scispace - formally typeset
Search or ask a question
JournalISSN: 1816-353X

International Journal of Network Security 

About: International Journal of Network Security is an academic journal. The journal publishes majorly in the area(s): Encryption & Authentication. It has an ISSN identifier of 1816-353X. Over the lifetime, 883 publications have been published receiving 14568 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: Although the feature of blockchain technologies may bring us more reliable and convenient services, the security issues and challenges behind this innovative technique is also an important topic that the authors need to concern.
Abstract: Blockchain technologies is one of the most popular issue in recent years, it has already changed people's lifestyle in some area due to its great influence on many business or industry, and what it can do will still continue cause impact in many places Although the feature of blockchain technologies may bring us more reliable and convenient services, the security issues and challenges behind this innovative technique is also an important topic that we need to concern

756 citations

Journal Article
TL;DR: An anomaly detection scheme using dynamic training method in which the training data is updated at regular time intervals is proposed and the simulation results show the effectiveness of the scheme compared with conventional scheme.
Abstract: This paper analyzes the blackhole attack which is one of the possible attacks in ad hoc networks. In a blackhole attack, a malicious node impersonates a destination node by sending a spoofed route reply packet to a source node that initiates a route discovery. By doing this, the malicious node can deprive the traffic from the source node. In order to prevent this kind of attack, it is crucial to detect the abnormality occurs during the attack. In conventional schemes, anomaly detection is achieved by defining the normal state from static training data. However, in mobile ad hoc networks where the network topology dynamically changes, such static training method could not be used efficiently. In this paper, we propose an anomaly detection scheme using dynamic training method in which the training data is updated at regular time intervals. The simulation results show the effectiveness of our scheme compared with conventional scheme.

453 citations

Journal Article
TL;DR: A reputation-based trust management protocol for P2P networks where users rate the reliability of parties they deal with, and share this information with their peers to establish trust among good peers as well as identifying the malicious ones.
Abstract: The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper we describe a reputation-based trust management protocol for P2P networks where users rate the reliability of parties they deal with, and share this information with their peers. The protocol helps establish trust among good peers as well as identifying the malicious ones. Results of various simulation experiments show that the proposed system can be highly effective in preventing the spread of malicious content in P2P networks.

274 citations

Journal ArticleDOI
TL;DR: The aim of this paper is to define the purpose of reversible watermarking, reflecting recent progress, and provide some research issues for the future.
Abstract: Over the past few years a number of research papers about reversible watermarks has been produced. Reversible watermarking is a novel category of watermarking schemes. It not only can strengthen the ownership of the original media but also can completely recover the original media from the watermarked media. This feature is suitable for some important media, such as medical and military images, because these kinds of media do not allow any losses. The aim of this paper is to define the purpose of reversible watermarking, reflecting recent progress, and provide some research issues for the future.

224 citations

Journal ArticleDOI
TL;DR: A review on current trends in intrusion detection together with a study on technologies implemented by some researchers in this research area are provided.
Abstract: With recent advances in network based technology and increased dependability of our every day life on this technology, assuring reliable operation of network based systems is very important. During recent years, number of attacks on networks has dramatically increased and consequently interest in network intrusion detection has increased among the researchers. This paper provides a review on current trends in intrusion detection together with a study on technologies implemented by some researchers in this research area. Honey pots are effective detection tools to sense attacks such as port or email scanning activities in the network. Some features and applications of honey pots are explained in this paper.

218 citations

Network Information
Related Journals (5)
arXiv: Cryptography and Security
13.3K papers, 117.4K citations
84% related
Computers & Electrical Engineering
5.2K papers, 82.1K citations
84% related
IACR Cryptology ePrint Archive
15.2K papers, 222.4K citations
84% related
Wireless Personal Communications
11.6K papers, 120.3K citations
83% related
Wireless Networks
3.4K papers, 102.4K citations
82% related
Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
20211
202011
20192
201811
201752
2016129