Notice Board :





Volume IV Issue I

Author Name
Thway K, C Reynolds
Year Of Publication
2012
Volume and Issue
Volume 4 Issue 1
Abstract
With the rapid expansion of computer networks during the past few years, security has become a crucial issue for modern computer systems. A good way to identify malicious use is through monitoring unusual user activity. To identify these malicious activities various data-mining and machine learning techniques have been deployed for intrusion detection. The manual tuning process required by current systems depends on the system operators in working out the tuning solution and in integrating it into the detection model. This paper proposes Self Configuring Intrusion Detection System (SCIDS) to make tuning automatically. The key idea is to use the binary SLIPPER as a basic module, which is a rule learner based on confidence-rated boosting. This system is evaluated using the NSL KDD intrusion detection dataset. An experimental result shows the SCIDS system with SLIPPER algorithm gives better performance in terms of detection rate, false alarm rate, total misclassification cost and cost per example on NSL-KDD dataset than that of on KDD.
PaperID
2012/eusrm/04/01/1009

Author Name
Rodrigo C
Year Of Publication
2012
Volume and Issue
Volume 4 Issue 1
Abstract
Nowadays, cyber security is the big issue and the internet is been witnessing Botnet as a serious cyber-threat against their security. The network of maliciously compromised hosts is called as Botnet. Botnets are used for various malicious activities for financial benefits by sending spam mails, stealing personal information and by launching Distributed Denial of Service attacks (DDoS). Though the existence of Bots and Botnet has been acknowledged, their behaviors have not yet been fully understood. Recent dramatic increase in malicious activities introduces spark for research in Botnet detection. This paper is a survey related to behavior of bots and their malicious attempts and types. It also highlights various detection mechanisms with an aim to seek insight into their efficiency and subsequent issues arising from variety of perspectives. Moreover, recommendations for defense against Botnets have also been mentioned.
PaperID
2012/eusrm/04/01/1018

Author Name
J Clément, M C A NGUEDIA
Year Of Publication
2012
Volume and Issue
Volume 4 Issue 1
Abstract
Network Protocol instrument (NPA) is additionally called packet analyser, network analyser, packet sniffer. NPA monitors specifically what's happening on Network & observes what different users do. it's simple to use tool to capture the traffic on the Subnet & show real time statistics whereas capturing packets. options are:-Analyze network issues, show list of information processing addresses that ar active on the network, show completely different protocol info sent and received between each 2 act machines. Details of those communications ar split and displayed into server. show statically info of protocol analysis. Displays graphical illustration of protocol analysis. Network Protocol analyzers ought to give 3 main sources of knowledge regarding your {lan|local ara network|LAN|computer network} in addition; varied protocols together with TCP/IP are utilized in conjunction with networks. so as to observe protocol misbehaviors and failures in networks, it's needed to investigate these protocols and examine interactions among them. This project presents elaborate style and implementation of our protocol analyser for information processing primarily based networks.
PaperID
2012/eusrm/04/01/1029

Author Name
D Sauce
Year Of Publication
2012
Volume and Issue
Volume 4 Issue 1
Abstract
In order to assist communication within a mobile Ad-Hoc network, a well-organized routing protocol is required to determine routes between mobile nodes. Power is one of the most important design criteria for Ad-Hoc networks as batteries provide inadequate working capacity to the mobile nodes. Power failure of a mobile node not only affects the node itself but also its ability to forward packets on behalf of others and hence affects the overall network lifetime. Much research efforts have been devoted to develop energy aware routing protocols. In this paper we propose an efficient algorithm, which maximizes the network lifetime by minimizing the power consumption during the source to destination route establishment alongside making the node secure. Limited resource availability such as battery power and security are the major issues to be handled with mobile Ad-Hoc networks. In mobile Ad-Hoc networks, an attacker can easily disrupt the functioning of the network by attacking the underlying routing protocol. Packets are secure during source to destination transmission by using Two Fish Encryption algorithms. As a case study proposed algorithm has been incorporated along with the route discovery procedure of AODV and PAR, by simulation it is observed that proposed algorithm’s performance is better as compare to AODV and PAR in terms of packet delivery ratio and network lifetime for different network scenarios.
PaperID
2012/eusrm/04/01/1039