Volume 4 Number 3 September 2013

    
A Prototype for Liunx/Unix Intrusion Detection:Approach by Behavior Specification

Ines BEN TEKAYA, Béchir AYEB

https://doi.org/

Abstract This paper describes literature works in intrusion detection field. After that, we propose an intrusion detection method in Linux/Unix commands using supervisor synthesis. This method was applied to distinct normal user behavior from intruders behavior. The main features of this work are twofold. It exploits supervisor synthesis in the intrusion detection field. It presents our approach by behavior specification. Two... Read More


Contribution to Enhance IPSec Security by a Safe and Efficient Internet Key Exchange Protocol

Ahmim marwa, Babes malika, Ghoualmi nacira

https://doi.org/

Abstract IPSec is a suite of protocols that provides security for internet communications at the IP layer. The security properties of IPSec mainly depend on the key exchange protocols where the efficiency and security of the key management are important parts of IPSec. Internet Key Exchange (IKE) protocol is the most common mechanism for the two hosts to exchange key materials.... Read More


Security Protocol Architecture for Website Authentications and Content Integrity

Belal Abuhaija, Nidal Shilbayeh, Mohammad Alwakeel

https://doi.org/

Abstract With the spread of the internet and networks, more people are relying on information sharing to research any subject. The number of Websites that are providing information on a single subject is huge. Some subjects and issues are somehow more sensitive to some people than others. However, there is no agreed upon mechanism for authenticating the content provider Web sites... Read More


A Novel Scheme for On-demand Distribution of Secure Element Keys

Vincent Alimi

https://doi.org/

Abstract The Trusted Service Manager is a key actor in the Near Field Communication technology ecosystem. It is responsible for the management of secure elements and/or applications life cycle on behalf of Issuers, Mobile Network Operators and Service Providers. The Issuer is the actor owning the keys of the secure element present in an NFC-enabled equipment. Some of them such as... Read More