scispace - formally typeset
Search or ask a question
JournalISSN: 0975-2307

International Journal of Network Security & Its Applications 

About: International Journal of Network Security & Its Applications is an academic journal. The journal publishes majorly in the area(s): Encryption & Intrusion detection system. Over the lifetime, 433 publications have been published receiving 4516 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper is a survey of trust based protocols and it proposes some new techniques on trust management in MANETs, a Collection of mobile nodes connected with wireless links.
Abstract: Mobile Ad Hoc Network (MANETs) is a Collection of mobile nodes connected with wireless links. MANET has no fixed topology as the nodes are moving constantly form one place to another place. All the nodes must co-operate with each other in order to route the packets. Cooperating nodes must trust each other. In defining and managing trust in a military MANET, we must consider the interactions between the composite cognitive, social, information and communication networks, and take into account the severe resource constraints (e.g., computing power, energy, bandwidth, time), and dynamics (e.g., topology changes, mobility, node failure, propagation channel conditions). Therefore trust is important word which affects the performance of MANET. There are several protocols proposed based on the trust. This paper is a survey of trust based protocols and it proposes some new techniques on trust management in MANETs.

284 citations

Journal ArticleDOI
TL;DR: This approach uses evolution theory to information evolution in order to filter the traffic data and thus reduce the complexity of Intrusion Detection System (IDS), by applying genetic algorithm (GA) to efficiently detect various types of network intrusions.
Abstract: Nowadays it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions and misuses. So Intrusion Detection Systems have become a needful component in terms of computer and network security. There are various approaches being utilized in intrusion detections, but unfortunately any of the systems so far is not completely flawless. So, the quest of betterment continues. In this progression, here we present an Intrusion Detection System (IDS), by applying genetic algorithm (GA) to efficiently detect various types of network intrusions. Parameters and evolution processes for GA are discussed in details and implemented. This approach uses evolution theory to information evolution in order to filter the traffic data and thus reduce the complexity. To implement and measure the performance of our system we used the KDD99 benchmark dataset and obtained reasonable detection rate.

235 citations

Journal ArticleDOI
TL;DR: This article has discussed about the VANET and its technical and security challenges, some major attacks and solutions that can be implemented against these attacks, and compared the solution using different parameters.
Abstract: Vehicular Ad hoc Networks (VANETs) are the promising approach to provide safety and other applications to the drivers as well as passengers. It becomes a key component of the intelligent transport system. A lot of works have been done towards it but security in VANET got less attention. In this article, we have discussed about the VANET and its technical and security challenges. We have also discussed some major attacks and solutions that can be implemented against these attacks. We have compared the solution using different parameters. Lastly we have discussed the mechanisms that are used in the solutions.

159 citations

Journal ArticleDOI
TL;DR: In this paper, the authors have discussed security risks and concerns in cloud computing and enlightened steps that an enterprise can take to reduce security risks, threats, vulnerabilities, and possible countermeasures.
Abstract: Deploying cloud computing in an enterprise infrastructure bring significant security concerns. Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats, vulnerabilities, and possible countermeasures. We believe enterprise should analyze the company/organization security risks, threats, and available countermeasures before adopting this technology. In this paper, we have discussed security risks and concerns in cloud computing and enlightened steps that an enterprise can take to reduce security risks and protect their resources. We have also explained cloud computing strengths/benefits, weaknesses, and applicable areas in information risk management.

151 citations

Network Information
Related Journals (5)
arXiv: Cryptography and Security
13.3K papers, 117.4K citations
83% related
International Journal of Computer Applications
26.6K papers, 157.4K citations
82% related
Security and Communication Networks
4.6K papers, 41.6K citations
81% related
arXiv: Networking and Internet Architecture
11.5K papers, 113.4K citations
80% related
Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
202112
202014
201924
201813
201720
201621