Pruning and Ranking Based Classifier for Efficient Detection of Android Malware
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.201-205, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.201205
Abstract
Mobile devices that run Android operating system are widely used. The applications running in Android mobiles can have malicious permissions due to malware. In other words, Android applications might spread malware which can sabotage valuable data. Therefore it is essential to have mechanism to classify malware and benign mobile applications running in Android phones. Since Android mobile applications run in the confines of mobile devices and associated servers, it is very challenging task to detect Android malware. Many solutions came into existence to detect malware applications. Of late Abawajy et al. proposed a technique known as Iterative Classifier Fusion System (ICFS) which employs classifiers iteratively with fusion to generate a final classifier for effective detection of malware. They combined NB tree classifier, Multilayer perception and Lib SVM with polynomial kernel to achieve this. However, the system does not focus on reduction or pruning of Android application permissions so as to build a classifier that reduces time and space complexity. In the proposed system, a methodology is proposed that focuses on reduction or pruning of android application permissions and ranking them in order to build a classifier that reduces time and space complexity. The classifier modelled with best ranked permissions can be representative of all permissions as least significant permissions are pruned to reduce search space. This paper built a prototype application to demonstrate proof of the concept. The experimental results revealed that the proposed system performs better in improving detection accuracy besides precision and recall measures.
Key-Words / Index Term
Malware, malware detection technique, pruning, ranking
References
[1] P. Faruki, A. Bharmal, V. Laxmi, V. Ganmoor, M. S. Gaur, M. Conti, and M. Rajarajan, “Android security: A survey of issues, malware penetration, and defences,” IEEE Communications Surveys and Tutorials, vol. 17, pp. 998–1022, 2015.
[2] Y. Zhou and X. Jiang, “Dissecting Android malware: Characterization and evolution,” in Proceedings of the 33rd IEEE Symposium on Security and Privacy, San Francisco, CA, pp. 95–109, 2012.
[3] J. Walls and K.-K. R. Choo, “A review of free cloud-based antimalware apps for Android,” in Proceedings of 2015 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Trust Com 2015, vol. 1, pp. 1053–1058, 2015.
[4] S. Naval, V. Laxmi, M. Rajarajan, M. S. Gaur, and M. Conti, “Employing program semantics for malware detection,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 12, pp. 2591–2604, 2015.
[5] P. Faruki, S. Bhandari, V. Laxmi, M. Gaur, and M. Conti, “Droid analyst : Synergic app framework for static and dynamic app analysis,” Studies in Computational Intelligence, vol. 621, pp. 519–552, 2015.
[6] L. Sinha, S. Bhandari, P. Faruki, M. S. Gaur, V. Laxmi, and M. Conti, “Flow Mine : Android app analysis via data flow,” in Proceeding of the 13th IEEE Annual Consumer Communications and Networking Conference, CCNC 2016, pp. 435–441, 2016.
[7] J. Abawajy, M. Chowdhury, and A. Kelarev, ”Hybrid Consensus Pruning of Ensemble Classifiers for Big Data Malware Detection,” IEEE Transaction on Cloud Com put 3(2):111, 2017.
[8] S. Sheen, R. Anitha, and V. Natarajan, “Android based malware detection using a multi feature collaborative decision fusion approach,” Neuro computing, vol. 151, pp. 905–912, 2015.
[9] S. Naval, V. Laxmi, M. S. Gaur, S. Raja, M. Rajarajan, and M. Conti, “Environment-reactive malware behaviour: Detection and categorization,” in Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, ser. LNCS, vol. 8872, pp. 167–182, 2015.
[10] F. Daryabar, A. Dehghantanha, F. Norouzi, and F. Mahmoodi, “Analysis of virtual honey net and vlan-based virtual networks,” in International Symposium on Humanities, Science and Engineering Research, SHUSER 2011, pp. 73–77, 2011.
[11] K. Zhao, D. Zhang, X. Su, and W. Li, “Fest: A feature extraction and selection tool for Android malware detection,” in 20th IEEE Symposium on Computers and Communication, ISCC 2015, pp. 714–720, 2015
[12] J. Abawajy, A. Kelarev “Iterative Classifier Fusion System for the Detection of Android Malware”. IEEE Transactions on Big Data, Vol. 5, No. 4, p1-12, 2017.
Citation
Ramisetti Uma Maheswari, R Raja Sekhar, "Pruning and Ranking Based Classifier for Efficient Detection of Android Malware," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.201-205, 2018.
Improved Exponential Reliability Coefficient Based Reputation Mechanism for Isolating Selfish Nodes in Mobile Ad hoc Network
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.206-212, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.206212
Abstract
Mobile Ad hoc Network (MANET) is outstanding for its restricted transmission scope of remote system interface. Thus, multiple hops (multi-hops) might be required for trading the data starting with one node then onto the next over the system with no base stations or switches. In MANETs, as there is no chain of command among nodes, each node is in charge of sending packets to its neighboring nodes. Because of serious asset requirements like memory, registering power, vitality, data transfer capacity and time, a few nodes may not partake in sending the packets for sparing its assets. The nearness of selfish behaviour among nodes may prompt system apportioning and has a noteworthy negative effect in throughput and the system activity. To maintain a strategic distance from such circumstances selfish node deduction is imperative. The proposed framework introduced an Improved Exponential Reliability Coefficient based Reputation Mechanism (IERCRM) which disengages the selfish nodes from the steering way in view of Enhanced Exponential Reliability Coefficient (EExRC). This unwavering quality coefficient controlled through exponential disappointment rate in light of moving normal strategy features the latest past conduct of the versatile nodes for measuring its validity. From the reenactment comes about, it is apparent that, the proposed IERCRM approach outflanks the current Exponential Reliability Coefficient based Reputation Mechanism in terms of performance evaluation metrics such as end to end delay, throughput and detection rate.
Key-Words / Index Term
Manet, Enhanced Exponential, Reliability, Coefficient, selfishnode and Priority Factor
References
[1] Hoang Lan Nguyen and UyenTrang Nguyen, “Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks,” IEEE ICNICONSMCL’06, 2006
[2] Yanchao Zhang , Wenjing Lou , Wei Liu, Yuguang Fang, “ A secure incentive protocol for mobile ad hoc networks” in Journal of Wireless Networks , Volume 13 Issue 5, pp. 663-678 , October 2007.
[3] L. Buttyan and J.P. Hubaux, “Enforcing service availability in mobile ad-hoc WANs”, in Proc. of IEEE/ACM MobiHoc, Boston, Aug. 2000.
[4] L. Buttyan and J.P.Hubaux, “Stimulating cooperation in self-organizing mobile ad hoc networks,” ACM Journal for Mobile Networks (MONET), Vol. 8, No. 5, Oct. 2003
[5] RubanaTarannum, YogadharPandey, “Detection and Deletion of Selfish MANET Nodes-A Distributed Approach” IEEE 2012
[6] Gagandeep, Aashima and Pawan Kumar. 2012. Analysis of different security attacks in MANETs on protocol stack. Int. J. Engg. Adv. Technol. 1(5): 269-275.
[7] P. Papadimitratos and Z.J. Haas, “Securing the Internet Routing Infrastructure”, IEEE communications Magazine, 40(10), Oct, 2002.
[8] A. Babakhouya, Y. Challal, and A. Buouabdallah, “A simulation analysis of routing misbehavior in mobile ad hoc networks,” in The Second International Conference on NextGeneration Mobile Applications, Services and Technologies NGMAST’08, 2008, pp. 592–597.
[9] Tan, WCW, Bose, SK & Cheng, TH 2012, ‘Power and mobility aware routing in wireless ad hoc networks’, IET communications, vol.6, no.11, pp.1425-1437.
[10] Michiardi P, Molva R. (2002). “Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks”, in International Conference on (CMS’02).
[11] Informant: Detecting Sybils Using Incen-tives N. Boris Margolin and Brian N. Levine Department of Computer Science, Univ. of Massachusetts, Amherst, MA, USA {margolin,brian}@cs.umass.edu.
[12]. Tarag Fahad & Robert Askwith”A Node Misbehaviour Detection Mechanism for Mobile Adhoc Networks “ ISBN: I-9025-6013-9c 2006 PGNet
[13] Jian-Ming Chang, Po-Chun Tsou, Han-Chieh Chao, Jiann-Liang Chen, “CBDS: A Cooperative Bait Detection Scheme to Prevent Malicious Node for MANET Based on Hybrid Defense Architecture,” IEEE 2011.
Citation
Daniel Nesa Kumar C, Saravanan V, "Improved Exponential Reliability Coefficient Based Reputation Mechanism for Isolating Selfish Nodes in Mobile Ad hoc Network," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.206-212, 2018.
Data Leakage Detection and Prevention of Confidential Data
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.213-218, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.213218
Abstract
Data leakage is big security threat to organization, when third party agent carried out data leakage. Perturbation method use for the detecting and preventing data leakage and also for assessing data third party agent. Firstly, watermarking techniques used for data leakage but in that techniques modification to original data take place. To overcome this disadvantage data allocation strategies is used. It improve feasibility of finding guilt agent. Data based on sample request and explicit request using allocation strategies allocate by the distributor to detect the agent. Fake object are given with original data. If one or more fake object is leaked, then distributor detect the leakage by the agent was guilty. So, perturbation is efficient technique handle data leakage and also make less sensitive to data before handle to agent.
Key-Words / Index Term
Agent, Distributor, Perturbation, Detection and Fake Object
References
[1] XiaokuiShu, Danfeng Yao and Elisa Bertino, “Privacy-Preserving Detection of Sensitive Data Exposure”, IEEE Transactions on Information Forensics and Security, 1092-1103.
[2] XiaokuiShu and Jing Zhang, Danfeng Daphne Yao and Wu Chun Feng, “Fast Detection of Transformed Data Leaks”, IEEE Transactions on Information Forensics and Security, 528-542.
[3] Michael Backes ,Niklas Grimm and Aniket Kate, “Data Lineage In Malicious Enviornments”, IEEE Transactions on Dependable and Secure Computing, 178-191.
[4] P. Papadimitriou, H. Garcia-Molina, “Data Leakage Detection”, IEEE Transactions On Knowledge And Data Engineering, 51-63.
[5] SubhashiniPeneti and B. Padmaja Rani, “Data Leakage Prevention System With Timestamps”, International Conference on Information Communication and Embedded Systems, 1-6.
[6] Gilad Katz, Yuval Elovici, and BrachaShapira, “CoBAn: A context based model for data leakage prevention”, Information science on Springer.
[7] VeronikiStamatiKoromina and Christos Ilioudis, “Insider Threats in Corporate Environments: A Case Study for DLP”, in Proc. ACM.
[8] Yin Fan, Wang Yu, Wang Lina, YuRongwei, “A Trustworthiness-Based Distribution Model for Data Leakage Prevention”, Wuhan university journal of natural sciences,2010, Vol.15 No.3, 205-209.
[9] K. Borders, E. V. Weele, B. Lau and A. Prakash, “Protecting Confidential Data on Personal Computers
with Storage Capsules”, 18th USENIX Security Symposium, 2009.
[10] Jason Croft, Matthew Caesar, Xin Liu, and Wenjuan Gong, “Towards practical avoidance of information leakage in enterprise networks”, International Journal of Distributed Networks,10 November 2011.
[11] P.Buneman, S.Khanna, and W.C.Tan, “Why and Where: A Charaterization of Data provenance”, Proc.Eighth Int’l Conf. Database Theory(ICDT ‘01’),J.V. den Bussche and V.Vianu,eds.,pp.316-330,Jan.2001
[12] P.Buneman and W.C.Tan, “Provenence in Databases”, Proc ACM SIGMOD, pp.1171-1173,2007
[13] Y.Cui and J.Widom, “Lineage Tracing For General Data Warehouse Transformations”, The VLDB J.vol.12,pp.41-58,2003.
[14] J.J.K.O.Ruanaidh, W.J.Dowling, and F.M.Boland, “Watermarking Digital Images For Copyright Protection”, IEE Proc. Vision, Signal and Image Processing,vol.143,no.4,pp.250-256,1996.
[15] F.Hartung and B.Girod, “Watermarking of Uncompressed and Compressed Video”, Signal Processing, vol.66, no.3,pp.283-301,1998.
[16] S.Czerwinski, R.Fromm,and T.Hodes, “Digital Music Distribution and Audio watermarking”, http://www.Scientificcommons.org/43025658,2007.
[17] S.Jajodia, P.Samarati, M.L.Sapino,and V.S. Subrahmanian, “Flexible Support For Multiple Access ControlPolicies”, ACM Trans. Database Systems vol.26.no.2.pp.214-260,2001.
[18] P.Bonatti, S.D.C.di Vimercati,and P.Samarati, “An Algebra For Composing Access Control Policies”, ACM Trans. Information and system Security,vol.5,no.1,pp.1-35, 2002.
[19] L. Sweeney, “Achieving K-Anonymity Privacy
Protection Using Generalization and Suppression”, http://en.Scientificcommons.org/43196131, 2002.
[20] R. Sion, M. Atallah, and S. Prabhakar, “Rights Protection for Relational Data”, Proc. ACM SIGMOD, pp. 98-109, 2003.
[21] Ensaf Hussein, Mohamed A. Belal, “Digital Watermarking Techniques, Applications and Attacks Applied to Digital Media: A Survey”, IJERT, ISSN: 2278-0118, Vol. 1 Issue 7, September2012.
[22] Sandip A. Kale, Prof. S.V.Kulkarni, “Data Leakage Detection”, International Journal of Advanced Research in Computer and Communication Engineering, ISSN: 2278-1021, Vol. 1, Issue 9, November 2012.
[23] Upasana Yadav, J.P.Sharma, Dinesh Sharma, Purnima K. Sharma, “Different Watermarking Techniques & its Applications: A Review”, IJSER, ISSN 2229-5518, Volume 5, Issue 4, April-2014.
[24] Cox, I.J.; Miller, M.L.; Bloom, J.A., “Digital Watermarking”, Morgan Kaufmann, 2001.
[25] Prabhishek Singh, R S Chadha, “A Survey of Digital Watermarking Techniques, Applications and Attacks”, IJEIT, ISSN: 2277-3754, Vol. 2 Issue 9, March-2013.
Citation
Shubhangi G. Dhawase, Bhagyashri J. Chaudhari, Neha S. Kolambe, Poonam S. Masare, "Data Leakage Detection and Prevention of Confidential Data," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.213-218, 2018.
Approximate Top-k Queries Monitoring on Document Streams
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.219-324, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.219324
Abstract
Document stream is the stream where documents are flows continuously. By monitoring these documents it is possible to have different applications of the real world like demand presentation, contextual advertisements, filtering of news updates, and general filtering of information to meet the needs of users. User preferences are used to process the top-k monitoring of documents streams continuously. However, it is a tedious and challenging task to fulfil the aspirations of various users and their preferences. In the literature many solutions are found. However an adaptive approach is essential to achieve better results. In this paper we proposed a framework and implemented to have continuous monitoring and approximation of document streams to Top-k queries of different users. Thus the proposed system yields more utility to end users than existing system. Top-k queries instead of preferences can provide the intent of users more clearly. Thus the filtered documents can reveal the user intention in making such queries. An algorithm named Adaptive Identifier Ordering (AIO) is implemented to achieve this. AIO adapts to the runtime dynamics of streaming besides using top-k queries to reports users with most appropriate documents. We build a prototype application to demonstrate proof of the concept.
Key-Words / Index Term
Document streams, top-k queries, continuous monitoring, adaptive identifier ordering
References
Citation
B. Mounika, R. Raja Sekher, "Approximate Top-k Queries Monitoring on Document Streams," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.219-324, 2018.
A novel approach for detection of coverage holes in Wireless Sensor Networks
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.225-232, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.225232
Abstract
Wireless sensor network consists of low powered battery operated tiny sensor nodes that are designed to work independently. Coverage is a prominent issue in WSNs that affects the quality of service. Coverage holes can appear anywhere in the monitored region because of several reasons like energy depletion, link failure etc. In this paper, a decentralized, node based, localized coverage hole detection algorithm is proposed. It works in two phases. In the first phase, each node identifies the critical boundary points with its neighbors. Thereafter in second phase, all critical points will be grouped together to form a hole. Simulation results show that our algorithm works better than existing detection algorithm.
Key-Words / Index Term
Wireless Sensor Networks, Critical Boundary Points, Coverage Holes, Detection of Coverage Holes
References
[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey", Computer networks, vol. 38, no. 4, pp. 393-422, 2002.
[2] K. M. Alam, J. Kamruzzaman, G. Karmakar, and M. Murshed, "Dynamic adjustment of sensing range for event coverage in wireless sensor networks", Journal of Network and Computer Applications, vol. 46, pp. 139-153, 2014.
[3] K. Shi, H. Chen, and Y. Lin, "Probabilistic coverage based sensor scheduling for target tracking sensor networks", Information sciences, vol. 292, pp. 95-110, 2015.
[4] B. Wang, H. B. Lim, and D. Ma, "A coverage-aware clustering protocol for wireless sensor networks", Computer Networks, vol. 56, no. 5, pp. 1599-1611, 2012.
[5] X. Gu, J. Yu, D. Yu, G. Wang, and Y. Lv, "ECDC: An energy and coverage-aware distributed clustering protocol for wireless sensor networks", Computers & Electrical Engineering, vol. 40, no. 2, pp. 384-398, 2014.
[6] J. A. Torkestani, "An adaptive energy-efficient area coverage algorithm for wireless sensor networks", Ad hoc networks, vol. 11, no. 6, pp. 1655-1666, 2013.
[7] S. Misra, M. P. Kumar, and M. S. Obaidat, "Connectivity preserving localized coverage algorithm for area monitoring using wireless sensor networks", Computer Communications, vol. 34, no. 12, pp. 1484-1496, 2011.
[8] X. Di, "A novel coverage-preserving clustering algorithm for wireless sensor networks", Physics Procedia, vol. 33, pp. 1054-1059, 2012.
[9] H.-C. Ma, P. K. Sahoo, and Y.-W. Chen, "Computational geometry based distributed coverage hole detection protocol for the wireless sensor networks", Journal of network and computer applications, vol. 34, no. 5, pp. 1743-1756, 2011.
[10] F. Yan, P. Martins, and L. Decreusefond, "Connectivity-based distributed coverage hole detection in wireless sensor networks," in Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE, 2011, pp. 1-6: IEEE.
[11] S. Babaie and S. S. Pirahesh, "Hole detection for increasing coverage in wireless sensor network using triangular structure", arXiv preprint arXiv:1203.3772, 2012.
[12] W. Li and W. Zhang, "Coverage hole and boundary nodes detection in wireless sensor networks", Journal of network and computer applications, vol. 48, pp. 35-43, 2015.
[13] F. Yan, A. Vergne, P. Martins, and L. Decreusefond, "Homology-based distributed coverage hole detection in wireless sensor networks", IEEE/ACM Transactions on Networking, vol. 23, no. 6, pp. 1705-1718, 2015.
[14] P. Kumar Sahoo, M.-J. Chiang, and S.-L. Wu, "An efficient distributed coverage hole detection protocol for wireless sensor networks", Sensors, vol. 16, no. 3, p. 386, 2016.
[15] L. Aliouane and M. Benchaïba, "Efficient boundary detection of coverage hole in WSNs," in Networks, Computers and Communications (ISNCC), 2016 International Symposium on, 2016, pp. 1-6: IEEE.
[16] P. Antil, A. Malik, and S. Kumar, "Neighbor Adjacency based Hole Detection Protocol for Wireless Sensor Networks", Procedia Computer Science, vol. 79, pp. 866-874, 2016.
[17] Z. Kang, H. Yu, and Q. Xiong, "Detection and Recovery of Coverage Holes in Wireless Sensor Networks", JNW, vol. 8, no. 4, pp. 822-828, 2013.
Citation
Manoj Verma, Sanjay Sharma, "A novel approach for detection of coverage holes in Wireless Sensor Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.225-232, 2018.
Optimizing Document Clustering for Dimension Reduction using improved k-means
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.233-238, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.233238
Abstract
Clustering is the process for grouping of similar document into a single cluster and dissimilar documents in other clusters. Document clustering is the process of grouping similar text documents in a single cluster. K-means clustering algorithm is a center predictable approach which selects initial centers randomly. In this paper, improved k-means clustering algorithm is used for text documents which predicts centers manually. Standard k-means uses cosine similarity but improved k-means uses Euclidean similarity measures for grouping similar documents in a single cluster. According to experimental results, accuracy of improved k-means is high as compared to existing k-means algorithm. Performance of proposed algorithm is measured in terms of F-measure, Precision, time and recall.
Key-Words / Index Term
Clustering, Document clustering, Tf-Idf, K-means, Euclidean similarity
References
[1] Svadas, T., & Jha, J. (2015). Document Cluster Mining on Text Documents.
[2] Thomas, A. M., & Resmipriya, M. G. (2016). An efficient text classification scheme using clustering. Procedia Technology, 24, 1220-1225.
[3] Punitha, S. C., Jayasree, R., & Punithavalli, M. (2013, January). Partition document clustering using ontology approach. In Computer Communication and Informatics (ICCCI), 2013 International Conference on (pp. 1-5). IEEE.
[4] Rai, P., & Singh, S. (2010). A survey of clustering techniques. International Journal of Computer Applications, 7(12), 1-5.
[5] Murugesan, K., & Zhang, J. (2011, July). Hybrid bisect K-means clustering algorithm. In Business Computing and Global Informatization (BCGIN), 2011 International Conference on (pp. 216-219). IEEE.
[6] Agrawal, R., & Phatak, M. (2012). Document clustering algorithm using modified k-means.
[7] Rafi, M., Maujood, M., Fazal, M. M., & Ali, S. M. (2010, June). A comparison of two suffix tree-based document clustering algorithms. In Information and Emerging Technologies (ICIET), 2010 International Conference on (pp. 1-5). IEEE.
[8] Mishra, R. K., Saini, K., & Bagri, S. (2015, May). Text document clustering on the basis of inter passage approach by using k-means. In Computing, Communication & Automation (ICCCA), 2015 International Conference on (pp. 110-113). IEEE.
[9] Zhang, Z., Cheng, H., Zhang, S., Chen, W., & Fang, Q. (2008, June). Clustering aggregation based on genetic algorithm for documents clustering. In Evolutionary Computation, 2008. CEC 2008.(IEEE World Congress on Computational Intelligence). IEEE Congress on (pp. 3156-3161). IEEE.
[10] Wang, J., & Su, X. (2011, May). An improved K-Means clustering algorithm. In Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on (pp. 44-46). IEEE.
[11] Singh, V. K., Tiwari, N., & Garg, S. (2011, October). Document clustering using k-means, heuristic k-means and fuzzy c-means. In Computational Intelligence and Communication Networks (CICN), 2011 International Conference on (pp. 297-301). IEEE.
[12] Sahu, L., & Mohan, B. R. (2014, December). An improved K-means algorithm using modified cosine distance measure for document clustering using Mahout with Hadoop. In Industrial and Information Systems (ICIIS), 2014 9th International Conference on (pp. 1-5). IEEE.
Citation
J. Verma, N. Verma, "Optimizing Document Clustering for Dimension Reduction using improved k-means," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.233-238, 2018.
Analysis of Attacks against Optimized Link State Routing Protocol -based Mobile Ad Hoc Networks
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.239-242, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.239242
Abstract
Mobile Adhoc Networks are vulnerable to attacks due to its dynamic topology. All attacks, blackhole, dropping attack and flooding are analyzed and implemented against Optimized Link State Routing Protocol on Network Simulator-3. The results clearly show how attacks could rigorously affect communication and, the need for security solutions for such highly dynamic networks.
Key-Words / Index Term
Mobile Adhoc Networks, Optimized Link State Routing Protocol, Attacks, Blackhole, Dropping , Flooding
References
[1] R. D. Pietro, S. Guarino, N. Verde, and J. Domingo-Ferrer, “Security in wireless ad-hoc networks a survey,” Computer Communications, vol. 51, pp. 1 – 20, 2014.
[2] E. F. Ahmed, R. A. Abouhogail, and A. Yahya, "Performance evaluation of blackhole attack on vanet`s routing protocols," International Journal of Software Engineering and Its Applications, vol. 8, no. 9, pp. 39 – 54, 2014.
[3] P. Yi, Z. Dai, S. Zhang, and Y. Zhong, “A new routing attack in mobile ad hoc networks,” International Journal of Information Technology, vol. 11, no. 2, pp. 83–94, 2005.
[4] Bounpadith Kannhavong, Hidehisa Nakayama, Abbas Jamalipour “Analysis of the Dropping Attack Against OLSR-based Mobile Ad Hoc Networks” Proc. 7th IEEE International Symposium on Computer Network, pp 30-35,2006.
[5] Sudhir Agrawal, Sanjeev Jain, Sanjeev Sharm, “A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks” Paper published in Journal of Computing, { ISSN-2151-9617}, pp. 41-48, January 2011.
[6] K. Biswas and Md. Liaqat Ali, “Security threats in Mobile Ad-Hoc Network”, Master Thesis, Blekinge Institute of Technology” Sweden, 22nd March 2007.
[7] G.A. Pegueno and J. R. Rivera, “Extension to MAC 802.11 for performance Improvement in MANET”, Karlstads University, Sweden, December 2006.
[8] Ankur Thakur and Anuj Gupta, “Black Hole Problem with OLSR Protocol in MANETs”, International Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 4. Pp, 1-4, Sept 2014.
[9] R.Kumari, P. Nand, “Performance Analysis of existing Routing Protocols” International Journal of Scientific Research in Computer Science and Engineering (IJSRCSE), ISSN-2320-7639, Vol. 5 No. 5, October-2017.
[10] R. Kumari, P. Nand , “ Performance analysis for MANETs using certain realistic mobility models:NS-2”,International Journal of Scientific Research in Computer Science and Engineering (IJSRCSE),Vol.6, Issue.1 , pp.70-77, Feb-2018.
[11] Leena Pal, Pradeep Sharma, Netram Kaurav and Shivlal Mewada, "Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.5, pp.1-4, 2013.
Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "A Novel Security Based Model for Wireless Mesh Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.1, pp.11-15, 2013.
Citation
Himani Bali, Naveen Hemrajani, "Analysis of Attacks against Optimized Link State Routing Protocol -based Mobile Ad Hoc Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.239-242, 2018.
A Model for Mapping Semantic Web Data with Heterogeneous Data Sources Using SPARQL
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.243-254, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.243254
Abstract
Semantic Web is extending web2.0 to web3.0 with an idea of incorporating intelligence or meaning to the existing web. Relational databases have been playing a crucial role in software development since many years. Also rapidly developing semantic web is based on mapping and compatibility of the existing data on the web which may be either in relational or non-relational form. RDF & Web Ontology are two major representations in semantic web, and SPARQL is a query language, used to query data from different semantic web resources like RDF/OWL/LOD (Linked Open Data). SPARQL processing and execution is playing a crucial role in mapping data from different sources. In this paper, first, a brief literature survey is being presented and discussed, focusing on SPARQL usage in mapping. Second, it focuses on various concerns of SPARQL query processing and execution in different domains along with SQL conversions and illustrations. Third, it presents analysis of various approaches and tools for the migration of data into semantic web from other data sources supported by a proposed model for information processing.
Key-Words / Index Term
SPARQL, RDF, OWL, LOD, Hadoop, Relational Databases (RDB), D2RQ, Twinkle, Jena fuseki, Jena ARQ, DBpedia
References
[1] E. Prud`hommeaux, A. Seaborne, “SPARQL Query Language for RDF,” W3C Recommendations , Jan , 2008.
[2] RDF Working Group, “RDF,” W3C Working Group, February 2014.
[3] A. Cuzzocrea, R. Buyya, V. Passanisi and G. Pilato, "MapReduce based Algorithms for managing Big RDF Graphs: State-of-art analysis, paradigms and future directions," in Cluster, Cloud and Grid Computing (CCGRID), 2017.
[4] H. Naacke, O. Curé and B. Amann, "SPARQL query processing with Apache Spark," arXiv.org Database, 2016.
[5] M. Franck, F. Moantagnat and C. Zucker, "A Survey of RDB to RDF translation approaches and Tools," laboratory informatiue, signaux et systems de Sophia antipolis, 2014.
[6] M. Hazber, R. Li, X. Gu, G. Xu and Y. Li, "Semantic SPARQL query in a relational database based on ontology construction," in International conference on Semantics, Knowledge and Grids, IEEE, 2015.
[7] OWL Working Group, "Web Ontology Language," 2012.
[8] S. Harris and A. Seaborne, "SPARQL 1.1 Query Language," 21 March 2013.
[9] A. Schatzle, M. Przyjaciel, S. Skilevic and G. Lausen, "S2RDF:RDF Querying with SPARQL on Spark," in VLDB Endowment, 2016.
[10] M. Grobe, "RDF, Jena, SPARQL and the Semantic Web," in SIGUCCS, Indianapolis, Indiana, USA, 2009.
[11] O. Hartig and G. Pirro, "SPARQL with Property Paths on the Web," Semantic Web Journal IOS Press, 2016.
[12] D. Spanos, P. Stavrou and N. Mitrou, "Bringing relational databases into the Semantic Web: A survey," Semantic Web Journal IOS Press, pp. 169-209, 2012.
[13] B. DuCharme, Learning SPARQL: Querying and.updating with SPARQL 1.1, O’REILLY, 2nd Edition., 2013.
[14] T. White, Hadoop: The Definitive Guide, April: O`REILLY, 2015.
[15] J. Cardoso and A. Pinto, "‘The Web Ontology Language (OWL) and its applications," IGI Global, 2015.
[16] B. Motik, P. Patel-Schneider and B. Grau, "OWL 2 Web Ontology Language," 2012.
[17] O. Hartig and R. Heese, "The SPARQL Query Graph Model for Query Optimization," in In Proceedings of the 4th European Semantic Web Conference (ESWC), Innsbruck, Austria, 2007.
[18] A. Chebotko, S. Lu, H. Jamil and F. Fotouhi, "Semantics Preserving SPARQL-to-SQL Query Translation for Optional Graph Patterns,," Technical Report TR-DB-052006-CLJF., 2016.
[19] P. Nikolaos, K. Ioannis, T. Dimitrios, K. Panagiotis and K. Nectarios, "H2RDF+: High-performance distributed joins over large-scale RDF graphs," in Big Data, 2013 IEEE International Conference on, 2013.
[20] J. Panawong, T. Ruangrajitpakorn and M. Buranarach, "An Automatic Database Generation and Ontology Mapping from OWL File," JIST, 2016.
[21] B. Bellini, P. Nesi and A. Venturi, "Linked open graph: Browsing multiple SPARQL entry points to build your own LOD views," Journal of Visual Languages & Computing, vol. 25, no. 6, pp. 703-716, December 2014.
[22] H. Oh, S. Chun, S. Eom and K. Lee, "Job-Optimized Map-Side Join Processing using MapReduce and HBase with Abstract RDF Data," in International Conference on Web Intelligence and Intelligent Agent Technology, 2015.
[23] T. Garcia and T. Wang, "Analysis of Big Data Technologies and Method - Query Large Web Public RDF Datasets on Amazon Cloud Using Hadoop and Open Source Parsers," in Seventh International Conference Semantic Computing (ICSC), Irvine, CA, USA, 2013.
[24] K. D. Mogotlane and J. Domneu, "Automatic Conversion of Relational databases into Ontologies: A Comparative Analysis of PROTÉGÉ Plug-ins Performances," International Journal of web & Semantic Technology (IJWest), 2016.
[25] K. Anyanwu, "A vision for SPARQL multi-query optimization on MapReduce," in 29th International Conference on Data Engineering Workshops (ICDEW), Brisbane, QLD, Australia, 2013.
[26] J. Lu, F. Cao, L. Ma ,Y. Yu1 and Y. Pan, “An Effective SPARQL Support over Relational Databases”, Springer-Verlag, Berlin Heidelberg, 2008.
[27] D. E. Spanos, P. Stavrou and N. Mitrou, "Bringing Relational Databases into the Semantic Web: A Survey," Semantic Web IOS Press, 2012.
[28] T. Health and C. Bizer, "Linked Data: Evolving the web into a Global Data Space," 2011.
[29] D. Calvanese, B. Cogrel, S. Komla-Ebri, R. Kontchakov, D. Lanti, M. Rezk, M. Rodriguez-Muro and G. Xiao, "Ontop: Answering SPARQL Queries over Relational Databases," Semantic Web Journal,IOS Press., 2016.
[30] Q. Trinh, K. Barker and R. Alhajj, "RDB2ONT: A Tool for Generating OWL Ontologies From Relational Database Systems," in Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services, 2006.
[31] J. Barrasa, O. Corcho and A. Perez, "R2O, an Extensible and Semantically Based Databaseto-ontology Mapping Language," in Second Workshop on Semantic Web and Databases, Springer-Verlag, Canada, 2004.
[32] C. P. d. Laborda and S. Conrad, "Relaional.OWL- A Data and schema representation format based on OWL," in Second Asia-Pacific Conference on Conceptual Modeling (APCCM2005),, 2005.
[33] G. Bumans, "Relational Database information availability to Semantic Web technologies," 2014.
[34] R. Gupta and S. Malik, "SPARQL Usage for Mapping Semantic Web Data (OWL/RDF) from Relational Database: A Revisit," in System Modeling and Advancement in Research Trends (SMART-2017), 2017.
[35] S. B. V. T. Aver, “Linked Open Data-Creating Knowledge out of the Interlinked Data", Springer, 2014.
[36] O. Hartig and J. Pérez, “LDQL: A Query Language for the Web of Linked Data”, Journal of Web Semantics, pp 9-29, 2016.
[37] A. Schätzle, M. Przyjaciel-Zablocki, T. Hornung and G. Lausen, "PigSPARQL: a SPARQL query processing baseline for big data," in ISWC-PD `13 Proceedings of the 12th International Semantic Web Conference (Posters & Demonstrations Track), Sydney, Australia, 2013.
[38] M.Ahmed , “Semantic Based Intelligent Information Retrieval through Data Mining and Ontology”, International Journal of Computer Sciences and Engineering. pp. 210-217, 2017.
Citation
R. Gupta, S.K. Malik, "A Model for Mapping Semantic Web Data with Heterogeneous Data Sources Using SPARQL," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.243-254, 2018.
Issues and Challenges In Reducing Data Breaches in Cloud Architecture
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.255-258, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.255258
Abstract
Cloud computing has increased awesome consideration from industry yet there are numerous issues that are in their primitive stage which is hampering the development of Cloud. One of these issues is security of information put away in the servers of data centres of Cloud specialist organizations. Numerous plans have been produced till date for guaranteeing security of information in Distributed Systems. Many strategies have been contemplated; dissected and new technique has been proposed which infix the parameters of security like confidentiality of data, recovery of data and uprightness of information to such an extent that it guarantees security of information put away in the servers of Cloud frameworks. This paper examines the imperative research and troubles that presents data breach in Cloud computing and gives best practices to specialist organizations and moreover attempts intend to impact cloud servers to upgrade their fundamental problems in this genuine monetary situation.
Key-Words / Index Term
Cloud Computing, Data Breach, Distributes System, Data Security
References
[1] D Zissis, D Lekkas. Addressing cloud computing security issues. Future Generation computer systems. 583-92, 2012.
[2] M Ali, SU Khan, AV Vasilakos. Security in cloud computing: Opportunities and challenges. Information sciences. vol1, no305, pg,357-83, 2015.
[3] M. E. Smid and D. K. Branstad, “The data encryption standard: Past
and future,” Proc. IEEE, vol. 76, no. 5, pp. 550-559, 1988.
[4] Emily Maltby, “Small companies look to Cloud for savings in 2011,” http://online.wsj.com/article/SB10001424052970203513204576047972349898048.html, December 29, 2010.
[5] J. Feng, Y. Chen, P. Liu, “Bridging the missing link of Cloud data storage security in AWS,” Proc. IEEE 7th Consumer Communications and Networking Conference (CCNC 2010), pp. 1-2, Jan. 2010, doi: 10.1109/CCNC.2010.5421770.
[6] “What is AWS?,” http://aws.amazon.com/what-is-aws/
[7] A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
[8] M. O. Rabin, “Efficient dispersal of information for security, load balancing and fault tolerance,” Journal of the ACM, vol. 36, no. 2, pp. 335-348,1989
[9] M. O. Rabin, “Fingerprinting by random polynomials,” Report TR-15-81, Center for Research in Computing Technology, Harvard University, 1981.
[10] R. Pletka, C. Cachin, “Cryptographic security for a high-performance distributed file system,” IBM Research, Technical report, Sept. 2006.
[11] E. Gheringer, “Choosing passwords: security and human factors,” Proc. of IEEE 90, pp. 369–373, 2000.
[12] R. Proctor, M. Lien, K. Vu, G. Salvendy, “Improving computer security for authentication of users: influence of proactive password restrictions, Behavior Research Methods,” Instruments and Computers 34, pp.163–169, 200
Citation
Savrabh Kumar Sharma, Rajneesh Singh, "Issues and Challenges In Reducing Data Breaches in Cloud Architecture," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.255-258, 2018.
Significant Programming and Mathematical Concepts of Semantic Web
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.259-265, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.259265
Abstract
Web is a global space for information where the data is largely present in unstructured or semi-structured form. Semantic Web is an extension of the present web scenario, envisioned to achieve a better collaboration between humans and machines by allowing the computer systems to understand the meaning of the user’s data and structuring the information on the web. Achieving this idea of a smart web includes realizing its programming and mathematical concepts as a significant aspect. Semantic web programming entails the representation and development of knowledge concepts and integrating them with applications. Algebra, combinatorics (graph theory), logic and set theory are the pure mathematics’ concepts that are majorly used by semantic web that forms its foundation and aids it in improving the similarity search, inferencing capabilities etc. In this paper, significant mathematical and programming concepts of semantic web have been explored, revisited, discussed and presented which may be a useful resource for semantic web researchers.
Key-Words / Index Term
Semantic Web, RDF, Ontology, Programming, Mathematical Concepts
References
[1] T. Berners-Lee, J. Hendler, and O. Lassila, “The semantic web”, Scientific American, Vol. 284, Issue 5, pp. 28-37, 2001.
[2] S. K. Malik, and SAM Rizvi, “An intelligent web framework based on ontology design”, Ph.D Thesis, Guru Gobind Singh Indraprastha University, 2014.
[3] G. Antoniou, & F. Van Harmelen, “A semantic web primer”, MIT press, 2004.
[4] J. Hebeler, M. Fisher, R. Blace, and A. Perez-Lopez, “Semantic web programming”, John Wiley & Sons, 2009.
[5] B. G. Humm, & A. Korobov, “Introducing layers of abstraction to semantic web programming”, In OTM Confederated International Conferences On the Move to Meaningful Internet Systems, Springer, pp. 412-423, 2011.
[6] S. Staab, S. Scheglmann, M. Leinberger & T. Gottron, “Programming the Semantic Web”, In European Semantic Web Conference, Springer, pp. 1-5, 2014.
[7] O. Lassila, “Programming semantic web applications: A synthesis of knowledge representation and semi-structured data”, Doctoral Dissertation, Nokia Research Center, Cambridge, 2007.
[8] C. Lange, “Ontologies and languages for representing mathematical knowledge on the semantic web”, Semantic Web, Vol. 4, Issue 2, pp. 119-158, 2013.
[9] C. Lange, “Integrating Mathematics into the Web of Data”, Linked Data in the Future Internet, Future Internet Assembly, pp. 12-16, 2010.
[10] S. Kaushik, et. al, “An algebra for composing ontologies”, In FOIS, Vol. 150, pp. 265-276, 2006.
[11] M. Marchiori, “The mathematical semantic web”, In International Conference on Mathematical Knowledge Management, Springer, pp. 216-223, 2016.
[12] O.A. Nevzorova, N. Zhiltsov, A. Kirillovich, & E. Lipachev, “OntoMath PRO ontology: a linked data hub for mathematics”, In International Conference on Knowledge Engineering and the Semantic Web, Springer, pp. 105-119, 2014.
Citation
N. Malik, S.K. Malik, "Significant Programming and Mathematical Concepts of Semantic Web," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.259-265, 2018.