IOSR Journal of Computer Engineering (IOSR-JCE)

May – Jun 2016 Volume 18 - Issue 3

Version 1 Version 2 Version 3 Version 4 Version 5 Version 6

Paper Type : Research Paper
Title : A Study on Proposed Distributed Attack Detection Algorithm Using Experimental and Simulation Analysis
Country : India
Authors : Siva Balaji Yadav.C || R.Seshadri,PhD

Abstract: The attack detection rates are higher for large node deployment densities, as compared to the low density counterparts. This is because the attack detection scheme relies on both the individual traffic observations by the detector nodes, as well as the subsequent verification and reconstruction of observed traffic sub patterns by the detector nodes as well as the mGN nodes, for classification purposes. In this work, we evaluated the performance of our proposed distributed attack detection scheme, through experiments and simulation analysis.............

Keyword: Algorithm, distributed denial of service attacks, wireless sensor networks, Map-based attack detection scheme

[1]. Jalili, R., Imani-Mehr, F., Amini, M. and Shahriari, H. (2005). Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks, In Proc. of the First Information Security Practice and Experience Conference, pp. 192-203.
[2]. Gligor, V. D. (1984). A note on the denial-of-service problem, IEEE Trans-actions on Software Engineering 10(3): 320-324.
[3]. Jung, J., Krishnamurthy, B. and Rabinovich, M. (2002). Flash crowds and denial of service attacks: Characterization and implications for cdns and web sites, In Proc. of the Intl' World Wide Web Conference, pp. 252-262.
[4]. Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D. and Pister, K. (2000). System architecture directions for networked sensors, Acm Sigplan No- tices 35(11): 93-104.
[5]. Intanagonwiwat, C., Govindan, R. and Estrin, D. (2000). Directed discussion: A scalable and robust communication paradigm for sensor networks, In Proc. of the Sixth Annual Intl' Conf. on Mobile Computing and Networks (MOBICOM'00), pp. 56-67.


Paper Type : Research Paper
Title : Dark Secret of SNS's Popularity
Country : India
Authors : Sanjiv Kumar

Abstract: Abstract Facebook pages promising possibility to reach mass audience simply by using Facebook advertising platforms. Lately, the number of likes in Facebook play it role as an analysis to check its demand and advantage, this conduces boosting page likes; such as farm comes into the surface. Based on what has been suggested by some reports, like Farm which using network profile that likes other many pages to stay away from spam detection system, although based on our awareness Facebook promotions of pages uses systematic analysis also. This paper compares the different measurement of the study of the page, Facebook by likes cumulate and by like bots. We create a page which is a honeypot page, analyse using Facebook and bot method and analyse gathered "likes" based on profiles background.

Keyword: ...................

[1]. [1] R. Olbrich and C. Holsing, 'Facebook Ads', WIST, vol. 43, no. 10, pp. 557-560, 2014.
[2] Docs.seleniumhq.org, 'Selenium WebDriver'. [Online]. Available: https://seleniumhq.github.io/selenium/docs/api/java/org/openqa/selenium/safari/SafariDriver.html. [Accessed: 04- Sep- 2015].
[3] YouTube, 'Facebook Fraud', 2014. [Online]. Available: https://www.youtube.com/watch?t=19&v=oVfHeWTKjag. [Accessed: 13- Sep- 2015].
[4] Alex Beutel, 'Stopping Group Attacks by Spotting Lockstep Behavior in Social Networks', 2013. [Online]. Available: http://alexbeutel.com/papers/www2013_copycatch.pdf. [Accessed: 07-Sep- 2015].
[5] V. Baker, 'Battle of the bots: Fake social media accounts on the attack', Index on Censorship, vol. 44, no. 2, pp. 127-129, 2015.


Paper Type : Research Paper
Title : Web-Based Decision Support System for Water Quality Monitoring and Prediction for Outdoor Microalgae Cultivation
Country :  
Authors : Beroña, Elyzer A || Buntag, Daibey Rose B || Felomina, Tan, Mary Jane M. || Coronado, Armin S.

Abstract: In outdoor microalgae cultivation, water quality monitoring is essential for identifying any existing problem or any issues that could emerge in the future. It is very helpful in maintaining the water parameters to its optimum level to prevent unexpected death of microalgae. In outdoor cultivation, the temperature of the environment is changing which makes the blooming of microalgae less predictable. Since the environment is not controlled, the monitoring of water quality status becomes more demanding. There is a need for a web-based Decision Support System (DSS) that allows monitoringof water quality anytime, anywhere; andpredicts future water quality..........

Keyword: Decision Support System, Water Quality Monitoring, Forecasting System, Microalgae Cultivation, K-Nearest Neighbors

[1]. Gross, M. "Development and Optimization of Algal Cultivation Systems." Graduate Theses and Dissertations, Iowa State
University. 13138 (2013) p. 4.
[2]. Enzing, C., M. Ploeg , M. Barbosa, and L. Sijtsma. "Micro-algae based products for the food and feed sector: an outlook for
Europe." Institute for Prospective technological Studies, Joint Research Centre (2014)
[3]. Wolskers H., M. Barbosa, D. Kleinergins, R. Bosma and R. Wiuffels. "Microalgae: the green gold of the future" Wageningen UR
[4]. "EnAlgae: Decision Support Toolset," AIN: Algal Information Network, www.algae- network.eu/cms/?page_id=169, last
accessed October 11, 2015.
[5]. Booth N., E. Everman, I. Kuo, L.Sprague and L. Murphy. "A Web-based Decision Support System for Accessing Regional Water
Quality Conditions and Management Actions". Journal of the American Water Resources Association. Volume 41. Issue 5.
(October 2011) pp. 1136-1150


Paper Type : Research Paper
Title : Balancing Load in Computational Grids: A New Approach
Country : India
Authors : Debashreet Das || C.R.Tripathy

Abstract: The emergence of grid computing over the internet needs a hybrid load balancing algorithm which can take into account the various characteristics of the grid computing environment. Hence, this paper proposes a load balancing strategy called Match-Maker Algorithm, which takes into account the grid architecture, resource availability and job characteristics. More focus has been given to module migration algorithm in an automated dynamic manner for the problem of allocating software modules to the processing nodes.

Keyword: Grid computing, Load Balancing, Reference optimization problem

[1]. Yagoubi B., Slimani Y, "Load Balancing Strategy in Grid Environment", Journal of Information Technology and Applications, Vol.1, No. 4, 2007, pp.285-296.
[2]. Yagoubi et.al., "Load Balancing in Grid Computing", Asian Journal of Information Technology, 5(10), 2006, pp. 1095-1103.
[3]. Patel D., Das D., Tripathy C.R., "A new Approach for Grid Load Balancing among Heterogeneous Resources with Bandwidth Consideration",
[4]. Shirazi B.A. et.al., "Scheduling and Balancing in Parallel and Distributed Systems", IEEE Computer Society, 1995.
[5]. Kameda et.al., "An Algorithm for optimal static load balancing in distributed computing systems", IEEE Transactions on Computers, 1992.


Paper Type : Research Paper
Title : Exploring Different Forms of Trust towards Trusting Intention in Social Media for E-Commerce Purpose
Country : Malaysia
Authors : Fatima Riike Muraina || Mohd Khairudin Bin Kasiran

Abstract: Social media has been described as a platform for sharing information, buying and selling of goods and services through the internet. Thus, it has been described as a place where electronic commerce is been taken place. However, consumers in social media have been facing lots of risks while transacting on social media due to failure of current studies to establish the need for trusting intention of consumers of online products. Hence, this research is conceptually presented four different forms of trust as the main factors to be taken into consideration towards achieving trusting intention of buyers of online product

Keyword: Calculus-Based Trust, Disposition to Trust, E-Commerce, Institution-Based Trust, Interpersonal Trust, Social Media.

[1]. F. Abedi, and J. Zeleznikow, The Provision of Trustworthy Online Dispute Resolution for Business to Consumer Electronic Disputes, Proceedings of 7th Asia-Pacific Business Research Conference, 2014, 25-26.
[2]. Z.M. Aljazzaf, M. Perry, and M.A.M. Capretz, Online Trust: Definition and Principles, Proceedings of the Computing in the Global Information Technology, 2010, 163-168.
[3]. A. Aris, N. Mustaffa, and N.S.M. Zabarudin, Concepts and Constructs in Online Trust, Proceedings of International Conference on Research and Innovation in Information System, 2011, 1-6.
[4]. A. Beldad, M.D. Jong, and M. Steehouder, How Shall I Trust the Faceless and the Intangible? A Literature Review on the Antecedents of Online Trust, Computers in Human Behavior. Vol. 26, No. 5:857-869, 2010.
[5]. H.H Chang, and S.W. Chen, The Impact of Online Store Environment Cues on Purchase Intention: Trust and Perceived Risk as a mediator," Online information review, Vol. 32 Issue 6: 818 - 841, 2008.


Paper Type : Research Paper
Title : Hiding the Data into Meaningful Encrypted Image Using Reversible Data Hiding Technique
Country : India
Authors : G.Malathi || Dr.S.Raju

Abstract: Data hacking is one of the challenging problems in Internet world. It is possible to greatly improve our understanding and also should provide security to network data. The most existing encryption algorithms designed to protect image contents transform original image into a texture-like or noise-like image which results in a significantly large number of attacks..........

Keyword: New Image Encryption System, Reversible Data Hiding

[1]. Y. Chen, Comment on ''Cheating prevention in visual cryptography'', IEEE Trans. Image Process. 21 (7) (2012) 3319–3323.
[2]. X. Zhang, Scalable coding of encrypted images, IEEE Trans. Image Process. 21 (6) (2012) 3108–3114.
[3]. M. Zanin, A. N. Pisarchik, Gray code permutation algorithm for high-dimensional data encryption, Information Sciences 270 (0) (2014) 288–297.
[4]. Y. Q. Zhang, X. Y. Wang, A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice, Information Sciences 273 (0) (2014) 329–351.
[5]. S. Tedmori, N. Al Najdawi, Image cryptographic algorithm based on the haar wavelet transform, Information Sciences 269 (0) (2014) 21–34.


Paper Type : Research Paper
Title : Virtual Watermarking for Color images
Country : India
Authors : Ms. Rakshitha || Ms. Sharanya P.S

Abstract: This work proposes a virtual watermarking technique for colored images. In the proposed work, sender uses two images one is cover image and other is secret image. Let us consider the secret image to be embedded as sub image and the cover image as master image. The master image is chosen such that it is common to both sender and receiver such as Lena image which is used in most of the image processing projects. In the first phase of the project an index array is derived by applying virtual watermarking process..........

Keyword: Index array, Key exchange protocol, Master image, Sub image, Virtual watermarking process.

[1] Dhruv Arya, 2010 : A Survey of Frequency and Wavelet Domain Digital Watermarking Techniques, International Journal of Scientific & Engineering Research, Vol. 1, Issue 2.
[2] Dr. M. Mohamed Sathik, S. S. Sujatha, 2010 : An Improved Invisible Watermarking Technique for Image Authentication , International Journal of Advanced Science and Technology, vol. 24.
[3] G. Rosline Nesa Kumari, B. VijayaKumar, L. Sumalatha, Dr V.V. Krishna, 2009 : Secure and Robust Watermarking on Grey Level Images, International Journal of Advanced Science and Technology, Vol. 11.
[4] Keshav S Rawat, Dheerendra S Tomar, Digital Watermarking Schemes for Authorization Against Copying or Piracy of Color Images, Indian Journal of Computer Science and Engineering, Vol. 1 No. 4 295-300.


Paper Type : Research Paper
Title : Studying the Performance of a Local Area Network through a Statistical Results of a Simulation Program
Country : Saudi Arabia
Authors : Othman AL-Rusaini || Adnan Affandi

Abstract: The ring topology was selected among several topologies,since in the ring topology easy to isolate faults and it has good performs under heavy network load, but the most problem that face in the ring topology is the system delay. Two ways offdecreasing the time delay have been proposed. The first way is changing the address field, a modification in both the hardware and the software are essential to implement that. The second way is utilizing combination of twoor more topologies at same time such ring and bus or double ring ..etc. in order to reduce as much as possible..........

Keyword: Standby ring, Double ring, Self-heal technique, Optical fiber

[1] D. D. Clark, K. T. Pogran and D. P. Reed, "An Introduction to Local Area Networks", Proceedings of the IEEE, vol. 66, no. 11, pp.1497-1517, 1978
[2] Kartik Pandya, "Network Structure or Topology", International Journal of Advance Research in Computer Science and Management Studies, vol. 1, issue 2, pp.22-27, 2013
[3] Forouzan, "Data Communication and Networking", 5th Edition, Tata McGraw-Hill.
[4] Andrew S. Tanenbaum, "Computer Networks", 4th Edition, Prentice Hall PTR.
[5] Francis Idachaba, Dike U. Ike, and Orovwode Hope, "Future Trends in Fiber Optics Communication", Proceedings of the World Congress on Engineering 2014, vol. I, 2014.


Paper Type : Research Paper
Title : More General Sophisticated Method of Implementation of Fiber to the Homes
Country : Saudi Arabia
Authors : Othman AL-Rusaini || Adnan Affandi

Abstract: Fiber to the Homes (FTTH) is one of the most important fiber optic applications, since FTTH provides huge bandwidth. The single fiber offering multi services such as :( Data, Voice, Video etc.).Comparing FTTH and copper network fiber provides the highest reliability, the lowest maintenance costs, the highest security and the most revenue potential. It will mainly be used for broadband services such as high speed internet access, cable TV etc..........

Keyword: FTTH, Access Networks, Optical Networks, Passive Optical Network (PON).

[1] M. Chardy et al., "Optimizing splitter and fiber location in multilevel optical FTTH network", European Journal of Operational Research: Elsevier B.V, pp. 430-440, 2012.
[2] K. Casier, S. Verbrugge, R. Meersman, D. Colle, M. Pickavet and P. Demeester, "A clear and balanced view on FTTH deployment costs", Proceedings of FITCE Congress, pp.109-112, 2008.
[3] Andrew S. Tanenbaum, "Computer Networks", 4th Edition, Prentice Hall PTR.
[4] Behrouz A. Forouzan, "Data Communication and Networking", 5th Edition, Tata McGraw-Hill.
[5] P. Sharma, R. Arora, S. Pardeshi and M. Singh, "Fibre Optic Communications: An Overview", International Journal of Emerging Technology and Advanced Engineering, vol. 3, issue 5, pp. 474-479, 2013.


Paper Type : Research Paper
Title : A Developed Tool Matrix for Enhancing the Penetration Testing Methodology
Country : Egypt
Authors : Ayman Al-ahwal

Abstract: Penetration testingis the science of insecurity that finds the vulnerabilities in the target of evaluation (ToE).Open Source Security Testing Methodology Manual (OSSTMM)is the standardof pen-testing methodology. It consists of four phases: discovery, enumeration, vulnerability mapping, and exploitation. Itsuffers from no formal, accurate way to do the pen-testing. It depends on the tool selection experience of the pen-testers who take a long time to search for the up-to-date tools that need a virtual environment to test before execution on the real environment to ensure they do not have malicious code and to verify those give the required results...........

Keyword: Penetration testing, pen-testing, pen-testing phases, OSSTMM, pen-testing baseline, pen-testing tools, pen-testing limitations, pen-testing advantages.

[1] Herbert H. Thompson, "Software Security Assurance," Security innovation (SI), Inc. The application Security Company, www. securityinnovation.com, November 2006.
[2] A. Vorobiev and J. Han, "Specifying Dynamic Security Properties of Web Service Based Systems," SKG2006, Guilin, China, 2006.
[3] Stuart McClure, Joel Scambray, and George Kurtz, "Hacking Exposed: Network Security Secrets and Solutions," Osborne/McGraw-Hill, Fifth Edition, USA, 2006.
[4] John Chirillo, "Hack Attacks Revealed," Wiley computer publishing, USA, 2001.
[5] Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, and Alf Zugenmaier, " Shield: Vulnerability Driven Network Filters for Preventing Known Vulnerability Exploits," Microsoft Research, SIGCOMM'04, ACM conference, USA, 2004.


Researcher can also search IOSR published article contents through

IOSR Xplore