Introduction of the Entropy-Based Method for Finding Influential Nodes in Information Dissemination on Online Social Networks
Majid
Ghayoori Sales
دانشگاه جامع امام حسین(ع)
author
Gholamreza
Bazdar
دانشگاه جامع امام حسین(ع)
author
Abolfazl
Sarkardeh
دانشگاه جامع امام حسین(ع)
author
text
article
2018
per
A complete reverse engineering (or blind identification) in an electronic battlefield determines the information conveyed by a received signal. Most of the research in the field of blind signal identification is around one-way and non-network communications in which the goal is to determine the information transmitted by a single transmitter. The first step of signal identification in communications networks is to determine the number of active users. In this paper, estimation of the number of users in a time-division multiple access (TDMA) network is considered. In order to estimate the number of users, a physical layer analysis can be applied to the received electromagnetic signals. However, due to some difficulties such as hardware limitations or closeness of active users, this method cannot always be employed. In these situations, a solution is to analyze the information in the upper layers of the network. In this paper, a method is proposed to estimate the number of active users using the redundant data generated by adaptive channel coding. Simulation results show that the proposed method is quite resistant against channel errors. In fact, the accuracy of the proposed method for signal to noise ratio of 7.3 dB is around 80%.
Electronic and Cyber Defense
Imam Hussein University
2322-4347
6
v.
2
no.
2018
1
10
https://ecdj.ihu.ac.ir/article_200175_933eade982799485af1166827ef41f53.pdf
Blind Estimation of Number of Users in TDMA Networks Using Redundancy of Adaptive Channel Coding
Mortaza
Ahmadian
دانشگاه تهران
author
Mahdi
Teymouri
تهران
author
text
article
2018
per
A complete reverse engineering (or blind identification) in an electronic battlefield, determines the information conveyed by a received signal. Most of the research in the field of blind signal identification is around one-way and non-network communications in which the goal is to determine the information transmitted by a single transmitter. The first step of signal identification in communications networks is to determine the number of active users. In this paper, estimation of the number of users in a time-division multiple access (TDMA) network is considered. In order to estimate the number of users, a physical layer analysis can be applied to the received electromagnetic signals. However, due to some difficulties such as hardware limitations or closeness of active users, this method cannot always be employed. In these situations, a solution is to analyze the information in the upper layers of the network. In this paper, a method is proposed to estimate the number of active users using the redundant data generated by adaptive channel coding. Simulation results show that the proposed method is quite resistance against channel errors In fact, for signal to noise ratio of 7.3 dB, the accuracy of the proposed method is around 80%. .
Electronic and Cyber Defense
Imam Hussein University
2322-4347
6
v.
2
no.
2018
11
20
https://ecdj.ihu.ac.ir/article_200176_50c1d591c3900fb3b7469bfe73277207.pdf
A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis
Mahmoud
Forooghy
امام حسین(ع)
author
Ali
Akramizadeh
دانشگاه تهران
author
Masoud
Bagheri
جامع امام حسین(ع)
author
text
article
2018
per
It is crucial to predict the other side possible actions in any conflict, especially in cyber security andcyberwars. In this paper, based on game theoretic analytical model, the decision-making process of tworivals during detection of vulnerability is discussed in cyberspace. Comparing the earlier approaches, theassumptions are made more realistic, such as possible retaliation of the opposed side, asymmetrical payoffsand risk of failure during usage of vulnerability and penetration. In order to achieve this goal, a new structureis proposed based on real conflicts in cyberwar. The proposed game is in extensive form with imperfectinformation in which the vulnerability is detected by chance for players. Based on Nash equilibrium concept,analytical approach proves that whenever players’ ability for cyber-attack are close together, bothsides will attend aggressive acts. The ability to detect vulnerabilities has less impact on strategy.
Electronic and Cyber Defense
Imam Hussein University
2322-4347
6
v.
2
no.
2018
21
28
https://ecdj.ihu.ac.ir/article_200177_965708b227c6ea736d8955c7c4ef8e05.pdf
Bayesian Networks Based Trust Model in Social Networks
Vahid
Hossein Nejad
دانشگاه آزاد واحد تبریز
author
Ali
Asgharpour Haji Kazem
-
author
text
article
2018
per
Social networks, networks that have come into existence, are on the Internet, whose purpose of the establishment is to communicate with different people from different societies. Social networks are a developed form whose information is not trusted by all individuals. Although, it is a popular network that can provide trusted information for some people. If one or more users receive some information from oth-ers, they should assure they have not recieved incorrect data from malicious users. Solutions to these prob-lems are confidence models. Provided that trust deals withpossibilities, Bayesian networks use possibilities to solve problems. As a result, the Bayesian network can improve the calculation of trust. In this study, the proposed model (BTSN) presents a model for calculating confidence using Bayesian networks for social networking. This model is able to calculate the confidence accurately and, in a large scale, can be used in social networks. In addition, the the performance and methods have been studied .
Electronic and Cyber Defense
Imam Hussein University
2322-4347
6
v.
2
no.
2018
29
38
https://ecdj.ihu.ac.ir/article_200178_78fbe19d9bd973305bf451aae4e0682e.pdf
Self-stabilizing Grundy Coloring Using Game Theory and Heuristics Ordering
Seyyed Mahmoud
Taheri
دانشگاه تهران
author
Hassan
Heydari
دانشگاه تهران
author
text
article
2018
per
Transient faults in distributed systems can be occurred in many situations like process failure and securityattacks. A self-stabilizing algorithm, regardless of the initial state, converges in finite time to legitimatestates and tolerates transient faults. In this paper, we propose a self-stabilizing Grundy coloring using someconcepts/results in the game theory. The proposed algorithm deals with autonomous networks, where nodesdo not have identifiers. By using Nash equilibrium, we prove our proposed algorithm converges in O(m)moves, where m is the number of network edges. Simulation results indicate that heuristics ordering leadsto decrease the number of colors up to 18% and increase the Convergence up to 5%.
Electronic and Cyber Defense
Imam Hussein University
2322-4347
6
v.
2
no.
2018
39
48
https://ecdj.ihu.ac.ir/article_200179_e6600c2c5e3368b62936fd7b8030bff1.pdf
Sequential Forward Feature Selection for Intrusion Detection System, Using Ant Colony Algorithm
Sadegh
Bejani
ایران
author
Mahdi
Abbasi
جامع امام حسین (ع)
author
text
article
2018
per
Intrusion detection system (IDS) is one of the most important security tools, which is used for detectingcomputer attacks. This System reacts based on two methods: misuse-based and anomaly-based detection.The time limitation to responding and using low efficiency algorithm is the biggest challenge for researchersto promote detection of attacks in IDS. One of the most significant stages in intrusion detection processis the accurate selection of features of IDS to promote the detection, based on these features. In this article,a new method is presented to determine the most effective features in IDS, based on misuse detection method.In this method, the features of NSL-KDD data set have been reduced by ant colony optimization in sequentialforward feature selection algorithm, utilizing PART classification algorithm. For evaluating successrate of this method, a specific software in Java language was implemented, using the functions of thelibrary of WEKA. The results compared with other successful methods show that this method increases detectionaccuracy rate, with concurrent detection of attack category, from 84.1% to 85.35%. Also, the detectiontime decreases from 0.31 seconds to less than 0.25 seconds in a data set of approximately twenty thousandmembers.
Electronic and Cyber Defense
Imam Hussein University
2322-4347
6
v.
2
no.
2018
49
63
https://ecdj.ihu.ac.ir/article_200180_794692c7f38eecf749f97d542e35822f.pdf
An Anti-Spam Framework for Advertising Targeting Smart Mobile Devices on IoT
Seyyed Mortaza
Pournaghi
قم
author
Yaqoub
Farjami
قم
author
text
article
2018
per
Today, technologies based on IoT are growing in many industrial areas. One of the most Fundamental technologies in IoT devices is RFID industry that has been widespread in many other fields of technology. RFID tags are used from supply chain to security issues and electronic passports. Cellular phones can play a significant role in the area of mobile advertising and they can operate as advertisement receivers from RFID tags that have been installed on objects in the environment. However, due to lower costs of this new advertising technology, advertisements in this channel will be more widespread; and then we would have a new portal for spams. The purpose of this article is suggesting a framework for advertising to smart mobile devices on IoT while preventing spam in ad-box. Framework and protocols expressed in this article have introduced a new generation of Mobile Advertising for which we call “Intelligent Mobile Advertising” or IM-Advertising. Unlike other spam prevention solutions that are used in other portals such as e-mail, our solution will power Ads and also it captures customer attention in an intelligent style. The Customer will only receive the ads which he specified, by type and benefits, and other ads will not enter his smart mobile system as spams. Also our suggested solution would not need any spam detection system and it is based on a fully legal framework. It makes our customer interested and at the same time collects valuable marketing information.
Electronic and Cyber Defense
Imam Hussein University
2322-4347
6
v.
2
no.
2018
65
81
https://ecdj.ihu.ac.ir/article_200181_38af4d2370b79d73265ff77785d0a02e.pdf
Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security
Majid
Farhadi
دانشگاه دامغان
author
Javad
Ghasemian
دانشگاه دامغان
author
Hossein
Sabzehparvar
دانشگاه علم و صنعت
author
text
article
2018
per
In this paper, we described Pearson's correlation coefficient inefficiency for analyzing the relationship between an image and encrypted one. Also, the information index was investigated as a suitable substitute for Pearson correlation coefficient. This weakness is independent of the encryption system of the image en-cryption; however, two encryption algorithms such as modified AES and W7 stream cipher have been used for laboratory calculations. In addition, by quantitative and qualitative examination of other standards for encryption analyzing of the image, the information index, in comparison with the Pearson correlation coef-ficient, shows the strengths and weaknesses of the image encryption algorithms better.
Electronic and Cyber Defense
Imam Hussein University
2322-4347
6
v.
2
no.
2018
83
91
https://ecdj.ihu.ac.ir/article_200182_8781285f81a74d9c683cd7377f422f26.pdf
Detection of Unknown Malicious Network Streams using Ensemble Learning
Hamid
Parvin
-
author
Vahideh
Rezaei
دانشگاه آزاد اسلامی یاسوج
author
Samad
Nejatian
دانشگاه ازاد اسلامی یاسوج
author
Roohullah
Omidvar
باشگاه پژوهشگران جوان و نخبگان دانشگاه ازاد اسلامی یاسوج
author
Milad
Yasrebi
دانشگاه آزاد اسلامی واحد شیراز
author
text
article
2018
per
Security is a significant issue in this world and is given several dimensions by varying circumstances.Among different security areas, cyber security can be claimed to have one of the most important places innew circumstances of this world. In this study, two virtual honeynets were designed in two different laboratoriesto help us study unknown attacks. Other scientific datasets were also used for this purpose. Imbalanceddata always cause problems for network datasets and reduce the efficiency for the prediction of minorityclasses. To cope with this problem, ensemble learning methods were applied in order to detect networkattacks and most specifically, unknown attacks, while taking advantage of different techniques andaction model learning. It was found that ensemble learning method was suitable for describing the securityproblems because activities done on computer systems can be viewed at multiple levels of abstraction andinformation can be collected from multiple data sources. Statistical analysis was used as the researchmethod in order to measure the reliability and validity of findings. Here, we applied statistical techniquesand tests to show that the algorithm designed by the proposed weighted voting and based on the geneticalgorithm has a better performance than other twelve classifiers.
Electronic and Cyber Defense
Imam Hussein University
2322-4347
6
v.
2
no.
2018
93
108
https://ecdj.ihu.ac.ir/article_200186_3a676332093391bc32d277a9b95d4c24.pdf
Target Tracking Algorithm in Wireless Sensor Networks with Optimum Power Consumption Using Quantized Observation
Mortaza
Sepahvand
دانشگاه جامع امام حسین(ع)
author
Ali
Naseri
جامع امام حسین(ع)
author
Meysam
Raeis Danaei
جامع امام حسین(ع)
author
Mohammad Hossein
Khanzadeh
جامع امام حسین(ع)
author
text
article
2018
per
Consensus-based methods are the most commonly used tracking methods in wireless sensor networks due to high error tolerance, precision tracking and scalability. But these methods, due to the high telecommunication overhead, do not have suitable energy efficiency and bandwidth in networks. The proposed tracking algorithm reduces the number of contributing sensors and the network interchange information overhead using dynamic clustering (based on the Cramer-Rao lower bound), and the adaptive quantization of the observations,. On the other hand, the algorithm uses a combination of Multi-lateration method and particle filtering to track targets based on the quantized information. This has led to a decrease in the accuracy of sent observations by 50% (4 bits). as a result, the tracking error is only 10% higher than the algorithm in which no quantization is used.
Electronic and Cyber Defense
Imam Hussein University
2322-4347
6
v.
2
no.
2018
109
121
https://ecdj.ihu.ac.ir/article_200183_da34aa216ff2c7162c7defa74c4f1135.pdf
A New And Efficient Method of Mass Masking and its Resistance Assessment to Power Analysis
Masoud
Masoumi
امام حسین
author
Ali
Dehghan Menshadi
دانشگاه امام حسین (ع)
author
Eghbal
Madadi
دانشگاه جامع امام حسین (ع)
author
Sobhan
Saei Moghaddam
تهران-اسلامشهر-میدان نماز-دانشگاه آزاد اسلامی واحد اسلامشهر
author
text
article
2018
per
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attemptto uncover part of a cipher key. Cryptographic security gets compromised if the current waveformsobtained correlate with those from a hypothetical power model of the circuit. In recent years, the security ofthe Advanced Encryption Standard (AES) against DPA, has received considerable attention. This paperpresents a practical implementation of advanced encryption standard (AES-128) algorithm combined with asimple yet effective masking scheme to protect it against differential and correlation power analysis attacks.The proposed masking scheme has advantages of easy software implementation and lower memory requirementcompared to conventional first-order masking technique. In addition, it is robust against both first andsecond-order differential power analysis. The experimental results and also the results of Welch’s T-Teststatistical analysis demonstrate that the proposed scheme has less information leakage than other existingconventional first-order masking schemes.
Electronic and Cyber Defense
Imam Hussein University
2322-4347
6
v.
2
no.
2018
123
134
https://ecdj.ihu.ac.ir/article_200184_99edb52d31233a65c728a1551a0ade29.pdf
Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle
Seyyed Mohammadreza
Mousavi Mirkalaei
دانشکده مهندسی برق، دانشگاه علم و صنعت ایران
author
Masoud
Kaveh
دانشکده مهندسی برق، دانشگاه علم و صنعت ایران
author
text
article
2018
per
The unique characteristics of the Underwater Acoustic Communication (UWAC) channel cause the UWAC systems to be very vulnerable to the malicious attacks. So, the bionic-based UWAC has been used due to its good covert performance, and its suitable frequency and correlation properties. It may not be covert in all the underwater environments, or an adversary can detect the message anyway. Therefore, this paper aims at proposing an improved Merkle hash tree based secure scheme that can resist the current possible underwater attacks, i.e., the replay attack, the fabricated message attack, the message altering attack, and the analyst attack. The security analysis indicates that the proposed scheme is resilient to the mentioned attacks. Also, the performance evaluations show that the proposed scheme is proportional to the UWAC limitations due to its efficiency in terms of energy consumption, communication overhead, and computation cost.
Electronic and Cyber Defense
Imam Hussein University
2322-4347
6
v.
2
no.
2018
135
146
https://ecdj.ihu.ac.ir/article_200185_b91b0b77706458401e47fcbc8a400a80.pdf