Pub Date : 2019-03-29DOI: 10.1109/ICSCAN.2019.8878796
M. Shanmugam, M. Sudha, K. Lavitha, V. Venkatesan, R. Keerthana
Augmented reality(AR) is a technology that covers virtual objects into a real environment with real objects for better observer’s knowledge. Virtual Reality (VR) enables user to interact with a computer-simulated environment which is either a simulation of the real world or an imaginary world. VR and AR are the key to explore, and touch the past, present and the future. They are the basis of creating one’s own world, one’s own custom-built reality. It enables users to design a video game to have a virtual stroll around the universe, to practice their own dream house, to experience a walk on an alien planet. We can learn by experiencing the most threatening and difficult situations by playing safe. Very few really know the basic principles of VR & AR and their open problems. In this survey, we present the historical overview of Virtual Reality and Augmented Reality, characteristics, and types of VR and AR systems. The requirements and challenges of typical VR and AR systems are illustrated.
{"title":"Research opportunities on virtual reality and augmented reality: a survey","authors":"M. Shanmugam, M. Sudha, K. Lavitha, V. Venkatesan, R. Keerthana","doi":"10.1109/ICSCAN.2019.8878796","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878796","url":null,"abstract":"Augmented reality(AR) is a technology that covers virtual objects into a real environment with real objects for better observer’s knowledge. Virtual Reality (VR) enables user to interact with a computer-simulated environment which is either a simulation of the real world or an imaginary world. VR and AR are the key to explore, and touch the past, present and the future. They are the basis of creating one’s own world, one’s own custom-built reality. It enables users to design a video game to have a virtual stroll around the universe, to practice their own dream house, to experience a walk on an alien planet. We can learn by experiencing the most threatening and difficult situations by playing safe. Very few really know the basic principles of VR & AR and their open problems. In this survey, we present the historical overview of Virtual Reality and Augmented Reality, characteristics, and types of VR and AR systems. The requirements and challenges of typical VR and AR systems are illustrated.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123189855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-29DOI: 10.1109/ICSCAN.2019.8878680
Om Prakash Samantray, S. Tripathy, Susant Kumar Das
Most of the malware detection techniques use malware signatures for detection. It is easy to detect known malicious program in a system but the problem arises when the malware is unknown. Because, unknown malware cannot be detected by using available known malware signatures. Signature based detection techniques fails to detect unknown and zero-day attacks. A novel approach is required to represent malware features effectively to detect obfuscated, unknown, and mutated malware. This paper emphasizes malware behavior, characteristics and properties extracted by different analytic techniques and to decide whether to include them to create behavioral based malware signature. We have made an attempt to understand the malware behavior using a few openly available tools for malware analysis.
{"title":"A study to Understand Malware Behavior through Malware Analysis","authors":"Om Prakash Samantray, S. Tripathy, Susant Kumar Das","doi":"10.1109/ICSCAN.2019.8878680","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878680","url":null,"abstract":"Most of the malware detection techniques use malware signatures for detection. It is easy to detect known malicious program in a system but the problem arises when the malware is unknown. Because, unknown malware cannot be detected by using available known malware signatures. Signature based detection techniques fails to detect unknown and zero-day attacks. A novel approach is required to represent malware features effectively to detect obfuscated, unknown, and mutated malware. This paper emphasizes malware behavior, characteristics and properties extracted by different analytic techniques and to decide whether to include them to create behavioral based malware signature. We have made an attempt to understand the malware behavior using a few openly available tools for malware analysis.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131766758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-29DOI: 10.1109/ICSCAN.2019.8878778
Gagandeep Singh, S. Srivastava, Radhika Lalwani, Nilanjan Tewari, M. Prabhakar
In this paper a non-isolated high gain DC-DC converter which is preferred for photovoltaic (PV) applications is proposed. This converter uses hybrid switched inductor technique to enhance its overall voltage gain. The inductors of the gain extension network are all charged together in parallel and get discharged simultaneously in series to obtain the high voltage gain (>10). Resultantly, the voltage stress experienced by the switches of the proposed converter are reduced to 55% of the desired output voltage. An experimental prototype version of the proposed converter yields the rated voltage gain of 10.8 and delivers 21OW at a maximum efficiency of 94.45% when excited from an input voltage of 35 V. Further, the operating range of the converter is demonstrated by experimental results which are obtained for an output power ranging from 90% to 95% of rated power.
{"title":"High Gain DC-DC Converter Based on Hybrid Switched-Inductor Topology for PV Application","authors":"Gagandeep Singh, S. Srivastava, Radhika Lalwani, Nilanjan Tewari, M. Prabhakar","doi":"10.1109/ICSCAN.2019.8878778","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878778","url":null,"abstract":"In this paper a non-isolated high gain DC-DC converter which is preferred for photovoltaic (PV) applications is proposed. This converter uses hybrid switched inductor technique to enhance its overall voltage gain. The inductors of the gain extension network are all charged together in parallel and get discharged simultaneously in series to obtain the high voltage gain (>10). Resultantly, the voltage stress experienced by the switches of the proposed converter are reduced to 55% of the desired output voltage. An experimental prototype version of the proposed converter yields the rated voltage gain of 10.8 and delivers 21OW at a maximum efficiency of 94.45% when excited from an input voltage of 35 V. Further, the operating range of the converter is demonstrated by experimental results which are obtained for an output power ranging from 90% to 95% of rated power.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129303158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The proposed device automatically corrects the power factor without any human presence. It consists of a microcontroller which detects the power factor value, if the power factor goes below 0.9(lagging) during peak hours it automatically connects capacitor banks to improve it. Now a days, one APFC panel cannot be used for different application. To make it universal we provide four keys UP, DOWN, ENTER, MENU. These keys are used to enter the capacitor values and to vary the CT ratio. As the capacitor values and current magnitude varies according to the application. The main aim of the proposed model is to maintain the power factor nearer to 0.9 which helps to increase the efficiency of the system.
{"title":"“Minimizing Penalty in Industrial Power Consumption by Using APFC unit”: A Review","authors":"Anuja Patil, Pooja Balkrishna Dhuri, Prachi Kushe, Pratibha Ashok Mondkar, Suraj Acharekar","doi":"10.1109/ICSCAN.2019.8878863","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878863","url":null,"abstract":"The proposed device automatically corrects the power factor without any human presence. It consists of a microcontroller which detects the power factor value, if the power factor goes below 0.9(lagging) during peak hours it automatically connects capacitor banks to improve it. Now a days, one APFC panel cannot be used for different application. To make it universal we provide four keys UP, DOWN, ENTER, MENU. These keys are used to enter the capacitor values and to vary the CT ratio. As the capacitor values and current magnitude varies according to the application. The main aim of the proposed model is to maintain the power factor nearer to 0.9 which helps to increase the efficiency of the system.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134311098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-29DOI: 10.1109/ICSCAN.2019.8878834
R. Priya, R. Valli, P. S. Santhana Krishnan
The objective of this paper is to develop a new voltage source inverter (VSI) that acts as a boost inverter. The proposed inverter topology will acts as inverter and also boosts the output voltage with respect to the applied input. In general, the output voltage (AC) of a conventional full-bridge inverter is lower than the input DC voltage. Boost inverters are used in systems, where the output AC voltage is required to be larger than the input DC voltage. In order to obtain output AC voltage higher than the input DC voltage, an additional step up chopper is usually required at the front end, bestowing a two-stage power conversion which yields increased circuit complexity. Hence, in this paper a Dual boost inverter (DBI) has been developed, as a single-stage converter with advantages of a small structure, reduced power devices, and good buck-boost ability. The conventional modulation strategy (full cycle modulation) of the proposed circuit makes all the switches to operate in high frequency and leads to high voltage/current stress, which in turn results in heavy conduction losses and switching losses. The proposed system uses Half Cycle modulation scheme which use the power switches in half cycle, and can greatly reduce the conduction and switching losses of the power devices. In addition, an improved DBI with two clamping switches is also proposed in this paper, to reduce the current circulation losses in DBI with low switching stress. Thus our proposed topology will achieve higher efficiency with reduced losses and switching stress. The simulation results are presented for DBI model and improved DBI model. An experimental prototype is also developed to realize the Dual boost inverter output (without clamping switches) to validate the simulation results.
{"title":"Single Stage Dual Boost Inverter with Half Cycle Modulation Scheme for PV System Applications","authors":"R. Priya, R. Valli, P. S. Santhana Krishnan","doi":"10.1109/ICSCAN.2019.8878834","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878834","url":null,"abstract":"The objective of this paper is to develop a new voltage source inverter (VSI) that acts as a boost inverter. The proposed inverter topology will acts as inverter and also boosts the output voltage with respect to the applied input. In general, the output voltage (AC) of a conventional full-bridge inverter is lower than the input DC voltage. Boost inverters are used in systems, where the output AC voltage is required to be larger than the input DC voltage. In order to obtain output AC voltage higher than the input DC voltage, an additional step up chopper is usually required at the front end, bestowing a two-stage power conversion which yields increased circuit complexity. Hence, in this paper a Dual boost inverter (DBI) has been developed, as a single-stage converter with advantages of a small structure, reduced power devices, and good buck-boost ability. The conventional modulation strategy (full cycle modulation) of the proposed circuit makes all the switches to operate in high frequency and leads to high voltage/current stress, which in turn results in heavy conduction losses and switching losses. The proposed system uses Half Cycle modulation scheme which use the power switches in half cycle, and can greatly reduce the conduction and switching losses of the power devices. In addition, an improved DBI with two clamping switches is also proposed in this paper, to reduce the current circulation losses in DBI with low switching stress. Thus our proposed topology will achieve higher efficiency with reduced losses and switching stress. The simulation results are presented for DBI model and improved DBI model. An experimental prototype is also developed to realize the Dual boost inverter output (without clamping switches) to validate the simulation results.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127525688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-29DOI: 10.1109/ICSCAN.2019.8878721
M. Pajany, A. Hemalatha
Every diminutive task in this planetary is machine-controlled by cyberspace of belongings which makes our life easier. Now internet of things is used for safety purpose also. Nowadays outflow of gas in pipeline is the major difficulty. The chief mental object of this project is to detect the leakage of gases in the pipeline. Pipeline will be monitored with in an regular intervals using gas detection sensors. If there is any leakage in the pipeline then it will be detected and information such as name of the gas, pressure rate of the gas and its location where there is leakage of gases will be passed to the mobile phone, laptops, etc using IOT. The accurate location for the gas leakage will be detected using the GPS. Advantages of this employment is,used to prevent failure of lives due to blow up, fire, etc.
{"title":"Pipeline Gas Leakage Detection And Location Identification System","authors":"M. Pajany, A. Hemalatha","doi":"10.1109/ICSCAN.2019.8878721","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878721","url":null,"abstract":"Every diminutive task in this planetary is machine-controlled by cyberspace of belongings which makes our life easier. Now internet of things is used for safety purpose also. Nowadays outflow of gas in pipeline is the major difficulty. The chief mental object of this project is to detect the leakage of gases in the pipeline. Pipeline will be monitored with in an regular intervals using gas detection sensors. If there is any leakage in the pipeline then it will be detected and information such as name of the gas, pressure rate of the gas and its location where there is leakage of gases will be passed to the mobile phone, laptops, etc using IOT. The accurate location for the gas leakage will be detected using the GPS. Advantages of this employment is,used to prevent failure of lives due to blow up, fire, etc.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114750574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-29DOI: 10.1109/ICSCAN.2019.8878808
A. Divya, T. Kavithanjali, P. Dharshini
Everyone cognize that, the forest is praise as one of the most significant and compulsory expedient and Forest fire injunction a permanent danger to bionomical systems and environmental aspects. The forest fire detection had become very important issue in the pre-suppression process which gives rise to the drastic need to perceive forest fires with greatest speed. The expert usage of wireless sensor network as a potentially explanation to the objective of forest fire has been emphatic in this literary. The proposed system depends on various sensors attached to it and the data from wireless transmission, to fulfil the solution process. A small satellite in the system dispatches these sensor data to the station on ground where they are scrutinized. The discourse plan impend on the data from Wireless sensor reticulation for the former discovery of Forest fire.
{"title":"IoT Enabled Forest Fire Detection and Early Warning System","authors":"A. Divya, T. Kavithanjali, P. Dharshini","doi":"10.1109/ICSCAN.2019.8878808","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878808","url":null,"abstract":"Everyone cognize that, the forest is praise as one of the most significant and compulsory expedient and Forest fire injunction a permanent danger to bionomical systems and environmental aspects. The forest fire detection had become very important issue in the pre-suppression process which gives rise to the drastic need to perceive forest fires with greatest speed. The expert usage of wireless sensor network as a potentially explanation to the objective of forest fire has been emphatic in this literary. The proposed system depends on various sensors attached to it and the data from wireless transmission, to fulfil the solution process. A small satellite in the system dispatches these sensor data to the station on ground where they are scrutinized. The discourse plan impend on the data from Wireless sensor reticulation for the former discovery of Forest fire.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117153596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-29DOI: 10.1109/ICSCAN.2019.8878750
S. Nishandhi, G. Nagarajan, Vankayala Chethan Prakash
A novel MIMO antenna composed of two symmetrical radiating elements is proposed. The major advantages of the proposed antenna are its dimensional size and low mutual coupling between antenna elements. For a high bandwidth microstrip patch antenna, a dielectric FR4 substrate is designed and compared with previously designed patch antennas. For rectangular patch antennas with microstrip line feed are designed for resonant frequencies. Antennas with radiating elements in presence of shared ground plane is designed with a beveled rectangular metal patch and the T-shaped stubs are presented in the shared ground plane to generate high isolation between the (multiple-input multiple-output) antenna element. The patch array operates at 2.4 GHz for Wi-Fi applications. Results show that the proposed antenna with good radiation patterns, impedance matching, and return loss characteristics are achieved.
{"title":"A Compact Microstrip-Fed MIMO Antenna For 2.4 GHz Applications","authors":"S. Nishandhi, G. Nagarajan, Vankayala Chethan Prakash","doi":"10.1109/ICSCAN.2019.8878750","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878750","url":null,"abstract":"A novel MIMO antenna composed of two symmetrical radiating elements is proposed. The major advantages of the proposed antenna are its dimensional size and low mutual coupling between antenna elements. For a high bandwidth microstrip patch antenna, a dielectric FR4 substrate is designed and compared with previously designed patch antennas. For rectangular patch antennas with microstrip line feed are designed for resonant frequencies. Antennas with radiating elements in presence of shared ground plane is designed with a beveled rectangular metal patch and the T-shaped stubs are presented in the shared ground plane to generate high isolation between the (multiple-input multiple-output) antenna element. The patch array operates at 2.4 GHz for Wi-Fi applications. Results show that the proposed antenna with good radiation patterns, impedance matching, and return loss characteristics are achieved.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"493 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127582158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-29DOI: 10.1109/ICSCAN.2019.8878745
S. Rajkumar, C. Sundaram, K. Sedhuraman, D. Muruganandhan
This paper deals with the application of steel (M19) material and composite material in HUB BLDC motor to analyze performance of the motor. The motor must be designed in proper dimensions for particular application then only the motor can be used, if the design is not proper the motor will not able to rotate freely and it draws heavy current. Before manufacturing the motor, the torque should always be less than that of net torque. Four configurations of (a) steel (M19) material with stator and rotor and (b) composite material with stator and rotor (c) Laminated steel (M19) material for Stator and soft composite material (SMC) for Rotor and (d) soft composite material (SMC) for Stator and Laminated steel (M19) material for Rotor have been studied to obtain their nodal temperature distributions by using finite element analysis in different parts of stator and rotor frames. The study tells that the steel (M19) and Soft composite materials (SMC) based stator and rotor frame has a good thermal capability and it provides better feature in electrical vehicles. It mainly deals with the analysis of magnetic field, magnetic Flux distribution, and current density in the core.
{"title":"Performance Analysis of Hub BLDC Motor Using Finite Element Analysis","authors":"S. Rajkumar, C. Sundaram, K. Sedhuraman, D. Muruganandhan","doi":"10.1109/ICSCAN.2019.8878745","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878745","url":null,"abstract":"This paper deals with the application of steel (M19) material and composite material in HUB BLDC motor to analyze performance of the motor. The motor must be designed in proper dimensions for particular application then only the motor can be used, if the design is not proper the motor will not able to rotate freely and it draws heavy current. Before manufacturing the motor, the torque should always be less than that of net torque. Four configurations of (a) steel (M19) material with stator and rotor and (b) composite material with stator and rotor (c) Laminated steel (M19) material for Stator and soft composite material (SMC) for Rotor and (d) soft composite material (SMC) for Stator and Laminated steel (M19) material for Rotor have been studied to obtain their nodal temperature distributions by using finite element analysis in different parts of stator and rotor frames. The study tells that the steel (M19) and Soft composite materials (SMC) based stator and rotor frame has a good thermal capability and it provides better feature in electrical vehicles. It mainly deals with the analysis of magnetic field, magnetic Flux distribution, and current density in the core.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123824340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-29DOI: 10.1109/ICSCAN.2019.8878832
R. Padmanaban, M. Thirumaran, V. Sanjana, A. Moshika
In recent days, Enterprises are expanding their business efficiently through web applications which has paved the way for building good consumer relationship with its customers. The major threat faced by these enterprises is their inability to provide secure environments as the web applications are prone to severe vulnerabilities. As a result of this, many security standards and tools have been evolving to handle the vulnerabilities. Though there are many vulnerability detection tools available in the present, they do not provide sufficient information on the attack. For the long-term functioning of an organization, data along with efficient analytics on the vulnerabilities is required to enhance its reliability. The proposed model thus aims to make use of Machine Learning with Analytics to solve the problem in hand. Hence, the sequence of the attack is detected through the pattern using PAA and further the detected vulnerabilities are classified using Machine Learning technique such as SVM. Probabilistic results are provided in order to obtain numerical data sets which could be used for obtaining a report on user and application behavior. Dynamic and Reconfigurable PAA with SVM Classifier is a challenging task to analyze the vulnerabilities and impact of these vulnerabilities in heterogeneous web environment. This will enhance the former processing by analysis of the origin and the pattern of the attack in a more effective manner. Hence, the proposed system is designed to perform detection of attacks. The system works on the mitigation and prevention as part of the attack prediction.
{"title":"Security Analytics For Heterogeneous Web","authors":"R. Padmanaban, M. Thirumaran, V. Sanjana, A. Moshika","doi":"10.1109/ICSCAN.2019.8878832","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878832","url":null,"abstract":"In recent days, Enterprises are expanding their business efficiently through web applications which has paved the way for building good consumer relationship with its customers. The major threat faced by these enterprises is their inability to provide secure environments as the web applications are prone to severe vulnerabilities. As a result of this, many security standards and tools have been evolving to handle the vulnerabilities. Though there are many vulnerability detection tools available in the present, they do not provide sufficient information on the attack. For the long-term functioning of an organization, data along with efficient analytics on the vulnerabilities is required to enhance its reliability. The proposed model thus aims to make use of Machine Learning with Analytics to solve the problem in hand. Hence, the sequence of the attack is detected through the pattern using PAA and further the detected vulnerabilities are classified using Machine Learning technique such as SVM. Probabilistic results are provided in order to obtain numerical data sets which could be used for obtaining a report on user and application behavior. Dynamic and Reconfigurable PAA with SVM Classifier is a challenging task to analyze the vulnerabilities and impact of these vulnerabilities in heterogeneous web environment. This will enhance the former processing by analysis of the origin and the pattern of the attack in a more effective manner. Hence, the proposed system is designed to perform detection of attacks. The system works on the mitigation and prevention as part of the attack prediction.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114685639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}