Preferred Language
Articles
/
ijs-12444
A Secure Session Management Based on Threat Modeling
...Show More Authors

A session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many cases, an attacker who manages to obtain a valid ID of user’s session can use it to directly enter that session – often without arising user’s suspicion. A secure session management must be implemented in the development phase of web applications because it is the responsibility of the web application, and not the underlying web server.
Threat modeling is a systematic process that is used to identify threats and vulnerabilities in software and has become popular technique to help system designers think about the security threats that their system might face.
In this paper we design the threat modeling for session’s ID threat by using SeaMonster security modeling software, and then propose a secure session management that avoids the vulnerabilities. The proposed secure session management is designed to give trust authentication between the client and the server to avoid session hijacing attack by using both: server session’s ID and MAC address of the client.Visual Studio. Net 2008 is used in implementing the proposed system

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The application of quality requirements in the Ministry of Labour and Social Affairs using the international standard (ISO 9001: 2015) Korean case study of the Iraqi Center
...Show More Authors

This research aims to study the mechanism of application of international specification requirements (ISO 9001: 2015) at the Iraqi Center- Korean Vocational Training return to vocational training department at the Ministry of Labour and Social Affairs for the purpose of preparing and creating the center to get a certificate of conformity with the requirements of the standard (ISO 9001: 2015) that would elevate the level of performance and services provided in the respondent Center after it is identified and the study of the reality of the quality management system by identifying strengths and weaknesses in the system to diagnose the gap and find ways to address that gap, and adopted the researchers the case study method to conduc

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Genotypic Variations of Mutans Streptococci Isolated from Dental Caries by REP-PCR
...Show More Authors

Mutans streptococci (MS) are a group of oral bacteria considered as the main cariogenic organisms. MS consists of several species of genus Streptococcus which are sharing similar phenotypes and genotypes. The aim of this study is to determine the genetic diversity of the core species of clinical strains of Streptococcus mutans, Streptococcus sobrinus and Streptococcus downei by using repitative extragenic palindromic (REP) primer. The DNA of the clinical strains of S. mutans (n=10), S. sobrinus (n=05) and S. downei (n=04) have been employed in the present study, which have been previously isolated from caries active subjects. The DNA of the clinical and reference strains was

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed May 01 2019
Journal Name
Journal Of Engineering
Determination of the Optimum formula for Composite Motor Gasoline Octane Number Blending Enhancer
...Show More Authors

To decrease the dependency of producing high octane number gasoline on the catalytic processes in petroleum refineries and to increase the gasoline pool, the effect of adding a suggested formula of composite blending octane number enhancer to motor gasoline composed of a mixture of oxygenated materials (ethanol and ether) and aromatic materials (toluene and xylene) was investigated by design of experiments made by Mini Tab 15 statistical software. The original gasoline before addition of the octane number blending enhancer has a value of (79) research octane number (RON). The design of experiments which study the optimum volumetric percentages of the four variables, ethanol, toluene, and ether and xylene materials leads

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 18 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Performance Analysis of OLSR Protocol in Mobile Ad Hoc Networks
...Show More Authors

Optimized Link State Routing Protocol (OLSR) is an efficient routing protocol used for various Ad hoc networks. OLSR employs the Multipoint Relay (MPR) technique to reduce network overhead traffic. A mobility model's main goal is to realistically simulate the movement behaviors of actual users. However, the high mobility and mobility model is the major design issues for an efficient and effective routing protocol for real Mobile Ad hoc Networks (MANETs). Therefore, this paper aims to analyze the performance of the OLSR protocol concerning various random and group mobility models. Two simulation scenarios were conducted over four mobility models, specifically the  Random Waypoint model (RWP), Random Direction model (RD), Nomadic Co

... Show More
View Publication Preview PDF
Crossref (14)
Crossref
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Engineering
Planning of Distribution Networks in Baghdad City
...Show More Authors

Planning of electrical distribution networks is considered of highest priority at the present time in Iraq, due to the huge increase in electrical demand and expansions imposed on distribution networks as a result of the great and rapid urban development.

Distribution system planning simulates and studies the behavior of electrical distribution networks under different operating conditions. The study provide understanding of the existing system and to prepare a short term development plan or a long term plan used to guide system expansion and future investments needed for improved network performance.

The objective of this research is the planning of Al_Bayaa 11 kV distribution network in Baghdad city bas

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Advances In Materials Physics And Chemistry
The Role of Cooling Condition on the Superconducting Properties of Tl<sub>2-x</sub>Hg<sub>x</sub>Sr<sub>2</sub>Ca<sub>2</sub>Cu<sub>3</sub>O<sub>10+δ</sub> System
...Show More Authors

View Publication
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Estimating and Analyzing Food Security Indicators in Selected Arab Countries for the Period (1996 - 2012)
...Show More Authors

        The study hypothesize that the majority of Arab countries  show a poor agricultural economic efficiency which resulted in a weak productive capacity of wheat in the face of the demand, which in turn led to the fluctuation of the rate of self-sufficiency and thus increase the size of the food gap. The study aims at estimating and analyzing the food security indicators for their importance in shaping the Arabic agricultural policy, which aims to achieve food security through domestic production and reduce the import of food to less possible extent. Some of the most important results reached by the study were that the increase in the amount of consumption of wheat in the countries of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Securing Data in Wireless Body Area Network Using Hyper-Chaotic Zhou System
...Show More Authors

  E-Health care system is one of the great technology enhancements via using medical devices through sensors worn or implanted in the patient's body. Wireless Body Area Network (WBAN) offers astonishing help through wireless transmission of patient's data using agreed distance in which it keeps patient's status always controlled by regular transmitting of vital data indications to the receiver. Security and privacy is a major concern in terms of data sent from WBAN and biological sensors. Several algorithms have been proposed through many hypotheses in order to find optimum solutions. In this paper, an encrypting algorithm has been proposed via using hyper-chaotic Zhou system where it provides high security, privacy, efficiency and

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Lagrange Interpolation for Mobile Agent Connection Encryption
...Show More Authors

A new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the local wireless network. The proposed technique depends on the two stages of encryption processing (AES algorithm and proposed Lagrange encryption key generation supported by XOR gate) for packets encryption. The AES key was manipulated by using proposed Lagrange interpolation key generated in order to avoid the weak encryption keys. A good multi encryption operation with a fast encryption time was proposed with a high quality connection operation.

 

View Publication Preview PDF