Journal of network security (vol2, issue2)

11
STM JOURNALS Scientific Technical Medical (JoNS) Network Security Journal of May - August 2014 ISSN: 2321 – 8517

description

 

Transcript of Journal of network security (vol2, issue2)

Page 1: Journal of network security (vol2, issue2)

STM JOURNALSScientific Technical Medical

(JoNS)

Network Security

Journal of

May - August 2014

ISSN: 2321 – 8517

Page 2: Journal of network security (vol2, issue2)

STM Publication, a strong initiative by Consortium E-Learning Network Private ltd.(Estd. 2006) was launched in the

year 2010 under the support and guidance by our esteemed Editorial and Advisory board members from renowned

institutes.

Objectives of STM Publication(s):

?Scientific, Technical and Medical research promotions.

?Publication of genuine Research/Review, Short Articles and Case Studies through proper review

process.

?Publishing Special Issues on Conferences.

?Preparing online platform for other print Journals.

?Empowering the libraries with online and print Journals in Scientific, Technical and Medical

domains.

?Publishing and distribution of books on various subjects which mainly falls in the category of

Nanotechnology, Scientific and technical writing & Environment, Health and Safety.

Salient Features:

?A bouquet of 100+ Journals that fall under Science, Technical & Medical domains.

?Employs Open Journals System (OJS) A Journal Management & Publishing System.

?The first and one of the fastest growing publication website in India as well as in abroad for its quality

and coverage.

?Rapid online submission and publication of papers, soon after their formal acceptance/ finalization.

?Facilitates linking with the other authors or professionals.

?Worldwide circulation and visibility.

Journal of Network Security

Focus and Scope Covers

Journal of Network Security is published (frequency: three times a year) in India by STM Journals (division of

Consortium e-Learning Network Private Ltd. Pvt.) The views expressed in the articles do not necessarily reflect of the

Publisher. The publisher does not endorse the quality or value of the advertised/sponsored products described therein.

Please consult full prescribing information before issuing a prescription for any products mentioned in this publication.

No part of this publication may be reproduced, stored in retrieval system or transmitted in any from without written

permission of the publisher.

To cite any of the material contained in this Journal, in English or translation, please use the full English reference at the

beginning of each article. To reuse any of the material, please contact STM Journals ([email protected])

(ISSN: 2321-8517)

?Internet, Network and Wireless Network Security& Applications

?Mobile, Sensor Network, Database and System Security

?Virus, worms, Trojan Protection, E-mail security, Spam, Phishing and E-mail fraud

?Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)

?Cryptographic protocols

? Intrusion Detection and Prevention

STM Publication(s)

Page 3: Journal of network security (vol2, issue2)

STM Journals (division of Consortium e-Learning Network Private Ltd. ) having its Marketing office located at Office

No. 4, First Floor, CSC pocket E Market, Mayur Vihar Phase II, New Delhi-110091, India is the Publisher of Journal.

Statements and opinions expressed in the Journal reflect the views of the author(s) and are not the opinion of STM

Journals unless so stated.

Subscription Information and Order:

Cost of Journal:

? National Subscription: Rs. 3750/- per Journal (includes 3 print issues), Single Issue copy purchase Rs.1500/copy

? International Subscription:

? Online Only- $99, Print Only-$149 (includes 3 print issues)

? Online + Print-$199 (includes 3 print issues + online access of published back volumes )

To purchase print compilation of back issues please send your query at [email protected]

Subscription must be prepaid. Rates outside the India includes speed delivery charges. Prices subject to change

without notice.

Mode of Payment: At par cheque, Demand draft, and RTGS (payment to be made in favor of

Consortium E-Learning Network. Pvt. ltd., payable at Delhi/New Delhi.

Online Access Policy

A). For Authors:

In order to provide maximum citation and wide publicity to the authors work, STM Journals also have Open Access

Policy, authors who would like to get their work open access can opt for Optional Open Access publication at

nominal cost as follows

India, SARC and African Countries: INR 2500 or 100 USD including single hard copy of Author's Journal.

Other Countries: USD 200 including single hard copy of Author's Journal.

B). For Subscribers:

? Online access will be activated within 72 hours of receipt of the payment (working days), subject to receipt of

correct information on user details/Static IP address of the subscriber.

? The access will be blocked:

? If the user requests for the same and furnishes valid reasons for blocking.

? Due to technical issue.

? Misuse of the access rights as per the access policy.

Advertising and Commercial Reprint Inquiries: STM Journals with wide circulation and visibility offer an excellent

media for showcasing/promotion of your products/services and the events-namely, Conferences, Symposia/Seminars

etc. These journals have very high potential to deliver the message across the targeted audience regularly with each

published issue. The advertisements on bulk subscriptions, gift subscriptions or reprint purchases for distribution etc. are

also very welcome.

Lost Issue Claims: Please note the following when applying for lost or missing issues:

? Claims for print copies lost will be honored only after 45 days of the dispatch date and before publication of the

next issue as per the frequency.

? Tracking id for the speed post will be provided to all our subscribers and the claims for the missing Journals will

be entertained only with the proofs which will be verified at both the ends.

? Claims filed due to insufficient (or no notice) of change of address will not be honored.

? Change of Address of Dispatch should be intimated to STM Journals at least 2 months prior to the dispatch

schedule as per the frequency by mentioning subscriber id and the subscription id.

? Refund requests will not be entertained.

Legal Disputes

All the legal disputes are subjected to Delhi Jurisdiction only.

If you have any questions, please contact the Publication Management Team:

[email protected]; Tel : +91 0120-4781211.

Page 4: Journal of network security (vol2, issue2)

Chairman

Mr. Puneet Mehrotra

Managing Director STM Journals, Consortium eLearning Network Pvt. Ltd.(CELNET)

Noida ,India

Group Managing Editor Dr. Archana Mehrotra

DirectorCELNET, Delhi, India

Puneet Pandeya

ManagerMonika Malhotra

Assistant Manager

Assistant Editors

Aditya Sanyal

Anupama Garg

Himani Pandey

Publication Management Team

Internal Members

External Members

Dr. Bimlesh Lochab

Industrial Tribology Machine Dynamics & Maintenance

Engineering Centre (ITMMEC)

Indian Institute of Technology Delhi, India

Prof. S. Ramaprabhu

Alternative Energy Technology Laboratory,

Department of Physics,

Indian Institute of Technology, Chennai, India

Dr. Rajiv Prakash

School of Materials Science and Technology,

Institute of Technology, Banaras Hindu University,

Varanasi, India

Dr. Rakesh Kumar

Assistant Professor, Department of

Applied Chemistry, BIT Mesra,

Patna, India

Associate Editors

Gargi Asha Jha

Nupur Anand

Priyanka Aswal

Sona Chahal

Page 5: Journal of network security (vol2, issue2)

STM Journal (s) Advisory Board

Dr. Ashish RunthalaLecturer, Biological Sciences Group,

Birla Institute of Technology & Science, Pilani Rajasthan, India.

Dr. Baldev Raj

Former Director, Indira Gandhi Centre for Atomic Research, India.

Chairman, National Institute of Technology Puducherry, India.

Dr. Baskar KaliyamoorthyAssociate Professor, Department

of Civil Engineering National Institute of Technology Trichy, India.

Prof. Bankim Chandra RayProfessor and Head, Department of

Metallurgical and Materials Engineering National Institute of Technology,

Rourkela, India.

Prof. D. N. Rao Professor, Department of Biochemistry,

AIIMS, New Delhi, India.

Prof. Jugal KishoreProfessor, Department of Community

Medicine, Maulana Azad Medical College, New Delhi, India.

Dr. Pankaj PoddarScientist, Physical & Materials ChemistryDivision, National Chemical Laboratory,

Pune, India.

Dr. Hardev Singh VirkProfessor Emeritus, Eternal

University, Baru Sahib, India.

Dr. Nandini Chatterjee SinghAssociate Professor,

National Brain Research Centre, Manesar, India.

Page 6: Journal of network security (vol2, issue2)

Dr. Shankargouda PatilAsst. Prof., Department of Oral

Pathology, KLE Society's Institute of Dental Sciences, Bangalore, India.

Prof. Subash Chandra MishraProfessor, Metallurgical & Materials

Engineering Department, NIT, Rourkela, India.

Prof. Yuwaraj Marotrao GhugalProfessor and Head Department, Govt.College of Engineering Station Road,

Osmanpura, Aurangabad, India.

Prof. Sundara RamaprabhuProfessor, Department of Physics

Indian Institute of Technology Madras, India.

Dr. Shrikant Balkisan DhootHead Research & Development,

Nurture Earth R&D Pvt LtdMIT Campus, Beed bypass road,

Aurangabad, India.

Dr. Rakesh KumarAssistant Professor,

Department of Applied Chemistry, BIT Mesra, Patna, India.

Dr. Priyavrat TharejaHead, Materials and Metallurgical

Engineering department, PEC University of Technology,

Chandigarh, India.

STM Journal (s) Advisory Board

Page 7: Journal of network security (vol2, issue2)

Editorial Board

Dr. Divakar Singh YadavDept. of Computer Science & Engineering,

Institute of Engineering and Technology UP Technical University, Lucknow, India

Maj. Gen Anil kumar Jain Amity University, India

Dr. Mark BurginDept. of Mathematics, UCLA, Los Angeles,

CA 90095, USA, United States

Yaduvir SinghDepartment of Electrical and Instrumentation Engineering,

Thapar University, Patiala Punjab, India

Dr. Gunamani JenaME CSE, PhD, FIE, MIEEE,

LMISTE, MCSI, India

Senthil Kumar A.V.Hindusthan College of Arts

and Science, Coimbatore, India

Dr. Adesh Kumar SharmaNational Dairy Research Institute

(Deemed University), Indian Council of Agriculture, Haryana, India

Prof. Prasanta K. JanaIndian School of Mines, Dhanbad

Dr. B.L. ShivakumarAssoc. Prof., Dept. of Computer Applications,

Sri Ramakrishna Engineering College, NGGO Colony Post, Coimbatore, India

Page 8: Journal of network security (vol2, issue2)

I take the privilege to present the hard copy compilation for the [Volume 2 Issue (2)] Journal of

Network Security (JoNS). The intension of JoNS is to create an atmosphere that stimulates

creativeness, research and growth in the area of Network Security .

The development and growth of the mankind is the consequence of brilliant Research done by

eminent Scientists and Engineers in every field. JoNS provides an outlet for Research findings and

reviews in areas of Network Security found to be relevant for National and International recent

developments & research initiative.

The aim and scope of the Journal is to provide an academic medium and an important reference for

the advancement and dissemination of Research results that support high level learning, teaching and

research in the domain of Network Security .

Finally, I express my sincere gratitude and thanks to our Editorial/ Reviewer board and Authors for

their continued support and invaluable contributions and suggestions in the form of authoring write-

ups/ reviewing and providing constructive comments for the advancement of the journals. With

regards to their due continuous support and co-operation, we have been able to publish quality

Research/Review findings for our customers base.

I hope you will enjoy reading this issue and we welcome your feedback on any aspect of the Journal.

Dr. Archana Mehrotra

Director

STM Journals

Director's Desk

STM JOURNALS

Page 9: Journal of network security (vol2, issue2)

1. Hybrid Model for Adaptive-IDS using Machine Learning Approach V. K. Pachghare, Avinash R. Kshirsagar, Rahul B. Adhao 1

2. A Comprehensive Methodology for Data Security and Privacy in Cloud Computing Systems Abid Hussain Wani 5

ContentsJournal of Network Security

Page 10: Journal of network security (vol2, issue2)

JoNC (2014)© STM Journals 2014. All Rights Reserved

Journal of Network Security ISSN: 2321-8517 (online)

Volume 2, Issue 2

www.stmjournals.com

Hybrid Model for Adaptive-IDS using Machine

Learning Approach

V. K. Pachghare*, Avinash R. Kshirsagar, Rahul B. Adhao Department of Computer Engineering and IT, College of Engineering, Pune, India

Abstract Increasing need and use of internet is encouraging the development of new protocols,

applications, services, etc. Even though these new developments are more robust than the

previous ones, the network attacks are also emerging and are increasing security threat. The intrusion detection systems are not able to detect all types of attacks, so a solution to

this problem is to combine some intrusion detection approaches to cope with the attacks

effectively. An adaptive intrusion detection system takes proper decision to detect attacks properly resulting in high accuracy. The experimentation on proposed system which

combines four approaches indicates enhanced performance.

Keywords: Intrusion detection, adaptability, machine learning, ensemble

Page 11: Journal of network security (vol2, issue2)

JoNC (2014) © STM Journals 2014. All Rights Reserved

Journal of Network Security ISSN: 2321-8517 (online)

Volume 2, Issue 2

www.stmjournals.com

A Comprehensive Methodology for Data Security and

Privacy in Cloud Computing Systems

Abid Hussain Wani* Department of Computer Science, South Campus, University of Kashmir, Srinagar, India

Abstract Cloud computing encompasses computing with a pool of virtualized computer resources. A cloud provides for self-recovering highly-scalable programming models,

workloads to recover from hardware/software failures and rebalance allocations, can host different workloads and allows workloads to be deployed/scaled-out on-demand

by rapid provisioning of virtual or physical machines. The idea is to move desktop

computing to a service-oriented platform using server clusters and huge databases at data centers. Cloud computing has become a standard method of software operation

for many businesses. However, challenges are being faced by both research and

professional cloud computing communities on optimized architectures, quality reliability, data security and privacy fronts. Services offered in cloud computing face

the overwhelming challenges to ensure the proper physical, logical and personnel security controls, especially when considering the fact that cloud computing moves the

application software and databases to the large data centers and in doing so the

management of the data and services may not be fully trustworthy. In this paper, the main focus is given to highlight and investigate the data storage from perspective of

threats and attacks and potential solution strategies. The paper also proposes an

effective and flexible distributed scheme with two salient features, i.e., achieving the integration of storage correctness insurance and data error localization.

Keywords: Cloud computing, security methodology, threats and attacks, storage

correctness, distributed storage system security