首页 > 最新文献

International Journal of Computer Science & Engineering Survey最新文献

英文 中文
A Survey on Terrorist Network Mining: Current Trends and Opportunities 恐怖主义网络挖掘调查:当前趋势与机遇
Pub Date : 2012-08-31 DOI: 10.5121/IJCSES.2012.3405
N. Chaurasia, Mradul Dhakar, Akhilesh Tiwari, R. K. Gupta
Along with the modernization and widespread usage of Internet, the security of the mankind has become one of the major issues today. The threat of human society from the terrorists is the challenge faced dominantly. Advancement in the technology has not only helped the common people for the growth but also these inhuman people to adversely affect the society with sophisticated techniques. In this regard, the law-enforcement agencies are aiming to prevent future attacks. To do so, the terrorist networks are being analyzed and detected. To achieve this, the law enforcement agencies are using data mining techniques as one of the effective solution. One such technique of data mining is Social network analysis which studies terrorist networks for the identification of relationships and associations that may exist between terrorist nodes. Terrorist activities can also be detected by means of analyzing Web traffic content. This paper studies social network analysis, web traffic content and explores various ways for identifying terrorist activities.
随着互联网的现代化和广泛使用,人类的安全已成为当今的主要问题之一。恐怖分子对人类社会的威胁是人类社会面临的主要挑战。技术的进步不仅帮助了普通人的成长,也让这些非人的人用复杂的技术对社会产生了不利的影响。在这方面,执法机构的目标是防止未来的袭击。为此,正在对恐怖主义网络进行分析和侦查。为了实现这一目标,执法机构正在使用数据挖掘技术作为有效的解决方案之一。其中一种数据挖掘技术是社会网络分析,它研究恐怖分子网络,以识别恐怖分子节点之间可能存在的关系和关联。恐怖活动也可以通过分析Web流量内容来检测。本文研究了社会网络分析、网络流量内容,并探索了识别恐怖活动的各种方法。
{"title":"A Survey on Terrorist Network Mining: Current Trends and Opportunities","authors":"N. Chaurasia, Mradul Dhakar, Akhilesh Tiwari, R. K. Gupta","doi":"10.5121/IJCSES.2012.3405","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3405","url":null,"abstract":"Along with the modernization and widespread usage of Internet, the security of the mankind has become one of the major issues today. The threat of human society from the terrorists is the challenge faced dominantly. Advancement in the technology has not only helped the common people for the growth but also these inhuman people to adversely affect the society with sophisticated techniques. In this regard, the law-enforcement agencies are aiming to prevent future attacks. To do so, the terrorist networks are being analyzed and detected. To achieve this, the law enforcement agencies are using data mining techniques as one of the effective solution. One such technique of data mining is Social network analysis which studies terrorist networks for the identification of relationships and associations that may exist between terrorist nodes. Terrorist activities can also be detected by means of analyzing Web traffic content. This paper studies social network analysis, web traffic content and explores various ways for identifying terrorist activities.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117088715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Survey Of Sql Injection Countermeasures Sql注入对策综述
Pub Date : 2012-06-30 DOI: 10.5121/IJCSES.2012.3305
R. Mahapatra, Subia Khan
SQL injection has become a predominant type of attacks that target web applications. It allows attackers to obtain unauthorized access to the back-end database to change the intended application-generated SQL queries. Researchers have proposed various solutions to address SQL injection problems. However, many of them have limitations and often cannot address all kinds of injection problems. What’s more, new types of SQL injection attacks have arisen over the years. To better counter these attacks, identifying and understanding existing countermeasures are very important. In this research , I had surveyed existing techniques against SQL injection attacks and analyzed their advantages and disadvantages. In addition, I identified techniques for building secure systems and applied them to my applications and database system, and illustrated how they were performed and the effect of them.
SQL注入已经成为针对web应用程序的主要攻击类型。它允许攻击者获得对后端数据库的未经授权的访问,以更改预期的应用程序生成的SQL查询。研究人员已经提出了各种解决SQL注入问题的方案。然而,它们中的许多都有局限性,通常不能解决各种注射问题。更重要的是,近年来出现了新的SQL注入攻击类型。为了更好地应对这些攻击,识别和理解现有的对策非常重要。在这项研究中,我调查了现有的针对SQL注入攻击的技术,并分析了它们的优缺点。此外,我还确定了构建安全系统的技术,并将其应用于我的应用程序和数据库系统,并说明了如何执行这些技术以及它们的效果。
{"title":"A Survey Of Sql Injection Countermeasures","authors":"R. Mahapatra, Subia Khan","doi":"10.5121/IJCSES.2012.3305","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3305","url":null,"abstract":"SQL injection has become a predominant type of attacks that target web applications. It allows attackers to obtain unauthorized access to the back-end database to change the intended application-generated SQL queries. Researchers have proposed various solutions to address SQL injection problems. However, many of them have limitations and often cannot address all kinds of injection problems. What’s more, new types of SQL injection attacks have arisen over the years. To better counter these attacks, identifying and understanding existing countermeasures are very important. In this research , I had surveyed existing techniques against SQL injection attacks and analyzed their advantages and disadvantages. In addition, I identified techniques for building secure systems and applied them to my applications and database system, and illustrated how they were performed and the effect of them.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116627474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
CROSS LAYER PROTOCOLS FOR MULTIMEDIA TRANSMISSION IN WIRELESS NETWORKS 无线网络多媒体传输的跨层协议
Pub Date : 2012-06-30 DOI: 10.5121/IJCSES.2012.3302
Santhosha Rao, K. Shama
Wireless networks initially inherited the traditional layered architecture from wired networks. Nevertheless, as third and fourth generation wireless communications and networking begin to proliferate in the area of communication networks, the suitability of the layered architecture is coming under close scrutiny from the research community. It is repeatedly argued that although layered architectures have served well for wired networks, they might not be suitable for wireless networks [1]. One of the key challenges for next-generation broadband wireless networks is to devise end-to-end protocol solutions across wired and wireless networks to accommodate large densities of highly mobile users demanding services and applications with a wide range of Quality of Service (QoS) requirements. Hence, in order to meet the challenging demands on future wireless networks, it may be required to adopt new approaches in which protocols can be designed by violating the reference layered architecture allowing direct communication between protocols in nonadjacent layers Such violations of a layered architecture have been termed as cross-layer design(CLD).
无线网络最初从有线网络继承了传统的分层结构。然而,随着第三代和第四代无线通信和网络开始在通信网络领域激增,分层架构的适用性正受到研究界的密切关注。尽管分层体系结构在有线网络中服务得很好,但它们可能不适用于无线网络[1]。下一代宽带无线网络面临的主要挑战之一是设计跨有线和无线网络的端到端协议解决方案,以适应对服务和应用有广泛服务质量要求的高移动用户的大密度。因此,为了满足未来无线网络的挑战性需求,可能需要采用新的方法,在这种方法中,可以通过违反参考分层体系结构来设计协议,允许在非相邻层中协议之间进行直接通信。这种违反分层体系结构的方法被称为跨层设计(CLD)。
{"title":"CROSS LAYER PROTOCOLS FOR MULTIMEDIA TRANSMISSION IN WIRELESS NETWORKS","authors":"Santhosha Rao, K. Shama","doi":"10.5121/IJCSES.2012.3302","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3302","url":null,"abstract":"Wireless networks initially inherited the traditional layered architecture from wired networks. Nevertheless, as third and fourth generation wireless communications and networking begin to proliferate in the area of communication networks, the suitability of the layered architecture is coming under close scrutiny from the research community. It is repeatedly argued that although layered architectures have served well for wired networks, they might not be suitable for wireless networks [1]. \u0000One of the key challenges for next-generation broadband wireless networks is to devise end-to-end protocol solutions across wired and wireless networks to accommodate large densities of highly mobile users demanding services and applications with a wide range of Quality of Service (QoS) requirements. Hence, in order to meet the challenging demands on future wireless networks, it may be required to \u0000adopt new approaches in which protocols can be designed by violating the reference layered architecture allowing direct communication between protocols in nonadjacent layers Such violations of a layered architecture have been termed as cross-layer design(CLD).","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127298119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
COMPLETE SYNCHRONIZATION OF HYPERCHAOTIC XU AND HYPERCHAOTIC LÜ SYSTEMS VIA ACTIVE CONTROL 通过主动控制实现超混沌xu和超混沌lÜ系统的完全同步
Pub Date : 2012-06-30 DOI: 10.5121/IJCSES.2012.3303
S. Vaidyanathan
This paper deploys active control for achieving complete synchronization of hyperchaotic Xu (2009) and hyperchaotic Lu (2006) systems. Specifically, this paper derives complete synchronization results for identical hyperchaotic Xu systems, identical hyperchaotic Lu systems and non-identical hyperchaotic Xu and Lu systems. The complete synchronization results have been proved using Lyapunov stability theory. Numerical simulations have been shown to validate and demonstrate the effectiveness of the complete synchronization results derived in this paper.
本文采用主动控制实现了超混沌Xu(2009)和超混沌Lu(2006)系统的完全同步。具体地,本文导出了相同超混沌Xu系统、相同超混沌Lu系统和非相同超混沌Xu和Lu系统的完全同步结果。利用李亚普诺夫稳定性理论证明了完全同步的结果。数值模拟结果验证了本文推导的完全同步结果的有效性。
{"title":"COMPLETE SYNCHRONIZATION OF HYPERCHAOTIC XU AND HYPERCHAOTIC LÜ SYSTEMS VIA ACTIVE CONTROL","authors":"S. Vaidyanathan","doi":"10.5121/IJCSES.2012.3303","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3303","url":null,"abstract":"This paper deploys active control for achieving complete synchronization of hyperchaotic Xu (2009) and hyperchaotic Lu (2006) systems. Specifically, this paper derives complete synchronization results for identical hyperchaotic Xu systems, identical hyperchaotic Lu systems and non-identical hyperchaotic Xu and Lu systems. The complete synchronization results have been proved using Lyapunov stability theory. Numerical simulations have been shown to validate and demonstrate the effectiveness of the complete synchronization results derived in this paper.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133595639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A SURVEY OF DIMENSIONALITY REDUCTION AND CLASSIFICATION METHODS 维数降维与分类方法综述
Pub Date : 2012-06-30 DOI: 10.5121/IJCSES.2012.3304
Nebu Varghese, V. Verghese, N. Jaisankar, Tech Student
Dimensionality Reduction is usually achieved on the feature space by adopting any one of the prescribed methods that fall under the selected technique. Feature selection and Feature extraction being the two aforesaid techniques of reducing dimensionality, the former discards certain features that may be useful at a later stage whereas the latter re-constructs its features into a simpler dimension thereby preserving all its initial characteristics. The sole purpose of this survey is to provide an adequate comprehension of the different dimensionality reduction techniques that exist currently and also to introduce the applicability of any one of the prescribed methods depending upon the given set of parameters and varying conditions as described, under each algorithm’s usage statistics. This paper also presents guidelines where in, selection of the best possible algorithm for a specific instance can be determined with ease when a condition arises where in two or more algorithms may be suitable for executing the aforementioned task.
通常采用所选技术下的任意一种规定方法来实现特征空间的降维。特征选择和特征提取是上述两种降维技术,前者放弃了某些可能在以后阶段有用的特征,而后者将其特征重构为更简单的维度,从而保留了其所有初始特征。本调查的唯一目的是提供对目前存在的不同降维技术的充分理解,并根据每种算法的使用统计数据,根据给定的参数集和所描述的不同条件,介绍任何一种规定方法的适用性。本文还提出了指导方针,其中,当出现两种或多种算法可能适合执行上述任务的情况时,可以很容易地确定为特定实例选择最佳算法。
{"title":"A SURVEY OF DIMENSIONALITY REDUCTION AND CLASSIFICATION METHODS","authors":"Nebu Varghese, V. Verghese, N. Jaisankar, Tech Student","doi":"10.5121/IJCSES.2012.3304","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3304","url":null,"abstract":"Dimensionality Reduction is usually achieved on the feature space by adopting any one of the prescribed methods that fall under the selected technique. Feature selection and Feature extraction being the two aforesaid techniques of reducing dimensionality, the former discards certain features that may be useful at a later stage whereas the latter re-constructs its features into a simpler dimension thereby preserving all its initial characteristics. The sole purpose of this survey is to provide an adequate comprehension of the different dimensionality reduction techniques that exist currently and also to introduce the applicability of any one of the prescribed methods depending upon the given set of parameters and varying conditions as described, under each algorithm’s usage statistics. This paper also presents guidelines where in, selection of the best possible algorithm for a specific instance can be determined with ease when a condition arises where in two or more algorithms may be suitable for executing the aforementioned task.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121837080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
SECURITY IN WIRELESS SENSOR NETWORKS - IMPROVING THE LEAP PROTOCOL 无线传感器网络的安全性——改进leap协议
Pub Date : 2012-06-30 DOI: 10.5121/IJCSES.2012.3301
Delan Alsoufi, K. Elleithy, Tariq Abuzaghleh, Ahmad Nassar
Wireless sensor networks are becoming significantly vital to many applications, and they were initially used by the military for surveillance purposes. One of the biggest concerns of WSNs is that they are very defenceless to security threats. Due to the fact that these networks are susceptible to hackers; it is possible for one to enter and render a network. For example, such networks may be hacked into in the military, using the system to attack friendly forces. Leap protocol offers many security benefits to WSNs. However, with much research it became apparent that LEAP only employs one base station and always assumes that it is trustworthy. It does not consist of defence against hacked or compromised base stations. In this paper, intensive research was undertaken on LEAP protocols, finding out its security drawbacks and limitations. A solution has been proposed in order to overcome the security issues faced in implementing this protocol whilst employing more than one base station. The performance of the proposed solution has been evaluated and simulated to provide a better network performance.
无线传感器网络在许多应用中变得至关重要,它们最初被军方用于监视目的。无线传感器网络最大的问题之一是它们对安全威胁的防御能力非常弱。因为这些网络很容易受到黑客的攻击;一个人可以进入并渲染一个网络。例如,这样的网络可能会在军队中被黑客入侵,利用该系统攻击友军。Leap协议为无线传感器网络提供了许多安全优势。然而,经过大量的研究,LEAP显然只使用一个基站,并且总是假设它是值得信赖的。它不包括防御被黑客攻击或破坏的基站。本文对LEAP协议进行了深入的研究,发现了它的安全缺陷和局限性。为了克服在使用多个基站时实现该协议所面临的安全问题,提出了一种解决方案。对该方案的性能进行了评估和仿真,以提供更好的网络性能。
{"title":"SECURITY IN WIRELESS SENSOR NETWORKS - IMPROVING THE LEAP PROTOCOL","authors":"Delan Alsoufi, K. Elleithy, Tariq Abuzaghleh, Ahmad Nassar","doi":"10.5121/IJCSES.2012.3301","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3301","url":null,"abstract":"Wireless sensor networks are becoming significantly vital to many applications, and they were initially used by the military for surveillance purposes. One of the biggest concerns of WSNs is that they are very defenceless to security threats. Due to the fact that these networks are susceptible to hackers; it is possible for one to enter and render a network. For example, such networks may be hacked into in the military, using the system to attack friendly forces. Leap protocol offers many security benefits to WSNs. However, with much research it became apparent that LEAP only employs one base station and always assumes that it is trustworthy. It does not consist of defence against hacked or compromised base stations. In this paper, intensive research was undertaken on LEAP protocols, finding out its security drawbacks and limitations. A solution has been proposed in order to overcome the security issues faced in implementing this protocol whilst employing more than one base station. The performance of the proposed solution has been evaluated and simulated to provide a better network performance.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134328471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Performance analysis of Coiflet-type wavelets for a fingerprint image compression by using wavelet and wavelet packet transform 基于小波和小波包变换的coiflet型小波对指纹图像的压缩性能分析
Pub Date : 2012-04-30 DOI: 10.5121/IJCSES.2012.3209
Rafiqul Islam, Farhad Bulbul, Shewli Shamim Shanta
Fingerprint analysis plays a crucial role in crucial legal matters such as investigation of crime and security system. Due to the large number and size of fingerprint images, data compression has to be applied to reduce the storage and communication bandwidth requirements of those images. To do this, there are many types of wavelet has been used for fingerprint image compression. In this paper we have used Coiflet-Type wavelets and our aim is to determine the most appropriate Coiflet-Type wavelet for better compression of a digitized fingerprint image and to achieve our goal Retain Energy (RE) and Number of Zeros (NZ) in percentage is determined for different Coiflet-Type wavelets at different threshold values at the fixed decomposition level 3 using wavelet and wavelet packet transform. We have used 8-bit grayscale left thumb digitized fingerprint image of size 480×400 as a test image.
指纹分析在侦查犯罪、安保系统等重大法律事务中起着至关重要的作用。由于指纹图像数量多、尺寸大,必须采用数据压缩技术来降低指纹图像对存储和通信带宽的要求。为了做到这一点,有许多类型的小波被用于指纹图像压缩。在本文中,我们使用了Coiflet-Type小波,我们的目标是确定最合适的Coiflet-Type小波,以便更好地压缩数字化指纹图像,并实现我们的目标,在固定分解级别3使用小波和小波包变换确定不同Coiflet-Type小波在不同阈值下的保留能量(RE)和0数(NZ)的百分比。我们使用尺寸为480×400的8位灰度左拇指数字化指纹图像作为测试图像。
{"title":"Performance analysis of Coiflet-type wavelets for a fingerprint image compression by using wavelet and wavelet packet transform","authors":"Rafiqul Islam, Farhad Bulbul, Shewli Shamim Shanta","doi":"10.5121/IJCSES.2012.3209","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3209","url":null,"abstract":"Fingerprint analysis plays a crucial role in crucial legal matters such as investigation of crime and security system. Due to the large number and size of fingerprint images, data compression has to be applied to reduce the storage and communication bandwidth requirements of those images. To do this, there are many types of wavelet has been used for fingerprint image compression. In this paper we have used Coiflet-Type wavelets and our aim is to determine the most appropriate Coiflet-Type wavelet for better compression of a digitized fingerprint image and to achieve our goal Retain Energy (RE) and Number of Zeros (NZ) in percentage is determined for different Coiflet-Type wavelets at different threshold values at the fixed decomposition level 3 using wavelet and wavelet packet transform. We have used 8-bit grayscale left thumb digitized fingerprint image of size 480×400 as a test image.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115852255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
THE PROPOSAL OF HYBRID INTRUSION DETECTION FOR DEFENCE OF SYNC FLOOD ATTACK IN WIRELESS SENSOR NETWORK 提出了一种用于无线传感器网络同步洪水攻击防御的混合入侵检测方法
Pub Date : 2012-04-30 DOI: 10.5121/IJCSES.2012.3204
R. Bhatnagar, Udai Shankar
Data security is a huge responsibility for sensor network as there are various ways in which security can be breached, enabling hackers to access sensitive data. Threats to wireless sensor networks are numerous and potentially devastating. Security issues ranging from session hijacking to Denial of Service (DOS) can plague a WSN. To aid in the defense and detection of these potential threats, WSN employ a security solution that includes an intrusion detection system (IDS). Different neural methods have been proposed in recent years for the development of intrusion detection system. In this paper, we surveyed denial of service attacks that disseminate the WSN such a way that it temporarily paralyses a network and proposed a hybrid Intrusion Detection approach based on stream flow and session state transition analysis that monitor and analyze stream flow of data, identify abnormal network activity, detect policy violations against sync flood attack.
数据安全对于传感器网络来说是一项巨大的责任,因为有各种各样的方式可以破坏安全,使黑客能够访问敏感数据。无线传感器网络面临的威胁数不胜数,而且具有潜在的破坏性。从会话劫持到拒绝服务(DOS)等安全问题都可能困扰WSN。为了帮助防御和检测这些潜在的威胁,WSN采用了一种包括入侵检测系统(IDS)的安全解决方案。近年来,针对入侵检测系统的发展提出了不同的神经网络方法。在本文中,我们调查了拒绝服务攻击,通过这种方式传播WSN,使网络暂时瘫痪,并提出了一种基于流流和会话状态转换分析的混合入侵检测方法,该方法可以监控和分析数据流,识别异常网络活动,检测策略违反同步洪水攻击。
{"title":"THE PROPOSAL OF HYBRID INTRUSION DETECTION FOR DEFENCE OF SYNC FLOOD ATTACK IN WIRELESS SENSOR NETWORK","authors":"R. Bhatnagar, Udai Shankar","doi":"10.5121/IJCSES.2012.3204","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3204","url":null,"abstract":"Data security is a huge responsibility for sensor network as there are various ways in which security can be breached, enabling hackers to access sensitive data. Threats to wireless sensor networks are numerous and potentially devastating. Security issues ranging from session hijacking to Denial of Service (DOS) can plague a WSN. To aid in the defense and detection of these potential threats, WSN employ a security solution that includes an intrusion detection system (IDS). Different neural methods have been proposed in recent years for the development of intrusion detection system. In this paper, we surveyed denial of service attacks that disseminate the WSN such a way that it temporarily paralyses a network and proposed a hybrid Intrusion Detection approach based on stream flow and session state transition analysis that monitor and analyze stream flow of data, identify abnormal network activity, detect policy violations against sync flood attack.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125837970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
NYMBLE BLOCKING SYSTEM 尼布尔阻塞系统
Pub Date : 2012-04-30 DOI: 10.5121/IJCSES.2012.3207
Anand Joshi, A. Shaikh, Aruna Kadam, Vasudha Sahu
In order to allow users to access Internet services privately, anonymizing networks like Tor uses a series of routers to hide the client’s IP address from the server. These networks, however, have been marred by users employing this anonymity for abusive purposes such as defacing popular web sites. Usually, web site administrators rely on IP-address blocking in order to disable access to misbehaving users, but it is impractical if the abuser routes through an anonymizing network. In order to avoid this, administrators bar all known exit nodes of the anonymizing network, thereby denying anonymous access to all the users (whether misbehaving or not). To solve this issue, we introduce Nymble, a system where servers blacklist misbehaving users, thereby blocking users without affecting their anonymity. Nymble is thus agnostic to varied definitions of misbehavior. Servers can block users for any reason, and the privacy of blacklisted users is not affected in any case.
为了允许用户私下访问互联网服务,像Tor这样的匿名网络使用一系列路由器来对服务器隐藏客户端的IP地址。然而,这些网络已经被用户滥用这种匿名性的目的所破坏,比如破坏热门网站。通常,网站管理员依靠ip地址封锁来阻止行为不端的用户访问,但如果滥用者通过匿名网络路由,这是不切实际的。为了避免这种情况,管理员禁止匿名化网络的所有已知出口节点,从而拒绝所有用户的匿名访问(无论行为是否不当)。为了解决这个问题,我们引入了ynble,一个服务器将行为不端的用户列入黑名单的系统,从而在不影响其匿名性的情况下阻止用户。因此,尼布尔对各种不当行为的定义都是不可知论的。服务器可以以任何理由屏蔽用户,被列入黑名单的用户的隐私在任何情况下都不受影响。
{"title":"NYMBLE BLOCKING SYSTEM","authors":"Anand Joshi, A. Shaikh, Aruna Kadam, Vasudha Sahu","doi":"10.5121/IJCSES.2012.3207","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3207","url":null,"abstract":"In order to allow users to access Internet services privately, anonymizing networks like Tor uses a series of routers to hide the client’s IP address from the server. These networks, however, have been marred by users employing this anonymity for abusive purposes such as defacing popular web sites. Usually, web site administrators rely on IP-address blocking in order to disable access to misbehaving users, but it is impractical if the abuser routes through an anonymizing network. In order to avoid this, administrators bar all known exit nodes of the anonymizing network, thereby denying anonymous access to all the users (whether misbehaving or not). To solve this issue, we introduce Nymble, a system where servers blacklist misbehaving users, thereby blocking users without affecting their anonymity. Nymble is thus agnostic to varied definitions of misbehavior. Servers can block users for any reason, and the privacy of blacklisted users is not affected in any case.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114168462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INCLUSION OF ROAD NETWORK IN THE SPATIAL DATABASE FOR FEATURES SEARCHING USING DYNAMIC INDEX 基于动态索引的道路网空间数据库特征搜索
Pub Date : 2012-04-30 DOI: 10.5121/IJCSES.2012.3208
S. Sivasubramanian
Spatial database systems manage large collections of geographic entities, which apart from spatial attributes contain spatial information and non spatial information (e.g., name, size, type, price, etc.). An attractive type of preference queries, which select the best spatial location with respect to the quality of facilities in its spatial area. Given a set D of interesting objects (e.g., candidate locations), a top-k spatial preference query retrieves the k objects in D with the highest scores. The featured score of a given object is derived from the quality of features (e.g., location and nearby features) in its spatial neighborhood. For example, using a landed property agency database of flats for Sale, a customer may want to rank the flats with respect to the appropriateness of their location, defined after aggregating the qualities of other features (e.g., restaurants, bus stop, hospital, market, school, etc.) within their spatial neighborhood. This neighborhood concept can be defined by different functions by the user. It can be an explicit circular region within a given distance from the flat. Another sensitive definition is to assign higher rates to the features based on their proximity to the land. In this paper, we formally define spatial preference queries and propose suitable dynamic index techniques and searching algorithms for them. We extend [1] results with dynamic index structure in order to accommodate time - variant changes in the spatial data. In my current work is the top-k spatial preference query on road network, in which the distance between object and road is defined by their shortest path distance.
空间数据库系统管理大量的地理实体,这些地理实体除空间属性外,还包含空间信息和非空间信息(如名称、大小、类型、价格等)。一种有吸引力的偏好查询类型,它根据其空间区域内的设施质量选择最佳空间位置。给定一组D个有趣的对象(例如,候选位置),top-k空间偏好查询将检索D中得分最高的k个对象。给定对象的特征分数来源于其空间邻域的特征质量(例如,位置和附近特征)。例如,使用房地产代理的待售公寓数据库,客户可能希望根据其位置的适当性对公寓进行排名,这是在汇总其空间社区内其他特征(例如,餐馆、公交车站、医院、市场、学校等)的质量后定义的。这种邻域概念可以由用户通过不同的功能来定义。它可以是距离平面给定距离内的显圆形区域。另一个比较敏感的定义是,根据地形特征与土地的接近程度,给它们分配更高的费率。本文正式定义了空间偏好查询,并提出了相应的动态索引技术和搜索算法。为了适应空间数据的时变变化,我们用动态索引结构扩展了[1]的结果。我目前的工作是道路网络上top-k空间偏好查询,其中物体与道路之间的距离由它们的最短路径距离来定义。
{"title":"INCLUSION OF ROAD NETWORK IN THE SPATIAL DATABASE FOR FEATURES SEARCHING USING DYNAMIC INDEX","authors":"S. Sivasubramanian","doi":"10.5121/IJCSES.2012.3208","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3208","url":null,"abstract":"Spatial database systems manage large collections of geographic entities, which apart from spatial attributes contain spatial information and non spatial information (e.g., name, size, type, price, etc.). An attractive type of preference queries, which select the best spatial location with respect to the quality of facilities in its spatial area. Given a set D of interesting objects (e.g., candidate locations), a top-k spatial preference query retrieves the k objects in D with the highest scores. The featured score of a given object is derived from the quality of features (e.g., location and nearby features) in its spatial neighborhood. For example, using a landed property agency database of flats for Sale, a customer may want to rank the flats with respect to the appropriateness of their location, defined after aggregating the qualities of other features (e.g., restaurants, bus stop, hospital, market, school, etc.) within their spatial neighborhood. This neighborhood concept can be defined by different functions by the user. It can be an explicit circular region within a given distance from the flat. Another sensitive definition is to assign higher rates to the features based on their proximity to the land. In this paper, we formally define spatial preference queries and propose suitable dynamic index techniques and searching algorithms for them. We extend [1] results with dynamic index structure in order to accommodate time - variant changes in the spatial data. In my current work is the top-k spatial preference query on road network, in which the distance between object and road is defined by their shortest path distance.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127699124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Computer Science & Engineering Survey
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1