scispace - formally typeset
Search or ask a question

Showing papers in "International journal of security and its applications in 2013"


Journal ArticleDOI
TL;DR: Experimental results demonstrate 98% detection rate and 0% false positive rate for the proposed malware detection system and the graph matching algorithm is based on Longest Common Subsequence (LCS) algorithm which is used on the simplified graphs.
Abstract: Malware stands for malicious software. It is software that is designed with a harmful intent. A malware detector is a system that attempts to identify malware using Application Programming Interface (API) call graph technique and/or other techniques. Matching the API call graph using graph matching algorithm have NP-complete problem and is slow because of computational complexity .In this study, a malware detection system based on API call graph is proposed. Each malware sample is represented as data dependent API call graph. After transforming the input sample into a simplified data dependent graph, graph matching algorithm is used to calculate similarity between the input sample and malware API call graph samples stored in a database. The graph matching algorithm is based on Longest Common Subsequence (LCS) algorithm which is used on the simplified graphs. Such strategy reduces the computation complexity by selecting paths with the same edge label in the API call graph. Experimental results on 85 samples demonstrate 98% detection rate and 0% false positive rate for the proposed malware detection system.

69 citations


Journal ArticleDOI
TL;DR: An assessment methodology is presented to analyze the performance of dierent rewalls platforms and the level of knowledge among the educated category in the community, represented by a sample of college students, on the importance of rewall and their use.
Abstract: Firewalls are an essential part of any information security system being the rst defense line against security attacks. The sea-saw eect between rewalls and network performance is most concerning to network users; where strict security settings result in weak network performance and permeant security settings allow for a stronger one. Hence, evaluating rewall platforms and their impact on network performance is important when assessing the eectiveness of network security. In this paper, we present an assessment methodol- ogy to analyze the performance of dierent rewalls platforms. The analysis considers the following metrics: delay, jitter, throughput, and packet loss. Moreover, the information security of the rewalls is also tested by applying a set of attacks and observing the reaction of the rewalls. The proposed assessment methodology is tested by performing real exper- iments on dierent types of rewalls including those that are personal and network-based. Moreover, a quantitative study is conducted to explore the level of knowledge among the educated category in the community, represented by a sample of college students, on the importance of rewall and their use.

39 citations


Journal ArticleDOI
TL;DR: This paper proposes designated verifier provable data possession (DV-PDP), a scheme that removed expensive bilinear computing from public clouds and is provable secure and high efficiency.
Abstract: Cloud storage is now an important development trend in information technology. However, information security has become an important problem to impede it for commercial application, such as data confidentiality, integrity, and availability. In this paper, we propose designated verifier provable data possession (DV-PDP). In public clouds, DV-PDP is a matter of crucial importance when the client cannot perform the remote data possession checking. We study the DV-PDP system security model and use ECC-based homomorphism authenticator to design DV-PDP scheme. The scheme removed expensive bilinear computing. Moreover in DV-PDP scheme, the cloud storage server is stateless and independent from verifier, which is an important secure property in PDP schemes. Through security analysis and performance analysis, our scheme is provable secure and high efficiency.

33 citations


Journal Article
TL;DR: A novel data integrity protection strategy based on digital watermarking technologies, where source sensors use a one-way hash function for collected data to create watermark information, and then make it associated with the data by embedding it into the redundant space of the targeted bytes.
Abstract: Wireless sensor networks are self-organized and data-centric, which have been well applied in many practical areas. But in these applications, data integrity from sensors has not been verified. Thereby in this paper, we have proposed a novel data integrity protection strategy based on digital watermarking technologies, mwhere source sensors use a one-way hash function for collected data to create watermark information, and then make it associated with the data by embedding it into the redundant space of the targeted bytes. At the base station side, a watermarking algorithm is designed to extract the watermarking information, which is compared to recalculated watermarking information to verify the integrity of the data during the transmission. Compare to other watermarking methods, our algorithm does not increase extra data storage space and remain data accuracy. According to the results of extensive experiments, our algorithm can effectively protect the integrity of the data and has more application values.

31 citations


Journal Article
Jin Wang, Zhongqi Zhang, Kaijie Xu, Yue Yin, Guo Ping 
TL;DR: A survey about some researches in the domain of e-healthcare for its data security and privacy issues, such as the security issues of the distributed data storage in wireless body area networks (WBANs) and the privacy of the patient-related information stored in the database of the medical organization systems.
Abstract: Recently, with the rapid development and implementation of wireless medical sensors, electronic healthcare (e-healthcare) has gained increasing popularity. Monitor and record some vital parameters of patients are of importance to know the patient’s health condition. But malicious attacks happen occasionally, which may cause the patient-related data being leaked or modified. In this paper, we made a survey about some researches in the domain of e-healthcare for its data security and privacy issues, such as the security issues of the distributed data storage in wireless body area networks (WBANs) and the privacy of the patient-related information stored in the database of the medical organization systems. We also proposed a general three-tier medical architecture and discussed its security issues in detail. Finally, we concluded some of the achievements from our references.

29 citations


Journal Article
TL;DR: A robust Hill algorithm (Hill++) is proposed which is an extension of the Affine Hill cipher and a random matrix key is introduced as an extra key for encryption and an involuntary matrix key formulation is also implemented in the proposed algorithm.
Abstract: The Hill cipher is the first polygraph cipher which has some advantages in symmetric data encryption. However, it is vulnerable to known plaintext attack. Another setback is that an invertible key matrix is needed for decryption and it is not suitable for encrypting a plaintext consisting of zeroes. The objective of this work is to modify the existing Hill cipher to overcome these three issues. Studies on previous results showed that the existing Hill algorithms are not yet sufficient. Some of these algorithms are still vulnerable to known plaintext attack. On the other hand, some of these algorithms have better randomization properties and as a result they are more resistant against known plaintext attack. Nevertheless, these enhanced Hill cipher algorithms still face the non invertible key matrix problem. Moreover, neither of these algorithms are suitable for all zeroes plaintext block encryption. In this paper, a robust Hill algorithm (Hill++) is proposed. The algorithm is an extension of the Affine Hill cipher. A random matrix key is introduced as an extra key for encryption. Moreover, an involuntary matrix key formulation is also implemented in the proposed algorithm. This formulation can produce an involuntary key where a same key can be used for both encryption and decryption. Testing on the proposed algorithm is carried out via two approaches, that is through comparative study and statistical analysis. Comparative study shows that Hill++ is resistant to all zeroes plaintext block encryption and does not face the non invertible key matrix problem as what was faced by the original Hill, AdvHill and HillMRIV algorithms. Apart from this, the encryption quality of the proposed algorithm is also measured by using the maximum deviation and correlation coefficient factors. Results from statistical analysis shows that Hill++ (when compared to Hill, AdvHill and HillMRIV algorithms) has the greatest maximum deviation value and its correlation coefficient value is the closest to zero. The results from these two measures proved that Hill++ has better encryption quality compared to HillMRIV.

20 citations


Journal Article
TL;DR: A brief description and classification of different graphical password schemes followed by information about vulnerabilities in the various schemes and recommendations for future development are given.
Abstract: Graphical Authentication Systems are a potential replacement or supplement for conventional authentication systems. Several studies have suggested graphical authentication may offer greater resistance to guessing and capture attacks but there are other attacks against graphical authentication including social engineering, brute force attacks, shoulder surfing, intercepted communication and spyware. In this paper we give a brief description and classification of different graphical password schemes followed by information about vulnerabilities in the various schemes and recommendations for future development.

19 citations


Journal ArticleDOI
TL;DR: This paper proposes a tamper detection and image recovery method for digital images that not only locates the alterations but also recovers the tamper regions.
Abstract: This paper proposes a tamper detection and image recovery method for digital images. The proposed method not only locates the alterations but also recovers the tamper regions. In this method, the vector quantization scheme is employed to generate the authentication data. The image to be protected is first compressed by the vector quantization scheme to generate the indices for image blocks. Multi-copies of the indices are embedded into the selected blocks by the pseudo random number generator. To detect the tamper regions, the authenticaiton procedure employes the forward detection strategy and the backward detection mechanism to find out the image modifications. The tamper regions can then be recovered by using the authentication data that was embeded previously if needed. From the experimental results, it is shown that the tamper regions can be clearly detected and well recovered.

18 citations


Journal ArticleDOI
TL;DR: Empirical results obtained from Java implementation of Elliptic curve Cryptosystem (ECC) indicate that ECC outperforms the other encryption/decryption algorithms considered in this study regarding the security strength, speed, and key size of ECC.
Abstract: In this paper we present empirical results obtained from Java implementation of Elliptic curve Cryptosystem (ECC) as an asymmetric block cipher algorithm and a set of symmetric block cipher algorithms namely Triple-Data Encryption Standard (T-DES), Advanced Encryption Standard (AES), and Blowfish. Performance evaluation based on CPU execution time is presented under WinXP and Linux. We used in our implementation Java programming language, Java Cryptography Architecture (JCA) and Java Cryptography Extension (JCE). The evaluation of the performance of these algorithms is done for secret key generation and encryption and decryption operations. Results indicated that ECC outperforms the other encryption/decryption algorithms considered in this study regarding the security strength, speed, and key size of ECC. Also, ECC’s performance advantage increases as security needs increases for newly emerging applications.

16 citations


Journal ArticleDOI
TL;DR: The experimental results show that the distortion is the minimum in five neighbor differencing, but the theoretical studies reveal that the hiding capacity is the highest in eight neighbor differeNcing.
Abstract: In this paper a pixel value differencing steganography based on the maximum difference of the neighboring pixel values have been proposed. There are four variants such as five, six, seven and eight neighbor differencing. In five neighbor differencing method the maximum difference amongst the five neighboring pixels such as upper, left, right, bottom and upperright corner are used to take embedding decision. In six neighbor differencing method the maximum difference amongst the six neighboring pixels such as upper, left, right, bottom, upper-right corner, and upper-left corner are used to take embedding decision. In seven neighbor differencing method the maximum difference amongst the seven neighboring pixels such as upper, left, right, bottom, upper-right corner, upper-left corner and bottom-left corner are used to take embedding decision. In eight neighbor differencing method the maximum difference amongst all the eight neighboring pixels are used to take embedding decision. The message extraction process is very simple and does not require any knowledge of the original image. The experimental results show that the distortion is the minimum in five neighbor differencing. But the theoretical studies reveal that the hiding capacity is the highest in eight neighbor differencing.

15 citations


Journal Article
TL;DR: An empirical evaluation of three text-based metrics to identify obfuscated code shows that the effectiveness of these metrics depends on the obfuscators, and proposes a combination of these three metrics and shows how this combination outperforms the individual metrics.
Abstract: Protecting data and applications from malware and other forms of malicious code has assumed a great relevance in the current era of pervasive web-based applications. Attackers often use code obfuscation to hide harmful programs from automatic detection. Several researchers have proposed methods to classify an unknown program as malicious or benign; however, little work has been done to identify obfuscated code. A promising approach to detect obfuscated code consists of using a set of metrics, collected by static analysis, to classify a program. In this paper we present an empirical evaluation of three text-based metrics to identify obfuscated code. Our experiment shows that the effectiveness of these metrics depends on the obfuscators: there are cases in which the metrics allow the proliferation of false positives (i.e., misclassification of clear code as obfuscated code), which is bothering but not dangerous, and cases where false negatives (i.e. misclassification of obfuscated as clear code) proliferate, which is definitely more dangerous. Based on our experiment, we propose a combination of these three metrics and show how this combination outperforms the individual metrics.

Journal ArticleDOI
TL;DR: The result of the emulation experiment in KDD99 data set indicates that this algorithm can effectively improve intrusion detection precision, and it has higher generalization and stability.
Abstract: Intrusion detection data often have some characteristics such as nonlinearity, higher dimension, much redundancy and noise, and partial continuous-attribute. This paper presents a new ensemble algorithm to improve intrusion detection precision. Firstly, it generates multiple training subsets in difference by using bootstrap technology. Then using neighborhood rough sets with different radiuses to make attribute reduction in these subsets, obtained the training subsets with greater difference, while Particle Swarm Optimization is used to optimize parameters of support vector machine in order to get base classifiers with greater difference and higher precision. Finally, the above base classifiers were integrdinedd by weighted synthesis method. The result of the emulation experiment in KDD99 data set indicates that this algorithm can effectively improve intrusion detection precision ,and it has higher generalization and stability.

Journal ArticleDOI
TL;DR: This paper presents a static heuristics based approach for the detection of packed executables, and brings out difficulties in detecting packed DLL, CLR and Debug mode executables via header analysis.
Abstract: Malware authors evade the signature based detection by packing the original malware using custom packers. In this paper, we present a static heuristics based approach for the detection of packed executables. We present 1) the PE heuristics considered for analysis and taxonomy of heuristics; 2) a method for computing the score using power distance based on weights and risks assigned to the defined heuristics; and 3) classification of packed executable based on the threshold obtained with the training data set, and the results achieved with the test data set. The experimental results show that our approach has a high detection rate of 99.82% with a low false positive rate of 2.22%. We also bring out difficulties in detecting packed DLL, CLR and Debug mode executables via header analysis.

Journal ArticleDOI
TL;DR: In this article, the security of Business Ecommerce is elaborate from the aspect of VLAN, application layer, session layer, dynamic password, symmetric key encryption and encryption of communication stack.
Abstract: In the process of transmitting Business E-commerce information, there are various risks that can put it at stake at any time. So in this article, for the purpose of ensuring the security of the devices, operating systems and data transaction, elaborate the security of Business Ecommerce from the aspect of VLAN, application layer, session layer, dynamic password, symmetric key encryption and encryption of communication stack. In order to do that, we need to strengthen and improve education, publicity, and security awareness of enterprises; using multiple networks and cryptographic techniques to protect the security of information; strengthening risk analysis and prevention to reduce systemic risks; perfection of Ecommerce legislation; using security strategies which protect the interests of both parties.

Journal ArticleDOI
TL;DR: This work proposes an Encrypted Verification Method (EVM) that effectively detects a black hole attack and proves by resorting to simulation that the EVM is highly dependable against the black holes attack.
Abstract: A black hole attack is one of the most serious attacks in mobile ad hoc networks. A malicious node can act as if it has a valid route to a destination and then respond with a false Route Reply (RREP) message to the source, when it receives a Route Request (RREQ). Then the malicious node absorbs data packets destined for the destination. We propose an Encrypted Verification Method (EVM) that effectively detects a black hole attack. It takes two steps. First, every node examines its neighbors by inspecting their data transmission behaviors. Second, a detection node that receives an RREP from the suspicious node sends an encrypted verification message directly to the destination along the path included in the RREP for verification. The approach not only pins down the black hole nodes, but also reduces control overhead significantly. We prove by resorting to simulation that the EVM is highly dependable against the black hole attack.

Journal ArticleDOI
TL;DR: A two-dimensional code encryption and decryption method based on Elementary Cellular Automata state rings with some advantages, such as high speed, good effect and high security is proposed.
Abstract: In order to improve security performance of the information stored in two-dimensional Code (Quick Response Code), a two-dimensional code encryption and decryption method based on Elementary Cellular Automata state rings is proposed in this paper. Cellular Automata can simulate complex phenomenon just using simple dynamical system. In addition, Cellular Automata and cryptography have a lot of similarities such as diffusivity and integrated chaos. Based on this feature, the method uses the Cellular Automata to encrypt and decrypt QR code binary image with the following parameters: the length is 8, the boundary condition is cyclic boundary condition and {0, 1} is the state space. The experimental results show that the method proposed in this paper has some advantages, such as high speed, good effect and high security.

Journal Article
TL;DR: A way to take advantage of the live forensic techniques for the anomaly detection of malware is suggested.
Abstract: Digital forensics techniques that have been used to analyze system intrusion incidents traditionally are used to detect anomaly behavior that may occur in the user terminal environment. Particularly, for the method to analyze user terminals, automated live forensics techniques that are used as supporting tool for malicious code (malware) detection. We suggest a way to take advantage of the live forensic techniques for the anomaly detection of malware.

Journal ArticleDOI
Ider Lkhagvasuren1, Jungmin So1, Jeong-Gun Lee1, Chuck Yoo, Young Woong Ko1 
TL;DR: An algorithm and structure for a deduplication method which can be efficiently used for eliminating identical data between files existing different machines with high rate and performing it within rapid time is presented.
Abstract: This paper presents an algorithm and structure for a deduplication method which can be efficiently used for eliminating identical data between files existing different machines with high rate and performing it within rapid time. The algorithm predicts identical parts between source and destination files very fast, and then assures the identical parts and transfers only those parts of blocks that proved to be unique region. The fundamental aspect of reaching faster and high scalability determining duplicate result is that data are expressed as fixedsize block chunks which are distributed to “Index-table” by chunk’s both side boundary values. “Index-table” is a fixed sized table structure; chunk’s boundary byte values are used as their cell row and column numbers. Experiment result shows that the proposed solution enhances data deduplication performance and reduces data storage capacity extensively.

Journal ArticleDOI
TL;DR: This paper proposed a secure mCoupon authentication scheme that is protected against illegal use in smart poster environment based on low-cost NFC to using limited resources.
Abstract: Recently, smart devices for various services have been developed using converged telecommunications, and the market for near field communication (NFC) mobile services is expected to grow rapidly. This property makes the standard suitable for mobile coupon applications. However, mCoupons differ significantly from paper-based coupons because unprotected data can be easily copied or modified without significant cost by anyone. A high number of uncontrolled copies of coupons can result in a significant loss. In this paper, we proposed a secure mCoupon authentication scheme that is protected against illegal use in smart poster environment based on low-cost NFC to using limited resources.

Journal ArticleDOI
TL;DR: On the basis of 3D Arnold cat map, an algorithm of image encryption which separates the original image to many same blocks and no period is presented, which confirms the security and the validity of the proposed algorithm.
Abstract: Hyper-chaos has more than one positive Lyapunov exponents and it has more complex dynamical characteristics than chaos. Hence it becomes a better choice for secure image encryption schemes. In this paper, 3D Arnold cat map can be applied in image encryption, and it has more security and better effect. However, its period is fixed. The original image will be returned to itself if iterating some times. On the basis of 3D Arnold cat map, it presented an algorithm of image encryption which separates the original image to many same blocks and no period. Theoretical and experimental analyses both confirm the security and the validity of the proposed algorithm.

Journal ArticleDOI
TL;DR: There are two phases in preventing this plagiarism: one is preventing plagiarism from occur, the other is to detect cases of plagiarism when the preventative measures fail.
Abstract: Student plagiarism is epidemic in universities. In computer programming education process, it is very common that students copy or modify other’s code as their own work. Because every course having numerous assignments, detected plagiarism will be very difficult and extremely time consuming. How to prevent the plagiarism in programming course is an important problem in education. This paper analyzes and expatiates the reasons and the methods about the code’s plagiarism, and thinks there are two phases in preventing this plagiarism: one is preventing plagiarism from occur, the other is to detect cases of plagiarism when the preventative measures fail. Preventing plagiarism methods mainly include the valid course assignment design and to forbid the electronic copy. This paper describes a code’s editor software which has been implemented use Java. When the preventative measures fail, this paper describes an automatic tool to help instructor find the suspicious targets. These phases’ aim is to cut down the plagiarism and improve the ability of the student’ programming

Journal ArticleDOI
TL;DR: This technique resulted in two key contributions: the size of the cryptographic key material is smaller and encryption/decryption cannot be affected with an unbounded number of revoked users, and the scheme is proved to be secure under the q-MEBDH assumption in the standard model.
Abstract: In this work, we design a method for efficient revocation within Ciphertext-Policy Attribute-Based Encryption scheme. Our main technical innovation is based on linear secret sharing and binary tree techniques, every user in system is assigned with both a set of attributes and a unique identifier. Any user can also be efficiently revoked by using this identifier. Furthermore, this technique resulted in two key contributions: the size of the cryptographic key material is smaller and encryption/decryption cannot be affected with an unbounded number of revoked users. Then, the scheme is proved to be secure under the q-MEBDH assumption in the standard model. The efficiency is also optimized that the size of user’s private key has only a constant increase. The revocation information is embedded in the ciphertext so that the fine-grained access control is more flexible.

Journal ArticleDOI
TL;DR: The proposed algorithm will facilitate the implementation of a smart electronic attendance system in the construction of the smart campus as it will save time and prevent bottlenecks as large numbers of students will not need to stand in line to check-in their attendance in the wall-mounted attendance device.
Abstract: This paper presents a proposal for a large-scale lecture authentication algorithm for an electronic attendance system The utilization rate for existing electronic attendance systems is low Because it couldn't solve the problems that occur by special conditions of university such as vicarious attendance, bottlenecking during attendance check-in, and attendees departure at intermission The most important things are not the authentication problems or errors on the technical issues Instead, issues are related to attempts to check attendance simultaneously by a number of students, failure to prevent vicarious attendance, and the uncertainties of students remaining in the classroom following check-in The authentication algorithm of the proposed system uses smartphone in attendance check So it will save time and prevent bottlenecks as large numbers of students will not need to stand in line to check-in their attendance in the wall-mounted attendance device And, it will minimize, if not eliminate, students who might leave at intermission Because the instructor can verify attendance many times with the simplicity of the attendance check verification procedure and the short authentication time Thus, the proposed algorithm will facilitate the implementation of a smart electronic attendance system in the construction of the smart campus

Journal Article
TL;DR: In this paper, a new counting algorithm for tangerine yield estimation is adapted to obtain better results with respect to partially / semi partially occluded tangerines and its clusters.
Abstract: In this present paper, a new counting algorithm for tangerine yield estimation is adapted to obtain better results with respect to partially / semi partially occluded tangerine and its clusters. To optimize tangerine counting, and to minimize typical background noises from orchards (i.e. bare soil, weeds, and man-made objects), a tangerine fruit counting algorithm is implemented, and compared between before harvesting, after harvesting tangerine fruits, and results of yield estimation through tangerine flower recognition. Under natural lighting conditions prediction of the tangerine fruits from the orchards is computed and compared based on observers, and with tangerine counting algorithm. The simulation outputs show that new counting algorithm is found to be suitable, and effective.

Journal ArticleDOI
TL;DR: Analyzing the existing trust-based clustering solutions, it was illuminated how trust and reputation are used in the cluster formation and maintenance phases and all of their trust computation methods were compared and concluded with open research issues.
Abstract: Mobile ad hoc networks are prone to various security attacks of malicious nodes and attackers. To protect the network clustering from security attacks, numerous trust-based clustering schemes have been presented in the literature. Analyzing the existing trust-based clustering solutions, the researchers illustrated their primary features and properties in this paper and mainly discussed about the trust management mechanisms which are integrated in each trust-based clustering solution. Besides it was illuminated how trust and reputation are used in the cluster formation and maintenance phases. At the end, all of their trust computation methods were compared and concluded with open research issues.

Journal ArticleDOI
TL;DR: An effective and robust audio watermarking algorithm that employs both the discrete wavelet transform and the discrete cosine transform and is robust against a wide range of Stirmark attacks such as noise addition, compression, and filtering.
Abstract: Unauthorized copying and distribution of digital audio has been greatly facilitated by the wide availability of low-cost personal computers, portable devices, network access, and audio recording and editing software. One possible solution for copyright protection is audio watermarking. In this paper, we propose an effective and robust audio watermarking algorithm that employs both the discrete wavelet transform and the discrete cosine transform. The algorithm involves, first, pre-processing of the binary watermark image and then embedding it into the original audio by quantization of coefficients. Experiments on audio recordings of many different music styles confirm the robustness of the algorithm against a wide range of Stirmark attacks such as noise addition, compression, and filtering, as well as other common attacks.

Journal ArticleDOI
TL;DR: Experimental results show that the model proposed can better ensure data confidentiality and integrity in cloud computing and adopts efficient encryption mechanisms to protect users’ data.
Abstract: In recent years, cloud computing has become a major mode to address SMEs inefficient and help improve their competitiveness. As cloud providers have priority access to data, so it is difficult to guarantee the confidentiality and integrity of users’ data. For this reason this paper proposed a model to solve the problem of data security in cloud computing. The model adopts efficient encryption mechanisms to protect users’ data. As the encrypted data is difficult to retrieve, we present a method of cipher text retrieval. Experimental results show that the model can better ensure data confidentiality and integrity.

Journal ArticleDOI
TL;DR: This work proposes use of wavelets to distinguish between legitimate flash events and pulsating distributed denial of service attacks and generating images to show point-of-presence of the attack.
Abstract: Today the scale, complexity and intensity of Denial of Service attacks has increased many folds. These attacks have moved from simple flooding based attacks to sophisticated Application based attacks as well as Protocol specific attacks.The challenge is to develop detection algorithms that can distinguish between the attacks like the new pulsating denial of service and legitimate traffic like Flash events. The presence of self-similarity in computer network traffic has introduced a newer dimension in techniques being developed for anomaly detection in aggregated network traffic.We propose use of wavelets to distinguish between legitimate flash events and pulsating distributed denial of service attacks and generating images to show point-of-presence of the attack.The detection methodology has also been tested on KDD Dataset.

Journal ArticleDOI
TL;DR: In this paper, a three-dimensional active frequency selective surfaces loading a varactor diode to achieve electrically controllable, by loading different values of voltage to control the variable capacitance diode.
Abstract: This paper presents a novel three-dimensional active frequency selective surfaces loading a varactor diode to achieve electrically controllable, by loading different values of paranoid voltage to control the variable capacitance diode. Simulation results show that the structure has excellent resonant characteristics in the range of 3.34GHz-1.59GHz, and has certain sensitivity for the change of the capacitance value,so it can achieve electrical controllable in the frequency band. The simulation results also show that this structure can satisfy characteristics for multiple perspectives in the whole plane, and be suitable to reduce radar cross section,when it is used on radomeofweapon systems in practical war.

Journal Article
TL;DR: The results show that high diagnostic rate can improve the reliability, availability and safety of the system.
Abstract: This paper presents the stochastic Petri net (SPN) model of the hybrid redundancy system. The capacity of fault detection is taken into account in the model. Besides, the method to perform reliability, availability, maintainability and safety (RAMS) analysis has been proposed based on the isomorphic Markov chain of the SPN model. The presented methodology is demonstrated by a case study of the output subsystem of the subsea blowout preventer. RAMS analysis of the presented case is conducted and the effects of the diagnostic rate and repair rate on the performance are studied. The results show that high diagnostic rate can improve the reliability, availability and safety of the system.