-
Quantum Secure Direct Communication using Entanglement and Super Dense Coding
Authors:
Ola M. Hegazy,
Ayman M. Bahaa-Eldin,
Yasser H. Dakroury
Abstract:
This paper introduces a new quantum protocol for secure direct communication. This protocol is based on Entanglement and Super-Dense coding. In this paper we present some basic definitions of entanglement in quantum mechanics, present how to use the maximally entangled states known as Bell States, and super dense coding technique to achieve secure direct message communication. Finally, we will app…
▽ More
This paper introduces a new quantum protocol for secure direct communication. This protocol is based on Entanglement and Super-Dense coding. In this paper we present some basic definitions of entanglement in quantum mechanics, present how to use the maximally entangled states known as Bell States, and super dense coding technique to achieve secure direct message communication. Finally, we will apply some error models that could affect the transmission of the quantum data on the quantum channels, and how to treat these errors and acquire a safe transmission of the data.
△ Less
Submitted 21 January, 2014;
originally announced February 2014.
-
Increasing Server Availability for Overall System Security: A Preventive Maintenance Approach Based on Failure Prediction
Authors:
Ayman M. Bahaa-Eldin,
Hoda K. Mohamead,
Sally S. Deraz
Abstract:
Server Availability (SA) is an important measure of overall systems security. Important security systems rely on the availability of their hosting servers to deliver critical security services. Many of these servers offer management interface through web mainly using an Apache server. This paper investigates the increase of Server Availability by the use of Artificial Neural Networks (ANN) to pred…
▽ More
Server Availability (SA) is an important measure of overall systems security. Important security systems rely on the availability of their hosting servers to deliver critical security services. Many of these servers offer management interface through web mainly using an Apache server. This paper investigates the increase of Server Availability by the use of Artificial Neural Networks (ANN) to predict software aging phenomenon. Several resource usage data is collected and analyzed on a typical long-running software system (a web server). A Multi-Layer Perceptron feed forward Artificial Neural Network was trained on an Apache web server data-set to predict future server resource exhaustion through uni-variate time series forecasting. The results were benchmarked against those obtained from non-parametric statistical techniques, parametric time series models and empirical modeling techniques reported in the literature.
△ Less
Submitted 21 January, 2014;
originally announced January 2014.
-
Genetic Algorithms and its use with back-propagation network
Authors:
Ayman M. Bahaa-Eldin,
A. M. A. Wahdan,
H. M. K. Mahdi
Abstract:
Genetic algorithms are considered as one of the most efficient search techniques. Although they do not offer an optimal solution, their ability to reach a suitable solution in considerably short time gives them their respectable role in many AI techniques. This work introduces genetic algorithms and describes their characteristics. Then a novel method using genetic algorithm in best training set g…
▽ More
Genetic algorithms are considered as one of the most efficient search techniques. Although they do not offer an optimal solution, their ability to reach a suitable solution in considerably short time gives them their respectable role in many AI techniques. This work introduces genetic algorithms and describes their characteristics. Then a novel method using genetic algorithm in best training set generation and selection for a back-propagation network is proposed. This work also offers a new extension to the original genetic algorithms
△ Less
Submitted 21 January, 2014;
originally announced January 2014.
-
Classification of IDS Alerts with Data Mining Techniques
Authors:
Hany Nashat Gabra,
Ayman Mohammad Bahaa-Eldin,
Huda Korashy
Abstract:
A data mining technique to reduce the amount of false alerts within an IDS system is proposed. The new technique achieves an accuracy of 99% compared to 97% by the current systems.
A data mining technique to reduce the amount of false alerts within an IDS system is proposed. The new technique achieves an accuracy of 99% compared to 97% by the current systems.
△ Less
Submitted 20 January, 2014;
originally announced January 2014.
-
Intelligent Systems for Information Security
Authors:
Ayman M. Bahaa-Eldin
Abstract:
This thesis aims to use intelligent systems to extend and improve performance and security of cryptographic techniques. Genetic algorithms framework for cryptanalysis problem is addressed. A novel extension to the differential cryptanalysis using genetic algorithm is proposed and a fitness measure based on the differential characteristics of the cipher being attacked is also proposed. The complexi…
▽ More
This thesis aims to use intelligent systems to extend and improve performance and security of cryptographic techniques. Genetic algorithms framework for cryptanalysis problem is addressed. A novel extension to the differential cryptanalysis using genetic algorithm is proposed and a fitness measure based on the differential characteristics of the cipher being attacked is also proposed. The complexity of the proposed attack is shown to be less than quarter of normal differential cryptanalysis of the same cipher by applying the proposed attack to both the basic Substitution Permutation Network and the Feistel Network. The basic models of modern block ciphers are attacked instead of actual cipher to prove that the attack is applicable to other ciphers vulnerable to differential cryptanalysis. A new attack for block cipher based on the ability of neural networks to perform an approximation of mapping is proposed. A complete problem formulation is explained and implementation of the attack on some hypothetical Feistel cipher not vulnerable to differential or linear attacks is presented. A new block cipher based on the neural networks is proposed. A complete cipher structure is given and a key scheduling is also shown. The main properties of neural network being able to perform mapping between large dimension domains in a very fast and a very small memory compared to S-Boxes is used as a base for the cipher.
△ Less
Submitted 15 January, 2014;
originally announced January 2014.
-
ATDSR: Trusted On-Demand Routing Protocol based on Agents for Mobile Ad-hoc Networks
Authors:
Ayman M. Bahaa-ElDin,
Islam Tharwat A. Halim,
Hossam M. A. Fahmy
Abstract:
The routing performance in Mobile Ad-hoc Networks (MANETs) relies on the co-operation of the individual nodes that constitute the network. The existence of misbehaving nodes may paralyze the routing operation in MANETs. To overcome this behavior, the trustworthiness of the network nodes should be considered in the route selection process combined with the hop count. The trustworthiness is achieved…
▽ More
The routing performance in Mobile Ad-hoc Networks (MANETs) relies on the co-operation of the individual nodes that constitute the network. The existence of misbehaving nodes may paralyze the routing operation in MANETs. To overcome this behavior, the trustworthiness of the network nodes should be considered in the route selection process combined with the hop count. The trustworthiness is achieved by measuring the trust value for each node in the network. In this paper, a new protocol based on self monitoring (agent-based) and following the dynamic source routing (DSR) algorithm is presented. This protocol is called Agent-Based Trusted Dynamic Source Routing (ATDSR) Protocol for MANETs. The objective of this protocol is to manage trust information locally with minimal overhead in terms of extra messages and time delay. This objective is achieved through installing in each participated node in the network a multi-agent system (MAS). MAS consists of two types of agents: monitoring agent (MOA) and routing agent (ROA). A new mathematical and more realistic objective model for measuring the trust value is introduced. This model is weighted by both number and size of routed packets to reflect the selective forwarding behavior of a node. The performance evaluation via simulation shows that our protocol is better than standard and trusted DSR. The simulation is done over a variety of environmental conditions such as number of malicious nodes, host density and movement rates.
△ Less
Submitted 17 September, 2013; v1 submitted 13 November, 2012;
originally announced November 2012.
-
Data Mining Based Technique for IDS Alerts Classification
Authors:
Hany N. Gabra,
Ayman M. Bahaa-Eldin,
Hoda K. Mohamed
Abstract:
Intrusion detection systems (IDSs) have become a widely used measure for security systems. The main problem for those systems results is the irrelevant alerts on those results. We will propose a data mining based method for classification to distinguish serious alerts and irrelevant one with a performance of 99.9% which is better in comparison with the other recent data mining methods that have re…
▽ More
Intrusion detection systems (IDSs) have become a widely used measure for security systems. The main problem for those systems results is the irrelevant alerts on those results. We will propose a data mining based method for classification to distinguish serious alerts and irrelevant one with a performance of 99.9% which is better in comparison with the other recent data mining methods that have reached the performance of 97%. A ranked alerts list also created according to alerts importance to minimize human interventions.
△ Less
Submitted 21 February, 2013; v1 submitted 6 November, 2012;
originally announced November 2012.
-
RCA: Efficient Connected Dominated Clustering Algorithm for Mobile Ad Hoc Networks
Authors:
Ayman M. Bahaa-Eldin,
Dina S. M. Hassan,
Hossam M. A. Fahmy
Abstract:
Clustering of mobile ad hoc networks is a largely growing field. The perceived benefits of clustering are comprehensively analyzed in open literature. This paper considers the development of a new connected-dominated-set clustering algorithm called Ring Clustering Algorithm (RCA). RCA is a heuristic algorithm that groups mobile nodes in a network into rings. Each ring consists of three ring-nodes.…
▽ More
Clustering of mobile ad hoc networks is a largely growing field. The perceived benefits of clustering are comprehensively analyzed in open literature. This paper considers the development of a new connected-dominated-set clustering algorithm called Ring Clustering Algorithm (RCA). RCA is a heuristic algorithm that groups mobile nodes in a network into rings. Each ring consists of three ring-nodes. The priority of a ring is determined according to a new parameter, the ring degree. This paper presents the proof that the maximum number of rings that can be formed by RCA in any disk area equals the maximum number of independent nodes that create non-overlapping circles in a corresponding area. Moreover, RCA has achieved a fixed approximation ratio, which is 5.146 and O(n) for both time and message complexities. Thus, RCA algorithm outperforms the current-best CDS algorithms that are investigated in this paper.
△ Less
Submitted 17 September, 2013; v1 submitted 4 November, 2012;
originally announced November 2012.