Page 99 - IJEEE-2023-Vol19-ISSUE-1
P. 99

Baban & Hameed                                                                                                 | 95

                              TABLE I                           only known in specific client and servers and the other is a
COMPARISON BETWEEN SOME SYMMETRIC ALGORITHMS [18,               public key[21]. Since encryption ensures just the confidentiality
                                                                of the information being sent, a digital signature which is
                                  19]                           another security technique ensures other security goals such as
                                                                non-repudiation, data authentication, and data integrity as
                    Symmetric Cryptography                      shown in figure 2. One–way-hash function (SHA256) is used
                                                                in the digital process which creates compressed data or digest
Algorithm    Key    Block   Round      Security   Speed         which is often unique and smaller than the plaintext and if any
   DES       Size   Size                 level                  change made to the massage can be discovered from a different
   RC2      (bits)  (bits)                        Slow,         hash result even if the same hash is used [22]. Definition of
   AES                                             but          HMAC-SHA256 as:
              64    64      16          Less      speed
                                       secure
              40                                 depends
                            16                   on key             !"#$(&, () = !(&?,-./) ? !(& ? 2-./ ? ())  (1)
           128,192
           and 256  64      (Mixing) Less          Fast            which uses the following parameters:
                               +2 secure                        H = cryptographic hash function = SHA256
                                                   Fast,        K = secret key
                            (Mashing)              but          m = message
                                                  speed         ¦ = concatenation
                    128 10,12 ,14 Secure         depends        ? = exclusive OR
                                                 on key         opad = outer padding
                                                                ipad = inner padding

                                                                Fig. 2: HMAC structure with Multi-Hash [23]

      Fig. 1: The AES Algorithm's General Structure [7]                   V. INTRUSION DETECTION SYSTEM (IDS)

IV. THE KEYED-HASH MESSAGE AUTHENTICATION CODE                      The intrusion can be described as group of activities that
                                 (HMAC)                         attempt to hack the confidentiality, integrity or availability of a
                                                                resource where the monitoring the events occurring in a
    HMAC is used to check the integrity of data transmitted     computer system or network and analyzing them for signatures
over or stored in an unreliable medium it is considered an      any of intrusions and virulent attacks named by Intrusion
essential requirement in open computing and communications.     detection. Intrusion Detection System (IDS) is a software or
Procedures that give integrity checks based on a private key    hardware system to ensure the intrusion detection process
are generally named message authentication codes (MACs).        automatically [24]. IDS is classified based on many various
Usually, message authentication codes are used between two      criteria to the present day. A common criterion is the intrusion
sides that share a private key to authenticate information      detection method and IDS is divided into two groups according
transmitted always the is MAC used with a hash function         to intrusion detection method "anomaly detection" and " Pattern
together with a private key whereas the HMAC uses the private   matching or misuse detection"[25].
key for the calculation and verification of the MACs[20].The
HMAC gives two types of keys one of them is a private key that                      VI. MISUSE DETECTION

                                                                       The misuse detection process is also known as signature-
                                                                  based detection. Signature based methodology works by
                                                                  matching observed signatures to the signatures on record
                                                                  which is can be a database or a list of known attack
                                                                  signatures. Every signature seen on the monitored system
                                                                  which matches the signatures on record is flagged as a
                                                                  breaking of the security policy or as an attack. The signature-
   94   95   96   97   98   99   100   101   102   103   104