Enhanced Decentralized Control and Attack Analysis Model for Virtual Network System

Size: px
Start display at page:

Download "Enhanced Decentralized Control and Attack Analysis Model for Virtual Network System"

Transcription

1 Enhanced Decentralized Control and Attack Analysis Model for Virtual Network System Kolan.Saritha*1, K.Ramesh Babu*2 PG Scholar, Dept of CSE, MRECW, Dist: secunderabad, Telangana state, India Associate Professor & HOD, Dept of CSE, MRECW, Dist: secunderabad, Telangana state, Indi ABSTRACT Technologically Network Security is always looping whole like the matter of Physics Black Hole. If we consider the these days demanding Technology which called as cloud computing in turn we call as virtualization, where Network is Most Primary Component leads us to a high level research to provide the best of security mechanism and minimizing the vulnerability. Network Security in the cloud environment is typically involve the first task as Detection of vulnerability which may lead the hacker to explore some more new technical flip-flop. Hence, in this paper we try to put forward some of the countermeasure as prevention is better than cure where we put the multi hop based counter vulnerability and making the Node to node acknowledgement with the intention of making the system enable with same intrusion mechanism. KEYWORDS: Network security, cloud computing, intrusion detection, IDS. I.INTRODUCTION Networks are becoming increasingly popular with many potential applications including general engineering, health, military, environment science, etc. They consist of large number of tiny sensor nodes with limited energy, memory, bandwidth, and processing power. Sensor nodes can be randomly deployed in inhospitable places. A WSN is self-organized with collaboration between nodes. Base station, which is usually a powerful computer with more computational resources, energy, and storage, is present and receives aggregated data from the sensors. IAAS: An organization or a company which provides a service. Those services may include much essential functionality such as computer networking, information storage, servers and virtualization. SAAS: This is also provided by an organization. They provide software, in which you can use these services. An example is Face book. Vulnerability is a prominent factor of risk. ISO defines risk as the potential that a given threat will exploit vulnerabilities of an asset or group of assets and thereby cause harm of the organization. II.RELATEDWORK Nowadays everyone has to accept the fact that the percentage of intruders is IJCSIET-ISSUE4-VOLUME3-SERIES2 Page 1

2 increasing day by day as technology advances. But at the same time we have a lot of chances to keep the data in security. We have a lot of free software on the internet to protect data from intruders such as antivirus software etc.coming to this thesis, Intrusion Detection System (IDS) is the tool for monitoring traffic in the network. Whenever it identifies vulnerabilities in the network, it sends a report to the system or network administrator. IDS are like an alarm on your computer. It makes it possible to block the unauthorized persons from accessing data. intrusion detection system is classified into two methods namely, behavior analysis and knowledge analysis. Behavior analysis method is done by comparing the previous behavior with the present one. It detects the intrusion by using heuristic/anomaly. Knowledge analysis method detects intrusions by using signatures/patterns. We are free to delete and modify rules at will in a knowledge based system. We refer to the next section Signature/pattern & heuristic/anomaly for further information.how to detect: The two IDS tools which we are going to discuss related to the project are signature/pattern Based IDS and Heuristic /anomaly based IDS. III.PROPOSED METHODOLOGY Fig.2.1 Ideal Frame Structure of Access period IDS and IPS both are software but they have different terminologies. IDS controlthe Intrusion Detection process while IPS has all the features from IDS as well as tools to prevent the attacks from intruders.the Intrusion detection system service helps to increase the security in the cloud system by using two methods i.e. behavior based and knowledge based service. We refer to the previous section for further information. The audited data is sent to the IDS service core, which analyzes the behavior using artificial intelligence to detect deviations. It has two sub systems namely analyzer and alert systems. Analyzer system the analyzer gets audit data and examines whether a heuristic in the database is being broken, after which it sends the outcome to the IDS service. For these outcomes, IDS estimates the attack probability and if probability ratio is high then it alerts the other nodes. Alert system in the cloud system if any one node is harmed by the intruder then alert system will alert the remaining nodes in the network regarding the attack. IJCSIET-ISSUE4-VOLUME3-SERIES2 Page 2

3 Fig.3.1 Architecture Diagram of Cloud Based Intrusion at Each Node Vulnerability is cloud specific if it is prevalent in established state-of-the-art cloud offerings.even though cloud computing is a new system in the market, in spite of this fact, currently thousands of cloud offerings are in the market. So we are going to discuss two important vulnerabilities that are related to our project. The two main vulnerabilities are injection vulnerabilities and weak authentication schemes. Injection vulnerabilities are attack techniques, in which the attacker exploits by editing the services or by user inputs to perform, execute and oppose the user s aim. passwords, because the users are using the same passwords in different websites and weak passwords. Session hijacking is an attack technique. A user does not have permission to access the system, but he gains the services in the system. The attackers steal a magic cookie that can be used to authenticate a client to a remote server. The fact is that these types of attacks are most common in websites because the web applications run over HTTP from a web server to a web browser. Therefore, HTTP cookies are used to maintain a session on so many websites. So in this case the attacker can steal cookies easily by using an intermediate system and they can access the user s web account. Session hijacking produces anomalies in the network traffic. Therefore, by using IDS we can detect the attack. IV.ANALYSIS The main cloud server is connected to all the proxy servers and it maintains the index of the data information by all the proxy servers. The below three examples are injection vulnerabilities.vulnerability is cloud specific if it is intrinsic to or prevalent in a core cloud computing technology. Authentication Mechanism: The main root cause of weaknesses in current authentication mechanism is usernames and Fig Illustration of Node Probability IJCSIET-ISSUE4-VOLUME3-SERIES2 Page 3

4 At first, the user sends the request to the main cloud server about the hi.doc file. Then the main cloud server will forward the request to the exact proxy. The proxy server gives back the information to the main cloud server. Finally, the proxy server will send the file to the user. In this case the main cloud server can handle multiple user requests. The proxy server helps to decrease the acknowledgment time and gives the reply to the users in a proper manner. V.CONCLUSION AND FUTURE ENHANCEMENT Everything starts with an idea, and then we have to analyze the idea step by step. Based on the implementation procedure we will get results. Data encryption is provided by exchanging link keys between each device. The signature payload plays a big role on performance of the network. I have developed model of key exchange integrated into the sensing function of beacon enabled IEEE cluster. The results show important impact of the ratio of the event sensing reliability and key update threshold on the clusters energy consumption. VI.REFERENCES [1] Cloud Security Alliance, Top Threats to Cloud Computing v1.0, sathreats. v1.0.pdf, Mar [2] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, A View of Cloud Computing, ACM Comm., vol. 53, no. 4, pp , Apr [3] B. Joshi, A. Vijayan, and B. Joshi, Securing Cloud Computing Environment Against DDoS Attacks, Proc. IEEE Int l Conf. Computer Comm. and Informatics (ICCCI 12), Jan [4] H. Takabi, J.B. Joshi, and G. Ahn, Security and Privacy Challenges in Cloud Computing Environments, IEEE Security and Privacy, vol. 8, no. 6, pp , Dec [5] Open vswitch Project, May [6] Z. Duan, P. Chen, F. Sanchez, Y. Dong, M. Stephenson, and J. Barker, Detecting Spam Zombies by Monitoring Outgoing Messages, IEEE Trans. Dependable and Secure Computing, vol. 9,no. 2, pp , Apr [7] G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, BotHunter: Detecting Malware Infection through IDS-driven Dialog Correlation, Proc. 16th USENIX Security Symp. (SS 07), pp. 12:1-12:16, Aug [8] G. Gu, J. Zhang, and W. Lee, BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic, Proc. 15 th Ann. Network and Distributed Sytem Security Symp. (NDSS 08), Feb [9] O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J.M. Wing, Automated Generation and Analysis of Attack Graphs, IJCSIET-ISSUE4-VOLUME3-SERIES2 Page 4

5 Proc. IEEE Symp. Security and Privacy, pp , 2002, [10] NuSMV: A New Symbolic Model Checker, it:1024/nusmv. Aug [11] P. Ammann, D. Wijesekera, and S. Kaushik, Scalable, graphbased network vulnerability analysis, Proc. 9th ACM Conf. Computer and Comm. Security (CCS 02), pp , [12] X. Ou, S. Govindavajhala, and A.W. Appel, MulVAL: A Logic- Based Network Security Analyzer, Proc. 14th USENIX Security Symp., pp , [13] R. Sadoddin and A. Ghorbani, Alert Correlation Survey: Framework and Techniques, Proc. ACM Int l Conf. Privacy, Security and Trust: Bridge the Gap between PST Technologies and Business Services (PST 06), pp. 37:1-37:10, [14] L. Wang, A. Liu, and S. Jajodia, Using Attack Graphs for Correlating, Hypothesizing, and Predicting Intrusion Alerts, Computer Comm., vol. 29, no. 15, pp , Sept [15] S. Roschke, F. Cheng, and C. Meinel, A New Alert Correlation Algorithm Based on Attack Graph, Proc. Fourth Int l Conf. Computational Intelligence in Security for Information Systems, pp , Attack Countermeasure Trees, Proc. IEEE Int l Conf. Dependable Systems Networks (DSN 12), June [17] N. Poolsappasit, R. Dewri, and I. Ray, Dynamic Security Risk Management Using Bayesian Attack Graphs, IEEE Trans. Dependable and Secure Computing, vol. 9, no. 1, pp , Feb [18] Open Networking Fundation, Software-Defined Networking: The New Norm for Networks, ONF White Paper, Apr [19] Openflow, [20] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, OpenFlow: Enabling Innovation in Campus Networks, SIGCOMM Computer Comm. Rev., vol. 38, no. 2, pp , Mar AUTHORS PROFILE: NAME: Kolan.Saritha, PG Scholar, Dept of CSE, MRECW, Dist: secunderabad, Telangana state, India, sarithakolan@gmail.com. [16] A. Roy, D.S. Kim, and K. Trivedi, Scalable Optimal Countermeasure Selection Using Implicit Enumeration on IJCSIET-ISSUE4-VOLUME3-SERIES2 Page 5

6 NAME: K.Ramesh Babu, Associate Professor & HOD, Dept of CSE, MRECW, Maisammaguda, Secunderabad, Telangana State, India, IJCSIET-ISSUE4-VOLUME3-SERIES2 Page 6

DETECTION OF INTRUSION AND PRESERVING PRIVACY FOR DATA IN CLOUD STORAGE SYSTEM

DETECTION OF INTRUSION AND PRESERVING PRIVACY FOR DATA IN CLOUD STORAGE SYSTEM International Journal of Power Control and Computation(IJPCSC) Vol 7. No.1 2015 Pp. 35-40 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0976-268X -------------------------------------------------------------------------------------------------------------------------------------------------------------------

More information

COUNTERMEASURE SELECTION FOR VIRTUAL NETWORK SYSTEMS USING NETWORK INTRUSION DETECTION

COUNTERMEASURE SELECTION FOR VIRTUAL NETWORK SYSTEMS USING NETWORK INTRUSION DETECTION International Journal of Computer Engineering and Applications, Volume IX, Issue VIII, August 2015 www.ijcea.com ISSN 2321-3469 COUNTERMEASURE SELECTION FOR VIRTUAL NETWORK SYSTEMS USING NETWORK INTRUSION

More information

A Novel Attack Graph Approach For Attack Detection And Prevention Using Nice

A Novel Attack Graph Approach For Attack Detection And Prevention Using Nice A Novel Attack Graph Approach For Attack Detection And Prevention Using Nice K.Suganya 1, K.T.V Subbarao 2 1,2 Department of Computer Science And Engineering 1,2 Akula Sree Ramulu institute of Engineering

More information

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV) Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Detection of Network Intrusion and Countermeasure Selection in Cloud Systems

Detection of Network Intrusion and Countermeasure Selection in Cloud Systems IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. X (Mar-Apr. 2014), PP 84-88 Detection of Network Intrusion and Countermeasure Selection in

More information

Secure intrusion detection and attack measure selection in virtual network systems

Secure intrusion detection and attack measure selection in virtual network systems Advances in Networks 2013; 1(2): 26-33 Published online June 10, 2013 (http://www.sciencepublishinggroup.com/j/net) doi: 10.11648/j.net.20130102.12 Secure intrusion detection and attack measure selection

More information

A Review of Network Intrusion Detection and Countermeasure

A Review of Network Intrusion Detection and Countermeasure A Review of Network Intrusion Detection and Countermeasure 1 K.Vikram, 2 B.Anitha, 3 G.Padmavathi, 4 D.Sravani 1,2,3,4 Dept of CSE, TKR Engineering College, Meerpet, Hyderabad, India Abstract Nowadays

More information

Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Counter measures In Cloud Environment

Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Counter measures In Cloud Environment Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Counter measures In Cloud Environment D.Usha Sree Chiranjeevi Reddy Institute of Technology Anantapuramu-51500, Andhra Pradesh.

More information

Detecting Spam Zombies By Monitoring Outgoing Messages

Detecting Spam Zombies By Monitoring Outgoing Messages International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 5, Issue 5 (May 2016), PP.71-75 Detecting Spam Zombies By Monitoring Outgoing Messages

More information

An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems Shaik Shanawaz 1, K. Thyagarajan 2 1 M.Tech, Sri Venkateswara College of Engineering and Technology,

More information

NICE: Network Invasion Detection and Countermeasure Selection in Virtual Network Systems

NICE: Network Invasion Detection and Countermeasure Selection in Virtual Network Systems NICE: Network Invasion Detection and Countermeasure Selection in Virtual Network Systems BrindhaKundavaran Computer Science and Engineering Sri Venkateshwara College of Engineering For Women(SVEW) Tirupati-517501

More information

Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage

Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage V.Anjani Kranthi *1, Smt.D.Hemalatha *2 M.Tech Student, Dept of CSE, S.R.K.R engineering college, Bhimavaram, AP,

More information

Employing a Reconfigurable Virtual Networking Approach by using NICE Mechanism

Employing a Reconfigurable Virtual Networking Approach by using NICE Mechanism Employing a Reconfigurable Virtual Networking Approach by using NICE Mechanism A.JensilinMary.M.E, E.SathishKumar, S.NavinChander, R.Naveenkumar, A.Prasanth Department of Information Technology SKP Engineering

More information

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms A.Sarika*1, Smt.J.Raghaveni*2 M.Tech Student, Dept of CSE, S.R.K.R Engineering college, Bhimavaram, AP,

More information

COUNTERMEASURE SELECTION AND INTRUSION DETECTION USING NICE IN VIRTUAL NETWORK SYSTEMS

COUNTERMEASURE SELECTION AND INTRUSION DETECTION USING NICE IN VIRTUAL NETWORK SYSTEMS Volume 117 No. 19 2017, 349-356 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu COUNTERMEASURE SELECTION AND INTRUSION DETECTION USING NICE IN VIRTUAL

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK SPAM DETECTION USNIG SPOT TOOL SURAJ KUTE, DIPIKA MOHOD, PAYAL SHIRE, PRATIKSHA

More information

Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique

Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 Prevention of Vulnerable Virtual Machines against DDOS Attacks in the Cloud C.Kavitha 1 1 M.E, First Year, Department of Computer Science and Engineering, Saveetha Engineering College, Chennai, Tamil Nadu,

More information

GENETIC ALGORITHM AND BAYESIAN ATTACK GRAPH FOR SECURITY RISK ANALYSIS AND MITIGATION P.PRAKASH 1 M.

GENETIC ALGORITHM AND BAYESIAN ATTACK GRAPH FOR SECURITY RISK ANALYSIS AND MITIGATION P.PRAKASH 1 M. GENETIC ALGORITHM AND BAYESIAN ATTACK GRAPH FOR SECURITY RISK ANALYSIS AND MITIGATION P.PRAKASH 1 M.SIVAKUMAR 2 1 Assistant Professor/ Dept. of CSE, Vidyaa Vikas College of Engineering and Technology,

More information

Systematic Detection And Resolution Of Firewall Policy Anomalies

Systematic Detection And Resolution Of Firewall Policy Anomalies Systematic Detection And Resolution Of Firewall Policy Anomalies 1.M.Madhuri 2.Knvssk Rajesh Dept.of CSE, Kakinada institute of Engineering & Tech., Korangi, kakinada, E.g.dt, AP, India. Abstract: In this

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Gabriel Sanchez Bautista and Ning Zhang School of Computer Science The University of Manchester Manchester M13 9PL, United

More information

UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK

UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK Dr G.Charles Babu Professor MRE College Secunderabad, India. charlesbabu26@gmail.com N.Chennakesavulu Assoc.Professor Wesley PG

More information

Internet Traffic Classification Using Machine Learning. Tanjila Ahmed Dec 6, 2017

Internet Traffic Classification Using Machine Learning. Tanjila Ahmed Dec 6, 2017 Internet Traffic Classification Using Machine Learning Tanjila Ahmed Dec 6, 2017 Agenda 1. Introduction 2. Motivation 3. Methodology 4. Results 5. Conclusion 6. References Motivation Traffic classification

More information

Auto Finding and Resolving Distributed Firewall Policy

Auto Finding and Resolving Distributed Firewall Policy IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 5 (Mar. - Apr. 2013), PP 56-60 Auto Finding and Resolving Distributed Firewall Policy Arunkumar.k 1,

More information

Dynamic and Flexible Group Key Generation Based on User Behaviour Monitoring

Dynamic and Flexible Group Key Generation Based on User Behaviour Monitoring International Journal of Computing Academic Research (IJCAR) ISSN 2305-9184, Volume 5, Number 1 (February 2016), pp.27-32 MEACSE Publications http://www.meacse.org/ijcar Dynamic and Flexible Group Key

More information

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network 1 Ms.Anisha Viswan, 2 Ms.T.Poongodi, 3 Ms.Ranjima P, 4 Ms.Minimol Mathew 1,3,4 PG Scholar, 2 Assistant Professor,

More information

Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code

Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code Sajeev V 1, Gowthamani R 2 Department of Computer Science, Nehru Institute of Technology, Coimbatore, India 1,

More information

Detecting Spam Zombies by Monitoring Outgoing Messages

Detecting Spam Zombies by Monitoring Outgoing Messages Detecting Spam Zombies by Monitoring Outgoing Messages Zhenhai Duan, Peng Chen, Fernando Sanchez Florida State University {duan, pchen, sanchez}@cs.fsu.edu Yingfei Dong University of Hawaii yingfei@hawaii.edu

More information

A Simple Secure Auditing for Cloud Storage

A Simple Secure Auditing for Cloud Storage A Simple Secure Auditing for Cloud Storage Lee-Hur Shing Institute of Information Science Academia Sinica leehurs@iis.sinica.edu.tw Marn-Ling Shing University of Taipei Yu-Hsuan Yeh, Yan-Zhi Hu and Shih-Ci

More information

Packet Forwarding Method by Clustering Approach to Prevent Vampire Attacks in Wireless Sensor Networks Vijimol Vincent K 1, D.

Packet Forwarding Method by Clustering Approach to Prevent Vampire Attacks in Wireless Sensor Networks Vijimol Vincent K 1, D. Packet Forwarding Method by Clustering Approach to Prevent Vampire Attacks in Wireless Sensor Networks Vijimol Vincent K 1, D.Prabakar 2 PG scholar, Dept of Computer Science and Engineering, SNS College

More information

Binary Protector: Intrusion Detection in Multitier Web Applications

Binary Protector: Intrusion Detection in Multitier Web Applications Binary Protector: Intrusion Detection in Multitier Web Applications C. Venkatesh 1 D.Nagaraju 2 T.Sunil Kumar Reddy 3 1 P.G Scholar, CSE Dept, Sir Vishveshwariah Institute of Science and Technology 2 Assistant

More information

@IJMTER-2016, All rights Reserved ,2 Department of Computer Science, G.H. Raisoni College of Engineering Nagpur, India

@IJMTER-2016, All rights Reserved ,2 Department of Computer Science, G.H. Raisoni College of Engineering Nagpur, India Secure and Flexible Communication Technique: Implementation Using MAC Filter in WLAN and MANET for IP Spoofing Detection Ashwini R. Vaidya 1, Siddhant Jaiswal 2 1,2 Department of Computer Science, G.H.

More information

A Review on Security in Smart Grids

A Review on Security in Smart Grids International Journal of Allied Practice, Research and Review Website: www.ijaprr.com (ISSN 2350-1294) A Review on Security in Smart Grids Jeetu Sharma, Partha Pratim Bhattacharya and V K Jain College

More information

Botnets: A Survey. Rangadurai Karthick R [CS10S009] Guide: Dr. B Ravindran

Botnets: A Survey. Rangadurai Karthick R [CS10S009] Guide: Dr. B Ravindran 08-08-2011 Guide: Dr. B Ravindran Outline 1 Introduction 2 3 4 5 6 2 Big Picture Recent Incidents Reasons for Study Internet Scenario Major Threats Flooding attacks Spamming Phishing Identity theft, etc.

More information

NETWORK SECURITY PROVISION BY MEANS OF ACCESS CONTROL LIST

NETWORK SECURITY PROVISION BY MEANS OF ACCESS CONTROL LIST INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE NETWORK SECURITY PROVISION BY MEANS OF ACCESS CONTROL LIST Chate A.B 1, Chirchi V.R 2 1 PG Student, Dept of CNE, M.B.E.S College

More information

Improving the Security Performance of Public Clouds Using Attribute Based Access Control in Document Sharing

Improving the Security Performance of Public Clouds Using Attribute Based Access Control in Document Sharing Improving the Security Performance of Public Clouds Using Attribute Based Access Control in Document Sharing ABSTRACT: Y.Sandhya*1, DR.M A D R Swamy*2 M.Tech Scholar, Dept of CSE, QISCET, ONGOLE, Dist:

More information

Web Gate Keeper: Detecting Encroachment in Multi-tier Web Application

Web Gate Keeper: Detecting Encroachment in Multi-tier Web Application Web Gate Keeper: Detecting Encroachment in Multi-tier Web Application Sanaz Jafari Prof.Dr.Suhas H. Patil (GUIDE) ABSTRACT The Internet services and different applications become vital part of every person

More information

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Using Data Mining Techniques

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Using Data Mining Techniques Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Using Data Mining Techniques Nandini P 1 Nagaraj M.Lutimath 2 1 PG Scholar, Dept. of CSE Sri Venkateshwara College, VTU, Belgaum,

More information

SECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM. SRM University, Chennai

SECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM. SRM University, Chennai Volume 115 No. 6 2017, 689-695 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu SECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM S. Selvakumar

More information

FAME: A NOVEL FRAMEWORK FOR POLICY MANAGEMENT IN FIREWALL

FAME: A NOVEL FRAMEWORK FOR POLICY MANAGEMENT IN FIREWALL FAME: A NOVEL FRAMEWORK FOR POLICY MANAGEMENT IN FIREWALL A.Krishna Mohan Associate professor Dept. CSE (IT) UCEK JNTU Kakinada Abstract: In this paper investigate the problem of discovering the set of

More information

BotCatch: Botnet Detection Based on Coordinated Group Activities of Compromised Hosts

BotCatch: Botnet Detection Based on Coordinated Group Activities of Compromised Hosts 2014 7th International Symposium on Telecommunications (IST'2014) BotCatch: Botnet Based on Coordinated Group Activities of Compromised Hosts Mosa Yahyazadeh and Mahdi Abadi Faculty of Electrical and Computer

More information

ADVANCES in NATURAL and APPLIED SCIENCES

ADVANCES in NATURAL and APPLIED SCIENCES ADVANCES in NATURAL and APPLIED SCIENCES ISSN: 1995-0772 Published BY AENSI Publication EISSN: 1998-1090 http://www.aensiweb.com/anas 2016 May 10(5): pages 223-227 Open Access Journal An Efficient Proxy

More information

Strengthening Network Security: An SDN (Software Defined Networking) Approach

Strengthening Network Security: An SDN (Software Defined Networking) Approach Strengthening Network Security: An SDN (Software Defined Networking) Approach Pradeep Kumar Sharma 1, Dr. S. S. Tyagi 2 1 Ph.D Research Scholar, Computer Science & Engineering, MRIU, Faridabad, Haryana,

More information

INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGIES, VOL. 02, ISSUE 01, JAN 2014

INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGIES, VOL. 02, ISSUE 01, JAN 2014 INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGIES, VOL. 02, ISSUE 01, JAN 2014 ISSN 2321 8665 LOW BANDWIDTH DDOS ATTACK DETECTION IN THE NETWORK 1 L. SHIVAKUMAR, 2 G. ANIL KUMAR 1 M.Tech CSC Dept, RVRIET,

More information

The Invisible Threat of Modern Malware Lee Gitzes, CISSP Comm Solutions Company

The Invisible Threat of Modern Malware Lee Gitzes, CISSP Comm Solutions Company The Invisible Threat of Modern Malware Lee Gitzes, CISSP Comm Solutions Company November 12, 2014 Malware s Evolution Why the change? Hacking is profitable! Breaches and Malware are Projected to Cost $491

More information

ANONYMIZATION OF DATA USING MAPREDUCE ON CLOUD

ANONYMIZATION OF DATA USING MAPREDUCE ON CLOUD ANONYMIZATION OF DATA USING MAPREDUCE ON CLOUD Mallappa Gurav 1, N. V. Karekar 2, Manjunath Suryavanshi 3 1 Dept. Of Computer Science and Engineering, K. L. E College of Engineering & Technology, Chikodi-591

More information

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks So we are proposing a network intrusion detection system (IDS) which uses a Keywords: DDoS (Distributed Denial

More information

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack F. Anne Jenefer & D. Vydeki E-mail : annejenefer@gmail.com, vydeki.d@srmeaswari.ac.in Abstract Mobile Ad-Hoc Network (MANET)

More information

NETWORK INTRUSION. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

NETWORK INTRUSION. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 NETWORK INTRUSION Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Learning Objectives Students should be able to: Recognize different

More information

Enhanced Malware Monitor in SDN using Kinetic Controller

Enhanced Malware Monitor in SDN using Kinetic Controller IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727 PP 46-52 www.iosrjournals.org Enhanced Malware Monitor in SDN using Kinetic Controller Jiphi T S, Simi Krishna K R Department

More information

Non-Intrusive Decentralized Attack Analyzer & Network Controller to Monitoring and Prevent Vulnerability in VM Network System

Non-Intrusive Decentralized Attack Analyzer & Network Controller to Monitoring and Prevent Vulnerability in VM Network System Non-Intrusive Decentralized Attack Analyzer & Network Controller to Monitoring and Prevent Vulnerability in VM Network System K. Senthil Raja 1, G. Sudhakar 2, Dr. S. Nithiyanandam 3 1 M.E/CSE, Ranganathan

More information

BotDigger: A Fuzzy Inference System for Botnet Detection

BotDigger: A Fuzzy Inference System for Botnet Detection The Fifth International Conference on Internet Monitoring and Protection BotDigger: A Fuzzy Inference System for Botnet Detection Basheer Al-Duwairi Network Engineering and Security Department Jordan University

More information

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review ACS-3921-001/4921-001 Computer Security And Privacy Fall 2018 Mid-Term Review ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been adopted and/or modified

More information

Available online at ScienceDirect. Procedia Computer Science 48 (2015 ) (ICCC-2014) (ICCC-2015)

Available online at   ScienceDirect. Procedia Computer Science 48 (2015 ) (ICCC-2014) (ICCC-2015) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 48 (2015 ) 347 352 International Conference on Intelligent Computing, Communication & Convergence (ICCC-2015) (ICCC-2014)

More information

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DE-DUPLICABLE EFFECTIVE VALIDATION of CAPACITY for DYNAMIC USER ENVIRONMENT Dr. Shubhangi D C *1 & Pooja 2 *1 HOD, Department

More information

Multivariate Correlation Analysis based detection of DOS with Tracebacking

Multivariate Correlation Analysis based detection of DOS with Tracebacking 1 Multivariate Correlation Analysis based detection of DOS with Tracebacking Jasheeda P Student Department of CSE Kathir College of Engineering Coimbatore jashi108@gmail.com T.K.P.Rajagopal Associate Professor

More information

A Review Paper on Network Security Attacks and Defences

A Review Paper on Network Security Attacks and Defences EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY

More information

Detecting Spam Zombies by Monitoring Outgoing Messages

Detecting Spam Zombies by Monitoring Outgoing Messages Detecting Spam Zombies by Monitoring Outgoing Messages Zhenhai Duan, Peng Chen, Fernando Sanchez Florida State University {duan, pchen, sanchez}@cs.fsu.edu Yingfei Dong University of Hawaii yingfei@hawaii.edu

More information

Mobile Management Method for SDN-based Wireless Networks

Mobile Management Method for SDN-based Wireless Networks Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2015, 7, 2063-2069 2063 Open Access Mobile Management Method for SDN-based Wireless Networks Min

More information

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina Rajasekaran 1, Rashmi 2 1 Asst. Professor, Department of Electronics and Communication, St. Joseph College of Engineering,

More information

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING S KEERTHI 1*, MADHAVA REDDY A 2* 1. II.M.Tech, Dept of CSE, AM Reddy Memorial College of Engineering & Technology, Petlurivaripalem. 2. Assoc.

More information

ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME

ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME Jae Kwan Lee 1 and Tae Ho Cho 2 1, 2 College of Information and Communication Engineering,

More information

Network Security - ISA 656 Review

Network Security - ISA 656 Review Network Security - ISA 656 Review Material Test Conditions 7:20pm - 9:30pm, Thursday, Dec 11th, in the Lab (STI-128) Same style of questions as the midterm I m not asking you to write programs Angelos

More information

New Non Path Metrics for Evaluating Network Security Based on Vulnerability

New Non Path Metrics for Evaluating Network Security Based on Vulnerability www.ijcsi.org 487 New Non Path Metrics for Evaluating Network Security Based on Vulnerability Tito Waluyo Purboyo 1 and Kuspriyanto 2 1,2 School of Electrical Engineering & Informatics, Institut Teknologi

More information

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE Chakali Sasirekha 1, K. Govardhan Reddy 2 1 M.Tech student, CSE, Kottam college of Engineering, Chinnatekuru(V),Kurnool,Andhra Pradesh,

More information

INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGIES, VOL. 02, ISSUE 01, JAN 2014 ISSN

INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGIES, VOL. 02, ISSUE 01, JAN 2014 ISSN CONSTANT INCREASE RATE DDOS ATTACKS DETECTION USING IP TRACE BACK AND INFORMATION DISTANCE METRICS 1 VEMULA GANESH, 2 B. VAMSI KRISHNA 1 M.Tech CSE Dept, MRCET, Hyderabad, Email: vmlganesh@gmail.com. 2

More information

Mitigating Malicious Activities by Providing New Acknowledgment Approach

Mitigating Malicious Activities by Providing New Acknowledgment Approach Mitigating Malicious Activities by Providing New Acknowledgment Approach G. S. Devi Lakshmi, J. Rajasekaran 2 PG Student, Sri Subramanya College of Engineering and Technology, Palani, Tamilnadu, India

More information

Intrusion Detection through Session Hijacking

Intrusion Detection through Session Hijacking Intrusion Detection through Session Hijacking Keshav Jain Chaudhary Devilal University, Sirsa, Haryana, Inida. Abstract:-The security of web applications has become increasingly important and a secure

More information

Managing Failures in IP Networks Using SDN Controllers by Adding Module to OpenFlow

Managing Failures in IP Networks Using SDN Controllers by Adding Module to OpenFlow Managing Failures in IP Networks Using SDN Controllers by Adding Module to OpenFlow Vivek S 1, Karthikayini T 2 1 PG Scholar, Department of Computer Science and Engineering, New Horizon College of Engineering,

More information

Comparison of Online Record Linkage Techniques

Comparison of Online Record Linkage Techniques International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 Dec-2015 p-issn: 2395-0072 www.irjet.net Comparison of Online Record Linkage Techniques Ms. SRUTHI.

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) COURSE OVERVIEW: The most effective cybersecurity professionals are able to predict attacks before they happen. Training in Ethical Hacking provides professionals with the

More information

IMPROVE NETWORK LIFETIME AND LOAD BALANCING MOBILE DATA CLUSTERING FOR WIRELESS SENSOR NETWORKS

IMPROVE NETWORK LIFETIME AND LOAD BALANCING MOBILE DATA CLUSTERING FOR WIRELESS SENSOR NETWORKS IMPROVE NETWORK LIFETIME AND LOAD BALANCING MOBILE DATA CLUSTERING FOR WIRELESS SENSOR NETWORKS A.Abdulasik 1 P.Subramoniam 2 PG Scholar 1, Assistant Professor 2, Dept. of Electronic and Communication

More information

Open Access Mobile Management Method for SDN-Based Wireless Networks

Open Access Mobile Management Method for SDN-Based Wireless Networks Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2015, 7, 2063-2069 2063 Open Access Mobile Management Method for SDN-Based Wireless Networks Min

More information

Intrusion Detection System using AI and Machine Learning Algorithm

Intrusion Detection System using AI and Machine Learning Algorithm Intrusion Detection System using AI and Machine Learning Algorithm Syam Akhil Repalle 1, Venkata Ratnam Kolluru 2 1 Student, Department of Electronics and Communication Engineering, Koneru Lakshmaiah Educational

More information

Usage of Honeypot to Secure datacenter in Infrastructure as a Service data

Usage of Honeypot to Secure datacenter in Infrastructure as a Service data Usage of Honeypot to Secure datacenter in Infrastructure as a Service data Ms. Priyanka Paliwal M. Tech. Student 2 nd yr.(comp. Science& Eng.) Government Engineering College Ajmer Ajmer, India (Erpriyanka_paliwal06@rediffmail.com)

More information

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Padmalaya Nayak V. Bhavani B. Lavanya ABSTRACT With the drastic growth of Internet and VLSI design, applications of WSNs are increasing

More information

Building Trust in the Internet of Things

Building Trust in the Internet of Things AN INTEL COMPANY Building Trust in the Internet of Things Developing an End-to-End Security Strategy for IoT Applications WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Recent security breaches

More information

Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring

Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring Learning Objective Explain the importance of security audits, testing, and monitoring to effective security policy.

More information

Catching BlackHole Attacks in Wireless Sensor Networks

Catching BlackHole Attacks in Wireless Sensor Networks Catching BlackHole Attacks in Wireless Sensor Networks Ashish M 1 and Mr. Jason Martis 2 1 M. Tech, Department Of ISE, NMAM Institute of Technology, Nitte 2 Asst. Prof, Department Of ISE, NMAM Institute

More information

2. INTRUDER DETECTION SYSTEMS

2. INTRUDER DETECTION SYSTEMS 1. INTRODUCTION It is apparent that information technology is the backbone of many organizations, small or big. Since they depend on information technology to drive their business forward, issues regarding

More information

Firewall Policy Modelling and Anomaly Detection

Firewall Policy Modelling and Anomaly Detection Firewall Policy Modelling and Anomaly Detection 1 Suhail Ahmed 1 Computer Science & Engineering Department, VTU University, SDIT, Mangalore, Karnataka. India Abstract - In this paper an anomaly management

More information

Bayesian Attack Graphs for Security Risk Assessment

Bayesian Attack Graphs for Security Risk Assessment 1 IST-153 Workshop on Cyber Resilience Bayesian Attack Graphs for Security Risk Assessment Luis Muñoz-González, Emil C. Lupu Department of Computing, Imperial College London, 180 Queen s Gate, SW7 2AZ,

More information

A Novel Intrusion Detection Method for WSN Sijia Wang a, Qi Li and Yanhui Guo

A Novel Intrusion Detection Method for WSN Sijia Wang a, Qi Li and Yanhui Guo International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) A Novel Intrusion Detection Method for WSN Sijia Wang a, Qi Li and Yanhui Guo Beijing University of

More information

An Adaptive and Optimal Distributed Clustering for Wireless Sensor

An Adaptive and Optimal Distributed Clustering for Wireless Sensor An Adaptive and Optimal Distributed Clustering for Wireless Sensor M. Senthil Kumaran, R. Haripriya 2, R.Nithya 3, Vijitha ananthi 4 Asst. Professor, Faculty of CSE, SCSVMV University, Kanchipuram. 2,

More information

DDOS Attack Prevention Technique in Cloud

DDOS Attack Prevention Technique in Cloud DDOS Attack Prevention Technique in Cloud Priyanka Dembla, Chander Diwaker CSE Department, U.I.E.T Kurukshetra University Kurukshetra, Haryana, India Email: priyankadembla05@gmail.com Abstract Cloud computing

More information

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology ISSN 2229-5518 321 Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology Abstract - Nowadays all are working with cloud Environment(cloud

More information

Built-in functionality of CYBERQUEST

Built-in functionality of CYBERQUEST CYBERQUEST Knows everything Built-in functionality of CYBERQUEST Summary Demonstration of CyberQuest functionality E-mail: office@nextgensoftware.solutions Content Intro... 3 Built-in functionality of CYBERQUEST...

More information

ISSN Vol.08,Issue.16, October-2016, Pages:

ISSN Vol.08,Issue.16, October-2016, Pages: ISSN 2348 2370 Vol.08,Issue.16, October-2016, Pages:3146-3152 www.ijatir.org Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation VEDIRE AJAYANI 1, K. TULASI 2, DR P. SUNITHA

More information

SDPMN: Privacy Preserving MapReduce Network Using SDN

SDPMN: Privacy Preserving MapReduce Network Using SDN 1 SDPMN: Privacy Preserving MapReduce Network Using SDN He Li, Hai Jin arxiv:1803.04277v1 [cs.dc] 12 Mar 2018 Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer

More information

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL CONTENTS EXECUTIVE SUMMARY 1 WEB APPLICATION SECURITY CHALLENGES 2 INSIST ON BEST-IN-CLASS CORE CAPABILITIES 3 HARNESSING ARTIFICIAL INTELLIGENCE

More information

A Survey on Software-Defined Wireless Sensor Networks: Challenges and Design Requirements

A Survey on Software-Defined Wireless Sensor Networks: Challenges and Design Requirements A Survey on Software-Defined Wireless Sensor Networks: Challenges and Design Requirements Thejaswini Kasaraneni Department of Electrical & Computer Engineering Missouri University of Science and Technology

More information

Review on Techniques of Collaborative Tagging

Review on Techniques of Collaborative Tagging Review on Techniques of Collaborative Tagging Ms. Benazeer S. Inamdar 1, Mrs. Gyankamal J. Chhajed 2 1 Student, M. E. Computer Engineering, VPCOE Baramati, Savitribai Phule Pune University, India benazeer.inamdar@gmail.com

More information

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS ISSN: 2229-6948 (ONLINE) ICTACT JOURNAL OF COMMUNICATION TECHNOLOGY, JUNE 2010, VOLUME: 01, ISSUE: 02 DOI: 10.21917/ijct.2010.0013 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING

More information

Exam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo

Exam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo Exam : 642-565 Title : Security Solutions for Systems Engineers(SSSE) Version : Demo 1. SomeCompany, Ltd. wants to implement the the PCI Data Security Standard to protect sensitive cardholder information.

More information

ROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL

ROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL ROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL S.Vijaya Madhavi 1, G.Rama Subba Reddy 2 1 M.tech Scholar (CSE), 2 Headof Department (CSE), Vignana Bharathi

More information

Comparative Study of Ids for Manet

Comparative Study of Ids for Manet IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XII (Mar-Apr. 2014), PP 14-18 Comparative Study of Ids for Manet R Ranjani 1, JJayalakshmi

More information

An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree

An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree P. Radoglou-Grammatikis and P. Sarigiannidis* University of Western Macedonia Department of Informatics & Telecommunications

More information

CAODV Free Blackhole Attack in Ad Hoc Networks

CAODV Free Blackhole Attack in Ad Hoc Networks 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore CAODV Free Blackhole Attack in Ad Hoc Networks Watchara Saetang

More information

MEMORY AND BEHAVIORAL PROTECTION ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

MEMORY AND BEHAVIORAL PROTECTION ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY MEMORY AND BEHAVIORAL PROTECTION ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY FACT: COMPUTERS AND SERVERS ARE STILL AT RISK CONVENTIONAL TOOLS NO LONGER MEASURE UP Despite pouring

More information