• Title/Summary/Keyword: computer network security

Search Result 2,732, Processing Time 0.023 seconds

Behavioral Tendency Analysis towards E-Participation for Voting in Political Elections using Social Web

  • Hussain Saleem;Jamshed Butt;Altaf H. Nizamani;Amin Lalani;Fawwad Alam;Samina Saleem
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.189-195
    • /
    • 2024
  • The issue "Exploring Social Media and Other Crucial Success Elements of Attitude towards Politics and Intention for Voting in Pakistan" is a huge study embracing more issues. The politics of Pakistan is basically the politics of semantic groups. Pakistan is a multilingual state more than six languages. There are 245 religious parties in Pakistan, as elaborated by the Daily Times research. The use of social media sites in Pakistan peaked to its maximum after announcement of election schedule by the Election Commission of Pakistan in March 22, 2013. Most of the political parties used it for the recent elections in Pakistan to promote their agenda and attract country's 80 million registered electors. This study was aiming to investigate the role of social media and other critical variables in the attitude towards politics and intention for voting.

5th Generation Wireless Networks Security: Challenges and Solutions

  • Siddiq, Bashayer Ahmed Bin
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.157-162
    • /
    • 2022
  • In reason of the high capacity and low latency, the 5G wireless networks used nowadays in many of life applications such as: remote surgery and guiding vehicle. The high requirements of 5G networks makes it more vulnerable for security threats and attacks. This paper presents some challenges faced by 5G networks and presets some of the security solutions.

Database Security System for Information Protection in Network Environment

  • Jung, Myung-Jin;Lee, Chung-Yung;Bae, Sang-Hyun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.211-215
    • /
    • 2003
  • Network security should be first considered in a distributed computing environment with frequent information interchange through internet. Clear classification is needed for information users should protect and for information open outside. Basically proper encrypted database system should be constructed for information security, and security policy should be planned for each site. This paper describes access control, user authentication, and User Security and Encryption technology for the construction of database security system from network users. We propose model of network encrypted database security system for combining these elements through the analysis of operational and technological elements. Systematic combination of operational and technological elements with proposed model can construct encrypted database security system secured from unauthorized users in distributed computing environment.

  • PDF

Security in Network Virtualization: A Survey

  • Jee, Seung Hun;Park, Ji Su;Shon, Jin Gon
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.801-817
    • /
    • 2021
  • Network virtualization technologies have played efficient roles in deploying cloud, Internet of Things (IoT), big data, and 5G network. We have conducted a survey on network virtualization technologies, such as software-defined networking (SDN), network functions virtualization (NFV), and network virtualization overlay (NVO). For each of technologies, we have explained the comprehensive architectures, applied technologies, and the advantages and disadvantages. Furthermore, this paper has provided a summarized view of the latest research works on challenges and solutions of security issues mainly focused on DDoS attack and encryption.

Identifying Strategies to Address Human Cybersecurity Behavior: A Review Study

  • Hakami, Mazen;Alshaikh, Moneer
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.299-309
    • /
    • 2022
  • Human factor represents a very challenging issue to organizations. Human factor is responsible for many cybersecurity incidents by noncompliance with the organization security policies. In this paper we conduct a comprehensive review of the literature to identify strategies to address human factor. Security awareness, training and education program is the main strategy to address human factor. Scholars have consistently argued that importance of security awareness to prevent incidents from human behavior.

The Security Quality of Computer Network (컴퓨터 네트워크의 보안 품질)

  • 신장균;박병호;유진철
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1995.11a
    • /
    • pp.41-47
    • /
    • 1995
  • This research suggests a criterion, security quality, which is a unifying principle in computer network security that has the lack of a unifying principle. The security quality includes secrecy, integrity, recording, and availability among the factors that represent the security evaluation of the computer system. So, we defined the security quality, which is a basis for determining the security level, as the grand total of evaluation about each factor.

  • PDF

Joint Virtual User Identification and Channel Security En/Decoding Method for Ad hoc Network

  • Zhang, Kenan;Li, Xingqian;Ding, Kai;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.241-247
    • /
    • 2022
  • Ad hoc network is self-organized network powered by battery. The reliability of virtual user identification and channel security are reduced when SNR is low due to limited user energy. In order to solve this problem, a joint virtual user identification and channel security en/decoding method is proposed in this paper. Transmitter-receiver-based virtual user identification code is generated by executing XOR operation between orthogonal address code of transmitter and pseudo random address code of receiver and encrypted by channel security code to acquire orthogonal random security sequence so as to improve channel security. In order to spread spectrum as well as improve transmission efficiency, data packet is divided into 6-bit symbols, each symbol is mapped with an orthogonal random security sequence. Subspace-based method is adopted by receiver to process received signal firstly, and then a judgment model is established to identify virtual users according to the previous processing results. Simulation results indicate that the proposed method obtains 1.6dB Eb/N0 gains compared with reference methods when miss alarm rate reaches 10-3.

Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks

  • Reshma, CR.;Arun, kumar B.R
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.168-174
    • /
    • 2021
  • The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user's bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information's such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.

Review Of Some Cryptographic Algorithms In Cloud Computing

  • Alharbi, Mawaddah Fouad;Aldosari, Fahd;Alharbi, Nawaf Fouad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.41-50
    • /
    • 2021
  • Cloud computing is one of the most expanding technologies nowadays; it offers many benefits that make it more cost-effective and more reliable in the business. This paper highlights the various benefits of cloud computing and discusses different cryptography algorithms being used to secure communications in cloud computing environments. Moreover, this thesis aims to propose some improvements to enhance the security and safety of cloud computing technologies.

Survey of Algorithms and Techniques Used to Improve the Security of A Public Wi-Fi Network

  • Aloufi, Hanouf;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.194-202
    • /
    • 2022
  • The use of public Wi-Fi has increased in recent years with many people like to spend their time outside in malls or café shops which provide public Wi-Fi for their customers. However, since the public Wi-Fi can be accessed from any device the security of public Wi-Fi plays a big role to prevent the stealing of information by an attacker with methods and techniques such as WPA, WPA2 and WPA3. However, it is well known to the attackers that these methods are not difficult to get hacked by the attacker device to take the client precious information. Some researches were done in increasing the security of public Wi-Fi each with their own different technique or algorithm to provide more secure connection to the public Wi-Fi and prevent any unauthorized user to connect to avoid stealing the data of another legal user. Theses research paper are evaluated to learn which method excel in protecting the public Wi-Fi security by giving an analysis to the methods provided by the research paper with comparing the pros and cons of each algorithm. Moreover, the research displays that there are methods to actually provide security to the public Wi-Fi with each being very different in implementation.