Abstract
Avalanche attack is huge in any computing systems, predominantly in security systems. Thus, this work aims to minimize the possibility of avalanche via systematically analyzing the cause behind avalanche. A novel and efficient attack model is proposed to evaluate the degree of vulnerability in a dependency-based system caused by its members. This model uses an algorithmic approach to identify, quantify, and prioritize i.e., ranking the extent of vulnerability due to the active members in a dependency-based system. It is implemented using heuristic search techniques to pinpoint the member having highest participation in vulnerability in its absence or to get the safest member having minimum participation using the Simulated Annealing method. Both the maximization/minimization problem is successfully solved, as the results locate the desired objectives that support the ingenuity of the proposed model. The results prove that the proposed method is superior than using the uniform search method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kahate A (2009) Cryptography and network security, 2nd edn. McGraw-Hill
Kumar A, Tiwari N (2012) Effective implementation and avalanche effect of Aes. Int J Secur Priv Trust Manage (IJSPTM) 1:3/4
Ahmad A (2012) Type of security threats and it’s prevention. Int J Comput Technol Appl 3(2):750–752
Aaron G (2010) Director, key account management and domain security at afilias; Rod Rasmussen—President and CTO at Internet Identity
McMillan R (2010) Report blames Avalanche group for most phishing. Network World
Alrabady A, Mahmud S (2005) Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs. In: IEEE Transactions on Vehicular Technology, Vol. 54, No. 1
Tanenbaum AS (2012) Computer networks. Pearson education/PHI. pp 13–14
Forouzan BA, Fegan CS (2011) Data communications and networking. McGraw-Hill Inc, pp 120–145
Korth HF, Abraham S, Sudarshan S (2003) Database system concepts. McGraw-Hill Inc, pp 35–36
Brumley D (2008) Analysis and defense of vulnerabilities in binary code. Ph.D. thesis, School of Computer Science Carnegie Mellon University Pittsburgh
Korel B (1992) Dynamic method for software test data generation. Softw Test Verification Reliab 2(4):203–213
Ibrahim S, Maarof M, IDRIS N (2005) Avalanche analysis of extended feistel network. In: Proceedings of the postgraduate annual research seminar. pp 265–269
Newsome J, Song D (2005) Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Proceedings of 12th network and distributed system security Symposium (NDSS 05)
Kasthurirathna D, Dong A, Piraveenan M, Tumer I (2013) The failure tolerance of mechatronic software systems to random and targeted attacks. In: Proceedings of the 2013 ASME International design engineering technical conferences & computers and information in engineering conference IDETC/CIE, Portland, Oregon, USA
Patidar G, Agrawal N, Tarmakar S (2013) A block based encryption model to improve Avalanche effect for data security. Int J Sci Res Publ 3(1)
Sensarma D, SenSarma S (2014) A graph based modified data encryption standard algorithm with enhanced security. IJRET: Int J Res Eng Technol 3(3)
Berezin Y, Bashan A, Danziger M, Li D, Havlin S (2015) Localized attacks on spatially embedded networks with dependencies. Sci Rep 5(8934):1–5
Kirkpatrick S, Gellat CD, Vecchi MP (1983) Optimization by simulated annealing. Science 220(4598):671–680
Reeves CR (ed) (1995) Modern heuristic techniques for combinatorial problems. McGraw-Hill
Corne D, Dorigo M, Glover F (1999) New ideas in optimization. McGraw-Hill
Back T (1996) Evolutionary algorithms in theory and practice. Oxford University Press, New York
Whitley D (2001) An overview of evolutionary algorithms Practical issues and common pitfalls. Inf Softw Technol 43(14):817–831
Harman M, Jones B (2001) Search-based software engineering. Inf Softw Technol 43(14):833–839
Clark J, Dolado JJ, Harman M, Hierons R, Jones B, Lumkin M, Mitchell B, Mancoridis S, Rees K, Roper M, Shepperd M (2003) Reformulating software engineering as a search problem. IEE Proc—Softw 150(3):161–175
Cook WJ, Cunningham WH, Pulleyblank WR, Schrijver A (1998) Combinatorial optimization. Wiley-Interscience Series in Discrete Mathematics and Optimization, pp 37–119
Kriti Virmani J, Dey D, Kumar V (2015) PCA-PNN and PCA-SVM based CAD systems for breast density classification. Appl Intell Optim Biol Med Curr Trends Open Probl
Dey N, Samanta S, Yang X-S, Chaudhri SS, Das A (2013) Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search. Int J Bio-Inspired Comput (IJBIC) 5(5):315–326
Samanta S, Acharjee S, Mukherjee A, Das D, Dey N (2013) Ant weight lifting algorithm for image segmentation. In: 2013 IEEE international conference on computational intelligence and computing research(ICCIC), Madurai
Chakraborty S, Samanta S, Mukherjee A, Dey N, Chaudhuri SS (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: 2013 IEEE international conference on computational intelligence and computing research (ICCIC), Madurai
Rani J, Seth K (2012) Dependency analysis for component based systems using minimum spanning tree. In: International conference on advances in computer applications (ICACA). pp 11–16
Russell S, Norvig P (2009) Artificial intelligence: a modern approach. Prentice Hall Press
Sullivan KA, Jacobson SH (2001) A convergence analysis of generalized hill climbing algorithms. IEEE Trans Autom Control 46:1288–1293
Granville V, Krivanek M, Rasson JP (1994) Simulated annealing—a proof of convergence. IEEE Trans Pattern Anal Mach Intell 16:652–656
Fleischer MA (1995) Simulated annealing: past, present, and future. In: Alexopoulos C, Kang K, Lilegdon WR, Goldsman D (eds) Proceedings of the 1995 winter simulation conference. IEEE Press, Arlington, Virginia, pp 155–161
Metropolis N, Rosenbluth A, Rosenbluth M, Teller A, Teller E (1953) Equation of state calculations by fast computing machines. J Chem Phys 21(6):1087–1092
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this chapter
Cite this chapter
Hore, S., Chatterjee, S., Dey, N., Ashour, A.S., Balas, V.E. (2016). A Vulnerability Analysis Mechanism Utilizing Avalanche Attack Model for Dependency-Based Systems. In: Chakrabarti, A., Sharma, N., Balas, V. (eds) Advances in Computing Applications. Springer, Singapore. https://doi.org/10.1007/978-981-10-2630-0_15
Download citation
DOI: https://doi.org/10.1007/978-981-10-2630-0_15
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2629-4
Online ISBN: 978-981-10-2630-0
eBook Packages: Computer ScienceComputer Science (R0)