The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Adhoc wireless networks are defined as the category of wireless networks that utilize multihop radio relaying and are capable of operating without the support of any fixed infrastructure and hence they are also called infrastructureless networks. This type of network allows for spontaneous communication without previous planning between mobile devices. A variety of routing protocols for adhoc wireless...
During blackhole attack, a malicious node captures packets and not forwards them in the network and advertises itself as having the shortest path to the node whose packets it wants to intercept. If more than one malicious nodes work together as a group then the damage will be very serious. This type of attack is called cooperative black hole attack. To avoid single blackhole attack in MANET we considered...
CPU scheduling is one of the most important tasks of operating system, which provides a specific sequence of execution for the processes waiting in queue. The scheduling of processes has very much impact on efficiency and performance of CPU. The major objective of this task is to maximize the efficiency and hence the performance. We present a Genetic Algorithm based approach for CPU scheduling. Genetic...
Data sharing between two organizations is common in many application areas like business planning or marketing. When data are to be shared between parties, there could be some sensitive data which should not be disclosed to the other parties. Also medical records are more sensitive so, privacy protection is taken more seriously. As per requirement by the Health Insurance Portability and Accountability...
Database systems are the important assets of the information system infrastructure in most organizations. The databases may contain invaluable sensitive information and unauthorized transaction could cause a lot of harm. In this paper, we proposed a Hybrid Reactive Database Intrusion Detection System that detects known as well as new database intrusions. We used an improved Apriori algorithm for mining...
Phishing is the combination of social engineering and technical exploits designed to convince a victim to provide personal information, usually for the monetary gain of the attacker. Phishing emails contains messages to lure victims into performing certain actions, such as clicking on a URL where a phishing website is hosted, or executing a malware code. Phishing has become the most popular practice...
The internet revolution has brought about a new way of expressing an individual's opinion. It has become a medium through which people openly express their views on various subjects. These opinions contain useful information which can be utilized in many sectors which require constant customer feedback. Analysis of the opinion and it's classification into different sentiment classes is gradually emerging...
A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and...
Recommender systems are widely used for making personalized recommendations for products or services during a live interaction nowadays. Collaborative filtering is the most successful and commonly used personalized recommendation technology. The open nature of collaborative recommender systems provides an opportunity for malicious users to access the systems with multiple fictitious identities and...
The Distributed Denial of service attack is the most threatening attack to the current internet security. DDOS can be attempted by many different techniques but flooding is the easiest way of attempting it. In this paper we have proposed the dynamic bandwidth control framework which detects and defend DDOS attack very quickly and efficiently by using rate limiting mechanism. The proposed defense system...
Border Gateway Protocol (BGP 4) has emerged as the de facto inter-domain routing protocol used for making the core routing decisions on the Internet. However, it is not a secured protocol and suffers from serious security flaws such as no Origin AS Prefix verification and no AS Path verification. These two flaws in the BGP protocol can result in the attacks such as Prefix Hijacking and AS_PATH Forgery...
The distributed denial of service attack is a major threat to current internet security. One of the most threatening type is flooding based DDoS attack. In this paper we have proposed a defense mechanism for flooding based DDoS attack based on the concept of rate limiting the attack traffic The propose defense framework consist of three major components, detection, IP traceback and bandwidth control...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.