SlideShare a Scribd company logo
INFORMATION TECHNOLOGY
Current Trends in
(CTIT)
ISSN 2249-4707 (Online)
ISSN 2348-7895 (Print)
September–December 2016
SJIF: 3.577
www.stmjournals.com
STM JOURNALS
Scientific Technical Medical
STM Journals, a strong initiative by Consortium E-Learning Network Private Ltd. (established 2006), was
launched in the year 2010 under the support and guidance by our esteemed Editorial and Advisory Board
Membersfromrenownedinstitutes.
Objectives:
 Promotion of Scientific, Technical and Medical research.
 Publication of Original Research/Review, Short Articles and Case Studies through
Peer Review process.
 Publishing Special Issues on Conferences.
 Preparing online platform for print journals.
 Empowering the libraries with online and print Journals in Scientific, Technical
and Medical domains.
 Publishing and distribution of books on various subjects in the category of Nanotechnology,
Scientific and Technical Writing, and Environment, Health and Safety.
SalientFeatures:
 A bouquet of 100+ Journals that fall under Science, Technical and Medical domains.
 Employs Open Journals System (OJS)—a journal management and publishing system.
 The first and one of the fastest growing publication website in India as well as in abroad
for its quality and coverage.
 Rapid online submission and publication of papers, soon after their formal
acceptance/finalization.
 Facilitates linking with the other authors or professionals.
 Worldwide circulation and visibility.
Current Trends in Information Technology
ISSN: 2249-4707(online), ISSN: 2348-7895(print)
Focus andScopeCovers
 ComputerNetworks
 InformationDatabases
 DataManagement
 Networking
 ProgrammingLanguages
 TechnologyDevelopments
 Intelligentorganisation
Current Trends in Information Technology is published (frequency: three times a year) in India by STM Journals
(division of Consortium e-Learning Network Private Ltd. Pvt.) The views expressed in the articles do not necessarily
reflect of the Publisher. The publisher does not endorse the quality or value of the advertised/sponsored products
described therein. Please consult full prescribing information before issuing a prescription for any products mentioned in
thispublication.
No part of this publication may be reproduced, stored in retrieval system or transmitted in any from without written
permissionof thepublisher.
To cite any of the material contained in this Journal, in English or translation, please use the full English reference at the
beginningof eacharticle.Toreuseanyofthematerial,pleasecontactSTM Journals (info@stmjournals.com)
STM Journals
STM Journals (division of Consortium e-Learning Network Private Ltd. ) having its Marketing office located at Office
No. 4, First Floor, CSC pocket E Market, Mayur Vihar Phase II, New Delhi-110091, India is the Publisher of Journal.
Statements and opinions expressed in the Journal reflect the views of the author(s) and are not the opinion of STM
Journals unless so stated.
Subscription Information and Order:
 NationalSubscription:
Print- Rs 3750/-perJournal( includes3printissues), SingleIssue copypurchase:Rs 1500.
Online - Rs 3750/- per Journal inclusive Service Tax ( includes 3 online issues), Single Issue purchase: Rs 1500
inclusiveServiceTax
Print+Online-Rs 5000/-perJournalinclusiveServiceTax( includes3print&onlineissues).
 International Subscription:
 Online Only- $199, Print Only-$299 (includes 3 print issues)
 Online + Print-$399 (includes 3 print issues + online access of published back volumes )
To purchase print compilation of back issues please send your query at info@stmjournals.com
Subscription must be prepaid. Rates outside of India includes delivery. Prices subject to change without notice.
Mode of Payment: At par cheque, Demand draft, and RTGS (payment to be made in favor of
Consortium E-Learning Network. Pvt. ltd., payable at Delhi/New Delhi.
Online Access Policy
A). For Authors:
In order to provide maximum citation and wide publicity to the authors work, STM Journals also have Open Access
Policy, authors who would like to get their work open access can opt for Optional Open Access publication at
nominal cost as follows
India, SARC and African Countries: INR 2500 or 100 USD including single hard copy of Author's Journal.
Other Countries: USD 200 including single hard copy of Author's Journal.
B). For Subscribers:
 Online access will be activated within 72 hours of receipt of the payment (working days), subject to receipt of
correct information on user details/Static IP address of the subscriber.
 The access will be blocked:
 If the user requests for the same and furnishes valid reasons for blocking.
 Due to technical issue.
 Misuse of the access rights as per the access policy.
Advertising and Commercial Reprint Inquiries: STM Journals with wide circulation and visibility offer an excellent
media for showcasing/promotion of your products/services and the events-namely, Conferences, Symposia/Seminars
etc. These journals have very high potential to deliver the message across the targeted audience regularly with each
published issue. The advertisements on bulk subscriptions, gift subscriptions or reprint purchases for distribution etc. are
alsoverywelcome.
Lost Issue Claims: Please note the following when applying for lost or missing issues:
 Claims for print copies lost will be honored only after 45 days of the dispatch date and before publication of the
next issue as per the frequency.
 Tracking id for the speed post will be provided to all our subscribers and the claims for the missing Journals will
be entertained only with the proofs which will be verified at both the ends.
 Claims filed due to insufficient (or no notice) of change of address will not be honored.
 Change of Address of Dispatch should be intimated to STM Journals at least 2 months prior to the dispatch
schedule as per the frequency by mentioning subscriber id and the subscription id.
 Refund requests will not be entertained.
Legal Disputes
All the legal disputes are subjected to Delhi Jurisdiction only. If you have any questions, please contact the Publication
Management Team: info@stmjournals.com; Tel : +91 0120-4781211.
Gargi Asha Jha
Manager (Publications)
PUBLICATION MANAGEMENT TEAM
Internal Members
External Members
Bimlesh Lochab
Assistant Professor
Department of Chemistry
School of Natural Sciences, Shiv Nadar University
Gautam Buddha Nagar, Uttar Pradesh, India
Dr. Rajiv Prakash
Professor and Coordinator
School of Materials Science and Technology
Indian Institute of Technology (BHU), Varanasi
Uttar Pradesh, India
Dr. Rakesh Kumar
Assistant Professor
Department of Applied Chemistry
BIT Mesra, Patna,
Bihar, India
Prof. S. Ramaprabhu
Alternative Energy and Nanotechnology Technology
Laboratory, Department of Physics
Indian Institute of Technology, Chennai
Tamil Nadu, India
Himani Pandey
Isha Chandra
Senior Associate Editors
Dr. Yog Raj Sood
Dean (Planning and Development)
Professor, Department of Electrical Engineering
National Institute of Technology, Hamirpur
Himachal Pradesh, India
Prof. Chris Cannings
Professor, School of Mathematics and Statistics
University of Sheffield,
Sheffield
United Kingdom
Dr. D. K. Vijaykumar
MS, MCh (Surgical Oncology), Professor and
Head Department of Surgical Oncology
Amrita Institute of Medical Sciences and Research Centre
Ponekkara, Cochin, Kerala, India
Dr. Durgadas Naik
Associate Professor (Microbiology)
Management and Science University,
University Drive, Seksyen13
Selangor, Malaysia
Prof. José María Luna Ariza
Department of Computer Sciences and
Numerical Analysis
Campus of Rabanales
University of Córdoba, Spain
Dr. Khaiser Nikam
Professor, Library and Information Science
Department of Library and Information Science
University of Mysore
Mysore, India
Quaisher J Hossain
Senior Editor
Group Managing Editor
Dr. Archana Mehrotra
Managing Director
CELNET, Delhi, India
Meenakshi Tripathi
Shivani Sharma
Chairman
Mr. Puneet Mehrotra
Director
Shambhavi Mishra
Associate Editors
Sugandha Mishra
Prof. Priyavrat Thareja
Director Principal
Rayat Institute of Engineering and
Information Technology
Punjab, India
Dr. Baldev Raj
Director, National Institute of Advanced Studies
Indian Institute of Science campus Bangalore
Karnataka, India
Former Director
Indira Gandhi Centre for Atomic Research,
Kalpakkam, Tamil Nadu, India
Dr. Pankaj Poddar
Senior Scientist
Physical and Materials Chemistry Division,
National Chemical Laboratory
Pune, Maharastra India
Prof. D. N. Rao
Professor and Head
Department of Biochemistry
All India Institute of Medical Sciences
New Delhi, India
Dr. Nandini Chatterjee Singh
Additional Professor
National Brain Research Centre
Manesar, Gurgaon
Haryana, India
Dr. Ashish Runthala
Lecturer, Biological Sciences Group
Birla Institute of Technology and Science
Pilani, Rajasthan,
India
Dr. Bankim Chandra Ray
Professor and Ex-Head of the Department
Department of Metallurgical and
Materials Engineering
National Institute of Technology, Rourkela
Odisha, India
Prof. Yuwaraj Marotrao Ghugal
Professor and Head
Department of Applied Mechanics
Government College of Engineering
Vidyanagar, Karad
Maharashtra, India
Dr. Hardev Singh Virk
Visiting Professor, Department of Physics
University of SGGS World University
Fatehgarh Sahib, Punjab,
India
Former Director Research
DAV Institute of Engineering and Technology
Jallandhar, India
Dr. Shrikant Balkisan Dhoot
Senior Research Scientist, Reliance
Industries Limited, Mumbai, India
Former Head (Research and Development)
Nurture Earth R&D Pvt Ltd., MIT Campus
Beed Bypass Road, Aurangabad
Maharashtra, India
STM JOURNALS
ADVISORY BOARD
Dr. Rakesh Kumar
Assistant Professor
Department of Applied Chemistry
Birla Institute of Technology
Patna, Bihar, India
Prof. Subash Chandra Mishra
Professor
Department of Metallurgical and
Materials Engineering
National Institute of Technology, Rourkela
Odisha, India
Dr. Shankargouda Patil
Assistant Professor
Department of Oral Pathology
KLE Society's Institute of Dental Sciences
Bangalore, Karnataka, India
Prof. Sundara Ramaprabhu
Professor
Department of Physics
Indian Institute of Technology Madras
Chennai, Tamil Nadu
India
Dr. Baskar Kaliyamoorthy
Associate Professor
Department of Civil Engineering
National Institute of Technology, Trichy
Tiruchirappalli, Tamil Nadu, India
STM JOURNALS
ADVISORY BOARD
Dr. N. Rakesh
Asst.Prof (Senior Grade) Dept. of
Computer Science & Engineering
Research laboratory Amrita
Vishwa VidyaPeetham Bangalore, India.
Dr. B. M. Sagar
Associate Professor, Information
Science Department, R.V. College of
Engineering, Bangalore, India.
Dr. R.Devi Priya
Assistant Professor,
Kongu Engineering College, India.
Dr. R. Vinob Chander
Assistant Professor, Department of
Information Technology, SSN College of
Engineering Kalavakkam, Chennai, India.
Dr. S. Anandamurugan
Assistant Professor (Selection Grade),
Department of Information Technology,
Kongu Engineering College,
Perundurai, India.
Dr. Munir ahamed Rabbani
Prof. Department of Computer Science,
College of Computer, Qassim University,
Saudi Arabia.
Dr. Himansu Sekhar Behera
Assistant Professor ,Department
Computer Science and Engineering,
Veer Surendra Sai University of
Technology (VSSUT) India.
Editorial Board
Dr. S.Natarajan
Professor, PES Institute of Technology
Global Academy of Technology, India.
Dr. Katta sugamya
Associate Professor, Dept. of IT,
CBIT, India.
Dr. Ravi Prakash Reddy
Professor & HOD, G.Narayanamma
Institute of Technology & Science
(for women) Shaikpet, Hyderabad, India.
Dr. M. Senthamil Selvi
Professor & Head in the Information
Technology Department, Sri Ramakrishna
Engineering College at the University of
Anna University, Chennai, India.
Dr. Sivaraj Rajappan
Professor, Department of Computer
Science, Velalar College of Engineering
and Technology, the Anna University,
India.
It is my privilege to present the print version of the [Volume 6 Issue 3] of our Current Trends in
Information Technology, 2016. The intension of CTIT is to create an atmosphere that stimulates
vision,researchandgrowth intheareaofInformationTechnology.
Timely publication, honest communication, comprehensive editing and trust with authors and
readers have been the hallmark of our journals. STM Journals provide a platform for scholarly
research articles to be published in journals of international standards. STM journals strive to publish
qualitypaperinrecordtime,makingitaleaderinserviceandbusiness offerings.
The aim and scope of STM Journals is to provide an academic medium and an important reference
for the advancement and dissemination of research results that support high level learning, teaching
andresearchinalltheScientific,TechnicalandMedicaldomains.
Finally, I express my sincere gratitude to our Editorial/ Reviewer board, Authors and publication
team for their continued support and invaluable contributions and suggestions in the form of
authoring writeups/reviewing and providing constructive comments for the advancement of the
journals.With regards to their due continuous support and co-operation, we have been able to publish
qualityResearch/Reviewsfindingsforourcustomersbase.
Ihopeyou willenjoyreadingthisissue andwewelcomeyour feedbackon anyaspectoftheJournal.
Dr.ArchanaMehrotra
ManagingDirector
STM Journals
Director's Desk
STM JOURNALS
1. Hadoop and Map Reduce for Simplified Processing of Big Data
Shobha Rani 1
2. Big Data to Big Data Mining: Issues, Challenges and Data Analytics Solutions
Neeraj Kumar, Madhulika Pandey, Krishan Kumar 7
3. Group Management for Secure and Dynamic Sharing of Data in Cloud Computing
Raju Dara, Bhongir Sony 16
4. Public Auditing Based Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
Raju Dara, Srikanth Ravula 24
5. Double Guard: Detection Intrusion in Multitier Application
S.D. Jadhav, S.R. Nallewar, N.V. Burande, G.V. Bawaskar, R.D. Shilpakar 32
6. Protected Data Compilation in WSN Using Random Routing Algorithms
Raju Dara, Jellela Satish Reddy 43
Contents
CTIT(2016) 1-6 © STM Journals 2016. All Rights Reserved Page 1
Current Trends in Information Technology
ISSN: 2249-4707(online), ISSN: 2348-7895(print)
Volume 6, Issue 3
www.stmjournals.com
Hadoop and Map Reduce for Simplified Processing of
Big Data
Shobha Rani*
Department of Computer Science, Akarapu Sharath Chandrika Devi Memorial College for Women,
Warangal, Telangana, India
Abstract
Big data refers to large and complex data sets made up of a variety of structured and
unstructured data, which are too big, too fast, or too hard to be managed by traditional
techniques. Hadoop is an open source software platform for structuring big data on computer
clusters built from commodity hardware and enabling it for data analysis. It is designed to
scale up from a single server to thousands of machines, with a very high degree of fault
tolerance. MapReduce is a programming model for processing large data sets with parallel
distributed algorithm on cluster. This paper presents the survey of simplified big data
processing with Hadoop architecture and MapReduce framework.
Keywords: Big data, Hadoop, MapReduce, HDFS, Big data Analytics
INTRODUCTION
Currently, enormous amounts of data are
created every day. With the rapid expansion of
data, we are moving from the terabyte to the
petabyte Age. At the same time, new
technologies make it possible to organize and
utilize the massive amounts of data currently
being generated. However, this trend creates a
great demand for new data storage and analysis
methods [1, 2]. Especially, theoretical and
practical aspects of extracting knowledge from
massive data sets have become quite important.
The term “Big Data” has recently been applied
to datasets that grow so large and become
unsuitable to work with the traditional database
management systems. They are data sets whose
size is beyond the ability of commonly used
software tools and storage systems to capture,
store, manage, as well as process data within a
tolerable elapsed time [3]. Big data sizes are
constantly increasing, currently ranging from
terabytes to petabytes of data in a single data
set. Consequently, some of the problems related
to big data include data capture, store,
searching, sharing, analysis and visualization.
Today enterprises are exploring large volumes
of highly detailed data so as to discover facts
they did not know before [4].
 Ambiguity—a lack of metadata creates
ambiguity in big data that leads to
inconsistency (Figure 1).
 Viscosity—measure of data flow over the
network.
CTIT(2016) 7-15 © STM Journals 2016. All Rights Reserved Page 7
Current Trends in Information Technology
ISSN: 2249-4707(online), ISSN: 2348-7895(print)
Volume 6, Issue 3
www.stmjournals.com
Big Data to Big Data Mining: Issues, Challenges and Data
Analytics Solutions
Neeraj Kumar, Madhulika Pandey*, Krishan Kumar
Department of Computer Science, JIMS Engineering Management Technical Campus, Greater Noida,
Uttar Pradesh, India
Abstract
Data has evolved at a great pace due to increasing interest of people and valuable
contribution towards the emerging technologies. Emerging technologies are successful in
generating huge quantity of data from various sources which in return provides Big Data. Big
Data constitutes large amount of data in terms of texts, statistics, facts, figures, and records,
etc., generated from heterogeneous environment. Big Data needs special attention for storage,
managing, transportation and processing of data. It includes amassing of data in terms of
3V’s, i.e. volume, variety and velocity. Issues and challenges of Big Data are real time
obstacles and needs instant consideration. This paper presents the overview of Big Data along
with its issues and challenges. Applications of data mining in Big Data along with some of its
open sources are also discussed in the paper.
Keywords: Big Data, big data analytics, big data mining, Massive Online Analysis, R,
GraphLab, Pegasus, Mahout
INTRODUCTION
In the pre-digital revolution world of the late
1980s, most of the data was stored on
videotapes such as VHS cassettes, Vinyl LP
records, audio cassette tapes, and photography
accounted for significant portions as well.
Paper based storage represented 33% of all the
data storage on its own in 1986. 25 % of all
the data stored in the world in 2000 was stored
digitally. 2002 was the first year in which
digital storage capacity overtook analog
capacity. The digital storage grew annually by
23% between 1986 and 2007 with 94 % of all
the data was stored in digital format by 2007
[1]. Now, we are successful in generating and
collecting data from numerous sources.
The data volumes are exploding. Today, more
than 2.5 exabytes (2.5 billion gigabytes) of
data is generated every single day. This is
expected to continue growing at a significant
rate with mobile devices accounting for much
of this data. Every second we create new data.
For example, we perform 40,000 search
queries every second (on Google alone), which
makes it 3.5 searches per day and 1.2 trillion
searches per year. Facebook users send on
average 31.25 million messages and view 2.77
million videos every minute [2]. Applications
of internet, such as E-commerce, social
networking sites, etc., are speeding up the data
generation process, this type of data generated
and gathered in huge volume is ‘Big Data’.
Big Data is making its valuable place in global
economy as it is turning into driving force for
economy. As data is increasing day by day, so
with the increase of size of data it is difficult
to manage such huge volume with the current
technology. Data is collected from various
sources because of which it is heterogeneous
in nature and may be deficient as well. There
is a need to store, manage and process the data
with innovative technology that can handle
and make use of data and transform it into
meaningful data, i.e. information.
This information from data is analyzed using
new techniques for generating valuable
outcomes useful for organizations and
businesses (Figure 1). This holds importance in
knowledge discovery and decision support
system. The data management of Big Data is
beyond the capability of classic database or
computer system. Big Data Analytics are the
one who generates valuable outcomes from
CTIT (2016) 16-23 © STM Journals 2016. All Rights Reserved Page 16
Current Trends in Information Technology
ISSN: 2249-4707(online), ISSN: 2348-7895(print)
Volume 6, Issue 3
www.stmjournals.com
Group Management for Secure and Dynamic Sharing of
Data in Cloud Computing
Raju Dara, Bhongir Sony*
Department of Computer Science Engineering, Krishna Murthy Institute of Technology and
Engineering, Jawaharlal Nehru Technological University, Hyderabad, Telangana, India
Abstract
Cloud computing has emerged as new model of computing which allows outsourcing data.
The phenomenon of outsourcing data to cloud became obvious as cloud has infrastructure as
a service (IaaS) layer for it. With this feature of cloud, there is growing trend in outsourcing
data to cloud. When an enterprise outsources its data to cloud, it needs to take care of its
functionalities in terms of data sharing across its users. The company creates groups and
manages group members in order to have secure and dynamic data sharing. Group manager
is responsible to determine data to be shared and privileges of group members. Group
management is very dynamic thing where new users may be added and existing members may
be removed from group. The users who are not associated with the group may involve in
collusion attack. The existing systems focus on group management and data sharing. In this
paper, we built a mechanism for revoking a user and disable all credentials given to him. We
built a prototype application that demonstrates the proof of concept. The empirical results
revealed that the proposed scheme is effective.
Keywords: Cloud computing, outsourcing, group management, secure data sharing, user
revocation
INTRODUCTION
Cloud computing became a reality. This is in
fact the latest technology that enables the
world to have a shared pool of resources and
access the resources through internet. This
phenomenon works for users without making
capital investment. The users of cloud can gain
access to resources and pay as they use. This is
very useful to computing community as the
cloud resources are made available to all
without restrictions. As the data is growing
exponentially, the enterprises prefer
outsourcing data to cloud for reducing
expenses and ease of management. However,
the cloud is treated as untrusted environment.
That is the reason there is security concern
while outsourcing data to cloud. Cloud can
also be used to store and share data to other
users. Cloud services are shown in Figure 1.
In this context, the data may be associated
with different groups in the cloud assuming
that an enterprise has multiple groups of
people working on different projects. In this
case, data is associated with groups. The data
of one group is not accessible to other group.
There is group manager who is responsible to
manage data and group members. Group
members may be added or removed as
required. The group manager is responsible to
handle security issues also. Group manager
can grant or remake privileges to group
members. The problem with such system is
that when users are removed from the group,
their access credentials are misused by people
to make collusion attacks. In this paper, we
proposed a user revocation scheme that takes
care of perfect user revocation process. With
user revocation, it is possible that the old
credentials cannot be misused and thus the
collusion attack is prevented. In this paper, our
contribution is to have a secure and dynamic
scheme for data sharing in cloud and it is
equipped with user revocation scheme for
complete security. The remainder of the paper
is structured as follows: next part of the paper
provides review of literature. After that, the
proposed system is presented in detail,
followed by experimental results and the
conclusion.
CTIT(2016) 24-31 © STM Journals 2016. All Rights Reserved Page 24
Current Trends in Information Technology
ISSN: 2249-4707(online), ISSN: 2348-7895(print)
Volume 6, Issue 3
www.stmjournals.com
Public Auditing Based Detection of Packet Dropping
Attacks in Wireless Ad Hoc Networks
Raju Dara, Srikanth Ravula*
Department of Computer Science Engineering, Krishna Murthy Institute of Technology and
Engineering, Jawaharlal Nehru Technological University, Hyderabad, Telangana, India
Abstract
Wireless ad hoc networks are vulnerable to packet dropping attacks. However, they are also
subjected to packet dropping due to link errors. In case of multi-hop wireless networks, it is
essential to differentiate packet dropping due to link error or malicious attack. When any
mechanism is able to differentiate this, can provide high level of security to the network with
respect to packet dropping attacks. Many solutions came into existence as found in the
literature. In this paper, we considered a special insider attack where malicious nodes are
aware of other nodes in the network and exploit their knowledge to achieve packet drop which
is potential risk in communication networks. Achieving satisfactory accuracy in detection of
packet loss due to malicious attacks is given high importance. In this paper, public auditing
mechanism is proposed and implemented that exploits correlations between lost packets. We
proposed a public auditing architecture for accurate detection of packet drop attacks. We
built a custom simulator using Java platform to demonstrate the proof of concept. The
empirical results reveal the usefulness of the proposed system.
Keywords: Wireless ad hoc network, packet dropping, auditing
INTRODUCTION
Network is made up of number of nodes. Each
node in the network can act as information
sender and information receiver. It is true in
case of multi-hops between sender and
receiver. The sender may not be able to send
packets directly to destination without the
cooperation from intermediate nodes on the
way. Therefore, it is essential to have such
cooperation. Having understood this, there are
certain issues here. The intermediate nodes
may act as malicious nodes and drop packets
without forwarding to neighbours.
In wireless ad hoc networks, this is the
problem that needs to be addressed. As
packets play a vital role in communication,
dropped packets cannot provide meaningful
information to destination. This way the
communication quality is deteriorated. With
respect to delay, insensitive packets pertaining
to a live event, it is important to ensure that
packets are reaching destination accurately.
Thus there is need for dealing with this
problem in order to have meaningful
communications in communication networks.
The existing applications either focused on
packet dropping caused by link errors or
attacks. Many existing mechanisms simply
consider packet dropping due to attacks. They
do not differentiate packet loss due to link
error and packet loss due to an attack. In this
paper we proposed a public auditing based
solution, which demonstrates the proof of
concept. The system is implemented in the
form of a custom simulator developed using
Java platform. The empirical results revealed
that the proposed system is able to
differentiate between packet losses due to link
error from that caused by malicious attacks.
The remainder of the paper is structured as
follow: next part of the paper provides review
of literature, presentation of the proposed
system in detail, experimental results and after
that, the conclusion of the paper.
RELATED WORKS
Malicious packet drops and packet drops due
to link errors is the differentiation shown by
detection algorithms generally. High malicious
dropping rates and low link errors in one
pattern. The second pattern is high link errors
CTIT(2016) 32-42 © STM Journals 2016. All Rights Reserved Page 32
Current Trends in Information Technology
ISSN: 2249-4707(online), ISSN: 2348-7895(print)
Volume 6, Issue 3
www.stmjournals.com
Double Guard: Detection Intrusion in Multitier
Application
S.D. Jadhav*, S.R. Nallewar, N.V. Burande, G.V. Bawaskar, R.D. Shilpakar
Department of Information Technology, Dhole Patil College of Engineering, Wagholi, Pune,
Maharashtra, India
Abstract
In double guard intrusion in multitier system, it is important concept taking into account
attacks. There is very little work being performed on multi-tiered anomaly detection (AD)
systems. It generates models of network behavior for both web and database network
interactions. In such multi-tiered architectures, the back-end database server is often
protected in system behind a firewall, while the web servers are remotely over the internet.
Though they are protected from direct remote attacks, the back-end systems are susceptible to
attacks that use web requests as a means to exploit. It detects this type of attack since the web
IDS would merely see typical user login traffic. The current multi-threaded web server
architecture in this system carries multiple systems; it is not feasible to detect or profile such
causal mapping between web server traffic and it has deserver traffic, since traffic cannot be
clearly attributed to user sessions in the use.
Keywords: Attacks, double guard, IDS, SQL, TCP
INTRODUCTION
Problem Definition
In this project we present double guard, a
system used to detect various attacks in multi-
tiered web services and our approach can
create normality models of isolated user
sessions that include both, the web front end
(HTTP) and back end (File or SQL) network
transactions [1]. To achieve this, we employ a
lightweight virtualization technique to assign
each user’s web session to addicted container,
an isolated virtual computing environment.
We use the container ID to accurately
associate the web request with the subsequent
DB queries. Double guard can build a causal
mapping profile by taking both, the in web
server and DB traffic into account in the
system used [2].
Objective
Intrusion detection system currently examines
network request individually within both, the
web server and the database system. However,
there is very little work being performed on
multi-tiered anomaly detection systems that
generate models of network behavior for both,
back end and web server database interactions.
The back end database server is often protected
behind a firewall while the web servers are
remotely accessible over the internet. Attacks
that use web request as a means to exploit the
back end and are very important.
Need of Project
Attacks like Sql and DDoS are very much
severe. These attacks in the past have affected
the system many number of times. These types
of attacks are not recognized by antivirus or by
firewalls. Hence, a system that can recognize
and deflect these attacks is required.
LITERATURE SURVEY
Of all the papers referred to implement the
proposed system, systems similar to the one
proposed here and on which we attempt to
present improvements on, can be espied in
three of the research papers [1–3].
We have successfully applied static program
analysis to intrusion detection and our
approach is automatic: the programmer or
system administrator merely needs to run our
tools on the program at hand. All other
automatic approaches to intrusion detection to
date have been based on statistical inference,
leading to many false alarms; in contrast, our
CTIT(2016) 43-50 © STM Journals 2016. All Rights Reserved Page 43
Current Trends in Information Technology
ISSN: 2249-4707(online), ISSN: 2348-7895(print)
Volume 6, Issue 3
www.stmjournals.com
Protected Data Compilation in WSN Using Random
Routing Algorithms
Raju Dara, Jellela Satish Reddy *
Department of Computer Science Engineering, Krishna Murthy Institute of Technology and
Engineering, Jawaharlal Nehru Technological University, Hyderabad, Telangana, India
Abstract
Wireless sensor networks make it conceivable to send secure information from source to
destination. On the off chance that connected to network checking information on a host, they
can be used to distinguish bargained hub; and refusal of administration is two-key assault. In
this paper, we display four "Multi-way randomized directing Algorithm", a technique to send
the information, various approaches to order the information into wireless sensor systems.
The pure random propagation, shares are engendered in view of one-bounce neighborhood
data, sink TTL beginning worth N in every offer and remaining calculations enhance the
effectiveness of shares in light of utilizing two-jump neighborhood data. Our work ponders the
best calculation by distinguishing the included hubs with dark gaps and refusal of
administration in the bundle data with multipath directing calculations that has not been
utilized some time recently. We investigated the calculation that have the best proficiency and
depicts the proposed framework.
Keywords: Wireless sensor networks, security, attacks and routing
INTRODUCTION
Wireless sensor networks normally comprise
of high cost, low-control, and multifunctional
wireless sensor hubs, with detecting wireless
correspondence capacities [1, 2]. These sensor
hubs impart the separation by means of a
wireless medium and work together to fulfill a
typical undertaking, for instance, environment
checking, military reconnaissance, and
mechanical procedure control (Figure 1) [3].
The fundamental reasoning behind WSNs is
that, while the ability of every individual
sensor hub is constrained, the total force of the
whole system is adequate for the required
mission.
In numerous WSN applications, the
organization of sensor hubs is performed in an
especially appointed manner without watchful
arranging and designing. Once sent, the sensor
hubs must have the capacity to self-ruling, and
sort out themselves into a wireless
correspondence system. Sensor hubs are
battery-controlled and are relied upon to work
without participation for a generally drawn out
stretch of time.
Most of the time it is extremely troublesome
and even difficult to change or revive batteries
for the sensor hubs. WSNs are portrayed with
denser levels of sensor hub, lack of quality of
sensor hubs, and separate force, calculation,
and memory limitations. In this way, the kinds
attributes and requirements present numerous
new difficulties for the advancement and use
of WSNs.
Wireless sensor system (WSN) is a
heterogeneous framework joining a large
number of small, modest sensor hubs with a
few recognizing qualities. It is low handling
force and radio reaches, allowing low vitality
utilization in the sensor hubs, and performing
constrained and particular detecting and
observing capacities [1–6].
Notwithstanding WSNs structure, a specific
class of specially appointed systems that work
with little base and have pulled in scientists for
its improvement and numerous potential
regular citizen and military applications, for
example, ecological observing, combat zone
reconnaissance, and country security. Be that
as it may, outlining security conventions is a
INFORMATION TECHNOLOGY
Current Trends in
(CTIT)
ISSN 2249-4707 (Online)
ISSN 2348-7895 (Print)
September–December 2016
SJIF: 3.577
www.stmjournals.com
STM JOURNALS
Scientific Technical Medical

More Related Content

What's hot

Research & Reviews: Journal of Physics vol 7 issue 3
Research & Reviews: Journal of Physics vol 7 issue 3Research & Reviews: Journal of Physics vol 7 issue 3
Research & Reviews: Journal of Physics vol 7 issue 3
STM Journals
 
Journal of Artificial Intelligence Research & Advances vol-3 issue-3
Journal of Artificial Intelligence Research & Advances vol-3 issue-3Journal of Artificial Intelligence Research & Advances vol-3 issue-3
Journal of Artificial Intelligence Research & Advances vol-3 issue-3
STM Journals
 
Trends in Drug Delivery vol 3 issue 3
Trends in Drug Delivery vol 3 issue 3Trends in Drug Delivery vol 3 issue 3
Trends in Drug Delivery vol 3 issue 3
STM Journals
 
Journal Automobile Engineering & Application vol 3 issue 3
Journal Automobile Engineering & Application vol 3 issue 3Journal Automobile Engineering & Application vol 3 issue 3
Journal Automobile Engineering & Application vol 3 issue 3
STM Journals
 
Journal of Remote Sensing & GIS vol 7 issue 3
Journal of Remote Sensing & GIS vol 7 issue 3Journal of Remote Sensing & GIS vol 7 issue 3
Journal of Remote Sensing & GIS vol 7 issue 3
STM Journals
 
Journal of Computer Technology & Applications vol 7 issue 3
Journal of Computer Technology & Applications vol 7 issue 3Journal of Computer Technology & Applications vol 7 issue 3
Journal of Computer Technology & Applications vol 7 issue 3
STM Journals
 
Recent Trends in Electronics & Communication Systems vol 3 issue 3
Recent Trends in Electronics & Communication Systems vol 3 issue 3Recent Trends in Electronics & Communication Systems vol 3 issue 3
Recent Trends in Electronics & Communication Systems vol 3 issue 3
STM Journals
 
Journal of Mobile Computing, Communications & Mobile Networks vol 3 issue 3
Journal of Mobile Computing, Communications & Mobile Networks vol 3 issue 3Journal of Mobile Computing, Communications & Mobile Networks vol 3 issue 3
Journal of Mobile Computing, Communications & Mobile Networks vol 3 issue 3
STM Journals
 
Recent Trends in Sensor Research & Technology vol 3 issue 3
Recent Trends in Sensor Research & Technology vol 3 issue 3Recent Trends in Sensor Research & Technology vol 3 issue 3
Recent Trends in Sensor Research & Technology vol 3 issue 3
STM Journals
 
Current Trends in Signal Processing vol 6 issue 3
Current Trends in Signal Processing vol 6 issue 3Current Trends in Signal Processing vol 6 issue 3
Current Trends in Signal Processing vol 6 issue 3
STM Journals
 
Journal of Control & Instrumentation vol 7 issue 3
Journal of Control & Instrumentation vol 7 issue 3Journal of Control & Instrumentation vol 7 issue 3
Journal of Control & Instrumentation vol 7 issue 3
STM Journals
 
Aerospace Engineering & Technology vol 6 issue 3
Aerospace Engineering & Technology vol 6 issue 3Aerospace Engineering & Technology vol 6 issue 3
Aerospace Engineering & Technology vol 6 issue 3
STM Journals
 
Research& Reviews Journal of Botany vol 5 issue 3
Research& Reviews Journal of Botany vol 5 issue 3Research& Reviews Journal of Botany vol 5 issue 3
Research& Reviews Journal of Botany vol 5 issue 3
STM Journals
 
Research & Reviews A Journal of Drug Formulation,Development and Production v...
Research & Reviews A Journal of Drug Formulation,Development and Production v...Research & Reviews A Journal of Drug Formulation,Development and Production v...
Research & Reviews A Journal of Drug Formulation,Development and Production v...
STM Journals
 
Emerging Trends in Chemical Engineering vol 3 issue 3
Emerging Trends in Chemical Engineering vol 3 issue 3Emerging Trends in Chemical Engineering vol 3 issue 3
Emerging Trends in Chemical Engineering vol 3 issue 3
STM Journals
 
Journal of Electronic Design Technology vol 7 issue 3
Journal of Electronic Design Technology vol 7 issue 3Journal of Electronic Design Technology vol 7 issue 3
Journal of Electronic Design Technology vol 7 issue 3
STM Journals
 
Journal of Offshore Structure and Technology vol 3 issue 3
Journal of Offshore Structure and Technology vol 3 issue 3Journal of Offshore Structure and Technology vol 3 issue 3
Journal of Offshore Structure and Technology vol 3 issue 3
STM Journals
 
Research & Reviews A Journal of Health Professions vol 6 issue 3
Research & Reviews A Journal of Health Professions vol 6 issue 3Research & Reviews A Journal of Health Professions vol 6 issue 3
Research & Reviews A Journal of Health Professions vol 6 issue 3
STM Journals
 
Journal of Advance database and Management & System vol 3 issue 3
Journal of Advance database and Management & System vol 3 issue 3Journal of Advance database and Management & System vol 3 issue 3
Journal of Advance database and Management & System vol 3 issue 3
STM Journals
 
Trends in Electrical Engineering vol 6 issue 3
Trends in Electrical Engineering vol 6 issue 3Trends in Electrical Engineering vol 6 issue 3
Trends in Electrical Engineering vol 6 issue 3
STM Journals
 

What's hot (20)

Research & Reviews: Journal of Physics vol 7 issue 3
Research & Reviews: Journal of Physics vol 7 issue 3Research & Reviews: Journal of Physics vol 7 issue 3
Research & Reviews: Journal of Physics vol 7 issue 3
 
Journal of Artificial Intelligence Research & Advances vol-3 issue-3
Journal of Artificial Intelligence Research & Advances vol-3 issue-3Journal of Artificial Intelligence Research & Advances vol-3 issue-3
Journal of Artificial Intelligence Research & Advances vol-3 issue-3
 
Trends in Drug Delivery vol 3 issue 3
Trends in Drug Delivery vol 3 issue 3Trends in Drug Delivery vol 3 issue 3
Trends in Drug Delivery vol 3 issue 3
 
Journal Automobile Engineering & Application vol 3 issue 3
Journal Automobile Engineering & Application vol 3 issue 3Journal Automobile Engineering & Application vol 3 issue 3
Journal Automobile Engineering & Application vol 3 issue 3
 
Journal of Remote Sensing & GIS vol 7 issue 3
Journal of Remote Sensing & GIS vol 7 issue 3Journal of Remote Sensing & GIS vol 7 issue 3
Journal of Remote Sensing & GIS vol 7 issue 3
 
Journal of Computer Technology & Applications vol 7 issue 3
Journal of Computer Technology & Applications vol 7 issue 3Journal of Computer Technology & Applications vol 7 issue 3
Journal of Computer Technology & Applications vol 7 issue 3
 
Recent Trends in Electronics & Communication Systems vol 3 issue 3
Recent Trends in Electronics & Communication Systems vol 3 issue 3Recent Trends in Electronics & Communication Systems vol 3 issue 3
Recent Trends in Electronics & Communication Systems vol 3 issue 3
 
Journal of Mobile Computing, Communications & Mobile Networks vol 3 issue 3
Journal of Mobile Computing, Communications & Mobile Networks vol 3 issue 3Journal of Mobile Computing, Communications & Mobile Networks vol 3 issue 3
Journal of Mobile Computing, Communications & Mobile Networks vol 3 issue 3
 
Recent Trends in Sensor Research & Technology vol 3 issue 3
Recent Trends in Sensor Research & Technology vol 3 issue 3Recent Trends in Sensor Research & Technology vol 3 issue 3
Recent Trends in Sensor Research & Technology vol 3 issue 3
 
Current Trends in Signal Processing vol 6 issue 3
Current Trends in Signal Processing vol 6 issue 3Current Trends in Signal Processing vol 6 issue 3
Current Trends in Signal Processing vol 6 issue 3
 
Journal of Control & Instrumentation vol 7 issue 3
Journal of Control & Instrumentation vol 7 issue 3Journal of Control & Instrumentation vol 7 issue 3
Journal of Control & Instrumentation vol 7 issue 3
 
Aerospace Engineering & Technology vol 6 issue 3
Aerospace Engineering & Technology vol 6 issue 3Aerospace Engineering & Technology vol 6 issue 3
Aerospace Engineering & Technology vol 6 issue 3
 
Research& Reviews Journal of Botany vol 5 issue 3
Research& Reviews Journal of Botany vol 5 issue 3Research& Reviews Journal of Botany vol 5 issue 3
Research& Reviews Journal of Botany vol 5 issue 3
 
Research & Reviews A Journal of Drug Formulation,Development and Production v...
Research & Reviews A Journal of Drug Formulation,Development and Production v...Research & Reviews A Journal of Drug Formulation,Development and Production v...
Research & Reviews A Journal of Drug Formulation,Development and Production v...
 
Emerging Trends in Chemical Engineering vol 3 issue 3
Emerging Trends in Chemical Engineering vol 3 issue 3Emerging Trends in Chemical Engineering vol 3 issue 3
Emerging Trends in Chemical Engineering vol 3 issue 3
 
Journal of Electronic Design Technology vol 7 issue 3
Journal of Electronic Design Technology vol 7 issue 3Journal of Electronic Design Technology vol 7 issue 3
Journal of Electronic Design Technology vol 7 issue 3
 
Journal of Offshore Structure and Technology vol 3 issue 3
Journal of Offshore Structure and Technology vol 3 issue 3Journal of Offshore Structure and Technology vol 3 issue 3
Journal of Offshore Structure and Technology vol 3 issue 3
 
Research & Reviews A Journal of Health Professions vol 6 issue 3
Research & Reviews A Journal of Health Professions vol 6 issue 3Research & Reviews A Journal of Health Professions vol 6 issue 3
Research & Reviews A Journal of Health Professions vol 6 issue 3
 
Journal of Advance database and Management & System vol 3 issue 3
Journal of Advance database and Management & System vol 3 issue 3Journal of Advance database and Management & System vol 3 issue 3
Journal of Advance database and Management & System vol 3 issue 3
 
Trends in Electrical Engineering vol 6 issue 3
Trends in Electrical Engineering vol 6 issue 3Trends in Electrical Engineering vol 6 issue 3
Trends in Electrical Engineering vol 6 issue 3
 

Viewers also liked

Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
Eldos Kuriakose
 
Technology trends for 2016
Technology trends for 2016 Technology trends for 2016
Technology trends for 2016
albert joseph
 
Technology trends
Technology trendsTechnology trends
Technology trends
jasper3
 
Dünya Temiz Enerji Yatırımları 2015
Dünya Temiz Enerji Yatırımları 2015 Dünya Temiz Enerji Yatırımları 2015
Dünya Temiz Enerji Yatırımları 2015
Faik Sönmez
 
Mwc report 2016
Mwc report 2016Mwc report 2016
BMG310 Overview: Current Issues in Information Technology: Professor Andy Phi...
BMG310 Overview: Current Issues in Information Technology: Professor Andy Phi...BMG310 Overview: Current Issues in Information Technology: Professor Andy Phi...
BMG310 Overview: Current Issues in Information Technology: Professor Andy Phi...
Applet
 
Current use of technology in pakistan for education
Current use of technology in pakistan for educationCurrent use of technology in pakistan for education
Current use of technology in pakistan for education
Nouman Hafeez
 
E books-midias-ética
E books-midias-éticaE books-midias-ética
E books-midias-ética
Marcio Robson Ferreira Ribeiro
 
Ozwater 12 Presentation on Climate Change Impacts On Sydney S Water Supply
Ozwater 12 Presentation on  Climate Change Impacts On Sydney S Water SupplyOzwater 12 Presentation on  Climate Change Impacts On Sydney S Water Supply
Ozwater 12 Presentation on Climate Change Impacts On Sydney S Water Supply
MahesMaheswaran
 
VISA Oro
VISA OroVISA Oro
VISA Oro
xandecarud
 
2013 Global Trends in Technology, Media and Telecoms
2013 Global Trends in Technology, Media and Telecoms2013 Global Trends in Technology, Media and Telecoms
2013 Global Trends in Technology, Media and Telecoms
CM Research
 
TRENDS IN INFORMATION TECHNOLOGY
TRENDS IN INFORMATION TECHNOLOGYTRENDS IN INFORMATION TECHNOLOGY
TRENDS IN INFORMATION TECHNOLOGY
Dhrutim25
 
Financial Literacy Programs for Teens
Financial Literacy Programs for TeensFinancial Literacy Programs for Teens
Financial Literacy Programs for Teens
ireadrosies
 
Journal of Nuclear Engineering & Technology vol 6 issue 3
Journal of Nuclear Engineering & Technology vol 6 issue 3Journal of Nuclear Engineering & Technology vol 6 issue 3
Journal of Nuclear Engineering & Technology vol 6 issue 3
STM Journals
 
Digital communications 2011 student version
Digital communications 2011 student versionDigital communications 2011 student version
Digital communications 2011 student version
Tom Chapman
 
Trends in Opto Electro & Optical Communication vol 6 issue 3
Trends in Opto Electro & Optical Communication vol 6 issue 3Trends in Opto Electro & Optical Communication vol 6 issue 3
Trends in Opto Electro & Optical Communication vol 6 issue 3
STM Journals
 
Software industry of pakistan 1995 2008
Software industry of pakistan 1995 2008Software industry of pakistan 1995 2008
Software industry of pakistan 1995 2008
M.Nadeem Jahangir
 
IT in Pakistan - past, present and the future
IT in Pakistan - past, present and the futureIT in Pakistan - past, present and the future
IT in Pakistan - past, present and the future
Imran Hunzai
 
Architecture & IA: Expanding the Metaphor - IA Summit 2016
Architecture & IA: Expanding the Metaphor - IA Summit 2016Architecture & IA: Expanding the Metaphor - IA Summit 2016
Architecture & IA: Expanding the Metaphor - IA Summit 2016
Jessica DuVerneay
 
Gr 1: History of Information Systems and its Importance
Gr 1: History of Information Systems and its ImportanceGr 1: History of Information Systems and its Importance
Gr 1: History of Information Systems and its Importance
university of education,Lahore
 

Viewers also liked (20)

Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
 
Technology trends for 2016
Technology trends for 2016 Technology trends for 2016
Technology trends for 2016
 
Technology trends
Technology trendsTechnology trends
Technology trends
 
Dünya Temiz Enerji Yatırımları 2015
Dünya Temiz Enerji Yatırımları 2015 Dünya Temiz Enerji Yatırımları 2015
Dünya Temiz Enerji Yatırımları 2015
 
Mwc report 2016
Mwc report 2016Mwc report 2016
Mwc report 2016
 
BMG310 Overview: Current Issues in Information Technology: Professor Andy Phi...
BMG310 Overview: Current Issues in Information Technology: Professor Andy Phi...BMG310 Overview: Current Issues in Information Technology: Professor Andy Phi...
BMG310 Overview: Current Issues in Information Technology: Professor Andy Phi...
 
Current use of technology in pakistan for education
Current use of technology in pakistan for educationCurrent use of technology in pakistan for education
Current use of technology in pakistan for education
 
E books-midias-ética
E books-midias-éticaE books-midias-ética
E books-midias-ética
 
Ozwater 12 Presentation on Climate Change Impacts On Sydney S Water Supply
Ozwater 12 Presentation on  Climate Change Impacts On Sydney S Water SupplyOzwater 12 Presentation on  Climate Change Impacts On Sydney S Water Supply
Ozwater 12 Presentation on Climate Change Impacts On Sydney S Water Supply
 
VISA Oro
VISA OroVISA Oro
VISA Oro
 
2013 Global Trends in Technology, Media and Telecoms
2013 Global Trends in Technology, Media and Telecoms2013 Global Trends in Technology, Media and Telecoms
2013 Global Trends in Technology, Media and Telecoms
 
TRENDS IN INFORMATION TECHNOLOGY
TRENDS IN INFORMATION TECHNOLOGYTRENDS IN INFORMATION TECHNOLOGY
TRENDS IN INFORMATION TECHNOLOGY
 
Financial Literacy Programs for Teens
Financial Literacy Programs for TeensFinancial Literacy Programs for Teens
Financial Literacy Programs for Teens
 
Journal of Nuclear Engineering & Technology vol 6 issue 3
Journal of Nuclear Engineering & Technology vol 6 issue 3Journal of Nuclear Engineering & Technology vol 6 issue 3
Journal of Nuclear Engineering & Technology vol 6 issue 3
 
Digital communications 2011 student version
Digital communications 2011 student versionDigital communications 2011 student version
Digital communications 2011 student version
 
Trends in Opto Electro & Optical Communication vol 6 issue 3
Trends in Opto Electro & Optical Communication vol 6 issue 3Trends in Opto Electro & Optical Communication vol 6 issue 3
Trends in Opto Electro & Optical Communication vol 6 issue 3
 
Software industry of pakistan 1995 2008
Software industry of pakistan 1995 2008Software industry of pakistan 1995 2008
Software industry of pakistan 1995 2008
 
IT in Pakistan - past, present and the future
IT in Pakistan - past, present and the futureIT in Pakistan - past, present and the future
IT in Pakistan - past, present and the future
 
Architecture & IA: Expanding the Metaphor - IA Summit 2016
Architecture & IA: Expanding the Metaphor - IA Summit 2016Architecture & IA: Expanding the Metaphor - IA Summit 2016
Architecture & IA: Expanding the Metaphor - IA Summit 2016
 
Gr 1: History of Information Systems and its Importance
Gr 1: History of Information Systems and its ImportanceGr 1: History of Information Systems and its Importance
Gr 1: History of Information Systems and its Importance
 

Similar to Current Trends in Information Technology vol 6 issue 3

Journal of Experimental & Applied Mechanics vol 7 issue 3
Journal of Experimental & Applied Mechanics vol 7 issue 3Journal of Experimental & Applied Mechanics vol 7 issue 3
Journal of Experimental & Applied Mechanics vol 7 issue 3
STM Journals
 
Journal of Production Research & Management vol 6 issue 3
Journal of Production Research & Management vol 6 issue 3Journal of Production Research & Management vol 6 issue 3
Journal of Production Research & Management vol 6 issue 3
STM Journals
 
Journal of Ayurvedic Science, Yoga and Naturopathy vol 3 issue 3
Journal of Ayurvedic Science, Yoga and Naturopathy vol 3 issue 3Journal of Ayurvedic Science, Yoga and Naturopathy vol 3 issue 3
Journal of Ayurvedic Science, Yoga and Naturopathy vol 3 issue 3
STM Journals
 
Journal of Microcontroller Engineering and Applications vol 3 issue 3
Journal of Microcontroller Engineering and Applications vol 3 issue 3Journal of Microcontroller Engineering and Applications vol 3 issue 3
Journal of Microcontroller Engineering and Applications vol 3 issue 3
STM Journals
 
Journal of Construction Engineering Technology & Management vol 6 issue 3
Journal of Construction Engineering Technology & Management vol 6 issue 3Journal of Construction Engineering Technology & Management vol 6 issue 3
Journal of Construction Engineering Technology & Management vol 6 issue 3
STM Journals
 
Journal of Water Resource Engineering and Management vol 3 issue 3
Journal of Water Resource Engineering and Management vol 3 issue 3Journal of Water Resource Engineering and Management vol 3 issue 3
Journal of Water Resource Engineering and Management vol 3 issue 3
STM Journals
 
Research & Reviews A Journal of Embedded System & Applications vol 4 issue 3
Research & Reviews A Journal of Embedded System & Applications vol 4 issue 3Research & Reviews A Journal of Embedded System & Applications vol 4 issue 3
Research & Reviews A Journal of Embedded System & Applications vol 4 issue 3
STM Journals
 
Journal of VLSI Design Tools & Technology vol 6 issue 3
Journal of VLSI Design Tools & Technology  vol 6 issue 3Journal of VLSI Design Tools & Technology  vol 6 issue 3
Journal of VLSI Design Tools & Technology vol 6 issue 3
STM Journals
 
Journal of Catalyst & Catalysis vol 3 issue 3
Journal of  Catalyst & Catalysis vol 3 issue 3Journal of  Catalyst & Catalysis vol 3 issue 3
Journal of Catalyst & Catalysis vol 3 issue 3
STM Journals
 
Journal of Web Engineering & Technology vol 3 issue 3
Journal of Web Engineering & Technology vol 3 issue 3Journal of Web Engineering & Technology vol 3 issue 3
Journal of Web Engineering & Technology vol 3 issue 3
STM Journals
 

Similar to Current Trends in Information Technology vol 6 issue 3 (10)

Journal of Experimental & Applied Mechanics vol 7 issue 3
Journal of Experimental & Applied Mechanics vol 7 issue 3Journal of Experimental & Applied Mechanics vol 7 issue 3
Journal of Experimental & Applied Mechanics vol 7 issue 3
 
Journal of Production Research & Management vol 6 issue 3
Journal of Production Research & Management vol 6 issue 3Journal of Production Research & Management vol 6 issue 3
Journal of Production Research & Management vol 6 issue 3
 
Journal of Ayurvedic Science, Yoga and Naturopathy vol 3 issue 3
Journal of Ayurvedic Science, Yoga and Naturopathy vol 3 issue 3Journal of Ayurvedic Science, Yoga and Naturopathy vol 3 issue 3
Journal of Ayurvedic Science, Yoga and Naturopathy vol 3 issue 3
 
Journal of Microcontroller Engineering and Applications vol 3 issue 3
Journal of Microcontroller Engineering and Applications vol 3 issue 3Journal of Microcontroller Engineering and Applications vol 3 issue 3
Journal of Microcontroller Engineering and Applications vol 3 issue 3
 
Journal of Construction Engineering Technology & Management vol 6 issue 3
Journal of Construction Engineering Technology & Management vol 6 issue 3Journal of Construction Engineering Technology & Management vol 6 issue 3
Journal of Construction Engineering Technology & Management vol 6 issue 3
 
Journal of Water Resource Engineering and Management vol 3 issue 3
Journal of Water Resource Engineering and Management vol 3 issue 3Journal of Water Resource Engineering and Management vol 3 issue 3
Journal of Water Resource Engineering and Management vol 3 issue 3
 
Research & Reviews A Journal of Embedded System & Applications vol 4 issue 3
Research & Reviews A Journal of Embedded System & Applications vol 4 issue 3Research & Reviews A Journal of Embedded System & Applications vol 4 issue 3
Research & Reviews A Journal of Embedded System & Applications vol 4 issue 3
 
Journal of VLSI Design Tools & Technology vol 6 issue 3
Journal of VLSI Design Tools & Technology  vol 6 issue 3Journal of VLSI Design Tools & Technology  vol 6 issue 3
Journal of VLSI Design Tools & Technology vol 6 issue 3
 
Journal of Catalyst & Catalysis vol 3 issue 3
Journal of  Catalyst & Catalysis vol 3 issue 3Journal of  Catalyst & Catalysis vol 3 issue 3
Journal of Catalyst & Catalysis vol 3 issue 3
 
Journal of Web Engineering & Technology vol 3 issue 3
Journal of Web Engineering & Technology vol 3 issue 3Journal of Web Engineering & Technology vol 3 issue 3
Journal of Web Engineering & Technology vol 3 issue 3
 

More from STM Journals

Journal of Water Pollution & Purification Research vol 3 issue 3
Journal of Water Pollution & Purification Research vol 3 issue 3Journal of Water Pollution & Purification Research vol 3 issue 3
Journal of Water Pollution & Purification Research vol 3 issue 3
STM Journals
 
esearch & Reviews: Journal of Veterinary Science and Technology vol 5 issue 3
esearch & Reviews: Journal of Veterinary Science and Technology vol 5 issue 3esearch & Reviews: Journal of Veterinary Science and Technology vol 5 issue 3
esearch & Reviews: Journal of Veterinary Science and Technology vol 5 issue 3
STM Journals
 
Research and Reviews: A Journal of Unani, Siddha and Homeopathy vol 3 issue 3
Research and Reviews: A Journal of Unani, Siddha and Homeopathy vol 3 issue 3Research and Reviews: A Journal of Unani, Siddha and Homeopathy vol 3 issue 3
Research and Reviews: A Journal of Unani, Siddha and Homeopathy vol 3 issue 3
STM Journals
 
Trends in Transport Engineering and Applications vol 3 issue-3
Trends in Transport Engineering and Applications  vol 3 issue-3Trends in Transport Engineering and Applications  vol 3 issue-3
Trends in Transport Engineering and Applications vol 3 issue-3
STM Journals
 
Research & Reviews: A Journal of Toxicology vol 6 issue 3
Research & Reviews: A Journal of Toxicology vol 6 issue 3Research & Reviews: A Journal of Toxicology vol 6 issue 3
Research & Reviews: A Journal of Toxicology vol 6 issue 3
STM Journals
 
Journal of Thin Films, Coating Science Technology and Application vol 3 issue 3
Journal of Thin Films, Coating Science Technology and Application vol 3 issue 3Journal of Thin Films, Coating Science Technology and Application vol 3 issue 3
Journal of Thin Films, Coating Science Technology and Application vol 3 issue 3
STM Journals
 
Research & Reviews: Journal of Surgery vol 5 issue 3
Research & Reviews: Journal of Surgery vol 5 issue 3Research & Reviews: Journal of Surgery vol 5 issue 3
Research & Reviews: Journal of Surgery vol 5 issue 3
STM Journals
 
Journal of Structural Engineering and Management vol 3 issue 3
Journal of Structural Engineering and Management vol 3 issue 3Journal of Structural Engineering and Management vol 3 issue 3
Journal of Structural Engineering and Management vol 3 issue 3
STM Journals
 
Research & Reviews: Journal of Statistics vol 5 issue 3
Research & Reviews: Journal of Statistics vol 5 issue 3Research & Reviews: Journal of Statistics vol 5 issue 3
Research & Reviews: Journal of Statistics vol 5 issue 3
STM Journals
 
Research & Reviews: Journal of Space Science & Technology vol 5 issue 3
Research & Reviews: Journal of Space Science & Technology vol 5 issue 3Research & Reviews: Journal of Space Science & Technology vol 5 issue 3
Research & Reviews: Journal of Space Science & Technology vol 5 issue 3
STM Journals
 
Journal of Refrigeration, Air Conditioning, Heating and Ventilation vol 3 iss...
Journal of Refrigeration, Air Conditioning, Heating and Ventilation vol 3 iss...Journal of Refrigeration, Air Conditioning, Heating and Ventilation vol 3 iss...
Journal of Refrigeration, Air Conditioning, Heating and Ventilation vol 3 iss...
STM Journals
 
Journal of Polymer & Composites vol 4 issue 3
Journal of Polymer & Composites vol 4 issue 3Journal of Polymer & Composites vol 4 issue 3
Journal of Polymer & Composites vol 4 issue 3
STM Journals
 
Research & Reviews: A Journal of Pharmacology vol 6 issue 3
Research & Reviews: A Journal of Pharmacology vol 6 issue 3Research & Reviews: A Journal of Pharmacology vol 6 issue 3
Research & Reviews: A Journal of Pharmacology vol 6 issue 3
STM Journals
 
Research & Reviews: A Journal of Pharmacognosy vol 3 issue 3
Research & Reviews: A Journal of Pharmacognosy  vol 3 issue 3Research & Reviews: A Journal of Pharmacognosy  vol 3 issue 3
Research & Reviews: A Journal of Pharmacognosy vol 3 issue 3
STM Journals
 
Research and Reviews: A Journal of Pharmaceutical Science vol 7 issue 3
Research and Reviews: A Journal of Pharmaceutical Science vol 7 issue 3Research and Reviews: A Journal of Pharmaceutical Science vol 7 issue 3
Research and Reviews: A Journal of Pharmaceutical Science vol 7 issue 3
STM Journals
 
Journal of Petroleum Engineering & Technology vol 6 issue 3
Journal of Petroleum Engineering & Technology vol 6 issue 3Journal of Petroleum Engineering & Technology vol 6 issue 3
Journal of Petroleum Engineering & Technology vol 6 issue 3
STM Journals
 
Research & Reviews: Journal of Oncology and Hematology vol 5 issue 3
Research & Reviews: Journal of Oncology and Hematology  vol 5 issue 3Research & Reviews: Journal of Oncology and Hematology  vol 5 issue 3
Research & Reviews: Journal of Oncology and Hematology vol 5 issue 3
STM Journals
 
OmniScience: A Multi-disciplinary Journal vol 6 issue-3
OmniScience: A Multi-disciplinary Journal vol 6 issue-3OmniScience: A Multi-disciplinary Journal vol 6 issue-3
OmniScience: A Multi-disciplinary Journal vol 6 issue-3
STM Journals
 
Journal of Nursing science & practice vol 6 issue 3
Journal of Nursing science & practice vol 6 issue 3Journal of Nursing science & practice vol 6 issue 3
Journal of Nursing science & practice vol 6 issue 3
STM Journals
 

More from STM Journals (19)

Journal of Water Pollution & Purification Research vol 3 issue 3
Journal of Water Pollution & Purification Research vol 3 issue 3Journal of Water Pollution & Purification Research vol 3 issue 3
Journal of Water Pollution & Purification Research vol 3 issue 3
 
esearch & Reviews: Journal of Veterinary Science and Technology vol 5 issue 3
esearch & Reviews: Journal of Veterinary Science and Technology vol 5 issue 3esearch & Reviews: Journal of Veterinary Science and Technology vol 5 issue 3
esearch & Reviews: Journal of Veterinary Science and Technology vol 5 issue 3
 
Research and Reviews: A Journal of Unani, Siddha and Homeopathy vol 3 issue 3
Research and Reviews: A Journal of Unani, Siddha and Homeopathy vol 3 issue 3Research and Reviews: A Journal of Unani, Siddha and Homeopathy vol 3 issue 3
Research and Reviews: A Journal of Unani, Siddha and Homeopathy vol 3 issue 3
 
Trends in Transport Engineering and Applications vol 3 issue-3
Trends in Transport Engineering and Applications  vol 3 issue-3Trends in Transport Engineering and Applications  vol 3 issue-3
Trends in Transport Engineering and Applications vol 3 issue-3
 
Research & Reviews: A Journal of Toxicology vol 6 issue 3
Research & Reviews: A Journal of Toxicology vol 6 issue 3Research & Reviews: A Journal of Toxicology vol 6 issue 3
Research & Reviews: A Journal of Toxicology vol 6 issue 3
 
Journal of Thin Films, Coating Science Technology and Application vol 3 issue 3
Journal of Thin Films, Coating Science Technology and Application vol 3 issue 3Journal of Thin Films, Coating Science Technology and Application vol 3 issue 3
Journal of Thin Films, Coating Science Technology and Application vol 3 issue 3
 
Research & Reviews: Journal of Surgery vol 5 issue 3
Research & Reviews: Journal of Surgery vol 5 issue 3Research & Reviews: Journal of Surgery vol 5 issue 3
Research & Reviews: Journal of Surgery vol 5 issue 3
 
Journal of Structural Engineering and Management vol 3 issue 3
Journal of Structural Engineering and Management vol 3 issue 3Journal of Structural Engineering and Management vol 3 issue 3
Journal of Structural Engineering and Management vol 3 issue 3
 
Research & Reviews: Journal of Statistics vol 5 issue 3
Research & Reviews: Journal of Statistics vol 5 issue 3Research & Reviews: Journal of Statistics vol 5 issue 3
Research & Reviews: Journal of Statistics vol 5 issue 3
 
Research & Reviews: Journal of Space Science & Technology vol 5 issue 3
Research & Reviews: Journal of Space Science & Technology vol 5 issue 3Research & Reviews: Journal of Space Science & Technology vol 5 issue 3
Research & Reviews: Journal of Space Science & Technology vol 5 issue 3
 
Journal of Refrigeration, Air Conditioning, Heating and Ventilation vol 3 iss...
Journal of Refrigeration, Air Conditioning, Heating and Ventilation vol 3 iss...Journal of Refrigeration, Air Conditioning, Heating and Ventilation vol 3 iss...
Journal of Refrigeration, Air Conditioning, Heating and Ventilation vol 3 iss...
 
Journal of Polymer & Composites vol 4 issue 3
Journal of Polymer & Composites vol 4 issue 3Journal of Polymer & Composites vol 4 issue 3
Journal of Polymer & Composites vol 4 issue 3
 
Research & Reviews: A Journal of Pharmacology vol 6 issue 3
Research & Reviews: A Journal of Pharmacology vol 6 issue 3Research & Reviews: A Journal of Pharmacology vol 6 issue 3
Research & Reviews: A Journal of Pharmacology vol 6 issue 3
 
Research & Reviews: A Journal of Pharmacognosy vol 3 issue 3
Research & Reviews: A Journal of Pharmacognosy  vol 3 issue 3Research & Reviews: A Journal of Pharmacognosy  vol 3 issue 3
Research & Reviews: A Journal of Pharmacognosy vol 3 issue 3
 
Research and Reviews: A Journal of Pharmaceutical Science vol 7 issue 3
Research and Reviews: A Journal of Pharmaceutical Science vol 7 issue 3Research and Reviews: A Journal of Pharmaceutical Science vol 7 issue 3
Research and Reviews: A Journal of Pharmaceutical Science vol 7 issue 3
 
Journal of Petroleum Engineering & Technology vol 6 issue 3
Journal of Petroleum Engineering & Technology vol 6 issue 3Journal of Petroleum Engineering & Technology vol 6 issue 3
Journal of Petroleum Engineering & Technology vol 6 issue 3
 
Research & Reviews: Journal of Oncology and Hematology vol 5 issue 3
Research & Reviews: Journal of Oncology and Hematology  vol 5 issue 3Research & Reviews: Journal of Oncology and Hematology  vol 5 issue 3
Research & Reviews: Journal of Oncology and Hematology vol 5 issue 3
 
OmniScience: A Multi-disciplinary Journal vol 6 issue-3
OmniScience: A Multi-disciplinary Journal vol 6 issue-3OmniScience: A Multi-disciplinary Journal vol 6 issue-3
OmniScience: A Multi-disciplinary Journal vol 6 issue-3
 
Journal of Nursing science & practice vol 6 issue 3
Journal of Nursing science & practice vol 6 issue 3Journal of Nursing science & practice vol 6 issue 3
Journal of Nursing science & practice vol 6 issue 3
 

Recently uploaded

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 

Recently uploaded (20)

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 

Current Trends in Information Technology vol 6 issue 3

  • 1. INFORMATION TECHNOLOGY Current Trends in (CTIT) ISSN 2249-4707 (Online) ISSN 2348-7895 (Print) September–December 2016 SJIF: 3.577 www.stmjournals.com STM JOURNALS Scientific Technical Medical
  • 2. STM Journals, a strong initiative by Consortium E-Learning Network Private Ltd. (established 2006), was launched in the year 2010 under the support and guidance by our esteemed Editorial and Advisory Board Membersfromrenownedinstitutes. Objectives:  Promotion of Scientific, Technical and Medical research.  Publication of Original Research/Review, Short Articles and Case Studies through Peer Review process.  Publishing Special Issues on Conferences.  Preparing online platform for print journals.  Empowering the libraries with online and print Journals in Scientific, Technical and Medical domains.  Publishing and distribution of books on various subjects in the category of Nanotechnology, Scientific and Technical Writing, and Environment, Health and Safety. SalientFeatures:  A bouquet of 100+ Journals that fall under Science, Technical and Medical domains.  Employs Open Journals System (OJS)—a journal management and publishing system.  The first and one of the fastest growing publication website in India as well as in abroad for its quality and coverage.  Rapid online submission and publication of papers, soon after their formal acceptance/finalization.  Facilitates linking with the other authors or professionals.  Worldwide circulation and visibility. Current Trends in Information Technology ISSN: 2249-4707(online), ISSN: 2348-7895(print) Focus andScopeCovers  ComputerNetworks  InformationDatabases  DataManagement  Networking  ProgrammingLanguages  TechnologyDevelopments  Intelligentorganisation Current Trends in Information Technology is published (frequency: three times a year) in India by STM Journals (division of Consortium e-Learning Network Private Ltd. Pvt.) The views expressed in the articles do not necessarily reflect of the Publisher. The publisher does not endorse the quality or value of the advertised/sponsored products described therein. Please consult full prescribing information before issuing a prescription for any products mentioned in thispublication. No part of this publication may be reproduced, stored in retrieval system or transmitted in any from without written permissionof thepublisher. To cite any of the material contained in this Journal, in English or translation, please use the full English reference at the beginningof eacharticle.Toreuseanyofthematerial,pleasecontactSTM Journals (info@stmjournals.com) STM Journals
  • 3. STM Journals (division of Consortium e-Learning Network Private Ltd. ) having its Marketing office located at Office No. 4, First Floor, CSC pocket E Market, Mayur Vihar Phase II, New Delhi-110091, India is the Publisher of Journal. Statements and opinions expressed in the Journal reflect the views of the author(s) and are not the opinion of STM Journals unless so stated. Subscription Information and Order:  NationalSubscription: Print- Rs 3750/-perJournal( includes3printissues), SingleIssue copypurchase:Rs 1500. Online - Rs 3750/- per Journal inclusive Service Tax ( includes 3 online issues), Single Issue purchase: Rs 1500 inclusiveServiceTax Print+Online-Rs 5000/-perJournalinclusiveServiceTax( includes3print&onlineissues).  International Subscription:  Online Only- $199, Print Only-$299 (includes 3 print issues)  Online + Print-$399 (includes 3 print issues + online access of published back volumes ) To purchase print compilation of back issues please send your query at info@stmjournals.com Subscription must be prepaid. Rates outside of India includes delivery. Prices subject to change without notice. Mode of Payment: At par cheque, Demand draft, and RTGS (payment to be made in favor of Consortium E-Learning Network. Pvt. ltd., payable at Delhi/New Delhi. Online Access Policy A). For Authors: In order to provide maximum citation and wide publicity to the authors work, STM Journals also have Open Access Policy, authors who would like to get their work open access can opt for Optional Open Access publication at nominal cost as follows India, SARC and African Countries: INR 2500 or 100 USD including single hard copy of Author's Journal. Other Countries: USD 200 including single hard copy of Author's Journal. B). For Subscribers:  Online access will be activated within 72 hours of receipt of the payment (working days), subject to receipt of correct information on user details/Static IP address of the subscriber.  The access will be blocked:  If the user requests for the same and furnishes valid reasons for blocking.  Due to technical issue.  Misuse of the access rights as per the access policy. Advertising and Commercial Reprint Inquiries: STM Journals with wide circulation and visibility offer an excellent media for showcasing/promotion of your products/services and the events-namely, Conferences, Symposia/Seminars etc. These journals have very high potential to deliver the message across the targeted audience regularly with each published issue. The advertisements on bulk subscriptions, gift subscriptions or reprint purchases for distribution etc. are alsoverywelcome. Lost Issue Claims: Please note the following when applying for lost or missing issues:  Claims for print copies lost will be honored only after 45 days of the dispatch date and before publication of the next issue as per the frequency.  Tracking id for the speed post will be provided to all our subscribers and the claims for the missing Journals will be entertained only with the proofs which will be verified at both the ends.  Claims filed due to insufficient (or no notice) of change of address will not be honored.  Change of Address of Dispatch should be intimated to STM Journals at least 2 months prior to the dispatch schedule as per the frequency by mentioning subscriber id and the subscription id.  Refund requests will not be entertained. Legal Disputes All the legal disputes are subjected to Delhi Jurisdiction only. If you have any questions, please contact the Publication Management Team: info@stmjournals.com; Tel : +91 0120-4781211.
  • 4. Gargi Asha Jha Manager (Publications) PUBLICATION MANAGEMENT TEAM Internal Members External Members Bimlesh Lochab Assistant Professor Department of Chemistry School of Natural Sciences, Shiv Nadar University Gautam Buddha Nagar, Uttar Pradesh, India Dr. Rajiv Prakash Professor and Coordinator School of Materials Science and Technology Indian Institute of Technology (BHU), Varanasi Uttar Pradesh, India Dr. Rakesh Kumar Assistant Professor Department of Applied Chemistry BIT Mesra, Patna, Bihar, India Prof. S. Ramaprabhu Alternative Energy and Nanotechnology Technology Laboratory, Department of Physics Indian Institute of Technology, Chennai Tamil Nadu, India Himani Pandey Isha Chandra Senior Associate Editors Dr. Yog Raj Sood Dean (Planning and Development) Professor, Department of Electrical Engineering National Institute of Technology, Hamirpur Himachal Pradesh, India Prof. Chris Cannings Professor, School of Mathematics and Statistics University of Sheffield, Sheffield United Kingdom Dr. D. K. Vijaykumar MS, MCh (Surgical Oncology), Professor and Head Department of Surgical Oncology Amrita Institute of Medical Sciences and Research Centre Ponekkara, Cochin, Kerala, India Dr. Durgadas Naik Associate Professor (Microbiology) Management and Science University, University Drive, Seksyen13 Selangor, Malaysia Prof. José María Luna Ariza Department of Computer Sciences and Numerical Analysis Campus of Rabanales University of Córdoba, Spain Dr. Khaiser Nikam Professor, Library and Information Science Department of Library and Information Science University of Mysore Mysore, India Quaisher J Hossain Senior Editor Group Managing Editor Dr. Archana Mehrotra Managing Director CELNET, Delhi, India Meenakshi Tripathi Shivani Sharma Chairman Mr. Puneet Mehrotra Director Shambhavi Mishra Associate Editors Sugandha Mishra
  • 5. Prof. Priyavrat Thareja Director Principal Rayat Institute of Engineering and Information Technology Punjab, India Dr. Baldev Raj Director, National Institute of Advanced Studies Indian Institute of Science campus Bangalore Karnataka, India Former Director Indira Gandhi Centre for Atomic Research, Kalpakkam, Tamil Nadu, India Dr. Pankaj Poddar Senior Scientist Physical and Materials Chemistry Division, National Chemical Laboratory Pune, Maharastra India Prof. D. N. Rao Professor and Head Department of Biochemistry All India Institute of Medical Sciences New Delhi, India Dr. Nandini Chatterjee Singh Additional Professor National Brain Research Centre Manesar, Gurgaon Haryana, India Dr. Ashish Runthala Lecturer, Biological Sciences Group Birla Institute of Technology and Science Pilani, Rajasthan, India Dr. Bankim Chandra Ray Professor and Ex-Head of the Department Department of Metallurgical and Materials Engineering National Institute of Technology, Rourkela Odisha, India Prof. Yuwaraj Marotrao Ghugal Professor and Head Department of Applied Mechanics Government College of Engineering Vidyanagar, Karad Maharashtra, India Dr. Hardev Singh Virk Visiting Professor, Department of Physics University of SGGS World University Fatehgarh Sahib, Punjab, India Former Director Research DAV Institute of Engineering and Technology Jallandhar, India Dr. Shrikant Balkisan Dhoot Senior Research Scientist, Reliance Industries Limited, Mumbai, India Former Head (Research and Development) Nurture Earth R&D Pvt Ltd., MIT Campus Beed Bypass Road, Aurangabad Maharashtra, India STM JOURNALS ADVISORY BOARD
  • 6. Dr. Rakesh Kumar Assistant Professor Department of Applied Chemistry Birla Institute of Technology Patna, Bihar, India Prof. Subash Chandra Mishra Professor Department of Metallurgical and Materials Engineering National Institute of Technology, Rourkela Odisha, India Dr. Shankargouda Patil Assistant Professor Department of Oral Pathology KLE Society's Institute of Dental Sciences Bangalore, Karnataka, India Prof. Sundara Ramaprabhu Professor Department of Physics Indian Institute of Technology Madras Chennai, Tamil Nadu India Dr. Baskar Kaliyamoorthy Associate Professor Department of Civil Engineering National Institute of Technology, Trichy Tiruchirappalli, Tamil Nadu, India STM JOURNALS ADVISORY BOARD
  • 7. Dr. N. Rakesh Asst.Prof (Senior Grade) Dept. of Computer Science & Engineering Research laboratory Amrita Vishwa VidyaPeetham Bangalore, India. Dr. B. M. Sagar Associate Professor, Information Science Department, R.V. College of Engineering, Bangalore, India. Dr. R.Devi Priya Assistant Professor, Kongu Engineering College, India. Dr. R. Vinob Chander Assistant Professor, Department of Information Technology, SSN College of Engineering Kalavakkam, Chennai, India. Dr. S. Anandamurugan Assistant Professor (Selection Grade), Department of Information Technology, Kongu Engineering College, Perundurai, India. Dr. Munir ahamed Rabbani Prof. Department of Computer Science, College of Computer, Qassim University, Saudi Arabia. Dr. Himansu Sekhar Behera Assistant Professor ,Department Computer Science and Engineering, Veer Surendra Sai University of Technology (VSSUT) India. Editorial Board Dr. S.Natarajan Professor, PES Institute of Technology Global Academy of Technology, India. Dr. Katta sugamya Associate Professor, Dept. of IT, CBIT, India. Dr. Ravi Prakash Reddy Professor & HOD, G.Narayanamma Institute of Technology & Science (for women) Shaikpet, Hyderabad, India. Dr. M. Senthamil Selvi Professor & Head in the Information Technology Department, Sri Ramakrishna Engineering College at the University of Anna University, Chennai, India. Dr. Sivaraj Rajappan Professor, Department of Computer Science, Velalar College of Engineering and Technology, the Anna University, India.
  • 8. It is my privilege to present the print version of the [Volume 6 Issue 3] of our Current Trends in Information Technology, 2016. The intension of CTIT is to create an atmosphere that stimulates vision,researchandgrowth intheareaofInformationTechnology. Timely publication, honest communication, comprehensive editing and trust with authors and readers have been the hallmark of our journals. STM Journals provide a platform for scholarly research articles to be published in journals of international standards. STM journals strive to publish qualitypaperinrecordtime,makingitaleaderinserviceandbusiness offerings. The aim and scope of STM Journals is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high level learning, teaching andresearchinalltheScientific,TechnicalandMedicaldomains. Finally, I express my sincere gratitude to our Editorial/ Reviewer board, Authors and publication team for their continued support and invaluable contributions and suggestions in the form of authoring writeups/reviewing and providing constructive comments for the advancement of the journals.With regards to their due continuous support and co-operation, we have been able to publish qualityResearch/Reviewsfindingsforourcustomersbase. Ihopeyou willenjoyreadingthisissue andwewelcomeyour feedbackon anyaspectoftheJournal. Dr.ArchanaMehrotra ManagingDirector STM Journals Director's Desk STM JOURNALS
  • 9. 1. Hadoop and Map Reduce for Simplified Processing of Big Data Shobha Rani 1 2. Big Data to Big Data Mining: Issues, Challenges and Data Analytics Solutions Neeraj Kumar, Madhulika Pandey, Krishan Kumar 7 3. Group Management for Secure and Dynamic Sharing of Data in Cloud Computing Raju Dara, Bhongir Sony 16 4. Public Auditing Based Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks Raju Dara, Srikanth Ravula 24 5. Double Guard: Detection Intrusion in Multitier Application S.D. Jadhav, S.R. Nallewar, N.V. Burande, G.V. Bawaskar, R.D. Shilpakar 32 6. Protected Data Compilation in WSN Using Random Routing Algorithms Raju Dara, Jellela Satish Reddy 43 Contents
  • 10. CTIT(2016) 1-6 © STM Journals 2016. All Rights Reserved Page 1 Current Trends in Information Technology ISSN: 2249-4707(online), ISSN: 2348-7895(print) Volume 6, Issue 3 www.stmjournals.com Hadoop and Map Reduce for Simplified Processing of Big Data Shobha Rani* Department of Computer Science, Akarapu Sharath Chandrika Devi Memorial College for Women, Warangal, Telangana, India Abstract Big data refers to large and complex data sets made up of a variety of structured and unstructured data, which are too big, too fast, or too hard to be managed by traditional techniques. Hadoop is an open source software platform for structuring big data on computer clusters built from commodity hardware and enabling it for data analysis. It is designed to scale up from a single server to thousands of machines, with a very high degree of fault tolerance. MapReduce is a programming model for processing large data sets with parallel distributed algorithm on cluster. This paper presents the survey of simplified big data processing with Hadoop architecture and MapReduce framework. Keywords: Big data, Hadoop, MapReduce, HDFS, Big data Analytics INTRODUCTION Currently, enormous amounts of data are created every day. With the rapid expansion of data, we are moving from the terabyte to the petabyte Age. At the same time, new technologies make it possible to organize and utilize the massive amounts of data currently being generated. However, this trend creates a great demand for new data storage and analysis methods [1, 2]. Especially, theoretical and practical aspects of extracting knowledge from massive data sets have become quite important. The term “Big Data” has recently been applied to datasets that grow so large and become unsuitable to work with the traditional database management systems. They are data sets whose size is beyond the ability of commonly used software tools and storage systems to capture, store, manage, as well as process data within a tolerable elapsed time [3]. Big data sizes are constantly increasing, currently ranging from terabytes to petabytes of data in a single data set. Consequently, some of the problems related to big data include data capture, store, searching, sharing, analysis and visualization. Today enterprises are exploring large volumes of highly detailed data so as to discover facts they did not know before [4].  Ambiguity—a lack of metadata creates ambiguity in big data that leads to inconsistency (Figure 1).  Viscosity—measure of data flow over the network.
  • 11. CTIT(2016) 7-15 © STM Journals 2016. All Rights Reserved Page 7 Current Trends in Information Technology ISSN: 2249-4707(online), ISSN: 2348-7895(print) Volume 6, Issue 3 www.stmjournals.com Big Data to Big Data Mining: Issues, Challenges and Data Analytics Solutions Neeraj Kumar, Madhulika Pandey*, Krishan Kumar Department of Computer Science, JIMS Engineering Management Technical Campus, Greater Noida, Uttar Pradesh, India Abstract Data has evolved at a great pace due to increasing interest of people and valuable contribution towards the emerging technologies. Emerging technologies are successful in generating huge quantity of data from various sources which in return provides Big Data. Big Data constitutes large amount of data in terms of texts, statistics, facts, figures, and records, etc., generated from heterogeneous environment. Big Data needs special attention for storage, managing, transportation and processing of data. It includes amassing of data in terms of 3V’s, i.e. volume, variety and velocity. Issues and challenges of Big Data are real time obstacles and needs instant consideration. This paper presents the overview of Big Data along with its issues and challenges. Applications of data mining in Big Data along with some of its open sources are also discussed in the paper. Keywords: Big Data, big data analytics, big data mining, Massive Online Analysis, R, GraphLab, Pegasus, Mahout INTRODUCTION In the pre-digital revolution world of the late 1980s, most of the data was stored on videotapes such as VHS cassettes, Vinyl LP records, audio cassette tapes, and photography accounted for significant portions as well. Paper based storage represented 33% of all the data storage on its own in 1986. 25 % of all the data stored in the world in 2000 was stored digitally. 2002 was the first year in which digital storage capacity overtook analog capacity. The digital storage grew annually by 23% between 1986 and 2007 with 94 % of all the data was stored in digital format by 2007 [1]. Now, we are successful in generating and collecting data from numerous sources. The data volumes are exploding. Today, more than 2.5 exabytes (2.5 billion gigabytes) of data is generated every single day. This is expected to continue growing at a significant rate with mobile devices accounting for much of this data. Every second we create new data. For example, we perform 40,000 search queries every second (on Google alone), which makes it 3.5 searches per day and 1.2 trillion searches per year. Facebook users send on average 31.25 million messages and view 2.77 million videos every minute [2]. Applications of internet, such as E-commerce, social networking sites, etc., are speeding up the data generation process, this type of data generated and gathered in huge volume is ‘Big Data’. Big Data is making its valuable place in global economy as it is turning into driving force for economy. As data is increasing day by day, so with the increase of size of data it is difficult to manage such huge volume with the current technology. Data is collected from various sources because of which it is heterogeneous in nature and may be deficient as well. There is a need to store, manage and process the data with innovative technology that can handle and make use of data and transform it into meaningful data, i.e. information. This information from data is analyzed using new techniques for generating valuable outcomes useful for organizations and businesses (Figure 1). This holds importance in knowledge discovery and decision support system. The data management of Big Data is beyond the capability of classic database or computer system. Big Data Analytics are the one who generates valuable outcomes from
  • 12. CTIT (2016) 16-23 © STM Journals 2016. All Rights Reserved Page 16 Current Trends in Information Technology ISSN: 2249-4707(online), ISSN: 2348-7895(print) Volume 6, Issue 3 www.stmjournals.com Group Management for Secure and Dynamic Sharing of Data in Cloud Computing Raju Dara, Bhongir Sony* Department of Computer Science Engineering, Krishna Murthy Institute of Technology and Engineering, Jawaharlal Nehru Technological University, Hyderabad, Telangana, India Abstract Cloud computing has emerged as new model of computing which allows outsourcing data. The phenomenon of outsourcing data to cloud became obvious as cloud has infrastructure as a service (IaaS) layer for it. With this feature of cloud, there is growing trend in outsourcing data to cloud. When an enterprise outsources its data to cloud, it needs to take care of its functionalities in terms of data sharing across its users. The company creates groups and manages group members in order to have secure and dynamic data sharing. Group manager is responsible to determine data to be shared and privileges of group members. Group management is very dynamic thing where new users may be added and existing members may be removed from group. The users who are not associated with the group may involve in collusion attack. The existing systems focus on group management and data sharing. In this paper, we built a mechanism for revoking a user and disable all credentials given to him. We built a prototype application that demonstrates the proof of concept. The empirical results revealed that the proposed scheme is effective. Keywords: Cloud computing, outsourcing, group management, secure data sharing, user revocation INTRODUCTION Cloud computing became a reality. This is in fact the latest technology that enables the world to have a shared pool of resources and access the resources through internet. This phenomenon works for users without making capital investment. The users of cloud can gain access to resources and pay as they use. This is very useful to computing community as the cloud resources are made available to all without restrictions. As the data is growing exponentially, the enterprises prefer outsourcing data to cloud for reducing expenses and ease of management. However, the cloud is treated as untrusted environment. That is the reason there is security concern while outsourcing data to cloud. Cloud can also be used to store and share data to other users. Cloud services are shown in Figure 1. In this context, the data may be associated with different groups in the cloud assuming that an enterprise has multiple groups of people working on different projects. In this case, data is associated with groups. The data of one group is not accessible to other group. There is group manager who is responsible to manage data and group members. Group members may be added or removed as required. The group manager is responsible to handle security issues also. Group manager can grant or remake privileges to group members. The problem with such system is that when users are removed from the group, their access credentials are misused by people to make collusion attacks. In this paper, we proposed a user revocation scheme that takes care of perfect user revocation process. With user revocation, it is possible that the old credentials cannot be misused and thus the collusion attack is prevented. In this paper, our contribution is to have a secure and dynamic scheme for data sharing in cloud and it is equipped with user revocation scheme for complete security. The remainder of the paper is structured as follows: next part of the paper provides review of literature. After that, the proposed system is presented in detail, followed by experimental results and the conclusion.
  • 13. CTIT(2016) 24-31 © STM Journals 2016. All Rights Reserved Page 24 Current Trends in Information Technology ISSN: 2249-4707(online), ISSN: 2348-7895(print) Volume 6, Issue 3 www.stmjournals.com Public Auditing Based Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks Raju Dara, Srikanth Ravula* Department of Computer Science Engineering, Krishna Murthy Institute of Technology and Engineering, Jawaharlal Nehru Technological University, Hyderabad, Telangana, India Abstract Wireless ad hoc networks are vulnerable to packet dropping attacks. However, they are also subjected to packet dropping due to link errors. In case of multi-hop wireless networks, it is essential to differentiate packet dropping due to link error or malicious attack. When any mechanism is able to differentiate this, can provide high level of security to the network with respect to packet dropping attacks. Many solutions came into existence as found in the literature. In this paper, we considered a special insider attack where malicious nodes are aware of other nodes in the network and exploit their knowledge to achieve packet drop which is potential risk in communication networks. Achieving satisfactory accuracy in detection of packet loss due to malicious attacks is given high importance. In this paper, public auditing mechanism is proposed and implemented that exploits correlations between lost packets. We proposed a public auditing architecture for accurate detection of packet drop attacks. We built a custom simulator using Java platform to demonstrate the proof of concept. The empirical results reveal the usefulness of the proposed system. Keywords: Wireless ad hoc network, packet dropping, auditing INTRODUCTION Network is made up of number of nodes. Each node in the network can act as information sender and information receiver. It is true in case of multi-hops between sender and receiver. The sender may not be able to send packets directly to destination without the cooperation from intermediate nodes on the way. Therefore, it is essential to have such cooperation. Having understood this, there are certain issues here. The intermediate nodes may act as malicious nodes and drop packets without forwarding to neighbours. In wireless ad hoc networks, this is the problem that needs to be addressed. As packets play a vital role in communication, dropped packets cannot provide meaningful information to destination. This way the communication quality is deteriorated. With respect to delay, insensitive packets pertaining to a live event, it is important to ensure that packets are reaching destination accurately. Thus there is need for dealing with this problem in order to have meaningful communications in communication networks. The existing applications either focused on packet dropping caused by link errors or attacks. Many existing mechanisms simply consider packet dropping due to attacks. They do not differentiate packet loss due to link error and packet loss due to an attack. In this paper we proposed a public auditing based solution, which demonstrates the proof of concept. The system is implemented in the form of a custom simulator developed using Java platform. The empirical results revealed that the proposed system is able to differentiate between packet losses due to link error from that caused by malicious attacks. The remainder of the paper is structured as follow: next part of the paper provides review of literature, presentation of the proposed system in detail, experimental results and after that, the conclusion of the paper. RELATED WORKS Malicious packet drops and packet drops due to link errors is the differentiation shown by detection algorithms generally. High malicious dropping rates and low link errors in one pattern. The second pattern is high link errors
  • 14. CTIT(2016) 32-42 © STM Journals 2016. All Rights Reserved Page 32 Current Trends in Information Technology ISSN: 2249-4707(online), ISSN: 2348-7895(print) Volume 6, Issue 3 www.stmjournals.com Double Guard: Detection Intrusion in Multitier Application S.D. Jadhav*, S.R. Nallewar, N.V. Burande, G.V. Bawaskar, R.D. Shilpakar Department of Information Technology, Dhole Patil College of Engineering, Wagholi, Pune, Maharashtra, India Abstract In double guard intrusion in multitier system, it is important concept taking into account attacks. There is very little work being performed on multi-tiered anomaly detection (AD) systems. It generates models of network behavior for both web and database network interactions. In such multi-tiered architectures, the back-end database server is often protected in system behind a firewall, while the web servers are remotely over the internet. Though they are protected from direct remote attacks, the back-end systems are susceptible to attacks that use web requests as a means to exploit. It detects this type of attack since the web IDS would merely see typical user login traffic. The current multi-threaded web server architecture in this system carries multiple systems; it is not feasible to detect or profile such causal mapping between web server traffic and it has deserver traffic, since traffic cannot be clearly attributed to user sessions in the use. Keywords: Attacks, double guard, IDS, SQL, TCP INTRODUCTION Problem Definition In this project we present double guard, a system used to detect various attacks in multi- tiered web services and our approach can create normality models of isolated user sessions that include both, the web front end (HTTP) and back end (File or SQL) network transactions [1]. To achieve this, we employ a lightweight virtualization technique to assign each user’s web session to addicted container, an isolated virtual computing environment. We use the container ID to accurately associate the web request with the subsequent DB queries. Double guard can build a causal mapping profile by taking both, the in web server and DB traffic into account in the system used [2]. Objective Intrusion detection system currently examines network request individually within both, the web server and the database system. However, there is very little work being performed on multi-tiered anomaly detection systems that generate models of network behavior for both, back end and web server database interactions. The back end database server is often protected behind a firewall while the web servers are remotely accessible over the internet. Attacks that use web request as a means to exploit the back end and are very important. Need of Project Attacks like Sql and DDoS are very much severe. These attacks in the past have affected the system many number of times. These types of attacks are not recognized by antivirus or by firewalls. Hence, a system that can recognize and deflect these attacks is required. LITERATURE SURVEY Of all the papers referred to implement the proposed system, systems similar to the one proposed here and on which we attempt to present improvements on, can be espied in three of the research papers [1–3]. We have successfully applied static program analysis to intrusion detection and our approach is automatic: the programmer or system administrator merely needs to run our tools on the program at hand. All other automatic approaches to intrusion detection to date have been based on statistical inference, leading to many false alarms; in contrast, our
  • 15. CTIT(2016) 43-50 © STM Journals 2016. All Rights Reserved Page 43 Current Trends in Information Technology ISSN: 2249-4707(online), ISSN: 2348-7895(print) Volume 6, Issue 3 www.stmjournals.com Protected Data Compilation in WSN Using Random Routing Algorithms Raju Dara, Jellela Satish Reddy * Department of Computer Science Engineering, Krishna Murthy Institute of Technology and Engineering, Jawaharlal Nehru Technological University, Hyderabad, Telangana, India Abstract Wireless sensor networks make it conceivable to send secure information from source to destination. On the off chance that connected to network checking information on a host, they can be used to distinguish bargained hub; and refusal of administration is two-key assault. In this paper, we display four "Multi-way randomized directing Algorithm", a technique to send the information, various approaches to order the information into wireless sensor systems. The pure random propagation, shares are engendered in view of one-bounce neighborhood data, sink TTL beginning worth N in every offer and remaining calculations enhance the effectiveness of shares in light of utilizing two-jump neighborhood data. Our work ponders the best calculation by distinguishing the included hubs with dark gaps and refusal of administration in the bundle data with multipath directing calculations that has not been utilized some time recently. We investigated the calculation that have the best proficiency and depicts the proposed framework. Keywords: Wireless sensor networks, security, attacks and routing INTRODUCTION Wireless sensor networks normally comprise of high cost, low-control, and multifunctional wireless sensor hubs, with detecting wireless correspondence capacities [1, 2]. These sensor hubs impart the separation by means of a wireless medium and work together to fulfill a typical undertaking, for instance, environment checking, military reconnaissance, and mechanical procedure control (Figure 1) [3]. The fundamental reasoning behind WSNs is that, while the ability of every individual sensor hub is constrained, the total force of the whole system is adequate for the required mission. In numerous WSN applications, the organization of sensor hubs is performed in an especially appointed manner without watchful arranging and designing. Once sent, the sensor hubs must have the capacity to self-ruling, and sort out themselves into a wireless correspondence system. Sensor hubs are battery-controlled and are relied upon to work without participation for a generally drawn out stretch of time. Most of the time it is extremely troublesome and even difficult to change or revive batteries for the sensor hubs. WSNs are portrayed with denser levels of sensor hub, lack of quality of sensor hubs, and separate force, calculation, and memory limitations. In this way, the kinds attributes and requirements present numerous new difficulties for the advancement and use of WSNs. Wireless sensor system (WSN) is a heterogeneous framework joining a large number of small, modest sensor hubs with a few recognizing qualities. It is low handling force and radio reaches, allowing low vitality utilization in the sensor hubs, and performing constrained and particular detecting and observing capacities [1–6]. Notwithstanding WSNs structure, a specific class of specially appointed systems that work with little base and have pulled in scientists for its improvement and numerous potential regular citizen and military applications, for example, ecological observing, combat zone reconnaissance, and country security. Be that as it may, outlining security conventions is a
  • 16. INFORMATION TECHNOLOGY Current Trends in (CTIT) ISSN 2249-4707 (Online) ISSN 2348-7895 (Print) September–December 2016 SJIF: 3.577 www.stmjournals.com STM JOURNALS Scientific Technical Medical