is Mesh-based routing algorithm. Semi Markov process is used to develop the node behavior model for network survivability. In this work, reliable data delivery is obtained for the MANET by estimating the present performance of the network through isolating the forwarder node in Semi Markov process.

Keywords: MANET, NSMP, Markov Process.

Multi DODAGs in RPL for Reliable Smart City IoT

A. Sebastian and S. Sivagurunathan

Department of Computer Science and Applications, Gandhigram Rural Institute, Dindigul, India

Abstract: [+]    |    Download File [ 1405KB ]    |   Read Article Online

Abstract: Internet of Things technology has given rise to Smart Cities, Smart Health, Smart Transport Logistics, Smart Production and Supply chain management, Smart Home and the list is long. Smart city deployments are gaining momentum around the world. Security and Reliability of IoT infrastructure in smart cities remain important challenges. In this regard, ROLL-WG has standardised RPL for urban environment (RFC 5548). RPL is designed to address the needs of constrained IoT environment. RPL uses Objective Functions (ETX & Hop Count) to optimise parent selection as well as route selection. Newer Objective Functions for IoT applications are suggested by researchers to manage network and security. In this paper, we propose Multi DODAG’s in RPL for improved performance and reliable smart city applications.We have tested the proposed model in Contiki OS with Cooja simulator. Proposed model provides improved efficiency in convergence time, Packet Delivery Ratio, Control Traffic Overhead, Power consumption. For reliability, node participation is evaluated. Hence, Multi DODAG’s in RPLcan better optimize constrained resources and provide reliability to the network.

Keywords: Internet of Things, Smart City, RPL, Multi DODAGs.

Security Strategies for Safe Data and Content Access in Operational Modules of Product Data Management Software

Sam George2 and K. David2

1Research Scholar, School of Computer Science, Bharathiar University, Coimbatore, Tamilnadu, India
2Associate Professor, Department of Computer Science, H.H. The Rajahs College, Pudukkottai, Tamilnadu, India

Abstract: [+]    |    Download File [ 1631KB ]    |   Read Article Online

Abstract: In any engineering organisation, product data is dispersed across multiple departments which makes it vulnerable to unauthorised access. In the design of an automated system, enforcement of this access mechanism throws open the primary challenge in ensuring safety of each modules and the content inside. Challenges in security design initiates from the entry of users to the system. Security aspects for user access hold the key in safeguarding the content and data inside. However, management of this requires a holistic approach in letting the user traverse only through pre-defined modules, data categories with well-defined access mechanisms. Success of this modular security design will eventually lead to an efficient storage mechanism for the data inside and user friendly traversal and operational mechanism for the user.

Keywords: Authentication, Data, Log, Security.

Energy Saving from Cloud Resources for a Sustainable Green Cloud Computing Environment

Karuppasamy M. and Balakannan S. P.

Kalasalingam University, Tamil Nadu, India

Abstract: [+]    |    Download File [ 395KB ]    |   Read Article Online

Abstract: Cloud computing services are proliferation. The Cloud computing resources face major pitfall in energy consumes. The prime of energy consumption in cloud computing is by means of client computational devices, server computational devices, network computational devices and power required to cool the IT load. The cloud resources contribute high operational energy cost and emit more carbon emission to the environment. Therefore the cloud services providers need green cloud environment resolution to decrease the operational energy cost along with environmental impact. The most important objective of this effort is to trim down the energy from utilized and unutilized (idle) cloud resources and save the energy in cloud resources efficiently. To achieve the sustainable green cloud environment from an Energy Saving Algorithm used to choose the appropriate virtual services so that the power at the client, server, and network recourses can be reduced.

Keywords: Cloud Computing, Green, Environment, Virtualization, Energy.

The Art of Piecewise Hashing: A Step Toward Better Evidence Provability

Aswin Gopalakrishnan1, Emanuele Vineti2, Ashok Kumar Mohan1 and M. Sethumadhavan1

1TIFAC-CORE in Cyber Security, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India
2Vrije University, the Netherlands

Abstract: [+]    |    Download File [ 2069KB ]    |   Read Article Online

Abstract: The integrity of digital evidence is believed to be the paramount trait in the world of cyber forensics. Cybercrime investigators face myriad challenges in the process similar to accommodating the call for bulk digital evidence. In due course extraction of useful information while maintaining the integrity and absolute protection against data degradation is mandatory. In this manuscript, we propose a novel approach by applying cryptographic hashing technique to only selected significant portions of the digital evidence, so even if the overall hash does not match, investigators could still verify the integrity of those critical sections of the evidence.We put forward two notions in this manuscript; former is heterogeneous piecewise hashing which is a flexible version of the piecewise hashing strategy, and latter is a novel evidence certification strategy which formalizes evidence provability process completely.

Keywords: Hashing, Piecewise, Acquisition, Certificate, admissibility, Litigation, Artifact, Corruption, Validation, Authenticity, Memory-block.

Boosting Based Implementation of Biometric Authentication in IoT

B. Thilagavathi1 and K. Suthendran2

1Assistant professor, Department of Electrical Sciences, Karunya Institute of Technology and Sciences, Coimbatore, India
2Associate professor, Department of Information Technology, Kalasalingam Academy of Research and Education, krishnankoil, India

Abstract: [+]    |    Download File [ 1543KB ]    |   Read Article Online

Abstract: In security and control application the biometric authentication played a specific and important role to identify the person. Analysis of face recognization is the prerequisite process for the entire authentication. This paper focuses an automatic real-time implementation of face recognization system by highlevel description language such as python. Comparing the biometrics where still images are used, video based biometric holds ample information than a single image. It provides the innovative solution for automatic real time face recognition from the video by the following algorithms like Adaboost, Haar cascade classifier and local binary pattern Histogram (LBPH). From the video stream, the input images are trained by adaboost algorithm which is implemented in cascade classifier. AdaBoost is called as adaptive boosting algorithm. It is a learning algorithm which has been combined with a weak classifier in order to form a strong classifier. Here, the real time testing image is compared with the 627 frames of trained images which are obtained from 47.7 MB (56088648 bytes) video. The hardware implementation of face recognization is obtained and the result can be stored and viewed in Thus by the above said procedures are authenticated by the combinational performance of Adaboost and Cascade classifier.

Keywords: Face Recognization, Video Processing, Embedded implementation, PHP.

A Novel Customized Big Data Analytics Framework for Drug Discovery

A. Jainul Fathima1, and G. Murugaboopathi2

1Research Scholar
2Associate Professor
1,2Department of Computer Science and Engineering, Kalasalingam Academy of Research and Education, Krishnankoil, Tamilnadu, India

Abstract: [+]    |    Download File [ 2016KB ]    |   Read Article Online

Abstract: Drug discovery is related to analytics as the method requires a technique to handle the extremely large volume of structured and unstructured biomedical data of multi-dimensional and complexity from pharmaceutical companies. To tackle the complexity of data and to get better insight into the data, big data analytics can be used to integrate the massive amount of pharmaceutical data and computational tools in an analytic framework. This paper presents an overview of big data analytics in the field of drug discovery and outlines an analytic framework which can be applied to computational drug discovery process and briefly discuss the challenges. Hence, big data analytics may contribute to better drug discovery.

Keywords: Big Data, Analytics, Framework, Drug Discovery

An Investigation on HTTP/2 Security

Meenakshi Suresh1, P. P. Amritha1, Ashok Kumar Mohan1 and V. Anil Kumar2

1TIFAC-CORE in Cyber Security, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India
2CSIR Fourth Paradigm Institute (CSIR-4PI), Bangalore, India

Abstract: [+]    |    Download File [ 2612KB ]    |   Read Article Online

Abstract: In the current world scenario where everyone is using the Internet, it is becoming a strenuous task to preserve security. Furthermore the world is becoming progressively digital by the passing of each minute.Alarge portion of the Internet is conducted using the Hyper Text Transfer Protocol (HTTP). But in 2015, it underwent a consequential enhancement and was released as HTTP/2.

HTTP/2 includes pipelining, response multiplexing, server push and header compression using HPACKbesides the properties of HTTP/1.1. These properties make it difficult for the eavesdroppers to monitor or fingerprint a website running on HTTP/2. This paper deals with the research on how strong the HTTP/2 protocol keeps the user information hidden and secure. By monitoring a live network traffic, its properties with HTTP/2 is assessed. This study helps understand the different aspects of the protocol and its influence on the network and browsers.

Keywords: HTTP, HTTP/2, SPDY, Server Push, HPACK.

Isolating Rumors Using Sentiment Analysis

V. Sivasangari1, Ashok Kumar Mohan1, K. Suthendran2 and M. Sethumadhavan1

1TIFAC-CORE in Cyber Security Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India
2Kalasalingam Academy of Research and Education, Krishnankoil 626 126, Tamilnadu, India

Abstract: [+]    |    Download File [ 1890KB ]    |   Read Article Online

Abstract: In recent days, social media has become a platform to spread false facts all the way through internet. One of the growing data analytic engine from web informal organization says, twitter has become the prime source for spreading fake news facilitating numerous perpetrators around the globe. It has turned into a competent, speedy cum effortless hotspot for news-fans to just click and forward junk data. Individuals are opting to use twitter for searching information regarding crisis circumstances and everyday occasions. In twitter, the spread of fraudulent or inaccurate information during the emergency situations will affect the individuals and public in numerous ways, but the original news is more reliable when it is declared by the news channels. So, the importance of proposed framework is categorized in three steps; Initially, Twitter Scraper is applied to scrape the vast volume of tweets and metadata from the collected set of tweets for the study on former Chief Minister (state of Tamil Nadu) death case controversy during 2016. Then the threshold value based on negative polarity of common tweets for the scraped data is calculated, once the tweeted texts are different from the threshold condition it will be automatically tagged as ‘rumor’ (negative) or else tagged as ‘non-rumor’ (positive) using sentiment classifier. Finally, the proposed model on VADER based sentiment analysis identifies the false facts. It is obtained as a result of the sample tweets regularly training and testing it on whole datasets.

Keywords: Social Media Analysis, Twitter Scraper, Sentiment Classifier, Rumor, Non-rumor, #RIP.

Deceiving Attackers in Wireless Local Area Networks Using Decoys

A. Aswin Kumar, Ashok Kumar Mohan and P. P. Amritha

TIFAC-CORE in Cyber Security, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India

Abstract: [+]    |    Download File [ 2044KB ]    |   Read Article Online

Abstract: Detecting a malicious activity like fingerprinting on wireless local area network is a challenging task. With cyber deception strategy, we can gather information about the malicious activity by placing honeypots that can act as a trap to lure the attacker. Cyber deception is a conventional method to cloak real-time environment into a virtual legitimate environment. Our analysis shows that deception is an existing strategy in a wired LAN environment. This paper provides a wider perspective of deception strategy on wireless LAN. We primarily focus on the evil twin access point which causes serious threat to the legitimate Wi-Fi access points. Here a novel approach has been suggested to detect and identify the malicious activity by deceiving the attackers in their evil twin access points using decoys which are honeypots. The paper also provides a reliable way to gather the attacker’s activity information. We can also detect SSL stripping and DNS spoofing attack using this approach.

Keywords: Wi-Fi, Cyber deception, Evil twin, Decoys, SSL stripping.

Wormhole Attack Detection and Prevention Using EIGRP Protocol Based on Round Trip Time

K. Karthigadevi1, S. Balamurali1 and M. Venkatesulu2

1Department of Computer Applications, Kalasalingam Academy of Research and Education, Krishnankoil 626 126, Tamilnadu, India
2Department of Information Technology, Kalasalingam Academy of Research and Education, Krishnankoil 626 126, Tamilnadu, India

Abstract: [+]    |    Download File [ 1748KB ]    |   Read Article Online

Abstract: One of the major harmful attacks in wireless sensor network is wormhole attack. These attacks are disturbing the routing in networks and create a large amount of traffics. Wormhole attacks are target to the banks, government, private sectors, public sectors etc. The proposed method is used to analyse and detect the wormhole attack. Using EIGRPprotocol to identify the shortest path and detect the attacking node based on the round trip time variation technique. As compared with previous method, it is the easy way to detect the wormhole attacks

Keywords: WSN,Wormhole attack, RTT, EIGRP, Intruder node.

River Publishers: Journal of Cyber Security and Mobility