首页 > 最新文献

2014 International Conference on Recent Trends in Information Technology最新文献

英文 中文
Analysis of acoustic signals from rotating machines for wear detection 用于磨损检测的旋转机械声信号分析
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996206
N. Iyer, Suresh R. Norman
Automated Condition Monitoring (ACM) of rotating machines is necessary to avoid sudden machine breakdown due to wear and tear of Rolling Element Bearings (REBs). Hence, detecting faults in REBs well before machine outage is important. The aim of the proposed system is to develop a prototype to detect mechanical wear, by capturing acoustic signals with frequencies between 20 Hz to 20 kHz, from the machine under test, using non-contact electret microphone sensor. The frequency spectra of the acoustic signal from a healthy bearing is compared with the acquired acoustic signal. This system aids in scheduled replacement of faulty parts, thereby reducing the machine downtime, increasing reliability and customer satisfaction, but the results do not infer on the severity of the fault present in the REBs. The system also helps in predicting Remaining Useful Life (RUL) of the machine under consideration.
旋转机械的自动状态监测(ACM)是必要的,以避免由于滚动轴承(REBs)的磨损而导致机器突然故障。因此,在机器停机前很好地检测reb中的故障非常重要。该系统的目标是开发一个原型,通过使用非接触式驻极体麦克风传感器,从被测机器捕获频率在20 Hz至20 kHz之间的声学信号,来检测机械磨损。将健康轴承声信号的频谱与采集到的声信号进行比较。该系统有助于按计划更换故障部件,从而减少机器停机时间,提高可靠性和客户满意度,但结果不能推断reb中存在的故障的严重程度。该系统还有助于预测机器的剩余使用寿命(RUL)。
{"title":"Analysis of acoustic signals from rotating machines for wear detection","authors":"N. Iyer, Suresh R. Norman","doi":"10.1109/ICRTIT.2014.6996206","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996206","url":null,"abstract":"Automated Condition Monitoring (ACM) of rotating machines is necessary to avoid sudden machine breakdown due to wear and tear of Rolling Element Bearings (REBs). Hence, detecting faults in REBs well before machine outage is important. The aim of the proposed system is to develop a prototype to detect mechanical wear, by capturing acoustic signals with frequencies between 20 Hz to 20 kHz, from the machine under test, using non-contact electret microphone sensor. The frequency spectra of the acoustic signal from a healthy bearing is compared with the acquired acoustic signal. This system aids in scheduled replacement of faulty parts, thereby reducing the machine downtime, increasing reliability and customer satisfaction, but the results do not infer on the severity of the fault present in the REBs. The system also helps in predicting Remaining Useful Life (RUL) of the machine under consideration.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126225702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CORDIC iterations based architecture for low power and high quality DCT 基于CORDIC迭代的低功耗高质量DCT体系结构
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996195
E. Leavline, S. Megala, D. A. A. G. Singh
Discrete Cosine Transform (DCT) is widely used in image and video compression standards. This paper presents low-power co-ordinate rotation digital computer (CORDIC) based reconfigurable architecture for discrete cosine transform (DCT). All the computations in DCT are not equally important in generating the frequency domain output. Considering the important difference in the DCT coefficients the number of CORDIC iterations can be dynamically changed to reduce the power of consumption with improved image quality. The proposed CORDIC based 2D DCT architecture is simulated using Modelsim and the experimental results show that our reconfigurable DCT achieves power savings with improved image quality.
离散余弦变换(DCT)广泛应用于图像和视频压缩标准中。提出了基于低功耗坐标旋转数字计算机(CORDIC)的离散余弦变换(DCT)可重构结构。在产生频域输出时,DCT中的所有计算并不同等重要。考虑到DCT系数的重要差异,可以动态改变CORDIC迭代次数,从而在提高图像质量的同时降低功耗。利用Modelsim软件对基于CORDIC的二维DCT结构进行了仿真,实验结果表明,我们的可重构DCT在提高图像质量的同时节省了功耗。
{"title":"CORDIC iterations based architecture for low power and high quality DCT","authors":"E. Leavline, S. Megala, D. A. A. G. Singh","doi":"10.1109/ICRTIT.2014.6996195","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996195","url":null,"abstract":"Discrete Cosine Transform (DCT) is widely used in image and video compression standards. This paper presents low-power co-ordinate rotation digital computer (CORDIC) based reconfigurable architecture for discrete cosine transform (DCT). All the computations in DCT are not equally important in generating the frequency domain output. Considering the important difference in the DCT coefficients the number of CORDIC iterations can be dynamically changed to reduce the power of consumption with improved image quality. The proposed CORDIC based 2D DCT architecture is simulated using Modelsim and the experimental results show that our reconfigurable DCT achieves power savings with improved image quality.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"431 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123595913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Semi - Markov based node behavior model for isolating selfish neighbors in MANETs 基于半马尔可夫节点行为模型的自利邻居隔离
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996155
J. Sengathir, R. Manoharan, R. Raja Kumar
Reliable dissemination of data in mobile ad hoc network necessitates high degree of connectivity among the nodes present in that environment. The existence of selfish nodes could drastically affect the network connectivity. However, the impact of selfish nodes on network connectivity has been studied either through reputation factor computed based on past history or conditional probability manipulated based on both the past and present behavior of nodes. Hence, a need arises for formulating a mathematical model that makes its future routing decision only based on the present context of the node. In this paper, we propose a Semi-Markov based mathematical model, which isolates selfish nodes exponentially. In particular, we stochastically analyze the network resilience with the aid of transition probability matrix. The effectiveness of the proposed model for network survivability has been verified through quantitative analysis. The numerical results, thus obtained make it evident that the network survivability decreases when the number of selfish nodes increases in an ad hoc scenario.
在移动自组织网络中,数据的可靠传播需要该环境中节点之间的高度连接。自私节点的存在会严重影响网络的连通性。然而,自私节点对网络连通性的影响已经通过基于过去历史计算的声誉因子或基于节点过去和现在行为操纵的条件概率来研究。因此,需要制定一种数学模型,使其未来的路由决策仅基于节点的当前上下文。本文提出了一种基于半马尔可夫的数学模型,该模型可以指数地隔离自利节点。特别地,我们借助转移概率矩阵对网络弹性进行了随机分析。通过定量分析,验证了所提网络生存能力模型的有效性。由此得到的数值结果表明,当自利节点数量增加时,网络的生存性明显降低。
{"title":"Semi - Markov based node behavior model for isolating selfish neighbors in MANETs","authors":"J. Sengathir, R. Manoharan, R. Raja Kumar","doi":"10.1109/ICRTIT.2014.6996155","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996155","url":null,"abstract":"Reliable dissemination of data in mobile ad hoc network necessitates high degree of connectivity among the nodes present in that environment. The existence of selfish nodes could drastically affect the network connectivity. However, the impact of selfish nodes on network connectivity has been studied either through reputation factor computed based on past history or conditional probability manipulated based on both the past and present behavior of nodes. Hence, a need arises for formulating a mathematical model that makes its future routing decision only based on the present context of the node. In this paper, we propose a Semi-Markov based mathematical model, which isolates selfish nodes exponentially. In particular, we stochastically analyze the network resilience with the aid of transition probability matrix. The effectiveness of the proposed model for network survivability has been verified through quantitative analysis. The numerical results, thus obtained make it evident that the network survivability decreases when the number of selfish nodes increases in an ad hoc scenario.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121600073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EmoMeter: Measuring mixed emotions using weighted combinational model 情绪测量:使用加权组合模型测量混合情绪
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996192
S. Kanagaraj, A. Shahina, M. Devosh, N. Kamalakannan
Emotion Recognition is an important area of affective computing and has potential applications. This paper proposes a combinational model to compute the percentage of different emotions jointly present in a given speech input. This model is a weighted combination of the classifier models like Neural Network, k-Nearest Neighbors, Gaussian Mixture Model, Naïve Bayesian Classifier and Support Vector Machines is proposed. The results of classification from the individual models are reported and compared with the proposed combinational model. It shows that the best performance is achieved using the proposed combination than the individual models.
情感识别是情感计算的一个重要领域,具有潜在的应用前景。本文提出了一种组合模型来计算不同情绪在给定语音输入中共同出现的百分比。该模型是神经网络、k近邻、高斯混合模型、Naïve贝叶斯分类器和支持向量机等分类器模型的加权组合。报告了单个模型的分类结果,并与所提出的组合模型进行了比较。结果表明,与单个模型相比,使用所提出的组合模型可以获得最佳的性能。
{"title":"EmoMeter: Measuring mixed emotions using weighted combinational model","authors":"S. Kanagaraj, A. Shahina, M. Devosh, N. Kamalakannan","doi":"10.1109/ICRTIT.2014.6996192","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996192","url":null,"abstract":"Emotion Recognition is an important area of affective computing and has potential applications. This paper proposes a combinational model to compute the percentage of different emotions jointly present in a given speech input. This model is a weighted combination of the classifier models like Neural Network, k-Nearest Neighbors, Gaussian Mixture Model, Naïve Bayesian Classifier and Support Vector Machines is proposed. The results of classification from the individual models are reported and compared with the proposed combinational model. It shows that the best performance is achieved using the proposed combination than the individual models.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129536680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Peak: Power efficiency analysis for key distribution in Wireless Sensor Network 峰值:无线传感器网络中密钥分配的功率效率分析
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996202
M. Raghini, N. Maheswari, R. Venkatesh
Secure Distributed Wireless Sensor Network (DWSN) is empowered by using an efficient key management technique. Battery powered sensor nodes faces precarious aspects during key distribution in order to reduce the energy consumption for the components of sensor nodes. Thus, implementing a key distribution algorithm should possess minimum power consumption. The proposed work steps towards greater heights by integrating power module with pairwise key establishment using group configuration methodology. We present an investigation of power consumption using STEM (Sparse Topology and Energy Management) protocol on sensor nodes (SNs) during the pairwise key establishment using graphical tools. Further memory utilization is reduced due to less number of keys generated from group configuration methodology. Analytical results of this PEAK (Power Efficiency Analysis for Key Distribution) show that energy efficiency is increased with sensor nodes while establishing pairwise key using group configuration when compared to existing key predistribution techniques.
安全分布式无线传感器网络(DWSN)通过使用有效的密钥管理技术来实现。电池供电的传感器节点在密钥分配过程中面临着不稳定的问题,以降低传感器节点组件的能耗。因此,实现密钥分发算法应该具有最小的功耗。所建议的工作步骤是通过使用组配置方法将功率模块与成对密钥建立集成到更高的高度。在使用图形工具建立成对密钥期间,我们使用STEM(稀疏拓扑和能量管理)协议对传感器节点(SNs)的功耗进行了调查。由于组配置方法生成的键数量较少,因此进一步降低了内存利用率。该PEAK(密钥分发的功率效率分析)的分析结果表明,与现有的密钥预分发技术相比,在使用组配置建立成对密钥时,传感器节点的能源效率有所提高。
{"title":"Peak: Power efficiency analysis for key distribution in Wireless Sensor Network","authors":"M. Raghini, N. Maheswari, R. Venkatesh","doi":"10.1109/ICRTIT.2014.6996202","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996202","url":null,"abstract":"Secure Distributed Wireless Sensor Network (DWSN) is empowered by using an efficient key management technique. Battery powered sensor nodes faces precarious aspects during key distribution in order to reduce the energy consumption for the components of sensor nodes. Thus, implementing a key distribution algorithm should possess minimum power consumption. The proposed work steps towards greater heights by integrating power module with pairwise key establishment using group configuration methodology. We present an investigation of power consumption using STEM (Sparse Topology and Energy Management) protocol on sensor nodes (SNs) during the pairwise key establishment using graphical tools. Further memory utilization is reduced due to less number of keys generated from group configuration methodology. Analytical results of this PEAK (Power Efficiency Analysis for Key Distribution) show that energy efficiency is increased with sensor nodes while establishing pairwise key using group configuration when compared to existing key predistribution techniques.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133306650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic secure storage system in cloud services 云服务中的动态安全存储系统
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996175
G. J. Rathanam, M. Sumalatha
Nowadays storage systems are now exposed to wide numbers of threat while handling the information in cloud service. Therefore we design a secured storage system for ensuring security and dynamic operation in the environment. The data is stored in the server using dynamic data operation with partitioning method. Improved Adaptive Huffman Technique and Improved RSA Double Encryption Technique also used which enables the user to access process in a secure manner and efficient way. The system does a verification to prevent the loss of data and ensures security with storage integrity method. An efficient distributed storage auditing mechanism is implemented to overcome the limitations in handling the data loss. Security in this service enforces error localization and easy detection of misbehaving server. In nature the data are dynamic in cloud service; hence this process aims to store the data with reduced computational cost, space and time consumption.
如今,存储系统在处理云服务中的信息时面临着各种各样的威胁。因此,我们设计了一个安全的存储系统,以确保在环境中的安全性和动态运行。使用动态数据操作和分区方法将数据存储在服务器中。采用改进的自适应霍夫曼技术和改进的RSA双重加密技术,使用户能够安全、高效地访问进程。系统对数据进行验证,防止数据丢失,并采用存储完整性方法保证安全性。实现了高效的分布式存储审计机制,克服了数据丢失处理的局限性。此服务中的安全性强制错误定位并易于检测行为不端的服务器。从本质上讲,云服务中的数据是动态的;因此,该过程旨在以减少计算成本、空间和时间消耗来存储数据。
{"title":"Dynamic secure storage system in cloud services","authors":"G. J. Rathanam, M. Sumalatha","doi":"10.1109/ICRTIT.2014.6996175","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996175","url":null,"abstract":"Nowadays storage systems are now exposed to wide numbers of threat while handling the information in cloud service. Therefore we design a secured storage system for ensuring security and dynamic operation in the environment. The data is stored in the server using dynamic data operation with partitioning method. Improved Adaptive Huffman Technique and Improved RSA Double Encryption Technique also used which enables the user to access process in a secure manner and efficient way. The system does a verification to prevent the loss of data and ensures security with storage integrity method. An efficient distributed storage auditing mechanism is implemented to overcome the limitations in handling the data loss. Security in this service enforces error localization and easy detection of misbehaving server. In nature the data are dynamic in cloud service; hence this process aims to store the data with reduced computational cost, space and time consumption.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132204587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Graph based resource recommender system 基于图的资源推荐系统
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996187
P. Pabitha, G. Amirthavalli, C. Vasuki, J. Mridhula
As technology improves day by day communication and browsing has become very much easier. However lots of information floods over the internet every moment thereby confusing the user as to select what or make decisions. To assist the user in identifying their interests and provide suggestions, recommendation systems came into existence. These systems filter the necessary content from large volumes of data to predict resources to the user. Common techniques used to implement recommender systems are content based approach or collaborative approach. However there are few limitations like data not being available for new users, ratings very sparse for resources. A graph based recommender system is proposed that makes useful recommendations by exploiting the significant content available. Clustering technique is used to identify the neighbourhood of the current user so that relevant resources are suggested. A weight based approach is used to calculate the ratings for the resources. This method is adopted to make the system less prone to data sparsity problem. This system is a web based client side application which makes recommendations by constructing user-resource graph and ranking the resources by a new method designed similar to that of search algorithms.
随着技术的日益进步,交流和浏览变得非常容易。然而,互联网上每时每刻都充斥着大量的信息,因此用户在选择什么或做出决定时感到困惑。为了帮助用户确定自己的兴趣并提供建议,推荐系统应运而生。这些系统从大量数据中过滤必要的内容,为用户预测资源。用于实现推荐系统的常用技术是基于内容的方法或协作方法。然而,也存在一些限制,比如新用户无法获得数据,资源评级非常稀疏。提出了一种基于图的推荐系统,该系统利用可用的重要内容进行有用的推荐。利用聚类技术识别当前用户的邻域,从而推荐相关资源。使用基于权重的方法来计算资源的评级。采用这种方法使系统不容易出现数据稀疏性问题。该系统是一个基于web的客户端应用程序,通过构建用户资源图进行推荐,并采用类似于搜索算法的新方法对资源进行排序。
{"title":"Graph based resource recommender system","authors":"P. Pabitha, G. Amirthavalli, C. Vasuki, J. Mridhula","doi":"10.1109/ICRTIT.2014.6996187","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996187","url":null,"abstract":"As technology improves day by day communication and browsing has become very much easier. However lots of information floods over the internet every moment thereby confusing the user as to select what or make decisions. To assist the user in identifying their interests and provide suggestions, recommendation systems came into existence. These systems filter the necessary content from large volumes of data to predict resources to the user. Common techniques used to implement recommender systems are content based approach or collaborative approach. However there are few limitations like data not being available for new users, ratings very sparse for resources. A graph based recommender system is proposed that makes useful recommendations by exploiting the significant content available. Clustering technique is used to identify the neighbourhood of the current user so that relevant resources are suggested. A weight based approach is used to calculate the ratings for the resources. This method is adopted to make the system less prone to data sparsity problem. This system is a web based client side application which makes recommendations by constructing user-resource graph and ranking the resources by a new method designed similar to that of search algorithms.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125738541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flow and rank correlation based detection against Distributed Reflection Denial of Service attack 基于流量和等级相关性的分布式反射拒绝服务攻击检测
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996117
P. Revathi
Denial of service attack in computing involves blocking of resources to particular user. This kind of blocking may be temporary or indefinite blocking to access web server in the network. This attack is usually done by a victim web server. Distributed denial of service attacks is given by more than two web servers. The flood of incoming network flows to the victim web server forces it to shut down. Although the attack's individual internet packets may be completely not dangerous and flood of such type of packets can overwhelm the victim server's internet connection or other packet-processing resources in the network. The result is that valid traffic, unable to compete with malicious flood, has little chance for obtaining useful service to legitimate users. This paper mainly concentrates on flow and rank correlation based algorithm (FRCD). With rank correlation we can check if there is any attack in the network or not. And having this as the base we could calculate flow correlation to check if this attack is legitimate or not. The proposed system is highly efficient and is a protocol independent method. The computational cost involved does not affect the network's throughput thereby increasing the possibilities of Distributed Reflection Denial of Service attack detection.
计算领域的拒绝服务攻击涉及到对特定用户的资源阻塞。这种屏蔽可以是对网络中访问web服务器的临时屏蔽或无限期屏蔽。这种攻击通常是由受害的web服务器完成的。分布式拒绝服务攻击是由两个以上的web服务器提供的。涌入受害web服务器的大量网络流迫使其关闭。虽然攻击的单个互联网数据包可能完全没有危险,但这种类型的数据包的洪水可以压倒受害者服务器的互联网连接或网络中的其他数据包处理资源。其结果是,有效流量无法与恶意流量竞争,几乎没有机会为合法用户提供有用的服务。本文主要研究基于流量和等级相关的算法(FRCD)。通过秩相关,我们可以检查网络中是否存在攻击。有了这个作为基础,我们可以计算流量相关性来检查这个攻击是否合法。该系统效率高,是一种协议无关的方法。所涉及的计算成本不会影响网络的吞吐量,从而增加了分布式反射拒绝服务攻击检测的可能性。
{"title":"Flow and rank correlation based detection against Distributed Reflection Denial of Service attack","authors":"P. Revathi","doi":"10.1109/ICRTIT.2014.6996117","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996117","url":null,"abstract":"Denial of service attack in computing involves blocking of resources to particular user. This kind of blocking may be temporary or indefinite blocking to access web server in the network. This attack is usually done by a victim web server. Distributed denial of service attacks is given by more than two web servers. The flood of incoming network flows to the victim web server forces it to shut down. Although the attack's individual internet packets may be completely not dangerous and flood of such type of packets can overwhelm the victim server's internet connection or other packet-processing resources in the network. The result is that valid traffic, unable to compete with malicious flood, has little chance for obtaining useful service to legitimate users. This paper mainly concentrates on flow and rank correlation based algorithm (FRCD). With rank correlation we can check if there is any attack in the network or not. And having this as the base we could calculate flow correlation to check if this attack is legitimate or not. The proposed system is highly efficient and is a protocol independent method. The computational cost involved does not affect the network's throughput thereby increasing the possibilities of Distributed Reflection Denial of Service attack detection.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124653387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An impact analysis: Real time DDoS attack detection and mitigation using machine learning 影响分析:使用机器学习进行实时DDoS攻击检测和缓解
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996133
B. Kiruthika, Devi, G. Preetha, G. Selvaram, S. Mercy, Shalinie Corresponding
Distributed Denial of service (DDoS) attacks is the most devastating attack which tampers the normal functionality of critical services in internet community. DDoS cyber weapon is highly motivated by several aspects including hactivitism, personal revenge, anti-government force, disgruntled employers/customers, ideological and political cause, cyber espionage and so on. IP spoofing is the powerful technique used by attackers to disrupt the availability of services in the internet network by impersonating as a trusted source. Since the spoofed traffic shares the same resources as that of the legitimate one's detection and filtering becomes very essential. The proposed model consists of online monitoring system (OMS), spoofed traffic detection module and interface based rate limiting (IBRL) algorithm. OMS provides DDoS impact measurements in real time by monitoring the degradation in host and network performance metrics. The spoofed traffic detection module incorporates hop count inspection algorithm (HCF) to check the authenticity of incoming packet by means of source IP address and its corresponding hops to destined victim. HCF coupled with support vector machine (SVM) provides 98.99% accuracy with reduced false positive. Followed with, IBRL algorithm restricts the traffic aggregates at victim router when exceeding system limits in order to provide sufficient bandwidth for remaining flows.
分布式拒绝服务攻击(Distributed Denial of service, DDoS)是网络社区中破坏关键服务正常运行的最具破坏性的攻击。DDoS网络武器的动机主要有行动主义、个人报复、反政府力量、不满雇主/客户、意识形态和政治原因、网络间谍活动等。IP欺骗是一种强大的技术,攻击者通过冒充可信源来破坏internet网络中服务的可用性。由于欺骗流量与合法流量共享相同的资源,因此检测和过滤变得非常重要。该模型由在线监控系统(OMS)、欺骗流量检测模块和基于接口的限速(IBRL)算法组成。OMS通过监控主机和网络性能指标的下降,实时提供DDoS影响测量。欺骗流量检测模块采用HCF (hop count inspection algorithm)算法,通过源IP地址和到达目标对象的跳数来检测报文的真实性。HCF与支持向量机(SVM)相结合,准确率达到98.99%,同时减少了误报。IBRL算法在流量超过系统限制时,对受害路由器上的流量聚合进行限制,为剩余流量提供足够的带宽。
{"title":"An impact analysis: Real time DDoS attack detection and mitigation using machine learning","authors":"B. Kiruthika, Devi, G. Preetha, G. Selvaram, S. Mercy, Shalinie Corresponding","doi":"10.1109/ICRTIT.2014.6996133","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996133","url":null,"abstract":"Distributed Denial of service (DDoS) attacks is the most devastating attack which tampers the normal functionality of critical services in internet community. DDoS cyber weapon is highly motivated by several aspects including hactivitism, personal revenge, anti-government force, disgruntled employers/customers, ideological and political cause, cyber espionage and so on. IP spoofing is the powerful technique used by attackers to disrupt the availability of services in the internet network by impersonating as a trusted source. Since the spoofed traffic shares the same resources as that of the legitimate one's detection and filtering becomes very essential. The proposed model consists of online monitoring system (OMS), spoofed traffic detection module and interface based rate limiting (IBRL) algorithm. OMS provides DDoS impact measurements in real time by monitoring the degradation in host and network performance metrics. The spoofed traffic detection module incorporates hop count inspection algorithm (HCF) to check the authenticity of incoming packet by means of source IP address and its corresponding hops to destined victim. HCF coupled with support vector machine (SVM) provides 98.99% accuracy with reduced false positive. Followed with, IBRL algorithm restricts the traffic aggregates at victim router when exceeding system limits in order to provide sufficient bandwidth for remaining flows.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128792697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Distributing jobs in Delay-Tolerant Networks: Is optimization worth it? 在延迟容忍网络中分配作业:优化是否值得?
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996205
Akhilesh Jain, Prem Nath Suman, Kapil Tawar, Mayank Jain
Delay-Tolerant Networks (DTNs) refer to mobile wireless networks that lack continuous network connectivity among the nodes. To deal with such intermittent characteristics, DTNs use store-carry-and-forward based routing protocols instead of instantaneous end-to-end path transmissions. Many real-life applications of such networks have been identified and some of them pose complex computational challenges. DTN nodes, however, do not necessarily possess high degree of computational power and are also limited by their energy constraints. Distributed computing has the ability to solve computationally complex and lengthy problems by dividing them into many tasks, which are then spread over the network to be solved simultaneously, resulting in faster execution and significantly lower costs. In this paper, we study the prospect of distributed computing techniques in DTNs. We investigate different job distribution algorithms and their performance across multiple DTN scenarios. We simulate a distributed job processing system on top of a DTN for various scenarios and analyze the effect of node density, job slicing, and mobility models on their performance.
容忍延迟网络(Delay-Tolerant network, DTNs)是指节点间缺乏连续网络连接的移动无线网络。为了处理这种间歇性特征,ddn使用基于存储-携带-转发的路由协议,而不是瞬时的端到端路径传输。这种网络的许多实际应用已经确定,其中一些提出了复杂的计算挑战。然而,DTN节点并不一定具有高度的计算能力,而且也受到能量约束的限制。分布式计算能够通过将计算复杂和冗长的问题划分为许多任务来解决这些问题,然后将这些任务分散到网络上同时解决,从而提高执行速度并显著降低成本。本文对分布式计算技术在分布式网络中的应用前景进行了展望。我们研究了不同的作业分配算法及其在多个DTN场景中的性能。我们在DTN上模拟了一个分布式作业处理系统的各种场景,并分析了节点密度、作业切片和迁移模型对其性能的影响。
{"title":"Distributing jobs in Delay-Tolerant Networks: Is optimization worth it?","authors":"Akhilesh Jain, Prem Nath Suman, Kapil Tawar, Mayank Jain","doi":"10.1109/ICRTIT.2014.6996205","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996205","url":null,"abstract":"Delay-Tolerant Networks (DTNs) refer to mobile wireless networks that lack continuous network connectivity among the nodes. To deal with such intermittent characteristics, DTNs use store-carry-and-forward based routing protocols instead of instantaneous end-to-end path transmissions. Many real-life applications of such networks have been identified and some of them pose complex computational challenges. DTN nodes, however, do not necessarily possess high degree of computational power and are also limited by their energy constraints. Distributed computing has the ability to solve computationally complex and lengthy problems by dividing them into many tasks, which are then spread over the network to be solved simultaneously, resulting in faster execution and significantly lower costs. In this paper, we study the prospect of distributed computing techniques in DTNs. We investigate different job distribution algorithms and their performance across multiple DTN scenarios. We simulate a distributed job processing system on top of a DTN for various scenarios and analyze the effect of node density, job slicing, and mobility models on their performance.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"09 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129916931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 International Conference on Recent Trends in Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1