=Paper= {{Paper |id=Vol-1755/227-233 |storemode=property |title=Modeling an Enhanced Intrusion Detection System Using Mobile Agent: A Methodological Framework |pdfUrl=https://ceur-ws.org/Vol-1755/227-233.pdf |volume=Vol-1755 |authors=Isah Olawale Mustapha,Rasheed Gbenga Jimoh |dblpUrl=https://dblp.org/rec/conf/cori/MustaphaJ16 }} ==Modeling an Enhanced Intrusion Detection System Using Mobile Agent: A Methodological Framework== https://ceur-ws.org/Vol-1755/227-233.pdf
          Modeling an Enhanced Intrusion Detection System
          using Mobile Agent: A Methodological Framework
                  Isah Olawale Mustapha                                                             R. G. Jimoh
             Al_Hikmah University Ilorin, Nigeria                                        University of Ilorin, Ilorin, Nigeria
                  salnet2002@yahoo.com                                                    jimoh_rasheed@yahoo.com


ABSTRACT                                                                    A number of previous researchers in the field of information
Increase demand by all and sundry for internet and share network,           security equally testify to the fact that information is becoming
has enhanced the development of various network technology that             more vulnerable [17]. Computer network consists of
has linked together different people of different motives,                  heterogeneous entities that include all kinds of processors,
consequently it has paved way for malicious and unauthorized                communication devices, and different human beings with different
user to intrude into information resources of organization. As a            motives. Along with the heterogeneous nature of each of the
result of the advantage embedded in the layered framework and               entities on computer network, the entities have continuously
those of signature base approach proposed by a number of earlier            diversify exponentially over the years [9].
researchers, this research proposed an hybridized framework with            The internet traffic together with it’s data and other resources is
the use of two comparators for detection of intrusion using                 on the increasing trend and it is projected to maintain such trend
secured, collaborative and optimum numbers of mobile agents.                as far back as 2009 [9]. This is illustrated in Figure 1.
The framework if implemented is expected to be of better
                                                                            Consequently, network overload, delay in network transmission,
efficiency with respect to time of detection, storage space and
                                                                            insufficient storage facilities, inadequate information, insufficient
reduction of network congestion.
                                                                            resources, traffic congestions that result to dropping of packet
                                                                            along the channel of transmission, increase computational
                                                                            bottleneck on the central processing modules of applications and
CCS Concepts                                                                total coordination of network affairs become a problem [9].
• Security and privacy ➝Intrusion/anomaly detection and                     These factors among others are posing insecurity problem to the
malware mitigation ➝ Intrusion Detection systems                            computer network and are creating more avenues for intrusion
                                                                            [21]
Keywords
                                                                             [32] also stated that Some vital information that are disseminated
Intrusion, Intrusion Detection System, Mobile Agent, Dijkstra
                                                                            within institutions, offices, across offices, between branches of an
Algorithm.
                                                                            organization and different types of establishment today atimes get
                                                                            to the hands of an unauthorized persons who tampered with the
1. INTRODUCTION                                                             contents of the information, therefore there is need to put some
Most companies, institutions and organizations today rely on                security measures in place, capable of detecting intrusion attempt
information for decision making [4]. Hence, other things being              promptly across every network settings otherwise lots of valuable
equal, the efficiency of any organization today depends on how              data and other sensitive information may continue to experience
well it can secure its information resources especially through the         threats such as impersonation, corruption, repudiation, break-in or
use of computer system [30]. Apart from that, computer system               denial of services which can cause serious danger on the
also responds to issues based on available resources and                    individual or organization that are concerned.
information that are presented to it [5]. More so, resources and            Insecurity as a result of intrusion has been a teething problem that
information sharing are the two primary objectives of setting up a          has been scaring user of computer network, despite the inevitable
computer network such information and resources serve as a                  benefit derived from it.
major factor in attaining and sustaining competitive advantage in
the emerging information driven organizations [16].                         On 20th Feb. 2012 there was a report by Jinshan that China”s
                                                                            internet security shows that network insecurity incidents are on a
                                                                            rising trend. This shows a global trend in the information security
This among other factors, led the world into ubiquitous computing           threat.
with e-banking ,e-commerce, e-messages, e-training and so on as
its dividend, this however does not come without its challenges as          In a null shell, the problem of information and network insecurity
it equally paved ways for intruder and unauthorized user to gain            especially by virtue of intrusion has become more rampant,
undue access to certain sensitive information [17].                         prominent, complicated and dynamic along with the rapid
                                                                            development of network technology, and up till now the network
                                                                            security technology has not been able to eradicate intrusion [25].
                                                                            Hence, there is need for enhancement of the current intrusion
                                                                            detection technologies capable of prompt detection. Such system
                                                                            design should not add too much load to the network and must be
CoRI’16, Sept 7–9, 2016, Ibadan, Nigeria.                                   fast for better detection.




                                                                      227
                                                                            to increase in network load on the part of the agent system. [14]
 50000                                                                      also asserted that the main obstacle hindering the application of
                                                                            mobile agent to IDS is insecurity on the part of the agent. This
 45000                                                                      reveals that if mobile agent is highly secured, the performance of
                                                                            IDS will be improved. The question here is that if such
                                                                            performance is improved through the enhancement of mobile
 40000                                                                      agent security, would there be any significant effect on the
                                                                            network traffic and network load?.
 35000                                                                      [28] also enlisted some shortcoming of mobile agent in the area of
                                                                            insecurity that has affected the usability and performance of IDS.
 Usage




 30000                                                                      In a recent study of mobile agent security threats, it was stated
             Usage




                                                                            that lots of security issues of mobile agent needs to be addressed
                                                                            and such issues include inter mobile agent collaboration, and
 25000                                                                      mutual authentication between host and mobile agents [1].
                                                                            [25] also claimed that agents’ security, management, coordination,
 20000                                                                      and collaboration are important problems for effective
                                                                            identification of distributed attack in a system. The fact here is
 15000                                                                      that when agents are highly secured and well collaborated, better
                                                                            detection of attack by the agent’s system can be achieved. In such
                                                                            scenario, how can secured agents be achieved to mutually address
 10000                                                                      intrusions with little or no effect on system usability and
                                                                            efficiency ?
  5000                                                                      What enhancement can be done on agents such that there will be
                                                                            little or no effect on processor’s load , processing time and
         0                                                                  network traffic ?
              2005   2006   2007   2008   2009   2010   2011   2012
                                    Year
                                                                            3.        METHODOLOGY
                                                                            As a result of the need to make effective usage of mobile agents
  Figure 1.      Internet Usage Trend (Holz, David, & Timoteo,
                                                                            and to take advantage of their inevitable characteristics for
                                2011)
                                                                            intrusion detection, this research is aimed at proposing an
                                                                            enhanced intrusion detection model with the use of more secured
                                                                            and collaborative mobile agents. Since mobile agent is central to
2. PROBLEM STATEMENT                                                        the proposed model for intrusion detection then the idea is to
As much as the use of computer network even internet is                     improve their safety, collaborative ability and reduce their
inevitable in the emerging information driven world, rapid                  response time such that the agent system usability and efficiency
development and increase demand for internet has pave way for               can be improved.
malicious user to illegally intrude into computer network [27].             To this end, this research work proposed an improvement on the
Day in day out, number of attackers is increasing, and the                  framework of [11] where mobile agents were used to detect user
technologies and the targets of attacks are diversified [18]. These         anomalities (i.e model of normal behaviour) in two level: user
among other insecurity issues has led to various researches and             activities and program operations. The model uses two approaches
development of IDS with the use of different technologies that              which include misuse detection approach (model of abnormal
include data mining, multi agent, Honey pot, multiclass, mobile             behaviour base on experience) and anomaly approach, this
agent etc.                                                                  hybridized approaches is proposed to enhance effectiveness of the
Up till today, previous research work reveals that, the technology          detection. It will also give room for Network Administrator to
of mobile agent can still be enhanced to reduce the dynamism and            make a decision on the suspected intrusion so as to avoid False
mutative rapid development of hacker technology and that the                Positive Alarm to some extent. It gives room for mobile agents to
benefit of using mobile agents in detecting intrusion cannot be             collaborate by triggering and communicating on any detected
denied, however securing the agent itself still poses a great               intrusion then store the characteristics of such intrusion attempt,
challenge in the information security domain [28]. Therefore,               this also enhance fast detection when such attempt is made again.
mobile agent effectiveness in IDS depends on some factors
relating to the agent itself [15].
                                                                            3.1       Modified Hybrid Framework
                                                                            The architecture of this proposed model consists of two
According to [15], mobile agent portability, and security affect            comparators being handled by mobile agent as shown below:
agent system’s usability and efficiency in intrusion detection.
Hence, attempt to improve on the security of mobile agent result




                                                                      228
                                                              EN
                                                              D




       User Profile                                       First                     Administrato            Block Access
                                    Repositor
                                    y                     Comparator                r                       &     Transfer
                                                          Check                     Response                Characteristics
                                    To Store              Deviation
       Process                      Profile                                         Interface
       Profile


                                                              N
                                                              O

                                                                                                                      Detected     Intrusions
                                                                                                                      Characteristics From
                                                [Second Comparator]. Store the
                                                                                                                      Other AGENTs &
                                                characteristics of detected                                           Networks
                                                intrusions & compare it with
                                                the present Users profile




                       User & Process                         Ye
                       Authentication                         s




                       User                               Block Access
                      or Host




                                        Figure 2. Propose Framework for the Hybridized Architecture


Mobile agent will perform the function of comparing profile in the            solution to security problem of mobile agent, there will be severe
first and second comparators. It will gather information and data             impediment on IDS. Therefore, the following principles of
relating to user and process profile of its domain from repository,           mobile agent need to be applied to guarantee safety of the agents
this task is performed on timely basis or based on an event                   [11]:
occurrence.                                                                   1. Participants cannot be assumed to trust each other by default.
          Each agent will have an access to relay the                         2. Any agent-critical decisions should be made on trusted hosts.
characteristics of detected intrusion within its domain to other
agents outside its domain and within some other network for                   3. Unchanging components of the state should be sealed
future detection (collaboration). Such characteristics may include            cryptographically.
recorded user activities, start time, speed of input, system resource                    Therefore, this research design has proposed to look at
used, energy consumption, and some other expected deviance                    security issues of mobile agents from four different perspectives
behavior of user and process detail for comparism purpose. Here,              of threat as follows
matching algorithm can be used by agent.
                                                                              Agent to platform threat.
                                                                              Platform to agent threat.
3.2       Mobile Agent Security Enhancement                                   Agent to agent threat.
Since security is also a key factor in ensuring the efficiency, ease          Platform to platform threat [1]
of use and wide spread deployment of intrusion detection
application base on mobile agent technology. Without proper

                                                                        229
Some of those threats that can cause insecurity include Alteration,             transmission, network traffic congestion and on computational
Eavesdropping, Repudiation, Denial of service, Unauthorized                     and processing time of the central processor. Hence, to improve
Access, Masquerading etc.                                                       the performance of the proposed design as regard to fastness and
     i.        Masquerading is away of impersonating legitimate                 network traffic, we propose the use of Dijkstra Algorithm as
               user, it gives room for extraction of sensitive                  follows:
               information by the fake agent.                                              In line with Dijkstra algorithm, G is propose to be a
     ii.       Unauthorized access exist by way of illegal                      graph which will represent the network of nodes in a domain and
               interference with a platform or when agents invoke               is going to have two sets associated with it.
               the public method of another agent.                              The first set is N which represents all nodes in the domain.
     iii.      Denial of service as to do with exhausting                       The second set is C which represents all connections between
               resources so that others can be deprived of it.                  nodes in the domain.
     iv.       Repudiation attack refers to threat that involve                 For each c ϵ C, we have d(c) ≥ 0, which represents the delay of
               preventing       agent    from     participating      in         edge c.
               communication or transaction.                                    The symbol σ will be used to represent the delay of the shortest
     v.        Alteration is a threat that has to do with undetected            path from one node to another node within the domain.
               change of code or data of an agent.                              Having defined these symbols we can formally define our mobile
     vi.       Eavesdropping is a passive attack that involves the              agent placement method as follows:
               interception      and     monitoring      of     secret                     Given G = (N, C) where each c ϵ C, d(c) > 0 , select a
               communication.                                                   node v ϵ V, such that the maximum σ from node v to all other
It may be concluded by close assessment and analysis of some of                 nodes in the domain, will be the minimum. This will be the
the above listed threats, that agents may be safe to certain level if           location for an agent to be placed. (i.e minmum of the maximum
                                                                                delay)
     i.        Their privacy and integrity is assured.                          Alternatively we can say that the node with min{max {σ(v, vi v )
     ii.       Agent to platform or server authentication is                    for i v ϵ V}for j ϵ V } will be the location for an agent to be
               ensured.                                                         place within the domain.
     iii.      Authorization and access control is highly                                  Hence for practical purpose, we shall examine the delay
               observed [11].                                                   from a node to all other nodes within a domain and pick the
                                                                                maximum delay for all the available nodes and store it in an array
In a null shell, to provide security for mobile agents in this model            call MAXARRAY. Then from MAXARRAY we shall pick the
against all or some of the above mentioned threats, this research               node with the smallest and place our Mobile Agent there.
work proposed to employ some of the following techniques:                                  The diagram and table below shows an instance of this:
     i.        During collaboration between agent from other
               domain for exchange of intrusion characteristics,
               agent and platform will be design to authenticate
               themselves (i.e verification of each other identity).
               Implementation of this is proposed to use digital
               signature and password protection strategies.
     ii.       To enhance high level of agent data and
               behavioural privacy, encryption and cloning is
               proposed.
     iii.      Agent communication and security related
               transactions is proposed to be recorded so that
               auditing and tracing of non participating agent can
               be fish out.
     iv.        Platform will be structured in such away that it can
               control concurrent and simultaneous access to data
               and services. It must also be a good manager of
               dead lock.
     v.        A platform or agent will also be design to signal
               the administrator in case any agent belonging to a
               domain has been changed or not, by monitoring a
               code that has been tempered, or whose state has
               been changed or whose execution flow has been
               redirected.
     vi.       Some other proposed mobile agent security
               mechanism for this model includes hash function,
               range checker, execution tracing and cryptography
               that allows detection of attack against code
               manipulation.

3.3 Placement and Distribution Enhancement
It is not an overemphasis, to say that too much of mobile agents in
many intrusion detection application have an effect on data
                                                                          230
As an instance, the domain in the above diagram has five nodes              Atimes increasing the number of agents in the network will allow
and the weight of the delay from node to node is has shown                  intrusions, anomalies and other security issues to be detected
above. Therefore, N = 5 and for the connection between node a               faster as well as spread the workload out across the network.
to node e
We have the following alternative connections together with their           Suppose we have a very large network consisting of network of
respective delay,                                                           networks, in which case there is a need to use more than a single
                                                                            agent in the agent system (i.e the proposed intrusion detection
p1=< a, b, c, e > and it”s weighted delay                                   system) for effective intrusion detection.
= w( a, b ) + w( b, c ) + w( c, e )                                         Therefore in such scenario, we propose the following strategies
= 1+2+1=4                                                                   inline with the above MAXARRAY list for selection and
                                                                            assignment of mobile agent to various domain within a large
also                                                                        network. As an instance, suppose the outcome of our SORTED
                                                                            MAXARRAY is as follows:
p2=< a, d, c, e > and it”s weighted delay =
w( a, d ) + w( d, c ) + w( c, e ) = 3 + 2 + 1 = 6.
                                                                                           Table 4: SORTED MAXARRAY
Table 1: shows the list of shortest delay from node to node for the
above sample network.                                                                           NODE       MAXIMUM
                                                                                                            DELAY
        NODE          a        b       C         d   e                                             C          3
         A            0        1       3         3   4                                             A             4
         B            1        0       2         4   3
         C            3        2       0         2   1                                             B             5
         D            3        4       2         0   1                                             D             5
         E            4        3       1         1   0
                                                                                                   E             5
 Table 2: MAXARRAY shows the maximum delay from each
             node to other nodes as follows.                                Here it imply that if we wish to assign two agents, they are
                                                                            preferably better placed in Node c and Node a. If we pick all the
                     NODE          MAXIMUM                                  weighted delays of Node a and Node c to all other nodes within
                                    DELAY                                   the network from Table 1, we can come out with the following
                          A           4                                     two dimensional array:
                          B              4                                  Table 5: Multiple Agents Assignment Table [ MAAT ]
                          C              3
                          D              4                                       NODE       a          b     C       d       e
                                                                                  A         0          1     3       3       4
                          E              4
                                                                                  C         3          2     0       2       1

Hence from MAXARRAY, NODE C is the appropriate node to                      Consequently, Table 5 clearly indicates that if we are to assign
place the mobile agent such that the IDS can be more efficient by           two agents, they should be place in Node a and Node c. Apart
virtue of less workload. This is to say that Node C alone may be            from that , mobile agent in Node a should be responsible for node
assigned an agent rather than assigning agents to every nodes               a and node b while mobile agent in Node c should be responsible
within the domain.                                                          for Node c, Node d, and Node e. Hence this kind of assignment
                                                                            strategy is proposed for this research design so as to use minimum
We can also have a SORTED MAXARRAY as shown in Table 3                      mobile agents that can respond to every other nodes efficiently in
below                                                                       case of any intrusion to our network.

                Table 3: SORTED MAXARRAY                                    3.4.1 Algorithm for Placement and Distribution of
                                                                            Mobile Agent.
                     NODE           MAXIMUM
                                     DELAY
                                                                            Single mobile agent placement algorithm for small network
                        C              3
                                                                                     i)       Input all the available nodes delay
                        A                    4                                       ii)      Apply Dijkstra Algorithm to get all shortest
                                                                                              distance from node to node
                        B                    4                                       iii)     For each node, select the highest delay out of
                                                                                              all the available shortest delay from a node to
                        D                    4                                                all other nodes.
                                                                                     iv)      Tabulate all the highest delay with their
                                                                                              corresponding node.
                          E                  4                                       v)       Sort the table in ascending order
                                                                                     vi)      Output the node with the smallest delay in the
                                                                                              table

                                                                      231
                                                                          [8]    Ganapathy, S., Yogesh, P., & Kannan, A. (2012).
3.4.2 Multiple Mobile Agent Placement Algorithm                                  Intelligent Agent-Based Intrusion Detection System Using.
for Large Network.                                                               Computational Intelligence and Neuroscience .
         i.        Input the max(min(delay)) for each node.               [9]    Holtz, M. D., David, B. M., & Timoteo, R. (2011).
         ii.       Arrange and tabulate them in ascending order.                 Building Scalable Distributed Intrusion Detection System
         iii       Select the number of node you need in line                    Based on the MapReduced Framework . REVISTA
         with tabulated order.        Ziv       Create      your                 TELECOMUNICACOES , 22-31.
         multiple agent assignment table                                  [10]   Jabez, J., & Muthukumarb, B. (2015). Intrusion Detection
         v         Determine and pick which of the nodes has a                   System (IDS): Anomaly Detection using Outlier.
                   minimum delay to the selected node                            International Conference on Intelligent Computing,
         vi        Output the selected node with those node for                  Communication & Convergence (pp. 338 – 346). India:
                   which they have minimum delay.                                Procedia Computer Science Press.
                                                                          [11]   Jaisankar, N., Saravanan, R., & Swamy, K. D. (July 2009).
                                                                                 Intelligent Intrusion Detection System Framework Using
                                                                                 Mobile. International Journal of Network Security & Its
3.5      Experimental Data:                                                      Applications (IJNSA) , Vol 1, No 2., 72-88.
This research work proposed to use randomly generated data to             [12]   Jansen, W. A. (2003). Intrusion Detection With Mobile
evaluate the efficiency of the research model through a series of                Agents. USA: NIST Special Publication 800-.
experimental simulation. The randomly generated data shall be
                                                                          [13]   Jansen, W., & Karygiannis, T. (october, 2000). Privilege
used to evaluate the resources required to operate the IDS model
                                                                                 Management of Mobile Agents. Twenty-third National
on a computer in term of memory usage, network traffic, network
                                                                                 Information Systems Security Conference (pp. pp.362-
load and processing load.
                                                                                 370). USA: NIST Special publication.
                                                                          [14]   Jansen, W., Mell, P., Karygiannis, T., & Marks, D. (1999).
4.       CONCLUSION                                                              Applying Mobile Agents to Intrusion Detection and
                                                                                 Response. National Institute of Standards , 1-46.
This paper has presented a proposed research framework which is
aimed at faster detection of attack, reduction of network                 [15]   Jianxiao, L., & Lijuan, L. (2009). Research of Distributed
congestion and bottle neck in packet processing. After                           Intrusion Detection System Model Based. International
implementation, it stand to be robust by it’s ability to receive                 Forum on Information Technology and Applications , 53-
characteristics of known attack from other network user and it’s                 57.
hybridized usage of user activity, and program operation                  [16]   Jimoh, R. G. (2013). Knowledge Management
monitoring for intrusion detection.                                              Functionality by Information Technology in Adeleke, B.
                                                                                 L., Abdus-Salam, N. &
                                                                          [17]   Kabiri, P., & Ghorbani, A. A. (2005). Research on
5.       REFERENCES                                                              Intrusion Detection and Response:. International Journal
[1]    Amro, B. (2013). Mobile Agent Systems, Recent Security                    of Network Security, , 84-102.
       Threats and Counter Measures. Journal of ResearchGate.             [18]   Lee, D.-h., Kim, D.-y., & Jung, J.-i. (2008). Multi-Stage
       Pages 160-167.                                                            Intrusion Detection System Using Hidden Markov Model
[2]    Ande, A. T. (2013) (ed), History and Philosophy of                        Algorithm. International Conference on Information
       Science in General Studies, General        Studies                        Science and Security , 72-77.
       Division, University of Ilorin, ISBN: 978-36284-0-2                [19]   Lee, W., & Stolfo, S. (2001). Real time data mining-based
[3]    Bernardes and Moreira (2000), Implementation of an                        intrusion detection. Proceedings of DARPA Information ,
       Intrusion Detection System Based on Mobile Agent.                         pp. 89 -100.
       international symposium on software engineering for
       parallel and distributed systems IEEE Computer Society,            [20]   Minar, N., Kramer, K. H., & Maes, P. (n.d.).
                                                                                 www.media.mit.edu/~nelson/research/routes/. Retrieved
[4]    Chapke, P. P., and Raut, A. B. (2012). Intrusion Detection                11 03, 2014, from
       System using Fuzzy logic and Data Mining Technique.                       www.media.mit.edu/~nelson/research/routes/:
       International Journal of Advanced Research in Computer                    http://www.media.mit.edu/~nelson/research/routes/
       Science and Software Engineering , Pages 152-154.
                                                                          [21]   Mohammed, H. A. (2015). HYBRID INTELLIGENT
[5]    Cichonski, P., Millar, T., Grance, T., & Scarfone, K. (                   APPROACH FOR NETWORK. MALAYSIA.
       2012). Computer Security Incident Handling Guide. USA:
       Special Publication 800-61 Revision 2.                             [22]   ntrusion-detection-system-group.co.uk. (n.d.). Retrieved
                                                                                 march 15, 2015, from intrusion-detection-system-group:
[6]    Corporate White Paper. "Deploying and Tunning Network                     http://www.intrusion-detection-system-group.co.uk
       Intrusion Detection System." intrusion .com White Paper
       2001 (2004): 3                                                     [23]   Pages 158-164.
[7]    Ehimen, O. R., & Oyakhilome, I. (2009). Development of             [24]   Pathak, H. (2011). Hybrid Security Architecture (HSA) for
       a Software Based Firewall System for Computer Network.                    Secure Execution. International Journal of Information
       Leonardo Electronic Journal of Practices and                              Technology , 499-502.
       Technologies , 75-80.                                              [25]   Ran, Z. (2012). A Model of Collaborative Intrusion
                                                                                 Detection System based on Multi-agents. International


                                                                    232
       Conference on Computer Science and Service System ,             [29]   Verwoerd, T., & Hunt, R. (2003). Intrusion Detection
       789-792.                                                               Techniques and Approaches.
[26]   Scarfone, K., & Mell, P. (2007). Guide to Intrusion             [30]   Whitman, Michael E., Townsend, Anthony M., and
       Detection and Prevention Systems. National Institute of                Hendrickson, Anthony R. “Cross-National Differences in
       Standard and Technology .                                              Computer-Use Ethics: A Nine Country Study.” The
[27]   Tian, -r. L., & Pan, W.-m. (2005). Intrusion Detection                 Journal of International Business Studies 30, no. 4 (1999):
       System Based on New Association Rule Mining Model.                     673–687.
       512-515.                                                        [31]   Yanxin W.(2004). An hybrid intrusion detection system
[28]   Trushna, T., Patil1, K., & Banchhor, C. (2013).                        (Unpublished dissertation). Iowa State University, Ames.
       Distributed Intrusion Detection System using.                          Retrieved from UMI Microform 3145689
       International Journal of Advanced Research in Computer          [32]   Zirra, P. B., & Wajiga, G. M. (2011). Cryptographic
       and Communication Engineering , 1901-1903.                             algorithms for Secure data Communication. International
                                                                              Journal of computer science and Security , 227-243.




                                                                 233