Notice Board :

Call for Paper
Vol. 10 Issue 2

Submission Start Date:
Feb 01, 2018

Acceptence Notification Start:
Feb 22, 2018

Submission End:
Feb 25, 2018

Final MenuScript Due:
March 05, 2018

Publication Date:
March 10, 2018
                         Notice Board: Call for PaperVol. 10 Issue 2      Submission Start Date: Feb 01, 2018      Acceptence Notification Start: Feb 22, 2018      Submission End: Feb 25, 2018      Final MenuScript Due: March 05, 2018      Publication Date: March 10, 2018




Volume IV Issue I

Author Name
Thway K, C Reynolds
Year Of Publication
2012
Volume and Issue
Volume 4 Issue 1
Abstract
With the rapid expansion of computer networks during the past few years, security has become a crucial issue for modern computer systems. A good way to identify malicious use is through monitoring unusual user activity. To identify these malicious activities various data-mining and machine learning techniques have been deployed for intrusion detection. The manual tuning process required by current systems depends on the system operators in working out the tuning solution and in integrating it into the detection model. This paper proposes Self Configuring Intrusion Detection System (SCIDS) to make tuning automatically. The key idea is to use the binary SLIPPER as a basic module, which is a rule learner based on confidence-rated boosting. This system is evaluated using the NSL KDD intrusion detection dataset. An experimental result shows the SCIDS system with SLIPPER algorithm gives better performance in terms of detection rate, false alarm rate, total misclassification cost and cost per example on NSL-KDD dataset than that of on KDD.
PaperID
2012/eusrm/04/01/1009

Author Name
Rodrigo C
Year Of Publication
2012
Volume and Issue
Volume 4 Issue 1
Abstract
Nowadays, cyber security is the big issue and the internet is been witnessing Botnet as a serious cyber-threat against their security. The network of maliciously compromised hosts is called as Botnet. Botnets are used for various malicious activities for financial benefits by sending spam mails, stealing personal information and by launching Distributed Denial of Service attacks (DDoS). Though the existence of Bots and Botnet has been acknowledged, their behaviors have not yet been fully understood. Recent dramatic increase in malicious activities introduces spark for research in Botnet detection. This paper is a survey related to behavior of bots and their malicious attempts and types. It also highlights various detection mechanisms with an aim to seek insight into their efficiency and subsequent issues arising from variety of perspectives. Moreover, recommendations for defense against Botnets have also been mentioned.
PaperID
2012/eusrm/04/01/1018

Author Name
R Henkel, Black V
Year Of Publication
2012
Volume and Issue
Volume 4 Issue 1
Abstract
There are three important contributions in SCS-Radix sort. First, the work saved by detecting data skew dynam-ically. Second, the exploitation of the memory hierarchy done by the algorithm. Third, the execution time stability of SCS-Radix when sorting data sets with different character-istics. We evaluate the use of SCS-Radix sort in the context of a parallel sorting algorithm on an SGI Origin 2000. The parallel algorithm is from 1:2 to 45 times faster using SCS-Radix sort than using Radix sort or Quick sort.
PaperID
2012/eusrm/04/01/1022

Author Name
J Clément, M C A NGUEDIA
Year Of Publication
2012
Volume and Issue
Volume 4 Issue 1
Abstract
Network Protocol instrument (NPA) is additionally called packet analyser, network analyser, packet sniffer. NPA monitors specifically what's happening on Network & observes what different users do. it's simple to use tool to capture the traffic on the Subnet & show real time statistics whereas capturing packets. options are:-Analyze network issues, show list of information processing addresses that ar active on the network, show completely different protocol info sent and received between each 2 act machines. Details of those communications ar split and displayed into server. show statically info of protocol analysis. Displays graphical illustration of protocol analysis. Network Protocol analyzers ought to give 3 main sources of knowledge regarding your {lan|local ara network|LAN|computer network} in addition; varied protocols together with TCP/IP are utilized in conjunction with networks. so as to observe protocol misbehaviors and failures in networks, it's needed to investigate these protocols and examine interactions among them. This project presents elaborate style and implementation of our protocol analyser for information processing primarily based networks.
PaperID
2012/eusrm/04/01/1029