ORIGINAL_ARTICLE
A SECURE ARCHITECTURE FOR DEFENDING ARP SPOOFING ATTACKS USING A SWITCH BASED METHODOLOGY
In local networks, security weaknesses in the data link layer enable internal attacks. Althoughswitches and routers have some built in security features, they are not enough to fully ensure thesecurity of local networks. Moreover, these features require network administrators' involvement andare prone to miss-configuration. In addition, data link layer protocols used in local area networks(LANs) are not designed with built-in security features. The most dangerous attacks on layer 2 are ARPspoofing and MAC flooding attacks. Several schemes to mitigate, detect and prevent these attacks havebeen proposed, but each has its limitations. This paper proposes a detection and prevention system forARP spoofing attacks. The system consists of two back to back servers. An application on the serversallows authentication of users to a centralized server. The server, in turn, retrieves logged users to theswitch. Hence filtering of untrusted users is performed by telneting the main switch. The Performancestudy has shown the efficiency and superiority of the proposed system, as compared to the previouswork. Several performance metrics have been measured to show its fast response to detection andprevention of the ARP spoofing attacks. The system has been compared to one of the famouscommercial tools. The comparison has shown the superiority of our system, since the system detectiontime is 20 time faster than that of the commercial tool.
https://ijicis.journals.ekb.eg/article_15759_d41d8cd98f00b204e9800998ecf8427e.pdf
2014-01-01
1
19
10.21608/ijicis.2014.15759
W
Elkilani
wail.elkilani@cis.asu.edu.eg
1
Computer Systems Department, Faculty of Computers and Information, Ain Shames University Cairo, Egypt
AUTHOR
ORIGINAL_ARTICLE
MEDICAL DECISION SUPPORT SYSTEM FOR HEPATITIS C VIRUS PREDICTION USING DATA MINING TECHNIQUES
The healthcare environment is generally perceived as being ‘information rich’ yet ‘knowledgepoor’. Which, unfortunately, are not “mined” to discover hidden information for effective decisionmaking by healthcare practitioners. The health-care knowledge management can be improved throughthe integration of data mining and decision support. In this paper, we present a prototype Hepatitis CVirus Decision Support System (HCVDSS) that uses three data mining classification techniques,namely, Decision Trees, Naïve Bayes and Neural Network. Results show that each technique has itsown strength in realizing the objectives of the defined mining goals. HCVDSS can answer complex“what if” queries. Using medical profiles such as gender, residence, Alt and Ast the proposed HCVDSScan predict the likelihood of patients getting HCV disease. It enables significant knowledge, e.g.,patterns, relationships between medical factors related to HCV disease, to be established. The proposedHCVDSS, which is implemented on the .Net platform, is windows application, user-friendly, scalable,reliable and expandable.
https://ijicis.journals.ekb.eg/article_15760_d41d8cd98f00b204e9800998ecf8427e.pdf
2014-01-01
21
35
10.21608/ijicis.2014.15760
M
Girgis
moheb.girgis@mu.edu.eg
1
Department of Computer Science, Faculty of Science, Minia University, Egypt
AUTHOR
T
Mahmoud
d.tarek@mu.edu.eg
2
Department of Computer Science, Faculty of Science, Minia University, Egypt
AUTHOR
E
Eliwa
entesar.eliwa@mu.edu.eg
3
Department of Computer Science, Faculty of Science, Minia University, Egypt
AUTHOR
ORIGINAL_ARTICLE
PERFORMANCE EVALUATION OF HYBRID PTS-SLM TECHNIQUES VERSUS CONVENTIONAL PTS
Orthogonal Frequency Division Multiplexing (OFDM) is an attractive technique for wirelesscommunication over frequency-selective fading channels. Suffer from high Peak-to-Average PowerRatio (PAPR) limiting OFDM usage and reduces the efficiency of High Power Amplifier (HPA) orworse degrade BER. Many PAPR reduction techniques have been proposed in the literature, amongthem Partial Transmit Sequence (PTS) and Selected Mapping (SLM) are highly successful PAPRreduction techniques. However, the highly computational complexities of these techniques limit theirPAPR reduction capability. Recently different hybrid schemes combine PTS and SLM aim to reduce thecomputational complexity or obtain a better PAPR reduction performance compared with conventionalPTS. In this paper, a fairly comparison between PTS and the other hybrid techniques is done,considering technique that can reduce number of required additions and multiplications or at least oneof them less than PTS, as the best technique among others. Results show that only SH which canachieve this condition while the other hybrid techniques can't achieve that.
https://ijicis.journals.ekb.eg/article_15763_d41d8cd98f00b204e9800998ecf8427e.pdf
2014-01-01
37
50
10.21608/ijicis.2014.15763
I
Tarrad
tarradif@gmail.com
1
Electrical Engineering Department, Faculty of Engineering, Al-Azhar University, Cairo- Egypt
AUTHOR
ORIGINAL_ARTICLE
HM-LEACH: ENERGY EFFICIENT HETEROGENEOUS MOBILE LEACH PROTOCOL FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS
in wireless sensor networks (wsns) sensor nodes with sensing, computing and communicationinfrastructure are randomly deployed and organized as clusters. most of the existing sensor networksfocus on homogeneous in which the cluster heads are changed periodically. to improve the lifetime ofenergy constraint battery powered wsn; clustered heterogeneous sensor networks are analyzed. in thispaper, we study the impact of heterogeneity of nodes in terms of their energy in mobile wsns that arehierarchically clustered. we assume that a percentage of the population of sensor nodes is equippedwith the additional energy resources. we also assume that the sensor nodes are randomly distributedand are mobile, the coordinates of the sink and the dimensions of the sensor field are known.homogeneous clustering protocols assume that all the sensor nodes are equipped with the same amountof energy and as a result, they cannot take the advantage of the presence of node heterogeneity.adapting this approach, we introduce an energy efficient heterogeneous mobile leach protocol forheterogeneous wsns based on weighted election probabilities of each node to become a cluster headaccording to the residual energy in each node. Finally, the simulation results demonstrate that ourproposed heterogeneous clustering approach is more effective in prolonging the network lifetime andreduce energy consumption compared with m-leach protocol.
https://ijicis.journals.ekb.eg/article_15764_d41d8cd98f00b204e9800998ecf8427e.pdf
2014-01-01
51
61
10.21608/ijicis.2014.15764
E
Selem
eng.enas@ymail.com
1
Mathematics Department. Zagazig University, Zagazig, Egypt
AUTHOR
A
Khedr
akhedr@sharajah.ac.ae
2
Computer Science Department, . Sharjah University, Sharjah, UAE27272
AUTHOR
H
Nassar
nassar@ci.suez.edu.eg
3
Computer Science Department, Suez Canal University, Ismailia, Egypt
AUTHOR
ORIGINAL_ARTICLE
AUTOMATIC MACHINE FAULT DIAGNOSIS BASED ON WAVELET TRANSFORM AND PROBABILISTIC NEURAL NETWORKS
Machinery parts always put imprint on the product during the production processing.Industry in the developing country the discovery of defects depends on the human experience andspectrum analysis (SA). Fast Fourier Transform (FFT) is basis for SA and uses to extract the frequencyfeatures which help the experts to identifying the causes of defected parts in machine. In this paperpresents a new technique to automatic fault diagnosis. The proposed technique is constituted of twostages architecture: the first stage is analysis the product signals to extract the features by usingwavelet transform (WT). The second stage is devoted to the classification of defect from the features byusing probabilistic neural network (PNN). Naïve Bayesian algorithm and Bayesian net algorithm istaken for classification and compared. The novelty of the proposed method resides in the ability notonly with higher precision, but also with dimensionality reduction and higher speed than method ofFourier transform and mathematical statistics.
https://ijicis.journals.ekb.eg/article_15766_d41d8cd98f00b204e9800998ecf8427e.pdf
2014-01-01
63
79
10.21608/ijicis.2014.15766
Ahmed
Amin
ahmedel_sayed@mans.edu.eg
1
7 Mahmoud Hekal St. Computer Science Department, Mansoura University, Mansoura - Egypt
AUTHOR
ORIGINAL_ARTICLE
PETRI NET PERFORMANCE AND RELIABILITY MODELS FOR WIRELESS NETWORKS
Since the dynamic behavior of wireless networks inherits different communication patternsfor the execution processes of the desired parallel tasks and the occurrence processes of handoffoperations, the available reliability metrics are not applicable to study and analyze such networks.Therefore, in this paper, we propose a novel Petri net modeling methodology for accurately calculatingthe reliability of wireless networks that incorporate theses aspects, such as wireless CORBA network.The proposed reliability methodology is developed based on using the End-to-End ExpectedInstantaneous Reliability (EIR) measure. The EIR has the capability to measure the reliability ofwireless networks that incorporate the handoff processes as well as the service processes. In theproposed technique, we firstly build Generalized Stochastic Petri Net (GSPN) performance model fordescribing the different communication pattern that can occur among the various network resourcesunder the execution of parallel tasks. Secondly, we build GSPN performance model for describing thehandoff communication processes among the various network resources. Finally, we build genericreliability model consists of the following parts: the first part describes the execution of the desiredparallel tasks, the second part illustrates the mobility characteristic introduced by handoff processes,and the third part describes the dynamic behavior of failure processes of network resources. We studyand analyze the various reliability results as well as the performance results obtained from thedeveloped GSPN models under the effect of communication distance among the CORBA networkresources.
https://ijicis.journals.ekb.eg/article_15768_d41d8cd98f00b204e9800998ecf8427e.pdf
2014-01-01
81
107
10.21608/ijicis.2014.15768
A
Koriem
eng.ahmedkoriem@gmail.com
1
National Authority for Remote Sensing and Space Sciences (NARSS), Cairo, Egypt
AUTHOR
I
Tarrad
tarrad.f@gmail.com
2
Electrical Engineering Department., Faculty of Eng., Al-Azhar University, Cairo, Egypt
AUTHOR
H
Farahat
hassanmfarahat@hotmail.com
3
Systems & Computers Eng. Department, Faculty of Eng., Al-Azhar University, Cairo, Egypt
AUTHOR
ORIGINAL_ARTICLE
A NEW ENHANCED AUTHENTICATED KEY AGREEMENT PROTOCOL
In 2010, Deng and Deng investigated several Seo-Sweeny related protocols and presented anew improvement to Tseng’s protocol to avoid discovered attacks such as modification and off-linepassword guessing attacks. In this paper, we show that Deng-Deng protocol is still vulnerable to offlinepassword guessing attack, and then we present an enhancement to prevent such attacks.
https://ijicis.journals.ekb.eg/article_15769_d41d8cd98f00b204e9800998ecf8427e.pdf
2014-01-01
109
115
10.21608/ijicis.2014.15769
K
El-Dahshan
dahshan@gmail.com
1
Faculty of Science, Mathematics Department, Al-Azhar University, Cairo - Egypt
AUTHOR
E
Masameer
emadmasameer@yahoo.com
2
Faculty of Science, Mathematics Department, Al-Azhar University, Cairo - Egypt
AUTHOR
Ab
Elhabshy
abdallah@azhar.edu.eg
3
Faculty of Science, Mathematics Department, Al-Azhar University, Cairo - Egypt
AUTHOR