American Journal of Networks and Communications

Volume 13, Issue 1, June 2024

  • Research Article

    Virtualization of a 4G Evolved Packet Core Network Using Network Function Virtualization (NFV) Technology with NS3 for Enterprise and Educational Purpose

    Tonye Emmanuel, Deussom Djomadji Eric Michel*, Ebai Oben Brolynes Agbor

    Issue: Volume 13, Issue 1, June 2024
    Pages: 1-18
    Received: 2 February 2024
    Accepted: 22 February 2024
    Published: 7 March 2024
    Downloads:
    Views:
    Abstract: The current networks of many operators dispose an increasing variety of purpose built, vertically integrated, and vendor-locked hardware equipment. This makes it difficult to easily scale their radio access and core networks as it requires yet another variety of equipment, leading to increased Time-to-Market and inefficient resource utilization. Fu... Show More
  • Research Article

    A Proposed Approach to Integrate Application Security Vulnerability Data with Incidence Response Systems

    Santanam Kasturi*, Xiaolong Li, Peng Li, John Pickard

    Issue: Volume 13, Issue 1, June 2024
    Pages: 19-29
    Received: 5 February 2024
    Accepted: 22 February 2024
    Published: 7 March 2024
    Downloads:
    Views:
    Abstract: This paper has proposed a method to develop an attack tree, from application vulnerability data discovered through tests and scans and correlation analysis using incoming transaction requests monitored by a Web Application Firewall (WAF) tool. The attack tree shows multiple pathways for an attack to shape through vulnerability linkages and a deeper... Show More
  • Research Article

    Genetic Algorithm for Mode Selection in Device-to-Device (D2D) Communication for 5G Cellular Networks

    Eric Michel Deussom Djomadji*, Maniba Garga, Bienvenue Arsene Roger Fouba, Thomas Bouetou Bouetou

    Issue: Volume 13, Issue 1, June 2024
    Pages: 30-43
    Received: 5 February 2024
    Accepted: 23 February 2024
    Published: 7 March 2024
    Downloads:
    Views:
    Abstract: The widespread use of smart devices and mobile applications is leading to a massive growth of wireless data traffic. With the rapidly growing of the customers’ data traffic demand, improving the system capacity and increasing the user throughput have become essential concerns for the future fifth-generation (5G) wireless communication network. In a... Show More
  • Research Article

    Wifi Pentesting Roadmap for Classic-Future Attacks and Defenses

    Ramafiarisona Hajasoa Malalatiana, Rakotondramanana Radiarisainana Sitraka*

    Issue: Volume 13, Issue 1, June 2024
    Pages: 44-63
    Received: 20 February 2024
    Accepted: 5 March 2024
    Published: 20 March 2024
    DOI: 10.11648/j.ajnc.20241301.14
    Downloads:
    Views:
    Abstract: The most advanced attack on the Wireless Fidelity (WIFI) network uses social engineering. The hacker makes portal captive and forces the victim for disconnecting to internet instead of entering the real password of the WIFI. In normal actions, asking WIFI password on the web interface is not the real process, but sometimes the victim is not experie... Show More