Skip to main content

A Vulnerability Analysis Mechanism Utilizing Avalanche Attack Model for Dependency-Based Systems

  • Chapter
  • First Online:
Advances in Computing Applications

Abstract

Avalanche attack is huge in any computing systems, predominantly in security systems. Thus, this work aims to minimize the possibility of avalanche via systematically analyzing the cause behind avalanche. A novel and efficient attack model is proposed to evaluate the degree of vulnerability in a dependency-based system caused by its members. This model uses an algorithmic approach to identify, quantify, and prioritize i.e., ranking the extent of vulnerability due to the active members in a dependency-based system. It is implemented using heuristic search techniques to pinpoint the member having highest participation in vulnerability in its absence or to get the safest member having minimum participation using the Simulated Annealing method. Both the maximization/minimization problem is successfully solved, as the results locate the desired objectives that support the ingenuity of the proposed model. The results prove that the proposed method is superior than using the uniform search method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kahate A (2009) Cryptography and network security, 2nd edn. McGraw-Hill

    Google Scholar 

  2. Kumar A, Tiwari N (2012) Effective implementation and avalanche effect of Aes. Int J Secur Priv Trust Manage (IJSPTM) 1:3/4

    Google Scholar 

  3. Ahmad A (2012) Type of security threats and it’s prevention. Int J Comput Technol Appl 3(2):750–752

    MathSciNet  Google Scholar 

  4. Aaron G (2010) Director, key account management and domain security at afilias; Rod Rasmussen—President and CTO at Internet Identity

    Google Scholar 

  5. McMillan R (2010) Report blames Avalanche group for most phishing. Network World

    Google Scholar 

  6. Alrabady A, Mahmud S (2005) Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs. In: IEEE Transactions on Vehicular Technology, Vol. 54, No. 1

    Google Scholar 

  7. Tanenbaum AS (2012) Computer networks. Pearson education/PHI. pp 13–14

    Google Scholar 

  8. Forouzan BA, Fegan CS (2011) Data communications and networking. McGraw-Hill Inc, pp 120–145

    Google Scholar 

  9. Korth HF, Abraham S, Sudarshan S (2003) Database system concepts. McGraw-Hill Inc, pp 35–36

    MATH  Google Scholar 

  10. Brumley D (2008) Analysis and defense of vulnerabilities in binary code. Ph.D. thesis, School of Computer Science Carnegie Mellon University Pittsburgh

    Google Scholar 

  11. Korel B (1992) Dynamic method for software test data generation. Softw Test Verification Reliab 2(4):203–213

    Article  Google Scholar 

  12. Ibrahim S, Maarof M, IDRIS N (2005) Avalanche analysis of extended feistel network. In: Proceedings of the postgraduate annual research seminar. pp 265–269

    Google Scholar 

  13. Newsome J, Song D (2005) Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Proceedings of 12th network and distributed system security Symposium (NDSS 05)

    Google Scholar 

  14. Kasthurirathna D, Dong A, Piraveenan M, Tumer I (2013) The failure tolerance of mechatronic software systems to random and targeted attacks. In: Proceedings of the 2013 ASME International design engineering technical conferences & computers and information in engineering conference IDETC/CIE, Portland, Oregon, USA

    Google Scholar 

  15. Patidar G, Agrawal N, Tarmakar S (2013) A block based encryption model to improve Avalanche effect for data security. Int J Sci Res Publ 3(1)

    Google Scholar 

  16. Sensarma D, SenSarma S (2014) A graph based modified data encryption standard algorithm with enhanced security. IJRET: Int J Res Eng Technol 3(3)

    Google Scholar 

  17. Berezin Y, Bashan A, Danziger M, Li D, Havlin S (2015) Localized attacks on spatially embedded networks with dependencies. Sci Rep 5(8934):1–5

    Google Scholar 

  18. Kirkpatrick S, Gellat CD, Vecchi MP (1983) Optimization by simulated annealing. Science 220(4598):671–680

    Article  MathSciNet  MATH  Google Scholar 

  19. Reeves CR (ed) (1995) Modern heuristic techniques for combinatorial problems. McGraw-Hill

    Google Scholar 

  20. Corne D, Dorigo M, Glover F (1999) New ideas in optimization. McGraw-Hill

    Google Scholar 

  21. Back T (1996) Evolutionary algorithms in theory and practice. Oxford University Press, New York

    MATH  Google Scholar 

  22. Whitley D (2001) An overview of evolutionary algorithms Practical issues and common pitfalls. Inf Softw Technol 43(14):817–831

    Article  Google Scholar 

  23. Harman M, Jones B (2001) Search-based software engineering. Inf Softw Technol 43(14):833–839

    Article  Google Scholar 

  24. Clark J, Dolado JJ, Harman M, Hierons R, Jones B, Lumkin M, Mitchell B, Mancoridis S, Rees K, Roper M, Shepperd M (2003) Reformulating software engineering as a search problem. IEE Proc—Softw 150(3):161–175

    Google Scholar 

  25. Cook WJ, Cunningham WH, Pulleyblank WR, Schrijver A (1998) Combinatorial optimization. Wiley-Interscience Series in Discrete Mathematics and Optimization, pp 37–119

    Google Scholar 

  26. Kriti Virmani J, Dey D, Kumar V (2015) PCA-PNN and PCA-SVM based CAD systems for breast density classification. Appl Intell Optim Biol Med Curr Trends Open Probl

    Google Scholar 

  27. Dey N, Samanta S, Yang X-S, Chaudhri SS, Das A (2013) Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search. Int J Bio-Inspired Comput (IJBIC) 5(5):315–326

    Article  Google Scholar 

  28. Samanta S, Acharjee S, Mukherjee A, Das D, Dey N (2013) Ant weight lifting algorithm for image segmentation. In: 2013 IEEE international conference on computational intelligence and computing research(ICCIC), Madurai

    Google Scholar 

  29. Chakraborty S, Samanta S, Mukherjee A, Dey N, Chaudhuri SS (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: 2013 IEEE international conference on computational intelligence and computing research (ICCIC), Madurai

    Google Scholar 

  30. Rani J, Seth K (2012) Dependency analysis for component based systems using minimum spanning tree. In: International conference on advances in computer applications (ICACA). pp 11–16

    Google Scholar 

  31. Russell S, Norvig P (2009) Artificial intelligence: a modern approach. Prentice Hall Press

    Google Scholar 

  32. Sullivan KA, Jacobson SH (2001) A convergence analysis of generalized hill climbing algorithms. IEEE Trans Autom Control 46:1288–1293

    Article  MathSciNet  MATH  Google Scholar 

  33. Granville V, Krivanek M, Rasson JP (1994) Simulated annealing—a proof of convergence. IEEE Trans Pattern Anal Mach Intell 16:652–656

    Article  Google Scholar 

  34. Fleischer MA (1995) Simulated annealing: past, present, and future. In: Alexopoulos C, Kang K, Lilegdon WR, Goldsman D (eds) Proceedings of the 1995 winter simulation conference. IEEE Press, Arlington, Virginia, pp 155–161

    Google Scholar 

  35. Metropolis N, Rosenbluth A, Rosenbluth M, Teller A, Teller E (1953) Equation of state calculations by fast computing machines. J Chem Phys 21(6):1087–1092

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nilanjan Dey .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this chapter

Cite this chapter

Hore, S., Chatterjee, S., Dey, N., Ashour, A.S., Balas, V.E. (2016). A Vulnerability Analysis Mechanism Utilizing Avalanche Attack Model for Dependency-Based Systems. In: Chakrabarti, A., Sharma, N., Balas, V. (eds) Advances in Computing Applications. Springer, Singapore. https://doi.org/10.1007/978-981-10-2630-0_15

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2630-0_15

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2629-4

  • Online ISBN: 978-981-10-2630-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics