In the ICT era the need of depth investigation and analysis is required on network traffic. The analysis should focus on detecting DDoS attacks. In the 21st century the use of communication or transactions arc complet...
详细信息
ISBN:
(纸本)9781538611449
In the ICT era the need of depth investigation and analysis is required on network traffic. The analysis should focus on detecting DDoS attacks. In the 21st century the use of communication or transactions arc completely doing through online, the political activists, and international cyber terrorists are choosing the DDoS attacks as a powerful weapon for their illegal an un ethical activities. It is impossible to the human being to identify all these unethical activities, hence the need of machine based algorithms are required. In this paper we used GLM, GBM, NN, RF regression algorithms for detection and prediction of DDoS attacks, and also proved that by using regression algorithms we observed more accurate result than using KNN SVM algorithm.
Heterogeneous distributedsystems.(HDS) provides service to users executed on a set of geographically heterogeneous distributed resources with dynamic nature. In HDS, load balancing approaches has a vital role in task...
详细信息
ISBN:
(数字)9781538668948
ISBN:
(纸本)9781538668955
Heterogeneous distributedsystems.(HDS) provides service to users executed on a set of geographically heterogeneous distributed resources with dynamic nature. In HDS, load balancing approaches has a vital role in tasks allocation for avoiding resources overloaded or underloaded. Over the past decades, these approaches have been developed to improve objective parameters. The mapping problem of independent Batch of Tasks (BoT) on computational machines with heterogeneities to optimize various quality of service (QoS) in distributed system has been proven as NP-complete. In this paper, we propose an Enhanced Load Balancing Strategy with Migration cost (ELBSM) to optimize load imbalance on nodes in the system. We evaluate our work through comparative performance evaluation using randomly generated batch of tasks by using MATLAB 8.5.0. Experimental study suggests that the proposed work prevails over existing strategies in terms of considered parameters under study.
distributed Denial of Service (DDoS) attacks poses a severe threat to widely used Internet-based services and applications. Currently, during in the technology era, the internet is the only real exigent that delivers ...
详细信息
ISBN:
(纸本)9781538611449
distributed Denial of Service (DDoS) attacks poses a severe threat to widely used Internet-based services and applications. Currently, during in the technology era, the internet is the only real exigent that delivers a glut of services like businesses, banking, communication, education, e-commerce, etc. distributed Denial of Service attack aims to deny access by legitimate users to shared services or resources. Because of the vulnerability of the initial style of the web, attackers can merely mimic the patterns of legitimate network traffic. The prevailing fingerprint or feature-based methods are not appropriate to detect a recent DDoS attack. In this paper our goal is to detect a DDoS attack as well as Flash Crowd using various information distance measures such as Kullbeck-Leibler, Hellinger and Manhattan distance to measure the flow similarity among the traffic. Further the detection parameters such as Detection Rate, Classification Rate, Precision Rate and False Positive Rate is computed and shows that the Kullbeck-Leibler detection metric effectively detects the attack as compared to the other two.
In vehicle to vehicle communication, every vehicle broadcasts its status information periodically in its beacons to create awareness for surrounding vehicles. However, when the wireless channel is congested due to bea...
详细信息
ISBN:
(纸本)9789897582424
In vehicle to vehicle communication, every vehicle broadcasts its status information periodically in its beacons to create awareness for surrounding vehicles. However, when the wireless channel is congested due to beaconing activity, many beacons are lost due to packet collision. This paper presents a distributed congestion control algorithm to adapt beacons transmit power. The algorithm is based on game theory, for which the existence of the Nash Equilibrium (NE) is proven and the uniqueness of the NE and stability of the algorithm is verified using simulation. The proposed algorithm is then compared with other congestion control mechanisms using simulation. The results of the simulations indicate that the proposed algorithm performs better than the others in terms of fairness, bandwidth usage, and the ability to meet the application requirements.
This paper presents Requirement Analysis of ToT Security in distributedsystems. particularly looking at trust, confidentiality and privacy issues. The novelty of ToT is its ability to perform automated tasks in a way...
详细信息
ISBN:
(纸本)9781509064229
This paper presents Requirement Analysis of ToT Security in distributedsystems. particularly looking at trust, confidentiality and privacy issues. The novelty of ToT is its ability to perform automated tasks in a way that was never envisaged. However, security and safety issues have been identified as key barriers, especially in distributed environments, whereby IoTs from different autonomous security domains may have to collaborate to solve business problems. This is not a surprise;as a disruptive technology, IoT come with inherent vulnerability and threats like most other computing structures. Trust, confidentiality and privacy are critically main security issues that must be addressed along the line of cloud computing and connectivity. Arguably, providing end-to-end security i.e. confidentiality, integrity and availability (CIA) cannot completely be built into IoT architecture by default as diverse use cases (or scenarios) may require different security configurations. Conversely, beside integrity and availability, trust, confidentiality and privacy may form one such layer of IoT security architecture that should be configurable at the point of deployment. We provide a novel requirement specification for addressing trust, confidentiality and privacy concerns simultaneously, after security requirements analysis. The requirements among others prescribe the need for negotiated release of provable attributes and resources, especially when devices have the Capabilities and Requirements to share data as well as collaborate in solving business problems.
Speaker Verification systems.needs to be robust over Morphed or Converted voice. There is possibility of Spoofing attack so to prevent that kind of attack and make surety of the system is big challenge. The main goal ...
详细信息
ISBN:
(纸本)9781538611449
Speaker Verification systems.needs to be robust over Morphed or Converted voice. There is possibility of Spoofing attack so to prevent that kind of attack and make surety of the system is big challenge. The main goal of the proposed system is to correctly identify the speaker and preventing the system from the morphing attack to ensure the authenticity, by using security. Morphing is performed by Pitch Synchronous Overlap and Add (PSOLA) method and Verification is performed by Correlation method, in that feature extraction is performed by MFCC and LPC method. Watermarking is performed with the blind detection and DM-QIM is used for watermarking process. In order to evaluate the overall performance of implemented algorithm, Identification rate, ABX test, and WSR are used.
Interoperability and enormous data processing remain significant challenges for Internet of Things39; systems. High heterogeneity in protocols, Vendors, data formats and worldwide acceptable standards39; scarcity ...
详细信息
This paper describes perspective platforms that can be used by BOINC for distributedcomputing: mobile devices (Android, iOS, Windows Phone) and video game consoles (Sony PlayStation, Microsoft Xbox and Nintendo Wii/S...
详细信息
Today, demand of distributedcomputing technique has grown drastically where cloud computing also has gain considerable attention from researchers and industries for various applications. Cloud computing is provided b...
详细信息
The proceedings contain 53 papers. The topics discussed include: sentiment identification for collaborative, geographically dispersed, cross-functional software development teams;WebNSM: a novel scalable WebRTC signal...
ISBN:
(纸本)9781538625651
The proceedings contain 53 papers. The topics discussed include: sentiment identification for collaborative, geographically dispersed, cross-functional software development teams;WebNSM: a novel scalable WebRTC signaling mechanism for many-to-many video conferencing;concurrent command and consistency management for distributed compound document authoring;model selection based on kalman temporal differences learning;extracting linked data from HTML tables;source identification for printed documents;when do changes induce software vulnerabilities?;VAPTAi: a threat model for vulnerability assessment and penetration testing of android and iOS mobile banking apps;and detecting android malwares by mining statically registered broadcast receivers.
暂无评论