ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)
e-mail ijnsa@airccse.org
ERA Listed Journal
International Journal of Network Security & Its Applications (IJNSA)
Cited by 288
 Nowadays it is very important to maintain a high level security to ensure safe and trusted
communication of information between various organizations. But secured data communication over
internet and any other network is always under threat of intrusions and misuses. So Intrusion Detection
Systems have become a needful component in terms of computer and network security.
 This approach uses evolution theory to information evolution in order to filter the traffic data and
thus reduce the complexity. To implement and measure the performance of our system we used the
KDD99 benchmark dataset and obtained reasonable detection rate.
Computer & Network Security, Intrusion Detection, Intrusion Detection System, Genetic Algorithm,
KDD Cup 1999 Dataset.
http://airccse.org/journal/nsa/0312nsa08.pdf
AIRCC Publication
Cited by 244
Deploying cloud computing in an enterprise infrastructure bring significant security concerns.
Successful implementation of cloud computing in an enterprise requires proper planning and
understanding of emerging risks, threats, vulnerabilities, and possible countermeasures.
We believe enterprise should analyze the company/organization security risks, threats, and available
countermeasures before adopting this technology. In this paper, we have discussed security risks and
concerns in cloud computing and enlightened steps that an enterprise can take to reduce security risks
and protect their resources.
We have also explained cloud computing strengths/benefits, weaknesses, and applicable areas in
information risk management.
http://airccse.org/journal/nsa/0111jnsa03.pdf
AIRCC Publication
AIRCC Publication
Cited by 170
Vehicular Ad hoc Networks (VANETs) are the promising approach to provide safety and other
applications to the drivers as well as passengers. It becomes a key component of the intelligent transport
system. A lot of works have been done towards it but security in VANET got less attention
In this article, we have discussed about the VANET and its technical and security challenges. We have
also discussed some major attacks and solutions that can be implemented against these attacks.
VANET, VANET architecture, ARAN, SEAD, SMT, NDM, ARIADNE
http://airccse.org/journal/nsa/5513nsa08.pdf
Cited by 151
Cloud computing has formed the conceptual and infrastructural basis for tomorrow’s computing. The
global computing infrastructure is rapidly moving towards cloud based architecture. While it is important
to take advantages of could based computing by means of deploying it in diversified sectors, the security
aspects in a cloud based computing environment remains at the core of interest.
If security is not robust and consistent, the flexibility and advantages that cloud computing has to offer
will have little credibility. This paper presents a review on the cloud computing concepts as well as
security issues inherent within the context of cloud computing and cloud infrastructure.
http://airccse.org/journal/nsa/6114nsa03.pdf
AIRCC Publication
Cloud computing, cloud service, cloud security, computer network, distributed computing, security.
Cited by 149
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the
behaviors of users. Then these behaviors will be considered an attack or a normal behavior.
Though IDS has been developed for many years, the large number of return alert messages makes
managers maintain system inefficiently. In this paper, we use RST (Rough Set Theory) and SVM (Support
Vector Machine) to detect intrusions. First, RST is used to preprocess the data and reduce the dimensions.
Next, the features were selected by RST will be sent to SVM model to learn and test respectively. The
method is effective to decrease the space density of data. The experiments will compare the results with
different methods and show RST and SVM schema could improve the false positive rate and accuracy.
http://airccse.org/journal/nsa/0409s1.pdf
AIRCC Publication
Rough Set; Support Vector Machine; Intrusion Detection System; Attack Detection Rate;
Cited by 145
The proposed algorithm also addresses some difficulties of data mining such as handling continuous
attribute, dealing with missing attribute values, and reducing noise in training data. Due to the large
volumes of security audit data as well as the complex and dynamic properties of intrusion behaviours,
several data mining based intrusion detection techniques have been applied to network-based traffic
data and host-based data in the last decades
The experimental results prove that the proposed algorithm achieved high detection rates (DR) and
significant reduce false positives (FP) for different types of network intrusions using limited
computational resources.
http://airccse.org/journal/nsa/0410ijnsa2.pdf
AIRCC Publication
Decision Tree, Detection Rate, False Positive, Naive Bayesian classifier, Network Intrusion Detection
Cited by 136
In this paper, we discuss security issues for cloud computing, Big data, Map Reduce and Hadoop
environment. The main focus is on security issues in cloud computing that are associated with big data.
 Big data applications are a great benefit to organizations, business, companies and many large scale and
small scale industries.We also discuss various possible solutions for the issues in cloud computing security
and Hadoop.
cloud computing, big data and its applications, advantages are likely to represent the most promising
new frontiers in science.
http://airccse.org/journal/nsa/6314nsa04.pdf
AIRCC Publication
Cloud Computing, Big Data, Hadoop,Map Reduce, HDFS (Hadoop Distributed File System)
Cited by 134
Log files contain information about User Name, IP Address, Time Stamp, Access Request, number of
Bytes Transferred, Result Status, URL that Referred and User Agent. The log files are maintained by the
web servers.
By analysing these log files gives a neat idea about the user. This paper gives a detailed discussion
about these log files, their formats, their creation, access procedures, their uses, various algorithms used
and the additional arameters that can be used in the log files which in turn gives way toan effective
mining. It also provides the idea of creating an extended log file and learning the user behaviour.
http://airccse.org/journal/nsa/0111jnsa07.pdf
AIRCC Publication
Web Log file, Web usage mining, Web servers, Log data, Log Level directive.
e-mail ijnsa@airccse.org
Network and Wireless Network Security
Mobile, Ad Hoc and Sensor Network Security
Peer-to-Peer Network Security
Database and System Security
Intrusion Detection and Prevention
Internet Security & Applications
Security & Network Management
E-mail security, Spam, Phishing, E-mail fraud
Virus, worms, Trojan Protection
Security threats & countermeasures (DDoS, MiM, Session
Hijacking, Replay attack etc,)
Ubiquitous Computing Security
Web 2.0 security
Cryptographic protocols
Performance Evaluations of Protocols & Security
Application
For More Details send Mail
ijnsa@airccse.org
Web Page Link :
http://airccse.org/journal/ijnsa.html
Month of Issue
January, March, May, July, September, November
Authors are invited to submit papers for this journal
through Submission System. Submissions must be original and
should not have been published previously or be under
consideration for publication while being evaluated for this
Journal.
 Quality Assessment of Access Security Controls over Financial
Information
http://aircconline.com/ijnsa/V11N6/11619ijnsa01.pdf

More Related Content

PDF
Top Cited Papers - International Journal of Network Security & Its Applicatio...
PPTX
Top Cited Papers - International Journal of Network Security & Its Applicatio...
PPTX
International Journal of Network Security & Its Applications (IJNSA)
PPTX
Top Cited Papers - International Journal of Network Security & Its Applicatio...
PPTX
International Journal of Network Security & Its Applications (IJNSA)
PPTX
International Journal of Network Security & Its Applications (IJNSA)
PPTX
Top Cited Paper - The International Journal of Network Security & Its Applica...
PDF
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
International Journal of Network Security & Its Applications (IJNSA)
Top Cited Papers - International Journal of Network Security & Its Applicatio...
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
Top Cited Paper - The International Journal of Network Security & Its Applica...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...

What's hot (20)

PDF
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
PDF
Secure Cloud Environment Using RSA Algorithm
PDF
IRJET - Multimedia Security on Cloud Computing using Cryptography
PDF
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
PDF
An approach for secured data transmission at client end in cloud computing
PDF
Improving Data Storage Security in Cloud using Hadoop
PDF
IJARCCE 20
PDF
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
PPTX
Cloud Security (Domain1- 5)
PDF
Maintaining Secure Cloud by Continuous Auditing
PDF
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
PDF
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
PPTX
Cloud computing security- critical infrastructures
PDF
Cloud intrusion detection System
PDF
Data Search in Cloud using the Encrypted Keywords
PDF
IRJET- Storage Security in Cloud Computing
PDF
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
PDF
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
PDF
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
PDF
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
Secure Cloud Environment Using RSA Algorithm
IRJET - Multimedia Security on Cloud Computing using Cryptography
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
An approach for secured data transmission at client end in cloud computing
Improving Data Storage Security in Cloud using Hadoop
IJARCCE 20
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
Cloud Security (Domain1- 5)
Maintaining Secure Cloud by Continuous Auditing
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
Cloud computing security- critical infrastructures
Cloud intrusion detection System
Data Search in Cloud using the Encrypted Keywords
IRJET- Storage Security in Cloud Computing
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
Ad

Similar to International Journal of Network Security & Its Applications (IJNSA) (20)

PPTX
Paper-1 PPT.pptx
PDF
Vertualisation
PDF
TOP 5 Most View Article in Computer Science & Information Technology Research
PDF
Iaetsd reducing security risks in virtual networks by
PDF
November 2024-: Most Downloaded Articles in Computer Science & Information Te...
PPTX
Seminar PPT Rahul Patil.pptx cloud based intruder security system
PPTX
Technical_Seminar_PPT_Template_2023-24.pptx
PPTX
Seminar PPT Rahul Patil.pptx ppt slideshow
PDF
Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...
PPTX
Cloud security From Infrastructure to People-ware
PDF
May 2022: Most Downloaded Articles in Computer Science &Information Technology
PDF
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
PDF
Top 10 Download Article in Computer Science & Information Technology: October...
PDF
What Is Openstack And Its Importance
PDF
Top Download Article in Computer Science & Information Technology Research: O...
PDF
Analysis of Cloud Computing Security Concerns and Methodologies
PDF
Cloud Computing Using Encryption and Intrusion Detection
PDF
Eb31854857
PDF
Secure intrusion detection and countermeasure selection in virtual system usi...
PDF
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
Paper-1 PPT.pptx
Vertualisation
TOP 5 Most View Article in Computer Science & Information Technology Research
Iaetsd reducing security risks in virtual networks by
November 2024-: Most Downloaded Articles in Computer Science & Information Te...
Seminar PPT Rahul Patil.pptx cloud based intruder security system
Technical_Seminar_PPT_Template_2023-24.pptx
Seminar PPT Rahul Patil.pptx ppt slideshow
Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...
Cloud security From Infrastructure to People-ware
May 2022: Most Downloaded Articles in Computer Science &Information Technology
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Top 10 Download Article in Computer Science & Information Technology: October...
What Is Openstack And Its Importance
Top Download Article in Computer Science & Information Technology Research: O...
Analysis of Cloud Computing Security Concerns and Methodologies
Cloud Computing Using Encryption and Intrusion Detection
Eb31854857
Secure intrusion detection and countermeasure selection in virtual system usi...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
Ad

Recently uploaded (20)

PDF
Hazard Identification & Risk Assessment .pdf
PPTX
Module on health assessment of CHN. pptx
PDF
CRP102_SAGALASSOS_Final_Projects_2025.pdf
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PPTX
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PPTX
Computer Architecture Input Output Memory.pptx
PDF
semiconductor packaging in vlsi design fab
PDF
Empowerment Technology for Senior High School Guide
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
English Textual Question & Ans (12th Class).pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
HVAC Specification 2024 according to central public works department
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Hazard Identification & Risk Assessment .pdf
Module on health assessment of CHN. pptx
CRP102_SAGALASSOS_Final_Projects_2025.pdf
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
Computer Architecture Input Output Memory.pptx
semiconductor packaging in vlsi design fab
Empowerment Technology for Senior High School Guide
Unit 4 Computer Architecture Multicore Processor.pptx
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
English Textual Question & Ans (12th Class).pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
HVAC Specification 2024 according to central public works department
Cambridge-Practice-Tests-for-IELTS-12.docx
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
B.Sc. DS Unit 2 Software Engineering.pptx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf

International Journal of Network Security & Its Applications (IJNSA)

  • 1. ISSN 0974 - 9330 (Online); 0975 - 2307 (Print) e-mail ijnsa@airccse.org ERA Listed Journal
  • 3. Cited by 288  Nowadays it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions and misuses. So Intrusion Detection Systems have become a needful component in terms of computer and network security.  This approach uses evolution theory to information evolution in order to filter the traffic data and thus reduce the complexity. To implement and measure the performance of our system we used the KDD99 benchmark dataset and obtained reasonable detection rate. Computer & Network Security, Intrusion Detection, Intrusion Detection System, Genetic Algorithm, KDD Cup 1999 Dataset. http://airccse.org/journal/nsa/0312nsa08.pdf AIRCC Publication
  • 4. Cited by 244 Deploying cloud computing in an enterprise infrastructure bring significant security concerns. Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats, vulnerabilities, and possible countermeasures. We believe enterprise should analyze the company/organization security risks, threats, and available countermeasures before adopting this technology. In this paper, we have discussed security risks and concerns in cloud computing and enlightened steps that an enterprise can take to reduce security risks and protect their resources. We have also explained cloud computing strengths/benefits, weaknesses, and applicable areas in information risk management. http://airccse.org/journal/nsa/0111jnsa03.pdf AIRCC Publication
  • 5. AIRCC Publication Cited by 170 Vehicular Ad hoc Networks (VANETs) are the promising approach to provide safety and other applications to the drivers as well as passengers. It becomes a key component of the intelligent transport system. A lot of works have been done towards it but security in VANET got less attention In this article, we have discussed about the VANET and its technical and security challenges. We have also discussed some major attacks and solutions that can be implemented against these attacks. VANET, VANET architecture, ARAN, SEAD, SMT, NDM, ARIADNE http://airccse.org/journal/nsa/5513nsa08.pdf
  • 6. Cited by 151 Cloud computing has formed the conceptual and infrastructural basis for tomorrow’s computing. The global computing infrastructure is rapidly moving towards cloud based architecture. While it is important to take advantages of could based computing by means of deploying it in diversified sectors, the security aspects in a cloud based computing environment remains at the core of interest. If security is not robust and consistent, the flexibility and advantages that cloud computing has to offer will have little credibility. This paper presents a review on the cloud computing concepts as well as security issues inherent within the context of cloud computing and cloud infrastructure. http://airccse.org/journal/nsa/6114nsa03.pdf AIRCC Publication Cloud computing, cloud service, cloud security, computer network, distributed computing, security.
  • 7. Cited by 149 The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a normal behavior. Though IDS has been developed for many years, the large number of return alert messages makes managers maintain system inefficiently. In this paper, we use RST (Rough Set Theory) and SVM (Support Vector Machine) to detect intrusions. First, RST is used to preprocess the data and reduce the dimensions. Next, the features were selected by RST will be sent to SVM model to learn and test respectively. The method is effective to decrease the space density of data. The experiments will compare the results with different methods and show RST and SVM schema could improve the false positive rate and accuracy. http://airccse.org/journal/nsa/0409s1.pdf AIRCC Publication Rough Set; Support Vector Machine; Intrusion Detection System; Attack Detection Rate;
  • 8. Cited by 145 The proposed algorithm also addresses some difficulties of data mining such as handling continuous attribute, dealing with missing attribute values, and reducing noise in training data. Due to the large volumes of security audit data as well as the complex and dynamic properties of intrusion behaviours, several data mining based intrusion detection techniques have been applied to network-based traffic data and host-based data in the last decades The experimental results prove that the proposed algorithm achieved high detection rates (DR) and significant reduce false positives (FP) for different types of network intrusions using limited computational resources. http://airccse.org/journal/nsa/0410ijnsa2.pdf AIRCC Publication Decision Tree, Detection Rate, False Positive, Naive Bayesian classifier, Network Intrusion Detection
  • 9. Cited by 136 In this paper, we discuss security issues for cloud computing, Big data, Map Reduce and Hadoop environment. The main focus is on security issues in cloud computing that are associated with big data.  Big data applications are a great benefit to organizations, business, companies and many large scale and small scale industries.We also discuss various possible solutions for the issues in cloud computing security and Hadoop. cloud computing, big data and its applications, advantages are likely to represent the most promising new frontiers in science. http://airccse.org/journal/nsa/6314nsa04.pdf AIRCC Publication Cloud Computing, Big Data, Hadoop,Map Reduce, HDFS (Hadoop Distributed File System)
  • 10. Cited by 134 Log files contain information about User Name, IP Address, Time Stamp, Access Request, number of Bytes Transferred, Result Status, URL that Referred and User Agent. The log files are maintained by the web servers. By analysing these log files gives a neat idea about the user. This paper gives a detailed discussion about these log files, their formats, their creation, access procedures, their uses, various algorithms used and the additional arameters that can be used in the log files which in turn gives way toan effective mining. It also provides the idea of creating an extended log file and learning the user behaviour. http://airccse.org/journal/nsa/0111jnsa07.pdf AIRCC Publication Web Log file, Web usage mining, Web servers, Log data, Log Level directive.
  • 11. e-mail ijnsa@airccse.org Network and Wireless Network Security Mobile, Ad Hoc and Sensor Network Security Peer-to-Peer Network Security Database and System Security Intrusion Detection and Prevention Internet Security & Applications Security & Network Management E-mail security, Spam, Phishing, E-mail fraud Virus, worms, Trojan Protection Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,) Ubiquitous Computing Security Web 2.0 security Cryptographic protocols Performance Evaluations of Protocols & Security Application
  • 12. For More Details send Mail ijnsa@airccse.org Web Page Link : http://airccse.org/journal/ijnsa.html Month of Issue January, March, May, July, September, November
  • 13. Authors are invited to submit papers for this journal through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
  • 14.  Quality Assessment of Access Security Controls over Financial Information http://aircconline.com/ijnsa/V11N6/11619ijnsa01.pdf

Editor's Notes