Skip to main content

2018 | Buch

Cyber Security

Proceedings of CSI 2015

herausgegeben von: Prof. Dr. M. U. Bokhari, Prof. Dr. Namrata Agrawal, Dr. Dharmendra Saini

Verlag: Springer Singapore

Buchreihe : Advances in Intelligent Systems and Computing

insite
SUCHEN

Über dieses Buch

This book comprises select proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. The volume covers diverse topics ranging from information security to cryptography and from encryption to intrusion detection. This book focuses on Cyber Security. It aims at informing the readers about the technology in general and the internet in particular. The book uncovers the various nuances of information security, cyber security and its various dimensions. This book also covers latest security trends, ways to combat cyber threats including the detection and mitigation of security threats and risks. The contents of this book will prove useful to professionals and researchers alike.

Inhaltsverzeichnis

Frontmatter
Privacy Protection Through Hiding Location Coordinates Using Geometric Transformation Techniques in Location-Based Services Enabled Mobiles

Mobile gadgets today are swaggering computing potential and memory at par or at times even higher to that found in desktop personal computers. A wireless interconnection has turned out to be considerably more readily accessible these days. As individuals are growing mobile with regard to the fast lifestyle and working pattern, a new, smarter system came into existence that is termed as “location-based service” (LBS). Such a system amalgamates the location data of a user with smart applications to deliver demanded services. Although LBSs provide major openings for a large variety of markets and remarkable convenience to the end user, it also presents subtle privacy attack to user’s location information. Threat to the privacy sneaks into the system due to the prerequisite of sending user’s current location to the LBS provider to attain related services. Since the volume of data gathered from dynamic or stationary mobile users using LBS can be high, it is vital to outline the frameworks and systems in a manner that is secure and keep the location information private. This can be portrayed as a big mobile data challenge in LBSs setting. This paper aims to explore the issues related to privacy involved in LBSs. In the paper, we introduce framework structure outline for preventing location-based vicinity inference of users who issue a query and also proposed VIC-PRO algorithm which helps to overcome the gaps of well-established K-anonymity approach in the existing system. The suggested approach strengthens the privacy of query initiating vicinity information.

Ruchika Gupta, Udai Pratap Rao
Advanced RSA Cryptographic Algorithm for Improving Data Security

Data security is a method which is used to cover the important information. Data security methods control the privacy and integrity of the important information. The access to the database of the companies has improved. Now companies store their business data more on computer than before. Most of the company data is for internal use and not for the general public because business data is highly confidential. At present, cryptographic block cipher is being used with some logical operation and the main drawback in this method is the generation of the secret key which is totally based on the alphabets. So with the help of loop concept, there is a chance for the hackers to find out the secret key. But I propose advanced algorithm for cryptography which is totally dependent on hashing function technique to generate a secret key which is further used to encrypt and decrypt the important information. The secret key will be generated by using different key generation algorithms which will be of higher sets of alphanumeric characters. I am using a hashing technique for cryptography along with a new quantum-bit generation method.

Mukesh Kumar
Different Security Mechanisms in Two-Factor Authentication for Collaborative Computing Environment

The main aim of this paper is to provide the security for accessing the collaborative computing environment. Main thing here is using authentication method, users can access their collaborative environments. So normal authentication is not sufficient for collaborative environment, that is why here I am proposing two-factor authentication for collaborative environment.

G. Dileep Kumar, R. Praveen Sam
‘Changing Trend in Network Security Measures: A Review’

The growing connectivity across the globe has been made possible due to Internet and web applications. Social networking and e-commerce web applications are dominating the cyberspace. Cybersecurity tends to secure the computer system, information and the connecting network from the attackers whose intention is to misuse the information and damage the resources. Network security is a bit complex mechanism as compared to information security as it does not only require securing end systems but also ensure the security of entire network system. This paper discusses the network security measures and the change in trend in application of these measures.

Swati Maurya, Anita Singhrova
An Improved RED Algorithm with Input Sensitivity

Random Early Detection (RED) is a recommended scheme of Active Queue Management (AQM) to avoid network congestion by Internet Engineering Task Force (IETF). RED being sensitive to its control parameters setting and traffic load behaves differently during different phases of scenarios and its performance degrades. To solve the above problems, we have proposed an improved algorithm LTRED, L stands for queue length and T stands for threshold, which incorporates the impact of load variation in early congestion notification along with tuning of threshold parameter of RED. Our approach is validated by doing extensive simulations on ns-2 (network simulator) and comparisons are done with RED, ARED, and AVQ well-known AQMs. Our approach has shown its superiority in terms of packet loss, early congestion indication, better link utilization, and improved goodput. In this work, mismatch between macroscopic and microscopic behavior of queue length of RED is also addressed and reduction in mismatch is achieved. In addition, LTRED makes very few changes to the original RED without making the system complex.

Kiran Chhabra, Manali Kshirsagar, Arun Zadgaonkar
Security Attacks in Wireless Sensor Networks: A Survey

Security is one of the major concerns in sensor networks. Wireless sensor network comprises of huge amount of nodes called as tiny sensor nodes. The nodes are required to exchange information with different nodes via wireless links in short intervals. The information may be potentially private regarding people and business processes. These networks suffer from adversary due to distributed behavior and deployment in distant areas. The networks are governed by some constraints at sensor node level like less battery power, less memory capacity, and low transmission range while at network level, they are governed by ad hoc networking and irregular connectivity. The paper analyzes the challenges, main security issues, security breaches in wireless sensor networks and lists their defensive measures.

Prachi Dewal, Gagandeep Singh Narula, Vishal Jain, Anupam Baliyan
Symmetric Key Encryption Technique: A Cellular Automata Based Approach

A cellular automaton is one of the most engrossing fields of studies. At the present digital world where almost every communication is being done via the Internet, requirement of security and privacy of information is a must. For securing big or small data over Internet, cryptographic techniques are essential. Usage of cellular automata characteristics in the field of cryptography is still not much explored. Here, the paper presents a symmetric key cryptographic technique of block cipher using cellular automata (CA) rules. Proposed methodology has been implemented in C. This cryptographic technique uses non-complemented cellular automata rules and hybrid CA rule vector to form group cellular automata that would be used to encrypt and decrypt the data.

Deepika Parashar, Satyabrata Roy, Nilanjan Dey, Vipin Jain, U. S. Rawat
A Comparative Study on Lightweight Cryptography

The traditional cryptosystem only fulfills the requirements of desktop computing epoch. Renewable lightweight cryptography algorithms are developing to beat the constraints of traditional cryptosystem, which provide tradeoff among cipher sort, attack immune, key size, plaintext length, and performance. The implementation of LWC algorithms is carried out on retaining in the mind that it will be implemented in minimal power consumption, fewer area requirement and also enough efficiency so it turns out to be ideal for such a resource confine devices such as RFID tags and wireless sensor node. In this, we are trying to emerge with frequent LWC algorithms which are grouped into stream cipher, block cipher, and hybrid model, and also reveal them, at the last a comparison is conducted on the effective parameters.

M. U. Bokhari, Shabbir Hassan
GPS Hash Table Based Location Identifier Algorithm for Security and Integrity Against Vampire Attacks

Wireless sensor networks are associated with assorted functional aspects including battery or energy, power, log of neighboring nodes, cache, and number of services. In a network attack, the malicious node or packet attempts to temporarily or permanently halt these parameters so that the authentic and realistic communication can be damaged. Such attacks were previously associated with DDoS attacks which do not allow the authentic user to access the services. Number of algorithms devised against DDoS attacks but very less treatment to the vampire attacks which is more hazardous as it is very difficult for the authentic user to confirm whether there is any attack on network. It consumes battery of node very rapidly which is not identified by the network node. In our proposed algorithm, a unique and effective algorithm for location-based key generation is devised and implemented which makes use of dynamic key exchange based on the location.

S. N. Panda
Data Security Model in Cloud Computing Environment

Cloud computing (CC) has emerged as the next generation of computing in IT Enterprise. Earlier, IT services are under proper physical and personnel control, CC migrates the application softwares and databases to the huge data centers, where the management of data along with services is done by the cloud provider. However, this characteristic poses many security challenges which have not been well understood. This paper focuses on security of data at cloud storage, which has always been a most important issue in CC security. Many approaches have been proposed to protect data in cloud which are not sufficient to meet the requirements of a cloud user. So in this paper, a model for data security at cloud storage site has been proposed.

Meena Kumari, Rajender Nath
Review of CIDS and Techniques of Detection of Malicious Insiders in Cloud-Based Environment

Cloud computing has gained an extreme importance nowadays. Every organization is getting attracted toward the Cloud computing due to its attractive features like cost saving, adaptability, etc. Although it offers the attractive features but still Cloud threats need great consideration. The insider threat is critically challenging in the Cloud-based environments. In order to mitigate from insider attacks in Clouds, the use of Intrusion detection system (IDS) is quite challenging. Every type of IDS has different methods of attack detection. So, single IDS cannot guarantee the protection from all types of attacks. Thus, in this paper, we have studied the various types of IDS and their features which made them either suitable or unsuitable for cloud computing. Also on the basis of review, required features for the Cloud-based IDS are identified.

Priya Oberoi, Sumit Mittal
DNA-Based Cryptography for Security in Wireless Sensor Networks

Wireless sensor networks (WSNs) employ tiny nodes which accumulate information in various applications and security is essential for sensor network applications, such as military target movement, etc. To impart security and privacy to tiny sensor nodes is challenging task due to the restricted capabilities of sensor nodes in terms of computation, communication, memory/storage, and battery power. This paper proposes DNA-based cryptography with the use of secure socket layer. It is exploratory research of biological based cryptosystem. As in conventional cryptography public/private key, pair is used for encryption/decryption process, we herein propose a DNA-based system in which the key pair is generated with the use of RSA algorithm and shared with SSL protocol. So, this proposed system resolves some of the problems related with sensor nodes and here we attain security in three stages, i.e., information security, computation security, and biological security.

Monika Poriye, Shuchita Upadhyaya
Privacy Preservation Using Various Anonymity Models

Need of collection and sharing of data is increasing day by day as it is the requirement of today’s society. While publishing data, one has to guarantee that sensitive information should be made secret so that no one is able to misuse it. For this purpose, one can use various methods and techniques of anonymization. A number of recent researchers are focusing on proposing different anonymity algorithms and techniques to keep published data secret. In this paper, a review of various methods of anonymity with different anonymity operators and various types of linkage attacks has been done. An analysis of the performance of various anonymity algorithms on the basis of various parameters on different data sets using ARX data anonymity software has been done in the end.

Deepak Narula, Pardeep Kumar, Shuchita Upadhyaya
A Hybrid Security Mechanism Based on DCT and Visual Cryptography for Data Communication Networks

To provide security in communication networks, various cryptographic and steganographic algorithms have been proposed. Cryptography converts the data into a form understood only by the receiver node whereas steganography hides the data behind a cover file; generally, an image file is used. To provide better security, the use of hybrid mechanisms has been proposed. In this paper, we try to combine visual cryptography coupled with DCT to provide better security for communication networks. The proposed technique is implemented in MATLAB-12, and the overheads of mixing the two mechanisms are evaluated using several performance metrics such as PSNR, Mean Square Error (MSE), time complexity and Mean Absolute Error (MAE) of the mechanism. The result shows that the proposed technique is far better in terms of security but with some overheads when compared to stand-alone technique DCT.

Yamini Jain, Gaurav Sharma, Gaurav Anand, Sangeeta Dhall
An Advanced Dynamic Authentic Security Method for Cloud Computing

Cloud computing delivers a broad range of services and resources like computational power, storage, computational platforms, and applications to cloud consumers through the Internet by on demand, pay-per-usage basics. With a growing number of cloud service providers resorting to using and sharing resources in the cloud environment, there is a necessity for protecting the data of various users from unauthorized access of information between network and cloud. However, the security and privacy of an open-ended, reasonably sharing of accessible resources is still uncertainty and present a major complication for cloud consumers to acclimatize interested in cloud environment. This manuscript initiates and deeply examines the cloud security problem. This paper deals with the protection concern that includes many of the cloud attacks, data integrity, data leakage, privacy, confidentiality, vulnerabilities during sharing of resources, services, and information. This method deals with securing the cloud information without data loss from malicious users, hackers, and attackers of a real-time environment. This method verifies user authentication and authorization management. It assures security on the transmission of data, quality of service, and prevents vital information from various active and passive attacks. This proficient method preserves the cloud environment with better performance evaluation. Furthermore, security and privacy analysis know the ability of the proposed method for cloud computing and extend productive efficiency with safe cloud computing environments.

S. Srinivasan, K. Raja
Security in CryptDB Using Fine-Grained Access Controls with ECDHE-ZeroVi’s Framework

Cloud Computing is a vast technology with high economic benefits, with low cost, many industries planning to store their information on cloud maintained by a third party are Third-Party Storage provider (TSP). Sometimes curious or malicious administrators may leak data in the TSP. CryptDB provides confidentiality works by executing the user SQL queries about encrypted data using Onion Encryption. Another threat is from cloud users, where they try to secure the systems against external adversaries with a secured user login and secure end-to-end encrypted connections. Though, the internal adversaries remain also the biggest threat from this case. The proposed security method of applying Elliptic Curve Diffie–Hellman Ephemeral in CP-ABE (Cipher Text Attribute-Based Encryption) technique for Key Exchange Policy. CP-ABE is a fine-grained access control with the policy of Attribute Authority (AA) to a user is having Secret Key (SK) based on the set of character attributes. Elliptic Curve Diffie–Hellman Ephemeral is a well-known technique in key exchange policy. Combining CP-ABE with Elliptic Curve Diffie–Hellman Ephemeral is proposed for the ECDHE-ZeroVi’s framework.

Krishna Keerthi Chennam, Akka Laskhmi Muddana, Tahseen Munnavara
Mitigating Cloud Security Threats Using Public-Key Infrastructure

Cloud computing is a very huge entity, as a technology, in recent era, evolving at a very rapid pace. There is a wide progress from mainframe computers toward the client/server infrastructures, including cloud computing deployment models with rudiments from autonomic computing, grid computing, and utility computing. This transition has brought tremendous effects on areas of information security and communications. These effects are majorly viewed positively, but there are some critical issues to be concerned. Due to this major transition toward cloud, various risks and challenges, identified and unidentified, have been discovered weakening the traditional security approaches. For this reason, that paper is aimed twofold: First to evaluate the requirements for cloud security and second is to propose a viable solution which would eradicate major potential threats. The model introduced in this paper will help to demolish network-related threats that arise due to trusted third party. The proposed solution will also enhance cryptography with Public-Key Infrastructure and helps in mitigating security threats. The solution presents a broad way of trusting services that realizes any security threats.

Disha H. Parekh, R. Sridaran
Analysis and Impact of Different Mechanisms of Defending Pass-the-Hash Attacks

Pass-the-hash attack has been around more than 18 years, and founded roots of its first existence were around 1997. The reason for discussing it again now is that it has come into forefront in recent times. And with the usage of Internet and World Wide Web like never before and given the ever increasing use of the Internet (2 billion users in 2011 with forecasts of another billion users coming online in the recent 4 years) and excessive use of ubiquitous devices and computing it has capabilities of affecting the most now. There are always certain machines which are unpatched or those which can have easy to find opening and to get the different privileged accesses through them, and now that cloud-based services are used and major chunk of computers still working on Windows platform, which is most prone to this kind of attack. It becomes a big threat for cloud services providers as well. In this paper, we are trying to focus and understand pass-the-hash attack and also discuss various pros and cons of some of the different approaches. Here, we present results and approaches proposed by various researchers, and also address the strengths and weaknesses of the solutions. Albeit extensive advancement has been made, more research should be done to address this issue. We propose several defense mechanisms here which are first of their kind and if implemented may reduce the repercussions of the attack.

Navjyotsinh Jadeja, Madhuri Vaghasia
Data Security and Encryption Technique for Cloud Storage

In the last few years, we have seen that cloud computing model has been developed as a promising business model of the fastest growing IT sector. Most of the IT companies, organizations, and educational institutes are now realizing that they can put on fast access to daily used computer applications and significantly boost up with infrastructure resources by simply moving to the cloud, at the very negligible cost. But they are also worried about privacy and security of their data, which is placed on the server of service providers. In this paper, we proposed a data security and encryption technique to provide privacy and security to our dynamic cloud data.

Sunil Kumar, Jayant Shekhar, Jatinder Paul Singh
Fine-Grained Access Control and Secured Data Sharing in Cloud Computing

In cloud computing data, outsourcing is one of the most convenient, cost–efficient, and cheapest ways for users to share their data with remote clients. However, the main problem is that the owner loses its physical control on data and so the main challenge is how to secure and share the data efficiently and maintaining fine-grained access control on it. Several approaches have been proposed including attribute-based encryption and proxy re-encryption for secured data sharing through cloud service providers. In this paper, we have given a survey and comparison of different attribute-based encryption and proxy re-encryption techniques. We have also proposed that threshold cyptosystem can be used for secured and efficient data sharing in cloud.

Neha Agarwal, Ajay Rana, J. P. Pandey
Comparative Study of Security Risk in Social Networking and Awareness to Individual

Nowadays, social networking sites are very greatly used and are continuously growing at its peak. The extraordinary use of all the social networking sites mainly Facebook, Twitter, LinkedIn, and Google Plus involve huge amount of data transferred to public daily. This data transfer involves public information such as personal information, education, professional, etc. which leads to security at personal level. Let us see the comparative study of Facebook, Twitter, LinkedIn, and Google Plus for security risk and how effective it is for well-being to society.

Tosal Bhalodia, Chandani Kathad, Keyur Zala
A Key Based Spiral Approach for DNA Cryptography

The present paper provides the conceptual framework on DNA cryptography. A key based spiral technique is proposed which uses the concept of a key to generate a spiral transposition to provide more data security than the existing technique. The existing technique is not much robust against attacks and it uses a fixed spiral. Various attacks can lead to data access to unauthorized users. The proposed technique makes the transformation based on key. The performance comparison between the existing, i.e., DNA sequence dictionary method for securing data in DNA using a fixed spiral transposition and proposed technique, i.e., a key based spiral approach for securing the data, shows that the proposed technique is much better than the existing technique in terms of MSE, PSNR, and percentage of total bit changed and provides more security than the existing technique.

Ekta, Ajit Singh
Permission-Set Based Detection and Analysis of Android Malware

Smartphone industry has become one of the fastest growing technological areas in the past few years. The monotonic growth of Android share market and the diversity among various app sources besides official Google Play Store has attracted attention of malware attacker. To tackle with the problem of increasing number of malicious Android app available at various sources, this paper proposes a novel approach which is based on feature similarity of Android apps. This approach has been implemented by performing static analysis to extract the features from an APK file. Extracted features are useful and meaningful to make efficient training system. This paper proposes a permission-based model which makes use of self-organizing map algorithm. The implemented approach has been analyzed using 1200 heterogeneous Android apps. The proposed approach shows improved results for TPR, FPR, and accuracy.

Aditi Sharma, Amit Doegar
Three-Level GIS Data Security: Conjointly Cryptography and Digital Watermarking

Geographic Information System (GIS) plays a vital role in many applications especially in military operations as they need to be spatial in nature. Successful application of military operations demands for accuracy of information and quick decisions taking steps. GIS has now become the most powerful medium for sharing of military information to officers and commanders. In the era of digital communication, officers use GIS to deliver their strategic plans to intended officers [5]. GIS has proven to be an excellent tool for enforcement and deployment of security mechanisms in military applications and to deliver confidential information at distant locations. In our proposed system, we will introduce a new mechanism to protect GIS data carrying confidential and sensitive data for military and army purpose by combining two of the cryptography algorithms: Advanced Encryption Standard (AES) and RSA with digital watermarking techniques.

Monika Bansal, Akanksha Upadhyaya
Digital Security: An Enigma

The subject security has wide coverage and it is growing with every passing day. As civilization progressed from Agrarian to semi-industrialization, advanced industrialization and finally to present ICT (Information and Communication Technology) age, concerns for security are increasingly taking in all objects from physical to digital. It augmented apprehensions from losing material wealth to most abstract entities like wealth of knowledge in digital form. Today’s technology allows wired and wireless access to tangible and intangible resource-built ups (material to digital), digitally, and steal the same if need arises. The riddle is to defend our own resources from the rapacious hand of ubiquitous computing and communicating technology evolved by us. The art and science of hiding and securing precious resources from possible predators in physical or digital forms make it complex and challenging. The enigma remains in the fact that predator uses same technology and at times also makes rule that prevails over others.

Avijit Dutta
ICMP Flood Attacks: A Vulnerability Analysis

The increasing rate of cyberattacks based on the DDoS principle has created various new areas of concern for information security. It has also raised a pertinent question—Are we protected against such attacks? With significant rise in the number of attacks and resulting reports of high vulnerability to ICMP flood attacks, perhaps we need to reconsider and revisit the pros and cons of the ICMP protocol. In this paper, we mainly focus on giving readers a brief outline of DDoS attacks and its constituents, primarily the ICMP protocol. We also present a survey and the research findings that show the rising vulnerability to ICMP and subsequently DDoS.

Varun Chauhan, Pranav Saini
Statistical Approach Using Meta Features for Android Malware Detection System

In this paper, a static analysis malware detection system based on machine learning techniques and making use of features like hardware components, requested permissions, application components, and filtered intents are extracted from various applications. Prominent features are selected as a part of dimensionality reduction using GSS coefficient and mutual information. Experiment has been evaluated on 3000 malware samples from Drebin dataset and on 1631 benign samples collected from Google Play Store. High ROC curve of 0.998 has been obtained for model developed using individual attributes with overall scanning time of 1.49 s. However, when the optimal features extracted from each category of attributes were aggregated a remarkable improvement in F-measure, i.e., 0.996 was noticed with a low FPR value of 0.003 concluding the fact that the approach can be used to support commercial AV.

Meenu Mary John, P. Vinod
Composite Email Features for Spam Identification

An approach is proposed in this work to search for composite email features by applying a language-specific technique known as NLP (Natural Language Processing) in email spam domain. Different style markers are employed on Enron-spam dataset to capture the nature of emails written by spam and ham email authors. Mainly, features from five categories, consisting of character-based features, word-based features, tag-based, structural features, and Bag-of-Words, are extracted. Dimensionality reduction is applied subsequently using TF–IDF–CF (Term Frequency–Inverse Document Frequency–Class Frequency) feature selection method in order to choose the prominent features from the huge feature space. The experiments are carried out on individual feature as well as composite feature models. A promising performance is produced by composite model with an F-measure of 0.9935 and minimum FPR of 0.0004.

Princy George, P. Vinod
Role of Multiple Encryptions in Biometric Devices

This paper debates about the role of multiple encryptions in biometric devices with a particular focus on the privacy and security benefits of biometric devices. This research paper is proposed to engage a larger number of data users to consider the beneficial role of multiphase encryption in biometric devices with enhanced security solutions. This paper discusses about how multiphase encryption can be promoted with biometric devices in order to overcome the present loopholes of the security devices. In current scenario, wireless security demands to provide an approach for securely verifying the user’s identity, authenticating the data access and certifying the security applications. The security of data has nowadays become challenging issues that comprises areas like data encryption, protected communication channel, and reliable third party to preserve the databases. The immediate growth in the area of information technology, the super-secure communication of confidential data is highly required. Biometrics technology has been extensively used in user’s verification and identification, but there are several security issues to provide adequate security. Therefore, using multiple encryption techniques in biometric devices, we can enhance the data security enormously.

Himanshu Gupta, C. Aka Assoua Anne-Marie
Buffer Overflow and SQL Injection: To Remotely Attack and Access Information

In today’s electronic world where data is accessed through internet, intranet, and extranet, the security of the information is an important issue. Buffer overflow attack in software and SQL injection attack in web application are the two main attacks which are explained in this paper with the aim to make user understand that how unintentional flaws get injected, how these flaws lead to vulnerabilities, and how these vulnerabilities are exploited by the attackers. In this paper, the real-time attack example is also shown with its screenshots step by step.

Mehak Khurana, Ruby Yadav, Meena Kumari
Prime Numbers: Foundation of Cryptography

Prime number plays a very important role in cryptography. There are various types of prime numbers and consists various properties. This paper gives the detail description of the importance of prime numbers in cryptography and algorithms which generates large/strong prime numbers. This paper also focuses on algorithms which find prime factors and tests whether the entered number is prime number or not.

Sonal Sarnaik, Basit Ansari
Steganography: A Survey

Due to the popularity of Internet and communication media, data security is one of the most focused areas of research. Cryptography and steganography are two important disciplines in the area of security. Image steganography is one of the techniques used to hide data inside an innocent image so that it is not visible to an eavesdropper while communication. This is a very useful technique when we transmit data from sender side to the receiver side. Many steganographic methods are suggested by the researchers struggling for good embedding capabilities and imperceptibility. This paper describes a survey on various image steganography techniques in spatial domains with their strengths and weaknesses.

Shilpa Pund-Dange
Comprehensive Methodology for Threat Identification and Vulnerability Assessment in Ad hoc Networks

Ad hoc networks are self-configuring wireless networks without any centralized management. These days, such networks are useful in military application owing to the ease of deployment. The inherent characteristics of these networks introduce new security threats and vulnerabilities that lead to more security attacks as compared to wired and wireless infrastructure networks. For threat identification, a hybrid threat identification methodology is proposed which combines the “Asset centric and Attacker centric” approaches. It takes into account the critical assets present in the network and the adversary capability required for compromising these assets. Further, a vulnerability assessment methodology is proposed under which the network vulnerabilities are analyzed at different levels—Host, Routing Protocol, Node Behavior, and Crypto Algorithms. The proposed methodology has been examined using two different types of scenario-emulated network and real network.

Richa Tyagi, Naveen Kumar Sharma, Kamini Malhotra, Anu Khosla
Hardware Trojans: An Austere Menace Ahead

Hardware Trojans, a relatively unheard threat viz-a-viz the typical software-based malwares and virus attacks that keep betiding across is being realized gradually by the IT security domain including the users, the IT Security professionals, and the corporate sector who all of a sudden discern the immense threat they might already be living in with. A distinctive dormant Hardware Trojan threat can be so flagitious that the victim does not even know if he is effectuated when he might already be. Hardware Trojans are evolving threats that can shake the roots of any set and constituted government or corporate giant for that matter. Unlike Software virus/malware threats, Hardware Trojans are pertinacious in nature. This paper brings out an overview of these threats including classifications, mechanisms they work on and the current set of countermeasures being researched upon.

Anupam Tiwari, Chetan Soni
Cybersecurity for Supervisory Control and Data Acquisition

SCADA stands for Supervisory Control and Data Acquisition, a communication technology which collects data from distant facilities and sends control signals to actuators. A number of factors exist that increases the risk allied with SCADA systems. SCADA components are considered to be profoundly privileged targets for cyberattacks through which hackers can easily hit the nation’s critical infrastructure and economy. This paper investigates security issues of SCADA communication protocols. In order to protect the SCADA networks, we focus on the protocols as they were not designed with inherent security features. This paper emphases on the security system through protocol hardening. The objective is to modify the structure of such protocols to provide more integrity and authentication. In the proposed structure, two algorithms are used to enhance the security and integrity of the payload. They are discussed further in the next six sections.

Sahebrao N. Shinde, Reena P. Shinde
k-Barrier Coverage-Based Intrusion Detection for Wireless Sensor Networks

Wireless sensor networks (WSNs) is an egressing technology having various applications such as in military for surveillance and reconnaissance, in health care for patient monitoring, environmental monitoring, weather monitoring, etc. These networks are vulnerable to different types of security threats such as intrusion. Therefore, intrusion detection is the main issue in sensor networks. It is assumed that mobility of sensors can be advantageous to get improved coverage performance. In this work, we discuss an intrusion detection technique in mobile sensor networks. The performance of the network is analyzed in terms of probability, such as k-barrier coverage probability versus moving intruders. Then, the effect of number of sensors, sensing range of sensors, and the speed of sensors and intruder on the probability of k-barrier coverage is analyzed. Finally, this work proves that the performance of the network can be improved up to a significant order with mobile sensors as compared to that of static sensors.

Jaiprakash Nagar, Sandeep Sharma
Performance Analysis of Vulnerability Detection Scanners for Web Systems

Much work is done in the area of vulnerability detection. However, it is still not sufficient to detect all the vulnerabilities present in a web application. Vulnerability detection scanners are an automated way to check for these vulnerabilities. But even after many improvements their detection rate is very low. In most cases, averaging to 40% detection of vulnerabilities. This rate can be increased when we provide favorable situations to scanners, increasing its detection rate. This work deals with such situations. The selection of best scanner for a given situation. So that detection of vulnerabilities is fulfilled in a more efficient way.

Shailendra Singh, Karan Singh
Performance Evaluation of Multicast Source Authentication Scheme

Multicast is a one to group communication. The applications of multicast are broadcasting stock quotes, videoconferencing, and software distribution. The deployment of efficient and secure communication mechanism is hindered because of the lack of security. There are various schemes such as simple hash scheme, hash tree scheme, and hash tree signature scheme. But these existing approaches also suffer from communication overhead and computation overhead. To solve the major problem of security concern is solved with support of source authentication mechanism. The purpose of our work is to evaluate the performance of multicast source authentication. The objectives of the proposed work are to reduce the communication overhead and computation cost of multicast communication system. The proposed work is implemented in QualNet 5.1.2.

Yogendra Mohan, C. Rama Krishna, Karan Singh
Design and Implementation of a Secure Hierarchical Trust Model for PKI

Public-Key Infrastructure (PKI) provides the authenticity of the public keys for a particular user. The public key is embedded in Digital Certificates. Therefore we tried to develop a specialized Hierarchical Trust Model. In this digital certificates are created using RSA of 2048 bits for key generation and combination of symmetric and asymmetric cryptography for the purpose of the security. As RSA is not suitable for large message encryption, we used AES-128 bit symmetric key for signing the information. The private key is stored locally on Machine, that is why sensitive information is stored as attributes of an Object. The object of a class is converted into Byte Array. This Byte Array is stored in BLOB data type of the database. The data is retrieved from MySQL database from BLOB data type field. This Byte Array is then converted into an object. The required data is extracted from the object.

Sarvesh Tanwar, K. V. Prema
Encryption and Decryption Technique Using Java

In today’s communication era, sharing of data is increasing significantly. The data being transmitted is vulnerable to several approaches. Consequently, the information security is one of the most challenging facts of communication. This research will represent a view on the modern state in the field of encryption, in particular on private key block ciphers which are widely applied for bulk data and connection encryption. Encryption is the contrivance of converting plain text into the cipher text in which plain text is taken the input for the encryption process, and cipher text is considered as the output. Decryption is the mechanism of changing cipher text into the plaintext. This technique runs on any web server or application server. The core thought is to encrypt secret information before transmitting it to interested websites. A J2EE information model is employed to test the integrity of the mechanism.

Ankur Saxena, Neeraj Kaushik, Nidhi Kaushik
Detection and Removal of Security Attacks Using ALARM Protocol in WSN Environment

A mobile ad hoc network comprises many mobile wireless nodes. MANET is a self-configuring network and such network can be organized easily without any base station. MANET can be very efficiently used in salvage-related area, military, and law enforcement. But it faces the issues of security and confidentiality, especially when used in susceptible areas. Safe routing protocols have been refined to provide protection and confidentiality at various levels, e.g., ALARM protocol (Anonymous Location-Aided Routing) provides both privacy features and security, which include data virtue, node verification, and obscurity. This network focuses on achieving the major security objectives which are confidentiality, authentication, authorization, and integrity. In this paper, we have proposed ALARM protocol in WSN environment which uses network time protocol synchronization and removes the malicious node from the network, hence preventing the network from attacks.

Seema Rawat, Praveen Kumar, Bhawna Dhruv
Encryption Technique Using Elliptic Curve Cryptography Through Compression and Artificial Intelligence

This paper is an algorithmic approach to a compression scheme followed by an encryption of the compressed input stream using Elliptic Curve Cryptography (ECC) over prime field. The compression is an Artificial Intelligence (AI) approach where the input stream is fully read, and the repetitive groups in input stream are replaced by some unused character set. Elliptic curve has been chosen as it requires very less key size. The cryptanalysis to find back the private key requires discrete logarithmic approach. In the encryption scheme, first, the required parameters have been chosen to satisfying the equation [4a3 + 27b2 ≠ 0 mod p], where a prime number “p”, which defines the cardinal number of the set. Each “p + 1” elements of the set has been evaluated. Each distinct character in the input stream is reflected to a point over the elliptic curve to deduce a point (xA, yA) using an integer value (K) which has been agreed by both sender and receiver. The receiver of the cipher text chooses a point from the set as the generator point generates public key set using key and is distributed among all the senders. This public key set has used in conjunction with the sender’s private key and the point (xA, yA) to generate the cipher text which has been passed over to the intended recipient. The receiver takes up the cipher text and uses private key to find back the (xA, yA). The actual character from (xA, yA) using K and the original input stream has been evaluated.

Subhranil Som
A Robust Server-Side JavaScript Feature Injection-Based Design for JSP Web Applications Against XSS Vulnerabilities

Cross-Site Scripting (XSS) attack vectors are well-thought-out selected as a serious infection for contemporary HTML5 websites. In this paper, a novel server-side JavaScript feature injection-based design is proposed that relies on the concept of inserting the features of JavaScript in order to discover the variation between the stored and observed features in the HTTP response. In addition to this, injection of context-sensitive sanitization functions has also adopted by our design to detect the XSS attack vectors in HTML websites. The prototype of our design will be developed in Java as a server-side framework, and the experimental results of our proposed design on JSP websites will also be evaluated as further extension.

Shashank Gupta, B. B. Gupta
PHISH-SAFE: URL Features-Based Phishing Detection System Using Machine Learning

Today, phishing is one of the most serious cyber-security threat in which attackers steal sensitive information such as personal identification number (PIN), credit card details, login, password, etc., from Internet users. In this paper, we proposed a machine learning based anti-phishing system (i.e., named as PHISH-SAFE) based on Uniform Resource Locator (URL) features. To evaluate the performance of our proposed system, we have taken 14 features from URL to detect a website as a phishing or non-phishing. The proposed system is trained using more than 33,000 phishing and legitimate URLs with SVM and Naïve Bayes classifiers. Our experiment results show more than 90% accuracy in detecting phishing websites using SVM classifier.

Ankit Kumar Jain, B. B. Gupta
Semantic Security for Sharing Computing Knowledge/Information

Due to the wide deployment of Internet and information technology for storage and processing of data, the ever-growing privacy concern is the major obstacle for information sharing. In the present digital scenario, the information security is of prime concern. With hundreds of terabytes or even Petabytes of data/information floating over around, it is important to have the access to the private sensitive data only to authorized users. The explosive increase in the amount of data/information leads to the growth of data mining techniques, a significant resource for information security. The data mining is the extrication of relevant patterns/ knowledge of information from bulk of data. It provides the variety of applicable techniques, in accordance with the different security issues aroused, to achieve a desired level of privacy. This paper provides a wide survey of the emerging issues in the security field and various privacy-preserving techniques PPDM techniques that can be used to mitigate the increasing security risks and threats. It also centers on analyzing the problem of computation on private information developing new concepts and techniques to deal with emerging privacy issues in various contexts security of information while sharing and exchange using Differential Privacy. Finally presents the challenges and techniques for differential privacy as a trusted path to achieve privacy and discuss some of the theoretical and practical challenges for future work in this area.

Mamta Narwaria, Sangheeta Mishra
Paradigmatic Approach to Cloud Security: Challenges and Remedies

Cloud computing is an amalgamation of resources over the Internet which dynamically allocates capacity and resources without setting up a new physical environment. Enterprises understand the convincing monetary and operational profits provided by cloud computing. Virtualization and usage of pooled IT resources in the cloud environment, provided to the organizations, makes them realize noteworthy cost savings and speeds up deployment of new applications. On the contrary, the valuable benefits of business cannot ajar without comprehending the challenges of data security. This work emphasis on the practices that can be incorporated into the cloud environment to provide enhanced security. It highlights a set of control-based technologies and protocols to provide regulatory consent and protect information, infrastructure, and data applications associated with the use of cloud. This work proposes a design which can be used to control the data, authenticity, and security at all the levels to solve the problem of security in cloud computing environment.

Rana Majumdar, Hina Gupta, Sakshi Goel, Abhishek Srivastava
The Digital Signature Schemes Based on Two Hard Problems: Factorization and Discrete Logarithm

This paper gives the survey of digital signatures, which are based on two hard problems: (1) factorization (FAC) and (2) discrete logarithms (DL). In 1994, L. Harn developed digital signature which is based on this two hard problems. Z. Shao showed the drawback of L. Harn’s scheme and proposed his new scheme. There are various schemes which are based on these two hard problems, because attacker cannot solve both the problems simultaneously.

A. B. Nimbalkar
Gaussian Tendencies in Data Flow in Communication Links

We have modeled data flow in communication link using random motion of a particle, which results in a Gaussian pattern of traffic flow over a period of time. The varying degrees of spectral deviation present a coherent model of data flow for wired links. We have considered multiple link systems and presented an n-dimensional representation of traffic model using a Gaussian function governed by n-parameters. The model opens new insights toward analyzing and predicting bandwidth requirements in communication links and their prospective failure.

Rudra Pratap Ojha, Dharm Raj, Pramod Kumar Srivastava, Goutam Sanyal
Metadaten
Titel
Cyber Security
herausgegeben von
Prof. Dr. M. U. Bokhari
Prof. Dr. Namrata Agrawal
Dr. Dharmendra Saini
Copyright-Jahr
2018
Verlag
Springer Singapore
Electronic ISBN
978-981-10-8536-9
Print ISBN
978-981-10-8535-2
DOI
https://doi.org/10.1007/978-981-10-8536-9