|
|
 |
Search published articles |
 |
|
Showing 38 results for Security
, , , Volume 3, Issue 1 (9-2014)
Abstract
The Cloud computing is a low-cost high performance model of computing services in response to the needs of users of Information Technology. Current security and privacy challenges in cloud environment have led to distaste some users and organizations to apply cloud instead of traditional infrastructures. Although many prevention efforts and acts are performed in current network architectures, detection and tracing of the attacker is necessary after the event is occurred. But current architecture of cloud computing does not satisfy the cloud forensics needs. Therefore, in this field the cloud forensic investigation have many different challenges. Regarding the low cost and high performance services of cloud computing, for the sake of security issues it can never be ignored. So far several solutions have been proposed regardingcloud’s security issues based on dynamic and elastic nature of cloud computing and legal issues. The main goal of this survey is to classify and and explore the cloud forensics issues and challenges.
, , Volume 3, Issue 2 (3-2015)
Abstract
Organizations should use from enterprise security architectures to secure their information assets. Security patterns are a good way to build and test new security mechanisms. Enterprise security pattern as an instance of model-driven architecture offers a solution to recurring information systems security problems. In this paper, we present a model-driven enterprise security pattern called Secure SaaS., which the organizations could apply to protect their information assets when using SaaS. On the other hand Cloud Computing is a approach for the efficient use of computational resources. cloud delivers computing as a service. However, security concerns prevent many individuals and organizations from using clouds. Second section of this paper focuses on the Security problem of Platform-as-a-Service (PaaS) clouds including access control, privacy and service continuity while protecting both the service provider and the user. Security problems of PaaS clouds are explored and classified. Countermeasures are proposed and discussed.
Sonia Naderi, Doctor Mohammadreza Javan, Volume 3, Issue 2 (3-2015)
Abstract
In this paper, a cooperative scheme for secure device to device (D2D) communications underlaying cellular networks is proposed. In our scheme, the cellular base station (BS) wants to transmit its information to a cellular user (CU). Meanwhile, two devices want to communicate directly using the same spectrum used by cellular network with the help of some decode-and-forward (DF) relay nodes. In addition, there exists a malicious user which wants to eavesdrop on information transmission of D2D pair. The transmit power of the transmitter of the D2D pair (TD2D) and the relays is limited such that the outage performance of cellular network is satisfied. We study the performance of the proposed scheme, which is measured based on the outage probability, and obtain the closed form expression for the outage probability for the optimal relay selection scheme. Finally, the performance of the proposed scheme is evaluated using simulations.
Mr. Afshin Rashidi, Dr. Reza Ebrahimi Atani, Mr. Hamid Nasiri, Volume 4, Issue 1 (9-2015)
Abstract
In the past decade with distribution software such as browsers, online stores, Internet banking, electronic mail systems and the Internet, to carry out reverse engineering attacks, illegal use of illegal software or reproduce it is.A new attack techniques have failed and this creates competition between the attackers and software developers. So far, many techniques based architecture, hardware and software for this semester has been introduced to protect each aspect of the application process. In this paper, we introduce a variety of threats to software and then try to categorize and review of techniques to protect our software.
, , , Volume 4, Issue 2 (3-2016)
Abstract
With emerging of the Internet, the way we communicate with each other has fundamentally revolutionized. The second development wave of the Internet is not about people, but will be about smart connected devices. Although more than a decade passes from the proposing of "Internet of Things" concept, the deployment of this concept has been done slowly for various reasons such as lack of required technologies development and security challenges. We must spend more time to understand the security challenges and available solutions, when we speak about smarter environments and technologies such as IoT. In this paper, we attempt to analysis existent threats and vulnerabilities in the area of security and privacy of Internet of Things using a systematic approach, while presenting a survey of the solutions proposed in the literature. Finally, research opportunities of this area will be discussed.
Mansour Esmaeilpour, Mina Feili, Volume 4, Issue 2 (3-2016)
Abstract
Standards in the field of IT security, due to the youthfulness of this area, it is relatively new, but the long history of standard processes, leading to a mature and efficient development of standards in this area. Several researches have been done in the field of information security that shows the breadth and complexity of information security, as well as, several standards has been developed in this field. Ignoring the information security is as open embrace risky on a variety of issues that may be faced in doing anything with it. Information security plays an important role in protecting the assets of the organization. As regards that no formula cannot guarantee complete security, however, need to a series of criteria and standards to achieve the appropriate level of information security resources to be used effectively and the best way to adopt security. Each of them has covered a specific aspect of security, and sometimes a set of standards to cover only one aspect of security. The adoption of information security standards, it must first be emphasized to match the original standard and note that proportionality is localized or they may create problems. The present research introduces the world deal with information security standards. It will be discussed that how to change views of information security in detail, and introduced a variety of tools and solutions.
Dr Mahmood Deypir, Mozhgan Ghasabi, Volume 5, Issue 1 (9-2016)
Abstract
Recently, software defined networks have been introduced for innovation and flexibility in computer networks. They are widely used in infrastructure networks and data centers. Using these networks has advantages such as scalability, efficient bandwidth usage, reducing control traffic, better traffic engineering and etc., which are mainly due to their programmability. There are also some security challenges that often arise from the same property. Software defined networks reliability compared to traditional network reduces due to these challenges. Therefore, if software defined networks are not design based on a security architecture, they will be vulnerable against known cyber-attacks such as DDoS, spoofing, information disclosure and etc. In this paper, software defined network security challenges and corresponding solutions are reviewed. Moreover, some applications of software defined networks for security including network traffic separation, network flow access control, and secure routing are mentioned. In order to do security testing and evaluation of relevant security solutions we have explained how these networks are simulated.
Sayed Mohamamd Tabatabaei Parsa, Hassan Shakeri, Volume 5, Issue 1 (9-2016)
Abstract
Wireless Sensor Networks (WSNs) are an ideal solution for miscellaneous applications of surveillance and control, such as traffic control, environmental monitoring, and battlefield surveillance. The wireless sensor nodes have limited memory and processing capability. The Sybil Attack is a serious threat in which a malicious node creates multiple fake identities in order to mislead the other sensor nodes. This attack can have influence on routing protocols and the operations like voting and data aggregation. In this paper, we present a dynamic and lightweight algorithm with a confidence-aware trust approach. The Algorithm uses the trust value of each sensor node to reduce the false alarm rates and detect indirect Sybil attacks in WSNs. The simulation results demonstrate that the average detection and wrong detection rates are 92% and 0.08% respectively.
, , Volume 5, Issue 2 (3-2017)
Abstract
The Identity Management System (IDM) is a set of policies, rules, procedures, and systems that manage authentication, access control, and audit activity based on digital identity. In the Identity Management System, given the storage of user identity attributes in the identity provider, users will lose their physical and traditional control over their personal identity, and on the other hand, user attributes are subject to more attacks from The inside of the system and the external attackers. Therefore, to ensure user's privacy control is keeping awareness of the release of his / her identity information, So providing security mechanisms in the area of privacy is essential. The current mechanisms have failed to satisfy users confidence in maintaining the security and privacy associated with their identity information. The designs presented in this area will increase user intervention and involvement during system interactions , and the user must act as an interface role. The Problems of the proposed designs, the high computational burden on a part of the system. In this article, the process of improving privacy control and user awareness for solving problems has been investigated.
Engineer Nasrin Taj Neyshabouri, Engineer Shaghayegh Naderi, Engineer Mahsa Omidvar Sarkandi, Engineer Hassan Koushkaki, Volume 6, Issue 1 (9-2017)
Abstract
validation among Users, Stockholders, and delivering important and various services with high availability are part of import dimensions of local search engines. This paper provided a comprehensive research result on Combination of security control tools with main components of local search engines, like crawler, ranker, Indexer and security requirements Consideration in all phases of software development life cycle. We organize the existing research works on securing local search engines based on combination of security standards relevant to software development life cycle of systems with key components of local search engines to help developers, software project managers for implementing security controls and requirements properly.
, , Volume 6, Issue 1 (9-2017)
Abstract
The use of Wireless Sensors Networks (WSNs) is rapidly growing in the areas of research, application, operation, and commerce. These kind of networks are used for monitoring a desired region of an environment. So, many abilities of these networks, by considering their lower cost, have caused them to be applicable in various areas. WSNs are designed in scale of hundreds to thousands nodes, wherein this great scale is technologically the most challenging issue. One of the most basic and challenging problem is the coverage issue. Security is another important issue. Coverage is the most paramount goal of creating and implementing of WSNs, because coverage is directly related to the degree of quality, method, and durability of the WSNs for recognizing the parameters and defined aims of the regions, and the implementation cost. In this paper, the methods of improving the security of public places (by increasing the coverage of the regions based on the sensors networks) have been investigated. The results indicate that by choosing an appropriate and optimum coverage, it is possible not only to cover the entire region by utilizing the minimum number of sensors, but also it is possible to increase the security of the monitored places of the network by lesser nodes.
Kamaleddin Ghezavati, Alireza Nowroozi, Volume 6, Issue 2 (3-2018)
Abstract
Online social networks (OSNs) is one of the most popular medium for communicating, sharing, and publishing a considerable amount of information. OSN popularity often faces the challenge of dealing with unwanted messages and hidden malicious purposes in it. Based on recent studies, social network users can easily expose their confidential details with others. Misuse of this information can cause damage in virtual and real world. In this paper, main categories attacks are given on social network online security and privacy in four categories classic, modern, hybrid and children special attacks and ways that can be used to protect against different types of attacks used OSN users is the social network operators, security companies, and researchers are provided. Finally, eight ways to prevent these threats is presented.
Sayed Mohammad Tabatabaei Parsa, Hassan Shakeri, Volume 6, Issue 2 (3-2018)
Abstract
Wireless Sensor Networks (WSNs) gather the environmental information via some sensor nodes and send them after some simple processing functions if necessary. These nodes are constrained devices in terms of memory, processing capability, radio range, and energy. Due to the unattended deployment of sensor nodes and the nature of wireless communications, these networks are vulnerable to several attacks. Among these, the Sybil Attack is a serious threat in which a malicious node creates multiple fake identities in order to mislead the other sensor nodes. In this case, the malicious node can attract lots of traffic and disrupt routing protocols. In this paper, we present a confidence-aware trust model considering Time Factor to detect such attacks. In this model, we use the indirect trust, gained from the neighbors' recommendations, in order to detect the indirect Sybil attacks, in which a legal node is not directly associated with the Sybil node. The Algorithm has been implemented using MATLAB. The simulation results demonstrate significant preference of the proposed method in terms of detection accuracy and false alarm rates. The average rate of detection and false detection of the proposed model are 93% and 0.26%.
, , Volume 7, Issue 1 (9-2018)
Abstract
The widespread use of information and communication technology in industrial control systems has exposed many cyber attacks to these systems. The first step in providing security solutions is to recognize the threats and vulnerabilities of a system at first. Therefore, in this work, after providing a general overview of the SCADA security, we provide a survey on actual cyber attacks from 2000 up to now. To be able to assess the risk of these attacks, we perform profiling them based on the target systems of the attack, the geographical area of it, the method used in the attack and its impact. This profiling provides a clear view of the most important security incidents in SCADA systems and could be useful in the defining suitable strategies for preventing and defending against the major SCADA security attacks.
Javad Moradi, Majid Ghayoori Sales, Volume 7, Issue 2 (3-2019)
Abstract
Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized people. To overcome these concerns, there are several security layers between the user and the data in the network layer, host, and database. For instance, security mechanisms, including firewall, data encryption, intrusion detection systems, etc., are used to prevent infiltration. Database Intrusion Detection System uses a variety of data mining techniques to detect abnormalities and detect malicious and intrusive activities. In this paper, a category of intrusion detection techniques is presented first in the database, and a review of the general algorithms for intrusion detection in databases is demonstrated. Since signature-based methods are elder and less complex and less diverse, the main focus of this paper is on behavioral methods.
, , Volume 8, Issue 1 (9-2019)
Abstract
Semiconductor metal oxide technology complements a popular and pervasive approach in the design of electronic and digital circuits, but in this technology, reduction at the sub-micron level is simply not feasible; therefore, quantum-dot cellular automata nanotechnology as a new way to design digital circuits and reduce power consumption was introduced. At the nanoscale, quantum-dot cellular automata cells represent a novel way of performing calculations by transmitting information through quantum cell interactions. Small dimensions, high speed, low power consumption, and low latency are the main features of this technology. Designing high-security circuits in nano-scale quantum-dot cellular automata technology is important for designers, considering the intercellular communication, low power consumption, and optimal power consumption. Therefore, this paper first describes the quantum-dot cellular automata at the nano level and then quantum cells, then important structures in this technology, timing and important points in the quantum-dot cellular automata circuit have been discussed and reviewed. In the field of security, such as cryptographic circuits, interconnections have been made at the nanotechnology of quantum-dot cellular automata technology. Finally, their structures, circuits, and performance are analyzed. The results showed that by applying some methods such as Feynman gate reversible logic, Fredkin circuit reversible key and decoding encoding process, the safety and reliability of nano-communications based on quantum-dot cellular automata technology can be increased.
Mohammad Darvishi, Majid Ghayoori, Volume 8, Issue 2 (2-2020)
Abstract
Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training, the result is in production of high volumes of false warnings. On the other hand, the high level of intrusion detection training time will cause a significant delay in the training system. Therefore, in the analysis section of the intrusion detection system, we need to use an algorithm that shows significant performance with the least educational data, hidden Markov model is one of these successful algorithms in this field.
This Research also is trying to provide a misuse based intrusion detection solution with the focus of the evolutionary Hidden Markov model, the EHMM, which is designed to overcome the challenges posed. The most important part of hidden Markov model is to adjust the values of the parameters, the more adjusted values, optimal values would be more effective. The hidden Markov model is more likely to predict the probability of future values. Therefore, it has been trying to end the mail based on the causative analysis of NSL data sets-KDD using evolutionary programming algorithm for hidden Markov model for the optimal parameters and sort of teach it. Then, using it, the types of attacks in the dataset were identified. To evaluate the success rate in improving the accuracy percentage EHMM proposal intrusion detection, MATLAB System simulation environment has been implemented. The results of the investigation show fitted, EHMM plan, the percentage of the average is 87% of intrusion detection (if hidden Markov model is used normal) to over 92% (in the case of the hidden Markov model using evolutionary) increases. Also after training the training data in both methods based on conventional and evolutionary Markov model, the time of the target system for a training data set is approximately two hundred thousand record from low average of 489 minutes to more than 400 minutes has been dropped in the proposed method. This outcome achievement and making it operational on intrusion detection for the native system, can cause a defensive improvement which can be fitted in front of the other country for hostile cyber.
Sara Zarei , Hadi Soleimany, Volume 8, Issue 2 (2-2020)
Abstract
One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use different methods and can be applied at different levels. Masking is an effective one which provides provable security in algorithm level. however even masked algorithms are sometimes suspected to leak kind of information in a condition that implemented in hardware leads to power analysis attacks. Threshold implementation is a way to secure hardware implementations against such probable challenges. In this paper, first we will introduce the different attack models in block ciphers, then we will concentrate on the gray-box model and explain the concepts of power analysis attacks and fundamentals of masking countermeasure. Later we will discuss the challenges of masking method in hardware implementations and introduce threshold implementation and its different aspects.
Amirhossein Pourshams, Mohammad Reza Hasani Ahangar, Mahmoud Saleh Esfahani, Volume 8, Issue 2 (2-2020)
Abstract
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a thorough understanding of security challenges and their solutions are required to reduce security concerns while developing new services. In this article, cloud computing, NFV and its VNFs from a security perspective is explained. Then, their security challenges with respect to cloud computing infrastructure and current solutions are discussed in a comparative scenario based way. Finally, proper security solutions for each scenario are proposed.
Mr Mohamad Jari, Miss Fariba Nazari, Volume 8, Issue 2 (2-2020)
Abstract
The purpose of this study is to identify and prioritize the effective technical and technical stress factors of information security by IT experts identified in Aghajari oil and gas Exploitation Company. The statistical population of the study consisted of 100 ICT managers and experts in Aghajari Oil and Gas Co. which directly related to the security of information in the company, 80 of them were selected as samples. In this research, the first questionnaire was designed with the aim of identifying the factors and half-openness. The second questionnaire was designed with the aim of screening the identified factors as closed and based on Likert's five-choice spectrum. Finally, a third questionnaire was designed with the aim of determining the weights and rank of each one of the factors and in a pair comparison. The necessary analysis was carried out through the software SSS, Excel, ExpressChevis and MATLAB. The results of the research led to the identification of two main factors (occupational stressors and technical stressful factors influencing information security by IT experts in Aghajari oil and gas Exploitation Company) and 14 sub factors and then their rank were determined.
|
|