submit CrossRef Open Access Subscribe New Journal Ideal

Click on image to enlarge

Software Networking

Kuinam J. Kim, Kyonggi University, South Korea

Associate Editor: Hyuncheol Kim, Namseoul University, South Korea

ISSN: 2445-9739 (Online Version)
Vol: 2017   Issue: 1

Published In:   January 2017

Publication Frequency: Continuous Article Publication

Search Available Volume and Issue for Software Networking

Composite Metrics for Network Security Analysis

doi: 10.13052/jsn2445-9739.2017.007
Simon Enoch Yusuf, Jin B. Hong, Mengmeng Ge and Dong Seong Kim

Department of Computer Science and Software Engineering, University of Canterbury, Private Bag 4800, Christchurch, New Zealand

Abstract: [+]    |    Download File [ 1201KB ]   |    Read Article Online

Abstract: Security metrics present the security level of a system or a network in both qualitative and quantitative ways. In general, security metrics are used to assess the security level of a system and to achieve security goals. There are a lot of security metrics for security analysis, but there is no systematic classification of security metrics that is based on network reachability information. To address this, we propose a systematic classification of existing security metrics based on network reachability information. Mainly, we classify the security metrics into host-based and network-based metrics. The host-based metrics are classified into metrics “without probability” and “with probability”, while the network based metrics are classified into “pathbased” and “non-path based”. Finally, we present and describe an approach to develop composite security metrics and it’s calculations using a Hierarchical Attack Representation Model (HARM) via an example network. Our novel classification of security metrics provides a new methodology to assess the security of a system.

Keywords: Attack Graphs, Cyber Security, Graphical Security Model, Security Assessment, Attack Trees.

FARIS: Fast and Memory-Efficient URL Filter on CPU and GPGPU

doi: 10.13052/jsn2445-9739.2017.006
Yuuki Takano and Ryosuke Miura

National Institute of Information and Communications Technology, Japan

Abstract: [+]    |    Download File [ 7269KB ]   |    Read Article Online

Abstract: Uniform resource locator (URL) filtering is a fundamental technology for intrusion detection, HTTP proxies, content distribution networks, contentcentric networks, and many other application areas. Some applications adopt URL filtering to protect user privacy from malicious or insecure websites. Some web browser extensions, such asAdBlock Plus, provide a URL-filtering mechanism for sites that intend to steal sensitive information.

Unfortunately, these extensions are implemented inefficiently, resulting in a slow application that consumes much memory. Although it provides a domain-specific language (DSL) to represent URLs, it internally uses regular expressions and does not take advantage ofthe benefits ofthe DSL. In addition, the number of filter rules become large, which makes matters worse.

In this paper,we propose the fast uniform resource identifier-specific filter, which is a domain-specific pseudo-machine for the DSL, to dramatically improve the performance of some browser extensions. Compared with a conventional implementation that internally adopts regular expressions, our proof-of-concept implementation is fast and small memory footprint.

Keywords: URL filter,Web, online advertisement.

Detection of Severe SSH Attacks Using Honeypot Servers and Machine Learning Techniques

doi: 10.13052/jsn2445-9739.2017.005
Gokul Kannan Sadasivam1, Chittaranjan Hota1, Bhojan Anand2

1Department of Computer Science and Information Systems, BITS, Pilani – Hyderabad Campus, Hyderabad, Telangana, India – 500078
2School of Computing, National University of Singapore, Computing 1, 13 Computing Drive, Singapore – 117417

Abstract: [+]    |    Download File [ 1761KB ]   |    Read Article Online

Abstract: There are attacks on or using an SSH server – SSH port scanning, SSH brute-force attack, and attack using a compromised server. Attacks using a server could be DoS attack, Phishing attack, E-mail spamming and so on. Sometimes an attacker breaks into a public SSH server and uses it for the above activities. Mostly, it is hard to detect the compromised SSH servers that were used by the attackers. However, by analysing the system logs an organisation can know about the compromises. For an organisation holding several SSH servers, it would be tedious to analyse the log files manually.Also, high-speed networks demand better mechanisms to detect the compromises. In this paper,we detect a compromised SSH session that is carrying out malicious activities. We use flow-based approach and machine learning techniques to detect a compromised session. In a flow-based approach, individual packets are not scrutinised. Hence, it works better on a high-speed network. The data is extracted from a distributed honeypot. The paper also describes the machine learning techniques with appropriate parameters and feature selection technique.Areal-time detection model that is tested on a public server is also presented. Several analyses proved that J48 decision tree algorithm and the PART algorithm are best suited for detection of SSH compromises. It was inferred that inter-arrival time between packets and the size of a packet payload play a significant role in detecting compromises.

Keywords: SSH Compromises, SSH Attacks, Machine Learning, Feature Selection, Flow-based Analysis.

Automated User Interface Generation Involving Field Classification

doi: 10.13052/jsn2445-9739.2017.004
Matrtin Tomasek and Tomas Cerny

Dept. of Computer Science, FEE Czech Technical University in Prague Technicka 2 Prague, Czech Republic

Abstract: [+]    |    Download File [ 1769KB ]   |    Read Article Online

Abstract: Software applications are designed with a concrete purpose in mind, specified by business owners basing on the individual requirements. The user-system interaction is specified in the analysis phase. This phase specifies inputs, outputs, interaction, etc. These elements could be specified separately based on the target platform. The designers know that the mobile clients could have a different application flow than desktop clients. However, this is not a rule and designer rarely think about the user context or application. This implies that outputs, inputs and interactions do not change automatically during the software lifecycle. In this paper we present techniques that can determine whether the user, which is in a particular context, should be required to spend his/her time to fill in fields that are not needed for accomplishing a specific business task. Moreover, these techniques are able to determine whether the fields should display or not, as well as how the system might interact with the user. Next, we present a computational architecture capable of these types of determinations and we demonstrate this technique in case study. Finally, we show how automatically combine user interface generation with our approach.

Keywords: MDD, automatically user interface generation, context-aware, business case, field classification, cross-cutting concerns.

Authentication and Authorization Rules Sharing for Internet of Things

doi: 10.13052/jsn2445-9739.2017.003
Michal Trnka and Tomas Cerny

Dept. of Computer Science, FEE, Czech Technical University, Technick´a 2, 166 27 Praha, Czech Republic

Abstract: [+]    |    Download File [ 954KB ]   |    Read Article Online

Abstract: Significant interest in internet of things drives both research and industry production these days. A lot of important questions has been solved but some remain opened. One of the essential unresolved issue is the identity management of particular end devices.

Having possibility to share authorization and authentication rules across network between various sensors, applications and users have clear advantages. It reduces duplication of those policies, while ensuring that they are coherent across the board. There are various proposals, methods and frameworks for identity management in normal environment. However, just few of them is usable in internet of things environment and even less have been made directly for the usage in the internet of things devices.

This paper proposes solution for management of devices for internet of things. The solution is based on central identity store. Each device has an associated account in the store that any device and application in the network can verify the device’s identity against. The central element does not provide only authentication of the devices, but the devices can be associated with different roles. Those roles can be used for authorization.

Case study for the proposed framework is built on top of the current web standards as OpenID Connect, OAuth and JSON Web Token. Also, central identity store is based on well-established open source solution. The communication scheme is very simple – after the device’s account is established, it retrieves OAuth 2.0 token and uses it to certify itself in every network connection. The token does not only contain authentication information, but also roles assigned to the device. The central element thus creates trusted environment and enables rapid response for any security events.

Keywords: Internet of Things, Security, Identity Management, Authentication, Authorization.

Holistic Service Orchestration over Distributed Micro Data Center

doi: 10.13052/jsn2445-9739.2017.002
TaeYeon Kim1,2 and Hongseok Jeon1,2

1Network Computing Convergence Research Section, Smart Network Research Department, Korea
2Electronics and Telecommunications Research Institute (ETRI), Korea

Abstract: [+]    |    Download File [ 1706KB ]   |    Read Article Online

Abstract: Three technologies, i.e. Cloud, SDN, and NFV, the most frequently touted as promising terms to pave the way to the next generation networking era are keenly needed to be harmonized for vertical application service providers. This holistic approach to orchestrate application service on the edge of the network is based on requirements such as Service Profile and Service Policy with environmental condition from service providers and network providers respectively. This paper shows how to organize and manage the application service from the perspective of end user side with two requirements, profile and policy, leveraging three disruptive technologies.

Keywords: Cloud, SD, NFV, orchestration.

An Evaluative Analysis of DUAL, SPF, and Bellman-Ford

doi: 10.13052/jsn2445-9739.2017.001
Shahab Tayeb and Shahram Latifi

Department of Electrical & Computer Engineering, University of Nevada, Las Vegas, NV, United States

Abstract: [+]    |    Download File [ 2550KB ]   |    Read Article Online

Abstract: This paper aims to discuss a comprehensive list of demerits associated with the use of Diffusing Update Algorithm compared to its link-state counterpart, namely, Shortest Path First algorithm which is a variant of Dijkstra’s algorithm. Such a comparison was neglected for the past two decades due to the proprietary nature of the former protocol. This has led to the prevalence of the latter which is why many computer network professionals adamantly recommend implementing link-state protocols in campus implementations. However, this is of importance today pursuant to the release of several IETF Internet drafts in an attempt to standardize the Enhanced Interior Gateway Routing Protocol. Additionally, the results are compared with Bellman-Ford as a simple but widespread routing solution.

Dynamic routing protocols rely on algorithms computing the shortest paths using weighted digraphs and tree traversals. In this paper, not only are the algorithms discussed but also an in-depth analysis of the various features of the aforementioned protocols is conducted. Abandoning the periodicity of update massages and operating in an event-driven fashion with automatic failover capability are some of the features that will be analysed. Part of the novelty of this paper lies in the mathematical representation of decisionmaking processes and metric computation. One of the notable findings of this paper is an evaluative analysis of convergence times achieved in a typical university campus routing implementation. Moreover, using wide metric vectors contributes to energy-aware routing and improved performance for jitter-sensitive services.

Keywords: Convergence, Diffusing Update Algorithm, Routing Protocols, Shortest Path First Algorithm,Wide Metrics.

River Publishers: Software Networking