Thursday, 21 November 2013

IEEE 2014: Building a Scalable System for Stealthy P2P-Botnet Detection

Technology - Available in Java

Abstract—Peer-to-peer (P2P) botnets have recently been adopted by botmasters for their resiliency against take-down efforts. Besides being harder to take down, modern botnets tend to be stealthier in the way they perform malicious activities, making current detection approaches ineffective. In addition, the rapidly growing volume of network traffic calls for high scalability of detection systems. In this paper, we propose a novel scalable botnet detection system capable of detecting stealthy P2P botnets.Our system first identifies all hosts that are likely engaged in P2P communications. It then derives statistical fingerprints to profile P2P traffic and further distinguish between P2P botnet traffic and legitimate P2P traffic. The parallelized computation with bounded complexity makes scalability a built-in feature of our system. Extensive evaluation has demonstrated both high detection accuracy and great scalability of the proposed system.

IEEE 2013: Hacktivism Trends Digital Forensic Tools and Challenges: A Survey

IEEE 2013 Transactions on Information and Communication Technologies 

Technology - Available in Java

Abstract— Hacktivism is the biggest challenge being faced by the Cyber world. Many digital forensic tools are being developed to deal with this challenge but at the same pace hackers are developing the counter techniques. This paper includes the digital forensics basics along with the recent trends of hacktivism in social networking sites, cloud computing, websites and phishing. The various tools of forensics with the platform supported, the recent versions and licensing details are discussed. The paper extends with the current challenges being faced by digital forensics. Keywords - Hacktivism; Computer forensics; Memory forensics; Network forensics; Mobile Phone forensics; Database forensics; Computer forensics Tools; Memory forensics Tools; Network forensics Tools; Mobile Phone forensics Tools; Database forensics
Tools; Anti digital forensics (ADF)

IEEE 2013: Data Security in Distributed System using Fully Homomorphic Encryption and Linear

IEEE 2013 Transactions on Communication Systems and Network Technologies

Technology - Available in Java

Abstract—Distributed computing is a method of computer processing in which different parts of a program run simultaneously on two or more computers that are communicating with each other over a system. Distributed computing is a type of segmented or corresponding computing, but the last term is most usually used to refer to dispensation in which different parts of a program run simultaneously on two or more processors that are part of the same computer. Beside all this there is security issues arise. Through insecure environment distribute the data to get the leakage problem inside the network communication or exchanges the resources of content information specification process. Previous system it cannot provides any verification and validation results specification process. There is no perfect encrypted format of data; it can contain less computational resources of information. In present system we are going to implement robust design with perfect security constraints. We also were implementing Linear Programming Condition and Fully Homomorphic encryption technique

IEEE 2013:Window - based streaming Video - on-Demand Transmission on BitTorrent-Like Peer-to-Peer Networks

IEEE 2013 consumer Communications and Networking Conference

Technology - Available in Java

Abstract—Peer-to-Peer (P2P) networks are distributed systems where no central authority rules the behavior of the individual peers. These systems relay on the voluntary participation of the peers to help each other and reduce congestion at the data servers. Bit Torrent is a popular file-sharing P2P application originally designed for non real-time data. Given the inherent characteristics of these systems, they have been considered to alleviate part of the traffic in conventional networks, particularly for streaming stored playback Video-on-Demand services. In this work, a window-based peer selection strategy for managed P2P networks is proposed. The basic idea is to select the down loader peers according to their progress in the file download process relative to the progress of the downloading peers. The aforementioned strategy is analyzed using both a fluid model and a Continuous Time Markov Chain. Also, abundance conditions in the system are identified. Index Terms - Streaming Stored Playback Video-on-Demand, Peer-to-peer Network, Bit Torrent

IEEE 2013: Rethinking Vehicular Communications: Merging VANET with Cloud Computing

IEEE 2013 Transactions on Cloud Computing Technology and Science

Technology - Available in Java

Abstract—Despite the surge in Vehicular Ad Hoc NETwork (VANET) research, future high-end vehicles are expected to under-utilize the on-board computation, communication, and storage resources. Olariu et al. envisioned the next paradigm shift from conventional VANET to Vehicular Cloud Computing (VCC) by merging VANET with cloud computing. But to date, in the literature, there is no solid architecture for cloud computing from VANET standpoint. In this paper, we put forth the taxonomy of VANET based cloud computing. It is, to the best of our knowledge, the first effort to define VANET Cloud architecture. Additionally we divide VANET clouds into three architectural frameworks named Vehicular Clouds (VC), Vehicles using Clouds (VuC), and Hybrid Vehicular Clouds (HVC). We also outline the unique security and privacy issues and research challenges in VANET clouds