首页 > 最新文献

International Journal of Computer Science & Engineering Survey最新文献

英文 中文
Video Authentication- An Overview 视频认证—概述
Pub Date : 2011-11-30 DOI: 10.5121/IJCSES.2011.2406
Saurabh Upadhyay, S. Singh
With the innovations and development in sophisticated video editing technology and a wide spread of video information and services in our society, it is becoming increasingly significant to assure the trustworthiness of video information. Therefore in surveillance, medical and various other fields, video contents must be protected against attempt to manipulate them. Such malicious alterations could affect the decisions based on these videos. A lot of techniques are proposed by various researchers in the literature that assure the authenticity of video information in their own way. In this paper we present a brief survey on video authentication techniques with their classification. These authentication techniques are broadly classified into four categories: digital signature based techniques, watermark based techniques, intelligent techniques and other techniques. Furthermore we give the shortcomings of different categories of video authentication techniques in brief.
随着先进的视频编辑技术的不断创新和发展,以及视频信息和视频服务在社会中的广泛传播,保证视频信息的可信度变得越来越重要。因此,在监控、医疗和其他各种领域,必须保护视频内容,防止有人企图操纵它们。这种恶意的改变可能会影响基于这些视频的决定。各种研究人员在文献中提出了许多技术,以各自的方式保证视频信息的真实性。本文简要介绍了视频认证技术及其分类。这些认证技术大致分为四类:基于数字签名的技术、基于水印的技术、智能技术和其他技术。并简要介绍了各类视频认证技术的缺点。
{"title":"Video Authentication- An Overview","authors":"Saurabh Upadhyay, S. Singh","doi":"10.5121/IJCSES.2011.2406","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2406","url":null,"abstract":"With the innovations and development in sophisticated video editing technology and a wide spread of video information and services in our society, it is becoming increasingly significant to assure the trustworthiness of video information. Therefore in surveillance, medical and various other fields, video contents must be protected against attempt to manipulate them. Such malicious alterations could affect the decisions based on these videos. A lot of techniques are proposed by various researchers in the literature that assure the authenticity of video information in their own way. In this paper we present a brief survey on video authentication techniques with their classification. These authentication techniques are broadly classified into four categories: digital signature based techniques, watermark based techniques, intelligent techniques and other techniques. Furthermore we give the shortcomings of different categories of video authentication techniques in brief.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125098095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
VISUALIZATION TECHNIQUES FOR INTRUSION DETECTION - A SURVEY 入侵检测的可视化技术综述
Pub Date : 2011-08-30 DOI: 10.5121/IJCSES.2011.2308
I. El-Henawy, Alaa El, Din Riad, Ahmed M. Hassan, N. Awadallah
In traditional intrusion detection system (IDS) environments, little activity has been applied to using visual analysis as an aid to intrusion detection. With more information systems being attacked and attack techniques evolving, the task of detecting intrusions is becoming an increasingly difficult. Efficient information visualization is an important element required for urgent detection of intruders. This paper presents a survey on using visualization techniques in intrusion detection system. Finally authors proposed a framework for visualization system for ID.
在传统的入侵检测系统(IDS)环境中,利用可视化分析辅助入侵检测的活动很少。随着越来越多的信息系统被攻击和攻击技术的发展,检测入侵的任务变得越来越困难。有效的信息可视化是紧急检测入侵者所需的重要元素。本文综述了可视化技术在入侵检测系统中的应用。最后提出了一个ID可视化系统的框架。
{"title":"VISUALIZATION TECHNIQUES FOR INTRUSION DETECTION - A SURVEY","authors":"I. El-Henawy, Alaa El, Din Riad, Ahmed M. Hassan, N. Awadallah","doi":"10.5121/IJCSES.2011.2308","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2308","url":null,"abstract":"In traditional intrusion detection system (IDS) environments, little activity has been applied to using visual analysis as an aid to intrusion detection. With more information systems being attacked and attack techniques evolving, the task of detecting intrusions is becoming an increasingly difficult. Efficient information visualization is an important element required for urgent detection of intruders. This paper presents a survey on using visualization techniques in intrusion detection system. Finally authors proposed a framework for visualization system for ID.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124095641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Systematic Review of Web Measurement 网络测量的系统回顾
Pub Date : 2011-08-30 DOI: 10.5121/IJCSES.2011.2305
Arvinder Kaur, Diksha Dani
This paper provides a systematic review of previous web measurement studies particularly focussing on web quality , web metric ,models and methods.The paper reviews journals and conference proceedings to evaluate the progress and direct future research in this area.
本文对以往的网络测量研究进行了系统的回顾,特别关注网络质量、网络度量、模型和方法。本文回顾了期刊和会议记录,以评估该领域的进展并指导未来的研究。
{"title":"The Systematic Review of Web Measurement","authors":"Arvinder Kaur, Diksha Dani","doi":"10.5121/IJCSES.2011.2305","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2305","url":null,"abstract":"This paper provides a systematic review of previous web measurement studies particularly focussing on web quality , web metric ,models and methods.The paper reviews journals and conference proceedings to evaluate the progress and direct future research in this area.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121460432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Role Of Middleware For Internet Of Things: A Study 中间件在物联网中的作用研究
Pub Date : 2011-08-30 DOI: 10.5121/IJCSES.2011.2307
S. Bandyopadhyay, Munmun Sengupta, Souvik Maiti, Subhajit Dutta
Internet of Things (IoT) has been recognized as a part of future internet and ubiquitous computing. It creates a true ubiquitous or smart environment. It demands a complex distributed architecture with numerous diverse components, including the end devices and application and association with their context. This article provides the significance of middleware system for (IoT). The middleware for IoT acts as a bond joining the heterogeneous domains of applications communicating over heterogeneous interfaces. First, to enable the better understanding of the current gap and future directions in this field a comprehensive review of the existing middleware systems for IoT is provided here. Second, fundamental functional blocks are proposed for this middleware system, and based on that feature wise classification is performed on the existing IoT-middleware. Third, open issues are analyzed and our vision on the research scope in this area is presented.
物联网(IoT)已经被认为是未来互联网和普适计算的一部分。它创造了一个真正无处不在或智能的环境。它需要一个复杂的分布式体系结构,其中包含许多不同的组件,包括终端设备和应用程序以及与其上下文的关联。本文阐述了中间件系统对物联网的重要意义。物联网的中间件充当连接通过异构接口通信的应用程序的异构域的纽带。首先,为了更好地了解该领域的当前差距和未来方向,本文对现有的物联网中间件系统进行了全面的回顾。其次,提出了该中间件系统的基本功能块,并在此基础上对现有物联网中间件进行了特征分类;第三,分析了目前存在的问题,并提出了我们对该领域研究范围的展望。
{"title":"Role Of Middleware For Internet Of Things: A Study","authors":"S. Bandyopadhyay, Munmun Sengupta, Souvik Maiti, Subhajit Dutta","doi":"10.5121/IJCSES.2011.2307","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2307","url":null,"abstract":"Internet of Things (IoT) has been recognized as a part of future internet and ubiquitous computing. It creates a true ubiquitous or smart environment. It demands a complex distributed architecture with numerous diverse components, including the end devices and application and association with their context. This article provides the significance of middleware system for (IoT). The middleware for IoT acts as a bond joining the heterogeneous domains of applications communicating over heterogeneous interfaces. First, to enable the better understanding of the current gap and future directions in this field a comprehensive review of the existing middleware systems for IoT is provided here. Second, fundamental functional blocks are proposed for this middleware system, and based on that feature wise classification is performed on the existing IoT-middleware. Third, open issues are analyzed and our vision on the research scope in this area is presented.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122180337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 243
Energy Efficient Mac Protocols For Wireless Sensor Networks: A Survey 无线传感器网络的节能Mac协议:综述
Pub Date : 2011-08-30 DOI: 10.5121/IJCSES.2011.2309
Bhavana Narain, Anuradha Sharma, Sanjay Kumar, V. Patle
Use of Wireless sensor networks have been widely seen in the fields of target detection and tracking, environmental monitoring, industrial process monitoring, and tactical systems.In wireless sensor networks nodes work with a incomplete power source, energy efficient operations in an important factor of the nodes in wireless sensor network. Energy conservation plays important role in different layers of the TCP/IP protocol suit, and for MAC layer it is the effective part. Therefore, to work in wireless communicating sensors network, we use MAC protocol which improve energy efficiency by increasing sleep duration, decreasing idle listening and overhearing, and eliminating hidden terminal problem or collision of packets. In this paper First section we describe the accessible energy –efficient MAC protocols for sensor networks their energy saving method. In Second section we discuss the architecture of same protocols and then compare same protocols depending on their Advantages and Disadvantages.
无线传感器网络在目标探测和跟踪、环境监测、工业过程监测和战术系统等领域得到了广泛的应用。在无线传感器网络中,节点在不完全电源下工作,节能是影响无线传感器网络中节点运行的一个重要因素。节能在TCP/IP协议层中起着重要的作用,对于MAC层更是节能的重要组成部分。因此,为了在无线通信传感器网络中工作,我们使用MAC协议,通过增加睡眠时间,减少空闲侦听和偷听,消除隐藏的终端问题或数据包碰撞来提高能量效率。本文首先介绍了传感器网络中可访问的节能MAC协议及其节能方法。在第二部分中,我们将讨论相同协议的体系结构,然后根据它们的优缺点对相同协议进行比较。
{"title":"Energy Efficient Mac Protocols For Wireless Sensor Networks: A Survey","authors":"Bhavana Narain, Anuradha Sharma, Sanjay Kumar, V. Patle","doi":"10.5121/IJCSES.2011.2309","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2309","url":null,"abstract":"Use of Wireless sensor networks have been widely seen in the fields of target detection and tracking, environmental monitoring, industrial process monitoring, and tactical systems.In wireless sensor networks nodes work with a incomplete power source, energy efficient operations in an important factor of the nodes in wireless sensor network. Energy conservation plays important role in different layers of the TCP/IP protocol suit, and for MAC layer it is the effective part. Therefore, to work in wireless communicating sensors network, we use MAC protocol which improve energy efficiency by increasing sleep duration, decreasing idle listening and overhearing, and eliminating hidden terminal problem or collision of packets. In this paper First section we describe the accessible energy –efficient MAC protocols for sensor networks their energy saving method. In Second section we discuss the architecture of same protocols and then compare same protocols depending on their Advantages and Disadvantages.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122017164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Defending Wormhole Attack in Wireless Ad-hoc Network 无线自组织网络中的虫洞攻击防御
Pub Date : 2011-08-30 DOI: 10.5121/IJCSES.2011.2311
Nisha S. Raote
The ad-hoc networks are the temporarily established wireless networks which does not require fixed infrastructure it is also called as infrastructure less network. Because of some flaws of adhoc network such as shared wireless medium and lack of any central coordination makes them more prone to attacks in comparison with the wired network. Among all the attacks wormhole attack is the most severe attack. In this attack an attacker capture the packets at one location in the network and send it two another attacker at a distant location through tunnels which is established through different ways like packet encapsulation, using high power transmission or by using direct antennas. This tunnel between two colluding attackers is virtual and it is called as a wormhole. The wormhole attack is possible even if the attacker has not comprised any hosts, and all communication provides authenticity and confidentiality. By using the various approaches for finding the solution over wormhole attack, the dynamic information of the packets could still be modified. So in order to give more robust protection in some special scenario like battlefields, which requires highly secured information, there is need of developing some secured mechanism for wormhole detection and prevention. Taking into consideration this problem the proposed scheme is developed. This paper discusses proposed works on wormhole attack along with its available counter measures in ad-hoc wireless network.
自组织网络是不需要固定基础设施而临时建立的无线网络,也称为无基础设施网络。由于自组网存在无线介质共享和缺乏中心协调等缺陷,使得自组网与有线网络相比更容易受到攻击。在所有的攻击中,虫洞攻击是最严重的攻击。在这种攻击中,攻击者在网络中的一个位置捕获数据包,并通过隧道将其发送给远程位置的另外两个攻击者,隧道通过不同的方式建立,如数据包封装,使用高功率传输或使用直接天线。两个串通攻击者之间的这条隧道是虚拟的,它被称为虫洞。即使攻击者没有包含任何主机,虫洞攻击也是可能的,并且所有通信都提供真实性和保密性。通过使用各种方法寻找虫洞攻击的解决方案,仍然可以修改数据包的动态信息。因此,为了在战场等对信息安全性要求较高的特殊场景中提供更强大的保护,有必要开发一些安全的虫洞检测和预防机制。考虑到这一问题,提出了一种方案。本文讨论了在自组织无线网络中针对虫洞攻击的研究工作,以及虫洞攻击的有效对策。
{"title":"Defending Wormhole Attack in Wireless Ad-hoc Network","authors":"Nisha S. Raote","doi":"10.5121/IJCSES.2011.2311","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2311","url":null,"abstract":"The ad-hoc networks are the temporarily established wireless networks which does not require fixed infrastructure it is also called as infrastructure less network. Because of some flaws of adhoc network such as shared wireless medium and lack of any central coordination makes them more prone to attacks in comparison with the wired network. Among all the attacks wormhole attack is the most severe attack. In this attack an attacker capture the packets at one location in the network and send it two another attacker at a distant location through tunnels which is established through different ways like packet encapsulation, using high power transmission or by using direct antennas. This tunnel between two colluding attackers is virtual and it is called as a wormhole. The wormhole attack is possible even if the attacker has not comprised any hosts, and all communication provides authenticity and confidentiality. By using the various approaches for finding the solution over wormhole attack, the dynamic information of the packets could still be modified. So in order to give more robust protection in some special scenario like battlefields, which requires highly secured information, there is need of developing some secured mechanism for wormhole detection and prevention. Taking into consideration this problem the proposed scheme is developed. This paper discusses proposed works on wormhole attack along with its available counter measures in ad-hoc wireless network.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127133830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Survey on Parameters of Fingerprint Classification Methods Based On Algorithmic Flow 基于算法流的指纹分类方法参数研究
Pub Date : 2011-08-30 DOI: 10.5121/IJCSES.2011.2312
Dimple Parekh, R. Vig
Classification refers to assigning a given fingerprint to one of the existing classes already recognized in the literature. A search over all the records in the database takes a long time, so the goal is to reduce the size of the search space by choosing an appropriate subset of database for search. Classifying a fingerprint images is a very difficult pattern recognition problem, due to the minimal interclass variability and maximal intraclass variability. This paper presents a sequence flow diagram which will help in developing the clarity on designing algorithm for classification based on various parameters extracted from the fingerprint image. It discusses in brief the ways in which the parameters are extracted from the image. Existing fingerprint classification approaches are based on these parameters as input for classifying the image. Parameters like orientation map, singular points, spurious singular points, ridge flow, transforms and hybrid feature are discussed in the paper.
分类是指将给定的指纹分配给文献中已经识别的现有类别之一。对数据库中的所有记录进行搜索需要很长时间,因此我们的目标是通过选择合适的数据库子集进行搜索来减小搜索空间的大小。指纹图像分类是一个非常困难的模式识别问题,因为类间变异性最小,类内变异性最大。本文给出了一个序列流程图,这有助于更清晰地设计基于指纹图像中提取的各种参数的分类算法。简要讨论了从图像中提取参数的方法。现有的指纹分类方法都是基于这些参数作为输入对图像进行分类。讨论了方向图、奇异点、伪奇异点、脊流、变换和混合特征等参数。
{"title":"Survey on Parameters of Fingerprint Classification Methods Based On Algorithmic Flow","authors":"Dimple Parekh, R. Vig","doi":"10.5121/IJCSES.2011.2312","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2312","url":null,"abstract":"Classification refers to assigning a given fingerprint to one of the existing classes already recognized in the literature. A search over all the records in the database takes a long time, so the goal is to reduce the size of the search space by choosing an appropriate subset of database for search. Classifying a fingerprint images is a very difficult pattern recognition problem, due to the minimal interclass variability and maximal intraclass variability. This paper presents a sequence flow diagram which will help in developing the clarity on designing algorithm for classification based on various parameters extracted from the fingerprint image. It discusses in brief the ways in which the parameters are extracted from the image. Existing fingerprint classification approaches are based on these parameters as input for classifying the image. Parameters like orientation map, singular points, spurious singular points, ridge flow, transforms and hybrid feature are discussed in the paper.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128321827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A STUDY ON FACE , EYE DETECTION AND GAZE ESTIMATION 人脸、眼睛检测与注视估计的研究
Pub Date : 2011-08-30 DOI: 10.5121/IJCSES.2011.2303
Zeynep Orman, Abdulkadir Battal, E. Kemer
Face and eye detection is one of the most challenging problems in computer vision area. The goal of this paper is to present a study over the existing literature on face and eye detection and gaze estimation. With the uptrend of systems based on face and eye detection in many different areas of life in recent years, this subject has gained much more attention by academic and industrial area. Many different studies have been performed about face and eye detection. Besides having many challenging problems like, having different lighting conditions, having glasses, facial hair or mustache on face, different orientation pose or occlusion of face, face and eye detection methods performed great progress. In this paper we first categorize face detection models and examine the basic algorithms for face detection. Then we present methods for eye detection and gaze estimation.
人脸和眼睛检测是计算机视觉领域最具挑战性的问题之一。本文的目的是对现有的关于人脸和眼睛检测和注视估计的文献进行研究。随着近年来基于人脸和眼睛检测的系统在生活的各个领域的兴起,这一课题越来越受到学术界和工业界的关注。关于面部和眼睛的检测已经进行了许多不同的研究。除了有许多具有挑战性的问题,如不同的照明条件,眼镜,面部毛发或胡须,不同的方向姿势或面部遮挡,面部和眼睛的检测方法取得了很大的进步。本文首先对人脸检测模型进行了分类,研究了人脸检测的基本算法。然后,我们提出了眼睛检测和注视估计方法。
{"title":"A STUDY ON FACE , EYE DETECTION AND GAZE ESTIMATION","authors":"Zeynep Orman, Abdulkadir Battal, E. Kemer","doi":"10.5121/IJCSES.2011.2303","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2303","url":null,"abstract":"Face and eye detection is one of the most challenging problems in computer vision area. The goal of this paper is to present a study over the existing literature on face and eye detection and gaze estimation. With the uptrend of systems based on face and eye detection in many different areas of life in recent years, this subject has gained much more attention by academic and industrial area. Many different studies have been performed about face and eye detection. Besides having many challenging problems like, having different lighting conditions, having glasses, facial hair or mustache on face, different orientation pose or occlusion of face, face and eye detection methods performed great progress. In this paper we first categorize face detection models and examine the basic algorithms for face detection. Then we present methods for eye detection and gaze estimation.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121570249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Firewall Policy Management Through Sliding Window Filtering Method Using Data Mining Techniques 基于数据挖掘技术的滑动窗口过滤防火墙策略管理
Pub Date : 2011-05-31 DOI: 10.5121/IJCSES.2011.2205
C. Rao, B. Rama, K. Mani
As the number of security incidents had been sharply growing, the issue of security-defense draws more and more attention from network community in past years. Firewall is known one of the most popular security-defense mechanism for corporations. It is the first defense-line for security infrastructure of corporations to against external intrusions and threats. A firewall will filter packets by following its policy rules to avoid suspicious intruder executing illegal actions and damaging internal network. Well-designed policy rules can increase the security-defense effect to against security risk. In this paper, we apply association rule mining to analyze network logs and detect anomalous behaviors, such as connections those shown frequently in short period with the same source IP and port. From these anomalous behaviors, we could inference useful, up-to-dated and efficient firewall policy rules. Comparing with the method proposed in [18], we utilize incremental mining to handle the increasingly changed traffic log data. The proposed method can highly enhance the execution performance in data analyzing. Experimental results show that the execution efficiency of our method is better than that of traditional methods when dealing with large-sized log files.
近年来,随着网络安全事件的急剧增加,网络安全防御问题越来越受到网络社会的关注。防火墙是企业最常用的安全防御机制之一。它是企业安全基础设施抵御外部入侵和威胁的第一道防线。防火墙会按照策略规则对数据包进行过滤,以避免可疑的入侵者执行非法操作,破坏内部网络。设计良好的策略规则可以增强安全防御效果,抵御安全风险。本文采用关联规则挖掘的方法对网络日志进行分析,并检测异常行为,如短时间内频繁出现的相同源IP和端口的连接。从这些异常行为中,我们可以推断出有用的、最新的和有效的防火墙策略规则。与文献[18]提出的方法相比,我们利用增量挖掘来处理日益变化的交通日志数据。该方法可大大提高数据分析的执行性能。实验结果表明,在处理大容量日志文件时,该方法的执行效率优于传统方法。
{"title":"Firewall Policy Management Through Sliding Window Filtering Method Using Data Mining Techniques","authors":"C. Rao, B. Rama, K. Mani","doi":"10.5121/IJCSES.2011.2205","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2205","url":null,"abstract":"As the number of security incidents had been sharply growing, the issue of security-defense draws more and more attention from network community in past years. Firewall is known one of the most popular security-defense mechanism for corporations. It is the first defense-line for security infrastructure of corporations to against external intrusions and threats. A firewall will filter packets by following its policy rules to avoid suspicious intruder executing illegal actions and damaging internal network. Well-designed policy rules can increase the security-defense effect to against security risk. In this paper, we apply association rule mining to analyze network logs and detect anomalous behaviors, such as connections those shown frequently in short period with the same source IP and port. From these anomalous behaviors, we could inference useful, up-to-dated and efficient firewall policy rules. Comparing with the method proposed in [18], we utilize incremental mining to handle the increasingly changed traffic log data. The proposed method can highly enhance the execution performance in data analyzing. Experimental results show that the execution efficiency of our method is better than that of traditional methods when dealing with large-sized log files.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127400867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dual Band Two Elements Inverted-L Antenna for 3.5 & 5 Ghz Mobile Wimax/Wi-Fi Applications 用于3.5和5 Ghz移动Wimax/Wi-Fi应用的双频双元倒l天线
Pub Date : 2011-05-31 DOI: 10.5121/IJCSES.2011.2203
S. Alam, Asaf Khan, L. Saha, Mehedi Hasan Pavel, T. Rahman
This paper presents the numerical simulations of dual band two elements Inverted-L antenna for 3.5 GHz mobile WiMAX and 5 GHz Wi-Fi operation. The proposed antenna is feed by a coaxial connector. The antenna arms effectively control the excited resonant modes for Wi-Fi and mobile WiMAX operation. Total area occupies by the antenna is 20 mm × 30 mm. The antenna contains substantial gain with less than 0.3 and 2 dBi gain variation within the -10 dB return loss bandwidth at 3.5 and 5 GHz operating frequency respectively. In addition, the antenna has achievable bandwidth, return loss and radiation characteristics for both frequencies. Due to the compact area occupied, the proposed antenna is promising to be embedded within the different portable devices employing 3.5 GHz mobile WiMAX and 5 GHz Wi-Fi operation .
本文对3.5 GHz移动WiMAX和5 GHz Wi-Fi工作的双频双元倒l天线进行了数值模拟。所提出的天线由同轴连接器馈电。天线臂有效地控制了Wi-Fi和移动WiMAX操作的激发谐振模式。天线总占地面积为20mm × 30mm。在3.5 GHz和5 GHz工作频率下,该天线在-10 dB回波损耗带宽内分别具有小于0.3和2 dBi的增益变化。此外,该天线在两个频率下都具有可实现的带宽、回波损耗和辐射特性。由于所占用的面积较小,所提出的天线有望嵌入采用3.5 GHz移动WiMAX和5 GHz Wi-Fi操作的不同便携式设备中。
{"title":"Dual Band Two Elements Inverted-L Antenna for 3.5 & 5 Ghz Mobile Wimax/Wi-Fi Applications","authors":"S. Alam, Asaf Khan, L. Saha, Mehedi Hasan Pavel, T. Rahman","doi":"10.5121/IJCSES.2011.2203","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2203","url":null,"abstract":"This paper presents the numerical simulations of dual band two elements Inverted-L antenna for 3.5 GHz mobile WiMAX and 5 GHz Wi-Fi operation. The proposed antenna is feed by a coaxial connector. The antenna arms effectively control the excited resonant modes for Wi-Fi and mobile WiMAX operation. Total area occupies by the antenna is 20 mm × 30 mm. The antenna contains substantial gain with less than 0.3 and 2 dBi gain variation within the -10 dB return loss bandwidth at 3.5 and 5 GHz operating frequency respectively. In addition, the antenna has achievable bandwidth, return loss and radiation characteristics for both frequencies. Due to the compact area occupied, the proposed antenna is promising to be embedded within the different portable devices employing 3.5 GHz mobile WiMAX and 5 GHz Wi-Fi operation .","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131791869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
International Journal of Computer Science & Engineering Survey
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1