journal of network security(vol2, issue1)
DESCRIPTION
ÂTRANSCRIPT
STM JOURNALSScientific Technical Medical
(JoNS)
Network Security
Journal of
(Jan - April 2014)
ISSN 2321 – 8517
STM Publication, a strong initiative by Consortium E-Learning Network Private ltd.(Estd. 2006) was launched in the
year 2010 under the support and guidance by our esteemed Editorial and Advisory board members from renowned
institutes.
Objectives of STM Publication(s):
?Scientific, Technical and Medical research promotions.
?Publication of genuine Research/Review, Short Articles and Case Studies through proper review
process.
?Publishing Special Issues on Conferences.
?Preparing online platform for other print Journals.
?Empowering the libraries with online and print Journals in Scientific, Technical and Medical
domains.
?Publishing and distribution of books on various subjects which mainly falls in the category of
Nanotechnology, Scientific and technical writing & Environment, Health and Safety.
Salient Features:
?A bouquet of 100+ Journals that fall under Science, Technical & Medical domains.
?Employs Open Journals System (OJS) A Journal Management & Publishing System.
?The first and one of the fastest growing publication website in India as well as in abroad for its quality
and coverage.
?Rapid online submission and publication of papers, soon after their formal acceptance/ finalization.
?Facilitates linking with the other authors or professionals.
?Worldwide circulation and visibility.
Journal of Network Security
Focus and Scope Covers
Journal of Network Security is published (frequency: three times a year) in India by STM Journals (division of
Consortium e-Learning Network Private Ltd. Pvt.) The views expressed in the articles do not necessarily reflect of the
Publisher. The publisher does not endorse the quality or value of the advertised/sponsored products described therein.
Please consult full prescribing information before issuing a prescription for any products mentioned in this publication.
No part of this publication may be reproduced, stored in retrieval system or transmitted in any from without written
permission of the publisher.
To cite any of the material contained in this Journal, in English or translation, please use the full English reference at the
beginning of each article. To reuse any of the material, please contact STM Journals ([email protected])
(ISSN: 2321-8517)
?Internet, Network and Wireless Network Security& Applications
?Mobile, Sensor Network, Database and System Security
?Virus, worms, Trojan Protection, E-mail security, Spam, Phishing and E-mail fraud
?Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
?Cryptographic protocols
? Intrusion Detection and Prevention
STM Publication(s)
STM Journals (division of Consortium e-Learning Network Private Ltd. ) having its Marketing office located at Office
No. 4, First Floor, CSC pocket E Market, Mayur Vihar Phase II, New Delhi-110091, India is the Publisher of Journal.
Statements and opinions expressed in the Journal reflect the views of the author(s) and are not the opinion of STM
Journals unless so stated.
Subscription Information and Order:
Cost of Journal:
? National Subscription: Rs. 3750/- per Journal (includes 3 print issues), Single Issue copy purchase Rs.1500/copy
? International Subscription:
? Online Only- $99, Print Only-$149 (includes 3 print issues)
? Online + Print-$199 (includes 3 print issues + online access of published back volumes )
To purchase print compilation of back issues please send your query at [email protected]
Subscription must be prepaid. Rates outside the India includes speed delivery charges. Prices subject to change
without notice.
Mode of Payment: At par cheque, Demand draft, and RTGS (payment to be made in favor of
Consortium E-Learning Network. Pvt. ltd., payable at Delhi/New Delhi.
Online Access Policy
A). For Authors:
In order to provide maximum citation and wide publicity to the authors work, STM Journals also have Open Access
Policy, authors who would like to get their work open access can opt for Optional Open Access publication at
nominal cost as follows
India, SARC and African Countries: INR 2500 or 100 USD including single hard copy of Author's Journal.
Other Countries: USD 200 including single hard copy of Author's Journal.
B). For Subscribers:
? Online access will be activated within 72 hours of receipt of the payment (working days), subject to receipt of
correct information on user details/Static IP address of the subscriber.
? The access will be blocked:
? If the user requests for the same and furnishes valid reasons for blocking.
? Due to technical issue.
? Misuse of the access rights as per the access policy.
Advertising and Commercial Reprint Inquiries: STM Journals with wide circulation and visibility offer an excellent
media for showcasing/promotion of your products/services and the events-namely, Conferences, Symposia/Seminars
etc. These journals have very high potential to deliver the message across the targeted audience regularly with each
published issue. The advertisements on bulk subscriptions, gift subscriptions or reprint purchases for distribution etc. are
also very welcome.
Lost Issue Claims: Please note the following when applying for lost or missing issues:
? Claims for print copies lost will be honored only after 45 days of the dispatch date and before publication of the
next issue as per the frequency.
? Tracking id for the speed post will be provided to all our subscribers and the claims for the missing Journals will
be entertained only with the proofs which will be verified at both the ends.
? Claims filed due to insufficient (or no notice) of change of address will not be honored.
? Change of Address of Dispatch should be intimated to STM Journals at least 2 months prior to the dispatch
schedule as per the frequency by mentioning subscriber id and the subscription id.
? Refund requests will not be entertained.
Legal Disputes
All the legal disputes are subjected to Delhi Jurisdiction only.
If you have any questions, please contact the Publication Management Team:
[email protected]; Tel : +91 0120-4781211.
Chairman
Mr. Puneet Mehrotra
Managing Director STM Journals, Consortium eLearning Network Pvt. Ltd.(CELNET)
Noida ,India
Group Managing Editor Dr. Archana Mehrotra
DirectorCELNET, Delhi, India
Puneet Pandeya
ManagerMonika Malhotra
Assistant Manager
Assistant Editors
Aditya Sanyal
Himani Garg
Himani Pandey
Publication Management Team
Internal Members
External Members
Dr. Bimlesh Lochab
Industrial Tribology Machine Dynamics & Maintenance
Engineering Centre (ITMMEC)
Indian Institute of Technology Delhi, India
Prof. S. Ramaprabhu
Alternative Energy Technology Laboratory,
Department of Physics,
Indian Institute of Technology, Chennai, India
Dr. Rajiv Prakash
School of Materials Science and Technology,
Institute of Technology, Banaras Hindu University,
Varanasi, India
Dr. Rakesh Kumar
Assistant Professor, Department of
Applied Chemistry, BIT Mesra,
Patna, India
Associate Editors
Gargi Asha Jha
Nupur Anand
Priyanka Aswal
Sona Chahal
STM Journal (s) Advisory Board
Dr. Ashish RunthalaLecturer, Biological Sciences Group,
Birla Institute of Technology & Science, Pilani Rajasthan, India.
Dr. Baldev RajDistinguished Scientist & Director,
Indira Gandhi Centre for Atomic Research
(ICGAR)Kalpakkam, India.
Dr. Baskar KaliyamoorthyAssociate Professor, Department
of Civil Engineering National Institute of Technology Trichy, India.
Prof. Bankim Chandra RayProfessor and Head, Department of
Metallurgical and Materials Engineering National Institute of Technology,
Rourkela, India.
Prof. D. N. Rao Professor, Department of Biochemistry,
AIIMS, New Delhi, India.
Prof. Jugal KishoreProfessor, Department of Community
Medicine, Maulana Azad Medical College, New Delhi, India.
Dr. Pankaj PoddarScientist, Physical & Materials ChemistryDivision, National Chemical Laboratory,
Pune, India.
Dr. Hardev Singh VirkProfessor Emeritus, Eternal
University, Baru Sahib, India.
Dr. Nandini Chatterjee SinghAssociate Professor,
National Brain Research Centre, Manesar, India.
Dr. Shankargouda PatilAsst. Prof., Department of Oral
Pathology, KLE Society's Institute of Dental Sciences, Bangalore, India.
Prof. Subash Chandra MishraProfessor, Metallurgical & Materials
Engineering Department, NIT, Rourkela, India.
Prof. Yuwaraj Marotrao GhugalProfessor and Head Department, Govt.College of Engineering Station Road,
Osmanpura, Aurangabad, India.
Prof. Sundara RamaprabhuProfessor, Department of Physics
Indian Institute of Technology Madras, India.
Dr. Shrikant Balkisan DhootHead Research & Development,
Nurture Earth R&D Pvt LtdMIT Campus, Beed bypass road,
Aurangabad, India.
Dr. Rakesh KumarAssistant Professor,
Department of Applied Chemistry, BIT Mesra, Patna, India.
Dr. Priyavrat TharejaHead, Materials and Metallurgical
Engineering department, PEC University of Technology,
Chandigarh, India.
STM Journal (s) Advisory Board
Editorial Board
Dr. Divakar Singh YadavDept. of Computer Science & Engineering,
Institute of Engineering and Technology UP Technical University, Lucknow, India
Maj. Gen Anil kumar Jain Amity University, India
Dr. Mark BurginDept. of Mathematics, UCLA, Los Angeles,
CA 90095, USA, United States
Yaduvir SinghDepartment of Electrical and Instrumentation Engineering,
Thapar University, Patiala Punjab, India
Dr. Gunamani JenaME CSE, PhD, FIE, MIEEE,
LMISTE, MCSI, India
Senthil Kumar A.V.Hindusthan College of Arts
and Science, Coimbatore, India
Dr. Adesh Kumar SharmaNational Dairy Research Institute
(Deemed University), Indian Council of Agriculture, Haryana, India
Prof. Prasanta K. JanaIndian School of Mines, Dhanbad
Dr. B.L. ShivakumarAssoc. Prof., Dept. of Computer Applications,
Sri Ramakrishna Engineering College, NGGO Colony Post, Coimbatore, India
I take the privilege to present the hard copy compilation for the [Volume 2 Issue (1)] Journal of
Network Security (JoNS). The intension of JoNS is to create an atmosphere that stimulates
creativeness, research and growth in the area of Network Security .
The development and growth of the mankind is the consequence of brilliant Research done by
eminent Scientists and Engineers in every field. JoNS provides an outlet for Research findings and
reviews in areas of Network Security found to be relevant for National and International recent
developments & research initiative.
The aim and scope of the Journal is to provide an academic medium and an important reference for
the advancement and dissemination of Research results that support high level learning, teaching and
research in the domain of Network Security .
Finally, I express my sincere gratitude and thanks to our Editorial/ Reviewer board and Authors for
their continued support and invaluable contributions and suggestions in the form of authoring write-
ups/ reviewing and providing constructive comments for the advancement of the journals. With
regards to their due continuous support and co-operation, we have been able to publish quality
Research/Review findings for our customers base.
I hope you will enjoy reading this issue and we welcome your feedback on any aspect of the Journal.
Dr. Archana Mehrotra
Director
STM Journals
Director's Desk
STM JOURNALS
1. An Approach to Develop Secure Ear Biometric System Md. Rabiul Islam, Md. Mostafizur Rahman, Rizoan Toufiq 1
2. Behavioral Prediction of Network Attacks Using Honeypot Rules Saranya K 7
3. Detection of Distributed Denial of Service Attack by Hidden Markov Model through Web Proxy System A. Aafreen, Kannan Balasubramanian 13
4. Performance Analysis of AODV, DSR and CGSR Routing Protocol in MANET based on Energy Consumption Priyanka Bansal, Jawahar Thakur 21
5. Prediction of Phishing Website using Visual Cryptography P. Suryaprabha, A. Anny Leema 28
ContentsJournal of Network Security
JoNS (2014)© STM Journals 2014. All Rights Reserved
Journal of Network Security ISSN: 2321-8517
Volume 2, Issue 1
www.stmjournals.com
An Approach to Develop Secure Ear Biometric System
Md. Rabiul Islam*, Md. Mostafizur Rahman, Rizoan Toufiq Department of Computer Science & Engineering, Rajshahi University of Engineering and
Technology, Rajshahi, Bangladesh
Abstract Biometrics is now the significant identification process for security system. The future
of biometrics is surely leads to a system because the acquisition process for biometrics
is very simple. Ear biometrics has an important role on biometrics system. Because it is a passive biometrics system which means that the user does not have to take active part
in the whole process. The most interesting human anatomical parts for such passive,
physiological biometrics systems based on images acquired from cameras are face and ear. This paper introduces to ear biometrics as a passive human identification systems.
Using two different methods and comparison between them help anyone to find the best
ear biometrics method. Geometrical method of feature extraction from human ear
images in order to perform human identification is presented with the help of two
different edge detection algorithms.
Keywords: Biometrics, ear identification, passive biometrics, geometrical method
JoNS (2014) STM Journals 2014. All Rights Reserved
Journal of Network Security ISSN: 2321-8517
Volume 2, Issue 1
www.stmjournals.com
Behavioral Prediction of Network Attacks
Using Honeypot Rules
Saranya K* B. S. Abdur Rahman University, Vandlur, Chennai, India
Abstract In this paper is presented an approach for behavioral prediction of network attacks using
honeypot rules using support physical machine as a classification technique. The
proposed honeypot is used to trap delay and gather information about the attackers. These systems are centralized at a strategic point in the network and collect data into a
log file that is subsequently analyzed as main vulnerability. Honeypots can generate the signature with the help of attack classifier, and it can detect and record known and
unknown attacks in addition. Signature-based classifier uses Bayesian classification
algorithm to represent malicious file or normal file. Therefore, the IP addresses correspond to higher chances for detecting intruders as more fake systems would be
mined in the network.
Keywords: Honeypot, attacks defined, signature generation, malicious, non-
malicious, IP blacklisting
JoNS (2014) 13-20 © STM Journals 2014. All Rights Reserved Page 13
Journal of Network Security ISSN: 2321-8517
Volume 2, Issue 1
www.stmjournals.com
Detection of Distributed Denial of Service Attack by
Hidden Markov Model through Web Proxy System
A. Aafreen*, Kannan Balasubramanian Mepco Schlenk Engineering College, Mepco Schlenk Engineering College, Sivakasi,
Tamilnadu, India
Abstract Nowadays the attack against the computer system is becoming very common and vulnerable. Indirect web proxy distributed denial of service attack is an increasingly
common internet phenomenon and is capable of making the internet services unavailable.
Such type of attacks cannot be easily discovered by most existing defense systems since malicious traffic is hidden in the aggregated traffic. Also the source of the attack traffic
and normal traffic cannot be distinguished because both of them share the same IP of the
proxy server. To overcome this problem, a new improved hidden semi-Markov model is proposed. Therefore, applying this proposed method protects the origin server from the
web proxy-based HTTP attacks. Web proxy’s access behavior can be regarded as the combination of the externally observable behavior and the internal driving mechanism.
The internal driving mechanism can be estimated by the observable features of proxy-to-
server traffic through the hidden semi-Markov model. Hidden semi-Markov model describes the dynamic behavior process of the aggregated traffic. The false positive rate
is also detected with respect to the incoming traffic.
Keywords: Traffic analysis, traffic modeling, distributed denial of service attack,
attack detection, attack response
JoNS (2014)© STM Journals 2014. All Rights Reserved
Journal of Network Security ISSN: 2321-8517
Volume 2, Issue 1
www.stmjournals.com
Performance Analysis of AODV, DSR and CGSR
Routing Protocol in MANET based on
Energy Consumption
Priyanka Bansal*, Jawahar Thakur Department of Computer Science, HPU Shimla, India
Abstract
Mobile Ad-hoc networks (MANET) have gained lots of attention in researches in recent
years, especially in routing protocols due to their dynamic nature. There are number of
routing protocols in MANET networks and performance of these routing protocols have been evaluated focusing on metrics such as delay, packet delivery, routing
overhead, throughput. However, not much work has been done to evaluate energy aspect of these routing protocols. Design new energy efficient routing algorithms are
based on this basic MANET routing protocols is the latest research area in MANET
and WSN. This paper will discuss the performance analysis of Dynamic Source Routing (DSR),Ad-hoc On-Demand Distance Vector(AODV) and Cluster-Gate routing
protocol(CGSR) routing protocol in MANET based on energy consumption. A detailed simulation model using OMNeT++4.3 with different mobility and traffic models are
used to study their energy consumption. Finally, an evaluation of these routing
protocols based on energy consumption is presented.
Keywords: Mobile Ad hoc network (MANET), routing protocols, energy
consumption, AODV, DSR, CGSR
JoNS (2014) © STM Journals 2014. All Rights Reserved
Journal of Network Security ISSN: 2321-8517
Volume 2, Issue 1
www.stmjournals.com
Prediction of Phishing Website using Visual Cryptography
P. Suryaprabha*, A. Anny Leema BS Abdur Rahman University, Chennai, India
Abstract Phishing is a new type of social network attack. It is the act of attempting to acquire the information such as username, password, credit card details, etc. In this project, a new
approach named as “Image Captcha Based Authentication Using Visual Cryptography”
to solve the problem of phishing is proposed. The string is converted into image captcha using the extracting and embedding method. The visual cryptography is used to preserve
the privacy of image captcha by decomposing the original image captcha into two shares
using VCS (2*2). One of the shares is kept with the user and the other is kept in the server side. The user has to enter the user name and upload his share in the login phase.
If the site is legitimate, it will display the image captcha and on the other hand image captcha will not be displayed if the website is fraudulent. This work is implemented in
Java as front-end and SQL as backend. This work helps to identify the phishing site and
the textual keyword validation along with visual cryptography.
Keywords: Phishing, embedded EVCS, luminance method, visual cryptography
scheme