Pub Date : 2011-12-01DOI: 10.1109/ICOAC.2011.6165183
V. Nithya, B. Ramachandran
In recent years, Wireless Sensor Networks (WSNs) have been applied in myriad of applications. As the sensor nodes are battery operated, the critical issue is to design WSNs with long life-time to fulfill their application requirements. Many energy conservation schemes have been proposed so far to increase the life-time of WSNs. In this paper, we explored the interactions between energy conservation protocols and introduced a novel hybrid protocol called Topology Control based On Demand MAC (TCODM) Algorithm that combines the benefits of Topology Control and Sleep Wake up schemes. It was found that by simultaneously applying multiple energy conservation schemes the average energy conservation increased by 68–82 % when compared to energy conservation protocols that are operated independently.
{"title":"Topology Control based on Demand MAC protocol for Wireless Sensor Networks","authors":"V. Nithya, B. Ramachandran","doi":"10.1109/ICOAC.2011.6165183","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165183","url":null,"abstract":"In recent years, Wireless Sensor Networks (WSNs) have been applied in myriad of applications. As the sensor nodes are battery operated, the critical issue is to design WSNs with long life-time to fulfill their application requirements. Many energy conservation schemes have been proposed so far to increase the life-time of WSNs. In this paper, we explored the interactions between energy conservation protocols and introduced a novel hybrid protocol called Topology Control based On Demand MAC (TCODM) Algorithm that combines the benefits of Topology Control and Sleep Wake up schemes. It was found that by simultaneously applying multiple energy conservation schemes the average energy conservation increased by 68–82 % when compared to energy conservation protocols that are operated independently.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122915351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICOAC.2011.6165203
P. C. Rafeeque, S. Sendhilkumar
With the recent explosive growth of Short text in the Internet and blog-sphere, Short text classification and analysis has been identified as a booming research topic in recent times. Short text classification is a challenge due to its sparse nature, noise words, syntactical structure and colloquial terminologies used. It is usually difficult for traditional similarity measures to detect intrinsic relationship among Short text snippets as they contain very limited common words. Although there are several reviews done on Text classification in general, there are no systematic reviews on Short text classification and analysis. This survey discusses the existing works on Short text analysis and the related issues and challenges. The effectiveness of these algorithms have been analysed by using standard analytical measures.
{"title":"A survey on Short text analysis in Web","authors":"P. C. Rafeeque, S. Sendhilkumar","doi":"10.1109/ICOAC.2011.6165203","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165203","url":null,"abstract":"With the recent explosive growth of Short text in the Internet and blog-sphere, Short text classification and analysis has been identified as a booming research topic in recent times. Short text classification is a challenge due to its sparse nature, noise words, syntactical structure and colloquial terminologies used. It is usually difficult for traditional similarity measures to detect intrinsic relationship among Short text snippets as they contain very limited common words. Although there are several reviews done on Text classification in general, there are no systematic reviews on Short text classification and analysis. This survey discusses the existing works on Short text analysis and the related issues and challenges. The effectiveness of these algorithms have been analysed by using standard analytical measures.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134125969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICOAC.2011.6165177
G. Lakshmi Priya, S. Hariharan
Data Mining is the process of extracting or mining the patterns from very large amount of biological datasets. Utilization of Data mining algorithms can reveal biological relevant associations between different genes and gene expression. In Data Mining, several techniques are available for predicting frequent patterns. One among the technique is association rule mining algorithm; which can be applied for solving the crucial problems faced in the field of biological science. From the literature, various algorithms have been employed in generating frequent patterns for distinct application. These algorithms have some limitations in predicting frequent patterns, such as space, time complexity and accuracy. In order to overcome these drawbacks, the study is made on existing algorithms for generating frequent patterns from the biological sequences. The literature survey gives a significant number of methods were generated for predicting associative patterns. The proposed system has to be developed for solving problems in biological science. Biological sequence may be a collection of DNA sequence, Gene expression sequence or Protein sequence for a specific viral disease. Amino acids are the building blocks of proteins. Proteins are organic compounds made up of amino acids arranged in a linear chain and folded into a globular form. The future proposal not only leads in predicting the frequent patterns; it will also satisfy some factors such as: time complexity, space and predict accurate solution to the required problem. With the help of these three factors into consideration and efficient algorithm can be identified for predicting the dominating amino acids for any kind of specific biological implication.
{"title":"A comparative study on existing methodologies to predict dominating patterns amongst biological sequences","authors":"G. Lakshmi Priya, S. Hariharan","doi":"10.1109/ICOAC.2011.6165177","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165177","url":null,"abstract":"Data Mining is the process of extracting or mining the patterns from very large amount of biological datasets. Utilization of Data mining algorithms can reveal biological relevant associations between different genes and gene expression. In Data Mining, several techniques are available for predicting frequent patterns. One among the technique is association rule mining algorithm; which can be applied for solving the crucial problems faced in the field of biological science. From the literature, various algorithms have been employed in generating frequent patterns for distinct application. These algorithms have some limitations in predicting frequent patterns, such as space, time complexity and accuracy. In order to overcome these drawbacks, the study is made on existing algorithms for generating frequent patterns from the biological sequences. The literature survey gives a significant number of methods were generated for predicting associative patterns. The proposed system has to be developed for solving problems in biological science. Biological sequence may be a collection of DNA sequence, Gene expression sequence or Protein sequence for a specific viral disease. Amino acids are the building blocks of proteins. Proteins are organic compounds made up of amino acids arranged in a linear chain and folded into a globular form. The future proposal not only leads in predicting the frequent patterns; it will also satisfy some factors such as: time complexity, space and predict accurate solution to the required problem. With the help of these three factors into consideration and efficient algorithm can be identified for predicting the dominating amino acids for any kind of specific biological implication.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"53 41","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132389002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICOAC.2011.6165202
K. Gomathi, Meera Gandhi
Key management is vital part of security; this issue is even bigger in wireless network compared to wired network. The distribution of keys in an authenticated manner is a difficult task in WMANET and when a node leaves or joins it need to generate new session key to maintain forward and backward secrecy. This paper reviewed technological solutions for managing keys by divide the network into clusters. A clustering architecture increases network lifetime and fault tolerance, and results in more efficient use of network resources. Cluster head will maintain the group key; it will also update the group key whenever there is a change in the membership. And the CH is responsible for inter-cluster and intra-cluster communication. A Secondary Cluster Head (SCH) is also elected to avoid the CH from becoming a bottleneck, and also it acts a monitoring node for cluster head lifetime. The combination of Weight based Clustering and RSA algorithm has been proposed for secure multicast key distribution in which source node uses Ad hoc On-Demand Distance Vector (AODV) routing protocol to reach its destination. The weight based clustering approach is based on combined weight metric that takes into account of several system parameters like the degree difference, transmission range, battery power and mobility of the node. The performance of the system is evaluated based on the few metrics like Packet Delivery Ratio (PDR), and end to end delay. As demonstrated, our algorithm reduces frequent head election phenomena by having SCH, thus improving overall performance and reducing energy utilization.
{"title":"Weight based clustered key management scheme using RSA for wireless mobile Ad hoc networks","authors":"K. Gomathi, Meera Gandhi","doi":"10.1109/ICOAC.2011.6165202","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165202","url":null,"abstract":"Key management is vital part of security; this issue is even bigger in wireless network compared to wired network. The distribution of keys in an authenticated manner is a difficult task in WMANET and when a node leaves or joins it need to generate new session key to maintain forward and backward secrecy. This paper reviewed technological solutions for managing keys by divide the network into clusters. A clustering architecture increases network lifetime and fault tolerance, and results in more efficient use of network resources. Cluster head will maintain the group key; it will also update the group key whenever there is a change in the membership. And the CH is responsible for inter-cluster and intra-cluster communication. A Secondary Cluster Head (SCH) is also elected to avoid the CH from becoming a bottleneck, and also it acts a monitoring node for cluster head lifetime. The combination of Weight based Clustering and RSA algorithm has been proposed for secure multicast key distribution in which source node uses Ad hoc On-Demand Distance Vector (AODV) routing protocol to reach its destination. The weight based clustering approach is based on combined weight metric that takes into account of several system parameters like the degree difference, transmission range, battery power and mobility of the node. The performance of the system is evaluated based on the few metrics like Packet Delivery Ratio (PDR), and end to end delay. As demonstrated, our algorithm reduces frequent head election phenomena by having SCH, thus improving overall performance and reducing energy utilization.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130888634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICoAC.2011.6165211
K. Sunder
Of the many cultural attributes associated with a government — such as diplomacy, empathy, or tact — the one that is often questioned is the attribute of execution. Questions are raised and frustrations are voiced, all demanding to know information about the forthcoming policies, enabling projects, infrastructure projects as an example, and/or sometimes the status of a demanded service. Cloud technologies can play a vital role (read means) in making this information available through its fundamental capacities. This paper elaborates Ramco's experiences in working on large government projects where knowing the nature of an asset, government initiatives, etc and using this knowledge to exploit cloud technologies, has proved effective for the Government and its community.
{"title":"Cloud technologies for the government","authors":"K. Sunder","doi":"10.1109/ICoAC.2011.6165211","DOIUrl":"https://doi.org/10.1109/ICoAC.2011.6165211","url":null,"abstract":"Of the many cultural attributes associated with a government — such as diplomacy, empathy, or tact — the one that is often questioned is the attribute of execution. Questions are raised and frustrations are voiced, all demanding to know information about the forthcoming policies, enabling projects, infrastructure projects as an example, and/or sometimes the status of a demanded service. Cloud technologies can play a vital role (read means) in making this information available through its fundamental capacities. This paper elaborates Ramco's experiences in working on large government projects where knowing the nature of an asset, government initiatives, etc and using this knowledge to exploit cloud technologies, has proved effective for the Government and its community.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134646911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICOAC.2011.6165160
N. V. Abilash Prabhu, R. Latha, K. Sankaran, G. Kannabiran
In recent times, customers have shifted their focus to offshoring vendors' ability to provide high quality software, in addition to the cost advantages. The present research highlights how knowledge management (KM) impacts through different factors on software quality in offshore development projects executed by vendors. A survey of 70 project managers engaged in offshoring at a mid size Indian Software Company was carried out and the collected data were analyzed using SPSS package. Out of seven factors considered for KM, Technical Knowledge (TK), Domain Knowledge (DK), Knowledge Sharing (KS), Organization Practices (OP), Knowledge Transfer Integration (KTI), and Leadership Coordination Practices (LCP) are associated with functionality, reliability, maintainability and usability attributes of Software Quality. However, it is found that Country Specific Requirement (CSR) is not associated with functionality, reliability and maintainability but associated with usability. Similarly, Technical Knowledge (TK) is not associated with functionality of the software.
{"title":"Impact of knowledge management on offshore software development: An exploratory study","authors":"N. V. Abilash Prabhu, R. Latha, K. Sankaran, G. Kannabiran","doi":"10.1109/ICOAC.2011.6165160","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165160","url":null,"abstract":"In recent times, customers have shifted their focus to offshoring vendors' ability to provide high quality software, in addition to the cost advantages. The present research highlights how knowledge management (KM) impacts through different factors on software quality in offshore development projects executed by vendors. A survey of 70 project managers engaged in offshoring at a mid size Indian Software Company was carried out and the collected data were analyzed using SPSS package. Out of seven factors considered for KM, Technical Knowledge (TK), Domain Knowledge (DK), Knowledge Sharing (KS), Organization Practices (OP), Knowledge Transfer Integration (KTI), and Leadership Coordination Practices (LCP) are associated with functionality, reliability, maintainability and usability attributes of Software Quality. However, it is found that Country Specific Requirement (CSR) is not associated with functionality, reliability and maintainability but associated with usability. Similarly, Technical Knowledge (TK) is not associated with functionality of the software.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128767238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICOAC.2011.6165168
S. Victor, S. S. Kumar
The term E-Waste or electronic waste refers to the end of life remnants of electronics goods whenever they cease to be of no material value to the original user. The main ingredient of e-waste or electronic waste or e-scrap are computers. E-Waste management is given the top priority in many developed/developing countries. The Indian government has also given the much needed impetus to the e-waste policy by way of drafting and implementing a bill (which is expected to be implemented w.e.f 01 Jan 2013) on the management, disposal and trans boundary movement of e-waste. This paper presents a review and assessment of the disposal system of scrap computers in India and has compared with the practices in Switzerland.
{"title":"Roadway for sustainable disposal of scrap computers in India","authors":"S. Victor, S. S. Kumar","doi":"10.1109/ICOAC.2011.6165168","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165168","url":null,"abstract":"The term E-Waste or electronic waste refers to the end of life remnants of electronics goods whenever they cease to be of no material value to the original user. The main ingredient of e-waste or electronic waste or e-scrap are computers. E-Waste management is given the top priority in many developed/developing countries. The Indian government has also given the much needed impetus to the e-waste policy by way of drafting and implementing a bill (which is expected to be implemented w.e.f 01 Jan 2013) on the management, disposal and trans boundary movement of e-waste. This paper presents a review and assessment of the disposal system of scrap computers in India and has compared with the practices in Switzerland.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133678673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICOAC.2011.6165150
R. Aarthi, K. Divya, N. Komala, S. Kavitha
Medicine is one of the major fields where the application of artificial intelligence primarily deals with construction of programs that perform diagnosis and make therapy recommendations. In digital mammography, data mining techniques are used to detect and characterize abnormalities in images and clinical reports. In the existing approaches, the mammogram image classification is done in either clinical data or statistical features of an image using neural networks and Support Vector Machine (SVM) classifier. This paper is proposed to evaluate the Application of Feature Extraction by means of combining the clinical and image features for clustering and classification in mammogram images. Initially, mammogram dataset is divided into training and test set. For the training and test sets, preprocessing techniques like noise removal and background removal are done to the images and Region of Interest (ROI) is identified. The statistical features are extracted from the ROI and the clinical data are obtained from the dataset. The feature set is clustered using k-means algorithm followed by SVM classification to classify the image as benign or malignant. The accuracy obtained from the proposed approach of clustering followed by classification is 86.11% which is higher than the direct classification approach where the accuracy is 80.0%. From the above results, the superiority of the proposed approach in terms of accuracy is justified.
{"title":"Application of Feature Extraction and clustering in mammogram classification using Support Vector Machine","authors":"R. Aarthi, K. Divya, N. Komala, S. Kavitha","doi":"10.1109/ICOAC.2011.6165150","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165150","url":null,"abstract":"Medicine is one of the major fields where the application of artificial intelligence primarily deals with construction of programs that perform diagnosis and make therapy recommendations. In digital mammography, data mining techniques are used to detect and characterize abnormalities in images and clinical reports. In the existing approaches, the mammogram image classification is done in either clinical data or statistical features of an image using neural networks and Support Vector Machine (SVM) classifier. This paper is proposed to evaluate the Application of Feature Extraction by means of combining the clinical and image features for clustering and classification in mammogram images. Initially, mammogram dataset is divided into training and test set. For the training and test sets, preprocessing techniques like noise removal and background removal are done to the images and Region of Interest (ROI) is identified. The statistical features are extracted from the ROI and the clinical data are obtained from the dataset. The feature set is clustered using k-means algorithm followed by SVM classification to classify the image as benign or malignant. The accuracy obtained from the proposed approach of clustering followed by classification is 86.11% which is higher than the direct classification approach where the accuracy is 80.0%. From the above results, the superiority of the proposed approach in terms of accuracy is justified.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132229665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICOAC.2011.6165161
S. Sathish, S. Boopathi, K. Gavel
Mobile Adhoc NETwork (MANET) is a collection of wireless mobile nodes that can dynamically form a network. This definition implies that there is no permanent topology, centralized administration and standard support services. Due to the characteristics of MANET, the movement of node is uncertain. It may cause links to break and the low battery life in nodes may cause nodes to fail. Each node is responsible for routing information among them and hence it act as a node and router. In on demand routing protocols all nodes when they learn or use routes, store the routes to the destinations in a routing table or a cache. The threshold based cache routing is proposed based on the information system of rough set theory for better routing. It is potentially useful to study the application of Information systems in cache-based routing protocols.
{"title":"Threshold based dynamic source routing in mobile ad hoc networks","authors":"S. Sathish, S. Boopathi, K. Gavel","doi":"10.1109/ICOAC.2011.6165161","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165161","url":null,"abstract":"Mobile Adhoc NETwork (MANET) is a collection of wireless mobile nodes that can dynamically form a network. This definition implies that there is no permanent topology, centralized administration and standard support services. Due to the characteristics of MANET, the movement of node is uncertain. It may cause links to break and the low battery life in nodes may cause nodes to fail. Each node is responsible for routing information among them and hence it act as a node and router. In on demand routing protocols all nodes when they learn or use routes, store the routes to the destinations in a routing table or a cache. The threshold based cache routing is proposed based on the information system of rough set theory for better routing. It is potentially useful to study the application of Information systems in cache-based routing protocols.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131052442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICOAC.2011.6165172
D. Arulsuju
The Rapid growth of internet resulted in feature rich and dynamic web applications. This increase in features also introduced completely under estimated attack vectors. Cross site scripting attacks, SQL Injection and malicious file execution are the most dominant classes of web vulnerabilities reported by OWASP 2011. These attacks make use of vulnerabilities in the code of web applications, resulting in serious consequences, such as theft of cookies, passwords and other personal credentials. It is caused by scripts, which do not sanitize user input. Several server-side counter measures for XSS attacks do exist, but such techniques have not been universally applied, because of their deployment overhead. The existing client-side solutions degrade the performance of client's system resulting in a poor web surfing experience. We present automata-based symbolic string analyses (XHunter)for automatic verification of string manipulating programs we compute the pre and post conditions of common string functions using deterministic finite automata (DFAs). Experiment result shows that our approach finds large number of malicious attacks in web application.
{"title":"Hunting malicious attacks in social networks","authors":"D. Arulsuju","doi":"10.1109/ICOAC.2011.6165172","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165172","url":null,"abstract":"The Rapid growth of internet resulted in feature rich and dynamic web applications. This increase in features also introduced completely under estimated attack vectors. Cross site scripting attacks, SQL Injection and malicious file execution are the most dominant classes of web vulnerabilities reported by OWASP 2011. These attacks make use of vulnerabilities in the code of web applications, resulting in serious consequences, such as theft of cookies, passwords and other personal credentials. It is caused by scripts, which do not sanitize user input. Several server-side counter measures for XSS attacks do exist, but such techniques have not been universally applied, because of their deployment overhead. The existing client-side solutions degrade the performance of client's system resulting in a poor web surfing experience. We present automata-based symbolic string analyses (XHunter)for automatic verification of string manipulating programs we compute the pre and post conditions of common string functions using deterministic finite automata (DFAs). Experiment result shows that our approach finds large number of malicious attacks in web application.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122045888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}