i-manager's Journal on Computer Science (JCOM)


Volume 8 Issue 4 December - February 2021

Research Paper

Novel Technique for Secure Keyless Car Authentication using Block-Chain System

Rashid Husain* , Rabia Khan **, Rajesh Kumar Tyagi ***
* Department of Mathematics and Computer Science, Sule Lamido University, Kafin Hausa, Jigawa State, Nigeria.
** Master of Computer Application, Punjab Technical University, India.
*** Department of Computer Science and Engineering, Amity School of Engineering and Technology, Amity University, Manesar, Gurgaon, Haryana, India.
Hussain, R., Khan, R., and Tyagi, R. K. (2021). Novel Technique for Secure Keyless Car Authentication using Block-Chain System. i-manager's Journal on Computer Science, 8(4), 1-6. https://doi.org/10.26634/jcom.8.4.18297

Abstract

Security of the vehicles are challenging factor. Nowadays, users prefer comfort and a safe environment for their vehicles. With the development in technology, ancient standard keys for vehicles have been modified by Remote Keyless Entry System (RKES). This new scenario boosts user's safety and convenience. During the development of this new environment, attackers have also found new ways to hack the RKES. In this paper, a novel technique for secure authentication using blockchain technology has been developed which will provide a more secure way for keyless access. Our model is based on a time comparison of various hash algorithms which are widely used in encrypted and blockchain processes for authentication. Many tests were conducted to check the time complexity of hash algorithms for providing a clear outlook about the security and time complexity.

Research Paper

A Novel Hybrid Approach for Network Intrusion Detection using Extreme Gradient Boosting and Long Short-Term Memory Networks

Rashmi Erandika Ratnayake * , Hakim Usoof **
* Department of Information and Communication Technology, University of Sri Jayewardenepura, Sri Lanka.
** Department of Statistics and Computer Science, University of Peradeniya, Sri Lanka.
Ratnayake, R. E., and Usoof, H. (2021). A Novel Hybrid Approach for Network Intrusion Detection using Extreme Gradient Boosting and Long Short-Term Memory Networks. i-manager's Journal on Computer Science, 8(4), 7-13. https://doi.org/10.26634/jcom.8.4.18338

Abstract

Network Intrusion Detection (NID) has become a prominent topic nowadays with the increased use of technology and networks. In this study, a novel hybrid approach for network intrusion detection has been presented using Extreme Gradient Boosting (XGBoost) and Long Short-Term Memory (LSTM) networks. The benchmark NSL-KDD dataset has been used. A number of minimal feature sets were created using XGBoost for feature selection and the effects of using them in an LSTM model for detecting whether or not the network features belong to an attack were studied. It has been observed that XGBoost feature selection could be used to create minimal feature sets with very high feature reduction ratios to use in an LSTM model for NID in order to have a clear understanding of the features the model uses to learn, to achieve shorter training times and a good accuracy value close to that achieved using all the features in the dataset utilizing lower space. The findings of this study can be used for building better NID systems using deep neural networks for real-time NID. Also, they can be utilized to develop a first layer of defense for alerting the users about possible threats in real-time.

Research Paper

Analysis of Hardware Cryptography for Securing Instant Messaging Applications

Hemalatha R.* , Pooja K. **, Gayathri P. ***, K. Selva Bhuvaneswari ****
*-**** Department of Computer Science and Engineering, University College of Engineering Kancheepuram, Kancheepuram, Tamil Nadu, India.
Hemalatha, R., Pooja, K., Gayathri, P., and Bhuvaneswari, K. S. (2021). Analysis of Hardware Cryptography for Securing Instant Messaging Applications. i-manager's Journal on Computer Science, 8(4), 14-18. https://doi.org/10.26634/jcom.8.4.18082

Abstract

Software cryptography is a great utility for many applications. If properly implemented, it provides a good level of security. However, some applications may require a greater level of secrecy and privacy, in such cases hardware cryptography would be more adequate. This paper illustrates the integration of hardware cryptosystem and instant messaging desktop application. Today, people use online chat platforms for sharing their private and business information. Such information can be attacked by hackers. The present instant messenger systems lack authenticity, confidentiality and integrity, and such disadvantages can be collaboratively eliminated through this proposed idea. Results will be tested to check whether the proposed model is resistant to adversarial attacks and also by considering cryptographic test like Hamming distance and NIST SP800-22.

Research Paper

Detection of Phishing Website using Machine Learning Algorithms and Deployment using FastAPI

P. Mohammed Ismail* , R. K. Vijayraajesh **, V. Dhanakoti ***, J. Chandru ****
*-**** Department of Computer Science and Engineering, SRM Valliammai Engineering College, Kattankulathur, Tamil Nadu, India.
Ismail, P. M., Vijayraajesh, R. K., Dhanakoti, V., and Chandru, J. (2021). Detection of Phishing Website using Machine Learning Algorithms and Deployment using FastAPI. i-manager's Journal on Computer Science, 8(4), 19-24. https://doi.org/10.26634/jcom.8.4.18143

Abstract

The constant growth of phishing and the rise in the number of phishing websites that could not be detected by search engines have led to the fact that individuals and organizations around the world are increasingly exposed to various cyber attacks. Phishing attacks are one of the most common and least protected security threats these days in the form of sealed browsers. We have techniques that are used to analyze textual URLs and identify indirect claims that indicate phishing attacks. Consequently, more effective phishing detection is required for improved cyber defense. Phishing attackers always use new and sophisticated techniques to deceive online customers. Hence, it is necessary that the anti-phishing solution should be an intelligent real-time system and fast. Threat intelligence and behavioral analytics systems support organizations to prevent phishing attacks. Our approach is novel compared to previous works; we collect phishing websites through various browsers using mini-bots or crawlers. The result will be used as the main source for linguistic analysis of the contents used for malicious attacks. A model will be built that involved in phishing detection and those websites will be avoided in real-time environments.

Review Paper

Twitter Sentiment Analysis

Vedurumudi Priyanka*
Department of Computer Science and Engineering, Sridevi Women's Engineering College, Hyderabad, Telangana, India.
Priyanka, V. (2021). Twitter Sentiment Analysis. i-manager's Journal on Computer Science, 8(4), 25-39. https://doi.org/10.26634/jcom.8.4.18269

Abstract

To perform sentiment analysis, a number of machine learning and deep learning approaches were utilised in this paper to address the challenge of sentiment categorization on the Twitter dataset. Finally, on the Kaggle's public leaderboard, a majority vote ensemble approach has been used using 5 of our best models to get a classification accuracy of 83.58 percent. Various strategies for analysing sentiment in tweets (a binary classification problem) have been compared. The training dataset should be a CSV file with the following columns: tweet_id, sentiment, tweet, where tweet_id is a unique integer identifying the tweet, sentiment is either 1 (positive) or 0 (negative), and tweet is the tweet enclosed within "". For library requirements particular to some methods, such as Keras with TensorFlow backend for Logistic Regression, MLP, RNN (LSTM), and CNN for XGBoost, we used the Anaconda Python distribution. Preprocessing, baselines, Naive Bayes, Maximum Entropy, Decision Trees, Random Forests, Multi-Layer Perception, and other techniques that are implemented.