A method and a system for the detection of an intrusion in a computer network compare the network traffic of the computer network at multiple different points in the network. In an uncompromised network the network traffic monitored at these two different points in the network should be identical. A network intrusion detection system is mostly place at strategic points in a network, so that it can monitor the traffic traveling to or from different devices on that network. The existing Software Defined Network SDN proposes the separation of forward and control planes by introducing a new independent plane called network controller. Machine learning is an artificial intelligence approach that focuses on acquiring knowledge from raw data and, based at least in part on the identified flow, selectively causing the packet, or a packet descriptor associated with the packet. The performance is evaluated using the network analysis metrics such as key generation delay, key sharing delay and the hash code generation time for both SDN and the proposed machine learning SDN. Prof P. Damodharan | K. Veena | Dr N. Suguna "Optimized Intrusion Detection System using Deep Learning Algorithm" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21447.pdf
Paper URL: https://www.ijtsrd.com/engineering/other/21447/optimized-intrusion-detection-system-using-deep-learning-algorithm/prof-p-damodharan
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Jowin John Chemban
By:
Jowin John Chemban (jowinchemban@gmail.com)
HGW16CS022 (2016-2020 Batch)
S7 B.Tech Computer Science Engineering
Holy Grace Academy of Engineering, Mala
Date : September 2019
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Jowin John Chemban
Seminar Report : Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection
By:
Jowin John Chemban (jowinchemban@gmail.com)
HGW16CS022 (2016-2020 Batch)
S7 B.Tech Computer Science Engineering
Holy Grace Academy of Engineering, Mala
Date : November 2019
With the growth of computer networking, electronic commerce and web services, security networking systems have become very important to protect infomation and networks againts malicious usage or attacks. In this report, it is designed an Intrusion Detection System using two artificial neural networks: one for Intrusion Detection and the another for Attack Classification.
Using Machine Learning in Networks Intrusion Detection SystemsOmar Shaya
The internet and different computing devices from desktop computers to smartphones have raised many security and privacy concerns, and the need to automate systems that detect attacks on these networks has emerged in order to be able to protect these networks with scale. And while traditional intrusion detection methods may be able to detect previously known attacks, the issue of dealing with new unknown attacks arises and that brings machine learning as a strong candidate to solve these challenges.
In this report, we investigate the use of machine learning in detecting network attacks, intrusion detection, by looking at work that has been done in this field. Particularly we look at the work that has been done by Pasocal et al.
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Jowin John Chemban
By:
Jowin John Chemban (jowinchemban@gmail.com)
HGW16CS022 (2016-2020 Batch)
S7 B.Tech Computer Science Engineering
Holy Grace Academy of Engineering, Mala
Date : September 2019
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Jowin John Chemban
Seminar Report : Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection
By:
Jowin John Chemban (jowinchemban@gmail.com)
HGW16CS022 (2016-2020 Batch)
S7 B.Tech Computer Science Engineering
Holy Grace Academy of Engineering, Mala
Date : November 2019
With the growth of computer networking, electronic commerce and web services, security networking systems have become very important to protect infomation and networks againts malicious usage or attacks. In this report, it is designed an Intrusion Detection System using two artificial neural networks: one for Intrusion Detection and the another for Attack Classification.
Using Machine Learning in Networks Intrusion Detection SystemsOmar Shaya
The internet and different computing devices from desktop computers to smartphones have raised many security and privacy concerns, and the need to automate systems that detect attacks on these networks has emerged in order to be able to protect these networks with scale. And while traditional intrusion detection methods may be able to detect previously known attacks, the issue of dealing with new unknown attacks arises and that brings machine learning as a strong candidate to solve these challenges.
In this report, we investigate the use of machine learning in detecting network attacks, intrusion detection, by looking at work that has been done in this field. Particularly we look at the work that has been done by Pasocal et al.
Computer Security and Intrusion Detection(IDS/IPS)LJ PROJECTS
This ppt explain you various type of possible attack, security property, Traffic Analysis, Security mechanism Intrusion detection system, vulnerability, Attack framework etc.
ids&ips technique is used to capture logs,sessions,port no,trojans,and malicious activity on the networkand servers.here u can get detailed about ids and ips techniques
Intrusion detection and prevention systemNikhil Raj
This presentation describes how to implement Network based Intrusion Detection System (SNORT) in the network. Detecting and analyzing alerts generated and blocking the Attacker using Access Control List.
What is IDS?
Software or hardware device
Monitors network or hosts for:
Malware (viruses, trojans, worms)
Network attacks via vulnerable ports
Host based attacks, e.g. privilege escalation
What is in an IDS?
An IDS normally consists of:
Various sensors based within the network or on hosts
These are responsible for generating the security events
A central engine
This correlates the events and uses heuristic techniques and rules to create alerts
A console
To enable an administrator to monitor the alerts and configure/tune the sensors
Different types of IDS
Network IDS (NIDS)
Examines all network traffic that passes the NIC that the sensor is running on
Host based IDS (HIDS)
An agent on the host that monitors host activities and log files
Stack-Based IDS
An agent on the host that monitors all of the packets that leave or enter the host
Can monitor a specific protocol(s) (e.g. HTTP for webserver)
SQL injection is a code injection technique, used to attack data-driven applications,
in which malicious SQL statements are inserted into an entry field for execution.
This is a method to attack web applications that have a data repository.The
attacker would send a specially crafted SQL statement that is designed to cause
some malicious action.SQL injection is an attack technique that exploits a security
vulnerability occurring in the database layer of an application and a service. This
is most often found within web pages with dynamic content.
An Efficient Classification Mechanism For Network Intrusion Detection System Based on Data Mining
Techniques:A Survey..........................................................................................................................1
Subaira A. S. and Anitha P.
Automated Biometric Verification: A Survey on Multimodal Biometrics ..............................................1
Rupali L. Telgad, Almas M. N. Siddiqui and Dr. Prapti D. Deshmukh
Design and Implementation of Intelligence Car Parking Systems ........................................................1
Ogunlere Samson, Maitanmi Olusola and Gregory Onwodi
Intrusion Detection Techniques for Mobile Ad Hoc and Wireless Sensor Networks..............................1
Rakesh Sharma, V. A. Athavale and Pinki Sharma
Performance Evaluation of Sentiment Mining Classifiers on Balanced and Imbalanced Dataset ...........1
G.Vinodhini and R M. Chandrasekaran
Demosaicing and Super-resolution for Color Filter Array via Residual Image Reconstruction and Sparse
Representation..................................................................................................................................1
Jie Yin, Guangling Sun and Xiaofei Zhou
Determining Weight of Known Evaluation Criteria in the Field of Mehr Housing using ANP Approach ..1
Saeed Safari, Mohammad Shojaee, Mohammad Tavakolian and Majid Assarian
Application of the Collaboration Facets of the Reference Model in Design Science Paradigm ...............1
Lukasz Ostrowski and Markus Helfert
Personalizing Education News Articles Using Interest Term and Category Based Recommender
Approaches .......................................................................................................................................1
Computer Security and Intrusion Detection(IDS/IPS)LJ PROJECTS
This ppt explain you various type of possible attack, security property, Traffic Analysis, Security mechanism Intrusion detection system, vulnerability, Attack framework etc.
ids&ips technique is used to capture logs,sessions,port no,trojans,and malicious activity on the networkand servers.here u can get detailed about ids and ips techniques
Intrusion detection and prevention systemNikhil Raj
This presentation describes how to implement Network based Intrusion Detection System (SNORT) in the network. Detecting and analyzing alerts generated and blocking the Attacker using Access Control List.
What is IDS?
Software or hardware device
Monitors network or hosts for:
Malware (viruses, trojans, worms)
Network attacks via vulnerable ports
Host based attacks, e.g. privilege escalation
What is in an IDS?
An IDS normally consists of:
Various sensors based within the network or on hosts
These are responsible for generating the security events
A central engine
This correlates the events and uses heuristic techniques and rules to create alerts
A console
To enable an administrator to monitor the alerts and configure/tune the sensors
Different types of IDS
Network IDS (NIDS)
Examines all network traffic that passes the NIC that the sensor is running on
Host based IDS (HIDS)
An agent on the host that monitors host activities and log files
Stack-Based IDS
An agent on the host that monitors all of the packets that leave or enter the host
Can monitor a specific protocol(s) (e.g. HTTP for webserver)
SQL injection is a code injection technique, used to attack data-driven applications,
in which malicious SQL statements are inserted into an entry field for execution.
This is a method to attack web applications that have a data repository.The
attacker would send a specially crafted SQL statement that is designed to cause
some malicious action.SQL injection is an attack technique that exploits a security
vulnerability occurring in the database layer of an application and a service. This
is most often found within web pages with dynamic content.
An Efficient Classification Mechanism For Network Intrusion Detection System Based on Data Mining
Techniques:A Survey..........................................................................................................................1
Subaira A. S. and Anitha P.
Automated Biometric Verification: A Survey on Multimodal Biometrics ..............................................1
Rupali L. Telgad, Almas M. N. Siddiqui and Dr. Prapti D. Deshmukh
Design and Implementation of Intelligence Car Parking Systems ........................................................1
Ogunlere Samson, Maitanmi Olusola and Gregory Onwodi
Intrusion Detection Techniques for Mobile Ad Hoc and Wireless Sensor Networks..............................1
Rakesh Sharma, V. A. Athavale and Pinki Sharma
Performance Evaluation of Sentiment Mining Classifiers on Balanced and Imbalanced Dataset ...........1
G.Vinodhini and R M. Chandrasekaran
Demosaicing and Super-resolution for Color Filter Array via Residual Image Reconstruction and Sparse
Representation..................................................................................................................................1
Jie Yin, Guangling Sun and Xiaofei Zhou
Determining Weight of Known Evaluation Criteria in the Field of Mehr Housing using ANP Approach ..1
Saeed Safari, Mohammad Shojaee, Mohammad Tavakolian and Majid Assarian
Application of the Collaboration Facets of the Reference Model in Design Science Paradigm ...............1
Lukasz Ostrowski and Markus Helfert
Personalizing Education News Articles Using Interest Term and Category Based Recommender
Approaches .......................................................................................................................................1
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IJNSA Journal
With the ever increasing number and diverse type of attacks, including new and previously unseen attacks, the effectiveness of an Intrusion Detection System is very important. Hence there is high demand to reduce the threat level in networks to ensure the data and services offered by them to be more secure. In this paper we developed an effective test suite for improving the efficiency and accuracy of an intrusion detection system using the layered CRFs. We set up different types of checks at multiple levels in each layer. Our framework examines various attributes at every layer in order to effectively identify any breach of security. Once the attack is detected, it is intimated through mobile phone to the system administrator for safeguarding the server system. We established experimentally that the layered CRFs can thus be more effective in detecting intrusions when compared with the other previously known techniques.
Secure intrusion detection and countermeasure selection in virtual system usi...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIOSR Journals
To improve network security different steps has been taken as size and importance of the network has
increases day by day. Then chances of a network attacks increases Network is mainly attacked by some
intrusions that are identified by network intrusion detection system. These intrusions are mainly present in data
packets and each packet has to scan for its detection. This paper works to develop a intrusion detection system
which utilizes the identity and signature of the intrusion for identifying different kinds of intrusions. As network
intrusion detection system need to be efficient enough that chance of false alarm generation should be less,
which means identifying as a intrusion but actually it is not an intrusion. Result obtained after analyzing this
system is quite good enough that nearly 90% of true alarms are generated. It detect intrusion for various
services like Dos, SSH, etc by neural network
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...IJNSA Journal
In order to the rapid growth of the network application, new kinds of network attacks are emerging
endlessly. So it is critical to protect the networks from attackers and the Intrusion detection
technology becomes popular. Therefore, it is necessary that this security concern must be articulate
right from the beginning of the network design and deployment. The intrusion detection technology is the
process of identifying network activity that can lead to a compromise of security policy. Lot of work has
been done in detection of intruders. But the solutions are not satisfactory. In this paper, we propose a
novel Distributed Intrusion Detection System using Multi Agent In order to decrease false alarms and
manage misuse and anomaly detects
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...IJNSA Journal
In order to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So it is critical to protect the networks from attackers and the Intrusion detection technology becomes popular. Therefore, it is necessary that this security concern must be articulate right from the beginning of the network design and deployment. The intrusion detection technology is the process of identifying network activity that can lead to a compromise of security policy. Lot of work has been done in detection of intruders. But the solutions are not satisfactory. In this paper, we propose a novel Distributed Intrusion Detection System using Multi Agent In order to decrease false alarms and manage misuse and anomaly detects.
Intrusion Detection Systems (IDSs) have become widely recognized as powerful tools for identifying, deterring and deflecting malicious attacks over the network. Intrusion detection systems (IDSs) are designed and installed to aid in deterring or mitigating the damage that can be caused by hacking, or breaking into sensitive IT systems. . The attacks can come from outsider attackers on the Internet, authorized insiders who misuse the privileges that have been given them and unauthorized insiders who attempt to gain unauthorized privileges. IDSs cannot be used in isolation, but must be part of a larger framework of IT security measures. Essential to almost every intrusion detection system is the ability to search through packets and identify content that matches known attacks. Space and time efficient string matching algorithms are therefore important for identifying these packets at line rate. In this paper we examine string matching algorithm and their use for Intrusion Detection. Keywords: System Design, Network Algorithm
In recent years, wireless sensor network (WSN) is used in several application areas resembling observance, tracking, and dominant in IoTs. for several applications of WSN, security is a crucial demand. However, security solutions in WSN disagree from ancient networks because of resource limitation and process constraints. This paper analyzes security solutions: TinySec, IEEE 802.15.4, SPINS, MiniSEC, LSec, LLSP, LISA, and LISP in WSN. This paper additionally presents characteristics, security needs, attacks, cryptography algorithms, and operation modes. This paper is taken into account to be helpful for security designers in WSNs.
Survey on Host and Network Based Intrusion Detection SystemEswar Publications
With invent of new technologies and devices, Intrusion has become an area of concern because of security issues, in the ever growing area of cyber-attack. An intrusion detection system (IDS) is defined as a device or software application which monitors system or network activities for malicious activities or policy violations. It produces reports to a management station [1]. In this paper we are mainly focused on different IDS concepts based on Host and Network systems.
When talk about intrusion, then it is pre- assume
that the intrusion is happened or it is stopped by the intrusion
detection system. This is all done through the process of collection
of network traffic information at certain point of networks in the
digital system. In this way the IDS perform their job to secure the
network. There are two types of Intrusion Detection: First is
Misuse based detection and second one is Anomaly based detection.
The detection which uses data set of known predefined set of
attacks is called Misuse - Based IDSs and Anomaly based IDSs are
capable of detecting new attacks which are not known to previous
data set of attacks and is based on some new heuristic methods. In
our hybrid IDS for computer network security we use Min-Min
algorithm with neural network in hybrid method for improving
performance of higher level of IDS in network. Data releasing is
the problem for privacy point of view, so we first evaluate training
for error from neural network regression state, after that we can get
outer sniffer by using Min length from source, so that we
hybridized as with Min – Min in neural network in hybrid system
which we proposed in our research paper
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Network Forensics is scientifically proven technique to accumulate, perceive, identify, examine, associate, analyse and document digital evidence from multiple systems for the purpose of uncovering the fact of attacks and other problem incident as well as performing the action to recover from the attack. Many systems are proposed for designing the network forensic systems. In this paper we have prepared comparative analysis of various models based on different techniques.
Outstanding to the promotion of the Internet and local networks, interruption occasions to computer
systems are emerging. Intrusion detection systems are becoming progressively vital in retaining
appropriate network safety. IDS is a software or hardware device that deals with attacks by gathering
information from a numerous system and network sources, then evaluating signs of security complexities.
Enterprise networked systems are unsurprisingly unprotected to the growing threats posed by hackers as
well as malicious users inside to a network. IDS technology is one of the significant tools used now-a-days,
to counter such threat. In this research we have proposed framework by using advance feature selection
and dimensionality reduction technique we can reduce IDS data then applying Fuzzy ARTMAP classifier
we can find intrusions so that we get accurate results within less time. Feature selection, as an active
research area in decreasing dimensionality, eliminating unrelated data, developing learning correctness,
and improving result unambiguousness.
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
The manufacturing industries all over the world are facing tough challenges for growth, development and sustainability in today’s competitive environment. They have to achieve apex position by adapting with the global competitive environment by delivering goods and services at low cost, prime quality and better price to increase wealth and consumer satisfaction. Cost Management ensures profit, growth and sustainability of the business with implementation of Continuous Improvement Technique like Six Sigma. This leads to optimize Business performance. The method drives for customer satisfaction, low variation, reduction in waste and cycle time resulting into a competitive advantage over other industries which did not implement it. The main objective of this paper ‘Six Sigma Technique A Journey Through Its Implementation’ is to conceptualize the effectiveness of Six Sigma Technique through the journey of its implementation. Aditi Sunilkumar Ghosalkar "‘Six Sigma Technique’: A Journey Through its Implementation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64546.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64546/‘six-sigma-technique’-a-journey-through-its-implementation/aditi-sunilkumar-ghosalkar
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
Edge computing, a paradigm that involves processing data closer to its source, has gained significant attention for its potential to revolutionize data processing and communication in space missions. With the increasing complexity and data volume generated by modern space missions, traditional centralized computing approaches face challenges related to latency, bandwidth, and security. Edge computing in space, involving on board processing and analysis of data, offers promising solutions to these challenges. This paper explores the concept of edge computing in space, its benefits, applications, and future prospects in enhancing space missions. Manish Verma "Edge Computing in Space: Enhancing Data Processing and Communication for Space Missions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64541.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/64541/edge-computing-in-space-enhancing-data-processing-and-communication-for-space-missions/manish-verma
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
Communal politics in India has evolved through centuries, weaving a complex tapestry shaped by historical legacies, colonial influences, and contemporary socio political transformations. This research comprehensively examines the dynamics of communal politics in 21st century India, emphasizing its historical roots, socio political dynamics, economic implications, challenges, and prospects for mitigation. The historical perspective unravels the intricate interplay of religious identities and power dynamics from ancient civilizations to the impact of colonial rule, providing insights into the evolution of communalism. The socio political dynamics section delves into the contemporary manifestations, exploring the roles of identity politics, socio economic disparities, and globalization. The economic implications section highlights how communal politics intersects with economic issues, perpetuating disparities and influencing resource allocation. Challenges posed by communal politics are scrutinized, revealing multifaceted issues ranging from social fragmentation to threats against democratic values. The prospects for mitigation present a multifaceted approach, incorporating policy interventions, community engagement, and educational initiatives. The paper conducts a comparative analysis with international examples, identifying common patterns such as identity politics and economic disparities. It also examines unique challenges, emphasizing Indias diverse religious landscape, historical legacy, and secular framework. Lessons for effective strategies are drawn from international experiences, offering insights into inclusive policies, interfaith dialogue, media regulation, and global cooperation. By scrutinizing historical epochs, contemporary dynamics, economic implications, and international comparisons, this research provides a comprehensive understanding of communal politics in India. The proposed strategies for mitigation underscore the importance of a holistic approach to foster social harmony, inclusivity, and democratic values. Rose Hossain "Dynamics of Communal Politics in 21st Century India: Challenges and Prospects" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64528.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/history/64528/dynamics-of-communal-politics-in-21st-century-india-challenges-and-prospects/rose-hossain
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
Background and Objective Telehealth has become a well known tool for the delivery of health care in Saudi Arabia, and the perspective and knowledge of healthcare providers are influential in the implementation, adoption and advancement of the method. This systematic review was conducted to examine the current literature base regarding telehealth and the related healthcare professional perspective and knowledge in the Kingdom of Saudi Arabia. Materials and Methods This systematic review was conducted by searching 7 databases including, MEDLINE, CINHAL, Web of Science, Scopus, PubMed, PsycINFO, and ProQuest Central. Studies on healthcare practitioners telehealth knowledge and perspectives published in English in Saudi Arabia from 2000 to 2023 were included. Boland directed this comprehensive review. The researchers examined each connected study using the AXIS tool, which evaluates cross sectional systematic reviews. Narrative synthesis was used to summarise and convey the data. Results Out of 1840 search results, 10 studies were included. Positive outlook and limited knowledge among providers were seen across trials. Healthcare professionals like telehealth for its ability to improve quality, access, and delivery, save time and money, and be successful. Age, gender, occupation, and work experience also affect health workers knowledge. In Saudi Arabia, healthcare professionals face inadequate expert assistance, patient privacy, internet connection concerns, lack of training courses, lack of telehealth understanding, and high costs while performing telemedicine. Conclusions Healthcare practitioners telehealth perceptions and knowledge were examined in this systematic study. Its collection of concerned experts different personal attitudes and expertise would help enhance telehealths implementation in Saudi Arabia, develop its healthcare delivery alternative, and eliminate frequent problems. Badriah Mousa I Mulayhi | Dr. Jomin George | Judy Jenkins "Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in Saudi Arabia: A Systematic Review" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64535.pdf Paper Url: https://www.ijtsrd.com/medicine/other/64535/assess-perspective-and-knowledge-of-healthcare-providers-towards-elehealth-in-saudi-arabia-a-systematic-review/badriah-mousa-i-mulayhi
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
The impact of digital media on the distribution of power and the weakening of traditional gatekeepers has gained considerable attention in recent years. The adoption of digital technologies and the internet has resulted in declining influence and power for traditional gatekeepers such as publishing houses and news organizations. Simultaneously, digital media has facilitated the emergence of new voices and players in the media industry. Digital medias impact on power decentralization and gatekeeper erosion is visible in several ways. One significant aspect is the democratization of information, which enables anyone with an internet connection to publish and share content globally, leading to citizen journalism and bypassing traditional gatekeepers. Another aspect is the disruption of conventional media industry business models, as traditional organizations struggle to adjust to the decrease in advertising revenue and the rise of digital platforms. Alternative business models, such as subscription models and crowdfunding, have become more prevalent, leading to the emergence of new players. Overall, the impact of digital media on the distribution of power and the weakening of traditional gatekeepers has brought about significant changes in the media landscape and the way information is shared. Further research is required to fully comprehend the implications of these changes and their impact on society. Dr. Kusum Lata "The Impact of Digital Media on the Decentralization of Power and the Erosion of Traditional Gatekeepers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64544.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64544/the-impact-of-digital-media-on-the-decentralization-of-power-and-the-erosion-of-traditional-gatekeepers/dr-kusum-lata
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
This research investigates the nexus between online discussions on Dr. B.R. Ambedkars ideals and their impact on social inclusion among college students in Gurugram, Haryana. Surveying 240 students from 12 government colleges, findings indicate that 65 actively engage in online discussions, with 80 demonstrating moderate to high awareness of Ambedkars ideals. Statistically significant correlations reveal that higher online engagement correlates with increased awareness p 0.05 and perceived social inclusion. Variations across colleges and a notable effect of college type on perceived social inclusion highlight the influence of contextual factors. Furthermore, the intersectional analysis underscores nuanced differences based on gender, caste, and socio economic status. Dr. Kusum Lata "Online Voices, Offline Impact: Ambedkar's Ideals and Socio-Political Inclusion - A Study of Gurugram District" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64543.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64543/online-voices-offline-impact-ambedkars-ideals-and-sociopolitical-inclusion--a-study-of-gurugram-district/dr-kusum-lata
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
Noting calls for contextualizing Agro entrepreneurs problems and challenges of the agro entrepreneurs and for greater attention to the Role of entrepreneurs in agro entrepreneurship research, we conduct a systematic literature review of extent research in agriculture entrepreneurship to overcome the study objectives of complications of agro entrepreneurs through various factors, Development of agriculture products is a key factor for the overall economic growth of agro entrepreneurs Agro Entrepreneurs produces firsthand large scale employment, utilizes the labor and natural resources, This research outlines the problems of Weather and Soil Erosions, Market price fluctuation, stimulates labor cost problems, reduces concentration of Price volatility, Dependency on Intermediaries, induces Limited Bargaining Power, and Storage and Transportation Costs. This paper mainly devoted to highlight Problems and challenges faced for the sustainable of Agro Entrepreneurs in India. Vinay Prasad B "Problems and Challenges of Agro Entreprenurship - A Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64540.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64540/problems-and-challenges-of-agro-entreprenurship--a-study/vinay-prasad-b
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
Disclosure is a process through which a business enterprise communicates with external parties. A corporate disclosure is communication of financial and non financial information of the activities of a business enterprise to the interested entities. Corporate disclosure is done through publishing annual reports. So corporate disclosure through annual reports plays a vital role in the life of all the companies and provides valuable information to investors. The basic objectives of corporate disclosure is to give a true and fair view of companies to the parties related either directly or indirectly like owner, government, creditors, shareholders etc. in the companies act, provisions have been made about mandatory and voluntary disclosure. The IT sector in India is rapidly growing, the trend to invest in the IT sector is rising and employment opportunities in IT sectors are also increasing. Therefore the IT sector is expected to have fair, full and adequate disclosure of all information. Unfair and incomplete disclosure may adversely affect the entire economy. A research study on disclosure practices of IT companies could play an important role in this regard. Hence, the present research study has been done to study and review comparative analysis of total corporate disclosure of selected IT companies of India and to put forward overall findings and suggestions with a view to increase disclosure score of these companies. The researcher hopes that the present research study will be helpful to all selected Companies for improving level of corporate disclosure through annual reports as well as the government, creditors, investors, all business organizations and upcoming researcher for comparative analyses of level of corporate disclosure with special reference to selected IT companies. Dr. Vaibhavi D. Thaker "Comparative Analysis of Total Corporate Disclosure of Selected IT Companies of India" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64539.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64539/comparative-analysis-of-total-corporate-disclosure-of-selected-it-companies-of-india/dr-vaibhavi-d-thaker
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
This study investigated the impact of educational background and professional training on human rights awareness among secondary school teachers in the Marathwada region of Maharashtra, India. The key findings reveal that higher levels of education, particularly a master’s degree, and fields of study related to education, humanities, or social sciences are associated with greater human rights awareness among teachers. Additionally, both pre service teacher training and in service professional development programs focused on human rights education significantly enhance teacher’s knowledge, skills, and competencies in promoting human rights principles in their classrooms. Baig Ameer Bee Mirza Abdul Aziz | Dr. Syed Azaz Ali Amjad Ali "The Impact of Educational Background and Professional Training on Human Rights Awareness among Secondary School Teachers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64529.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64529/the-impact-of-educational-background-and-professional-training-on-human-rights-awareness-among-secondary-school-teachers/baig-ameer-bee-mirza-abdul-aziz
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
“One Language sets you in a corridor for life. Two languages open every door along the way” Frank Smith English as a foreign language or as a second language has been ruling in India since the period of Lord Macaulay. But the question is how much we teach or learn English properly in our culture. Is there any scope to use English as a language rather than a subject How much we learn or teach English without any interference of mother language specially in the classroom teaching learning scenario in West Bengal By considering all these issues the researcher has attempted in this article to focus on the effective teaching learning process comparing to other traditional strategies in the field of English curriculum at the secondary level to investigate whether they fulfill the present teaching learning requirements or not by examining the validity of the present curriculum of English. The purpose of this study is to focus on the effectiveness of the systematic, scientific, sequential and logical transaction of the course between the teachers and the learners in the perspective of the 5Es programme that is engage, explore, explain, extend and evaluate. Sanchali Mondal | Santinath Sarkar "A Study on the Effective Teaching Learning Process in English Curriculum at the Secondary Level of West Bengal" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd62412.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/62412/a-study-on-the-effective-teaching-learning-process-in-english-curriculum-at-the-secondary-level-of-west-bengal/sanchali-mondal
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
This paper reports on a study which was conducted to investigate the role of mentoring and its influence on the effectiveness of the teaching of Physics in secondary schools in the South West Region of Cameroon. The study adopted the convergent parallel mixed methods design, focusing on respondents in secondary schools in the South West Region of Cameroon. Both quantitative and qualitative data were collected, analysed separately, and the results were compared to see if the findings confirm or disconfirm each other. The quantitative analysis found that majority of the respondents 72 of Physics teachers affirmed that they had more experienced colleagues as mentors to help build their confidence, improve their teaching, and help them improve their effectiveness and efficiency in guiding learners’ achievements. Only 28 of the respondents disagreed with these statements. With majority respondents 72 agreeing with the statements, it implies that in most secondary schools, experienced Physics teachers act as mentors to build teachers’ confidence in teaching and improving students’ learning. The interview qualitative data analysis summarized how secondary school Principals use meetings with mentors and mentees to promote mentorship in the school milieu. This has helped strengthen teachers’ classroom practices in secondary schools in the South West Region of Cameroon. With the results confirming each other, the study recommends that mentoring should focus on helping teachers employ social interactions and instructional practices feedback and clarity in teaching that have direct measurable impact on students’ learning achievements. Andrew Ngeim Sumba | Frederick Ebot Ashu | Peter Agborbechem Tambi "The Role of Mentoring and Its Influence on the Effectiveness of the Teaching of Physics in Secondary Schools in the South West Region of Cameroon" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64524.pdf Paper Url: https://www.ijtsrd.com/management/management-development/64524/the-role-of-mentoring-and-its-influence-on-the-effectiveness-of-the-teaching-of-physics-in-secondary-schools-in-the-south-west-region-of-cameroon/andrew-ngeim-sumba
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
This study primarily focuses on the design of a high side buck converter using an Arduino microcontroller. The converter is specifically intended for use in DC DC applications, particularly in standalone solar PV systems where the PV output voltage exceeds the load or battery voltage. To evaluate the performance of the converter, simulation experiments are conducted using Proteus Software. These simulations provide insights into the input and output voltages, currents, powers, and efficiency under different state of charge SoC conditions of a 12V,70Ah rechargeable lead acid battery. Additionally, the hardware design of the converter is implemented, and practical data is collected through operation, monitoring, and recording. By comparing the simulation results with the practical results, the efficiency and performance of the designed converter are assessed. The findings indicate that while the buck converter is suitable for practical use in standalone PV systems, its efficiency is compromised due to a lower output current. Chan Myae Aung | Dr. Ei Mon "Design Simulation and Hardware Construction of an Arduino-Microcontroller Based DC-DC High-Side Buck Converter for Standalone PV System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64518.pdf Paper Url: https://www.ijtsrd.com/engineering/mechanical-engineering/64518/design-simulation-and-hardware-construction-of-an-arduinomicrocontroller-based-dcdc-highside-buck-converter-for-standalone-pv-system/chan-myae-aung
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
Energy becomes sustainable if it meets the needs of the present without compromising the ability of future generations to meet their own needs. Some of the definitions of sustainable energy include the considerations of environmental aspects such as greenhouse gas emissions, social, and economic aspects such as energy poverty. Generally far more sustainable than fossil fuel are renewable energy sources such as wind, hydroelectric power, solar, and geothermal energy sources. Worthy of note is that some renewable energy projects, like the clearing of forests to produce biofuels, can cause severe environmental damage. The sustainability of nuclear power which is a low carbon source is highly debated because of concerns about radioactive waste, nuclear proliferation, and accidents. The switching from coal to natural gas has environmental benefits, including a lower climate impact, but could lead to delay in switching to more sustainable options. “Carbon capture and storage” can be built into power plants to remove the carbon dioxide CO2 emissions, but this technology is expensive and has rarely been implemented. Leading non renewable energy sources around the world is fossil fuels, coal, petroleum, and natural gas. Nuclear energy is usually considered another non renewable energy source, although nuclear energy itself is a renewable energy source, but the material used in nuclear power plants is not. The paper addresses the issue of sustainable energy, its attendant benefits to the future generation, and humanity in general. Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku "Sustainable Energy" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64534.pdf Paper Url: https://www.ijtsrd.com/engineering/electrical-engineering/64534/sustainable-energy/paul-a-adekunte
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
This paper aims to outline the executive regulations, survey standards, and specifications required for the implementation of the Sudan Survey Act, and for regulating and organizing all surveying work activities in Sudan. The act has been discussed for more than 5 years. The Land Survey Act was initiated by the Sudan Survey Authority and all official legislations were headed by the Sudan Ministry of Justice till it was issued in 2022. The paper presents conceptual guidelines to be used for the Survey Act implementation and to regulate the survey work practice, standardizing the field surveys, processing, quality control, procedures, and the processes related to survey work carried out by the stakeholders and relevant authorities in Sudan. The conceptual guidelines are meant to improve the quality and harmonization of geospatial data and to aid decision making processes as well as geospatial information systems. The established comprehensive executive regulations will govern and regulate the implementation of the Sudan Survey Geomatics Act in all surveying and mapping practices undertaken by the Sudan Survey Authority SSA and state local survey departments for public or private sector organizations. The targeted standards and specifications include the reference frame, projection, coordinate systems, and the guidelines and specifications that must be followed in the field of survey work, processes, and mapping products. In the last few decades, there has been a growing awareness of the importance of geomatics activities and measurements on the Earths surface in space and time, together with observing and mapping the changes. In such cases, data must be captured promptly, standardized, and obtained with more accuracy and specified in much detail. The paper will also highlight the current situation in Sudan, the degree to which survey standards are used, the problems encountered, and the errors that arise from not using the standards and survey specifications. Kamal A. A. Sami "Concepts for Sudan Survey Act Implementations - Executive Regulations and Standards" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63484.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63484/concepts-for-sudan-survey-act-implementations--executive-regulations-and-standards/kamal-a-a-sami
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
The discussions between ellipsoid and geoid have invoked many researchers during the recent decades, especially during the GNSS technology era, which had witnessed a great deal of development but still geoid undulation requires more investigations. To figure out a solution for Sudans local geoid, this research has tried to intake the possibility of determining the geoid model by following two approaches, gravimetric and geometrical geoid model determination, by making use of GNSS leveling benchmarks at Khartoum state. The Benchmarks are well distributed in the study area, in which, the horizontal coordinates and the height above the ellipsoid have been observed by GNSS while orthometric heights were carried out using precise leveling. The Global Geopotential Model GGM represented in EGM2008 has been exploited to figure out the geoid undulation at the benchmarks in the study area. This is followed by a fitting process, that has been done to suit the geoid undulation data which has been computed using GNSS leveling data and geoid undulation inspired by the EGM2008. Two geoid surfaces were created after the fitting process to ensure that they are identical and both of them could be counted for getting the same geoid undulation with an acceptable accuracy. In this respect, statistical operation played an important role in ensuring the consistency and integrity of the model by applying cross validation techniques splitting the data into training and testing datasets for building the geoid model and testing its eligibility. The geometrical solution for geoid undulation computation has been utilized by applying straightforward equations that facilitate the calculation of the geoid undulation directly through applying statistical techniques for the GNSS leveling data of the study area to get the common equation parameters values that could be utilized to calculate geoid undulation of any position in the study area within the claimed accuracy. Both systems were checked and proved eligible to be used within the study area with acceptable accuracy which may contribute to solving the geoid undulation problem in the Khartoum area, and be further generalized to determine the geoid model over the entire country, and this could be considered in the future, for regional and continental geoid model. Ahmed M. A. Mohammed. | Kamal A. A. Sami "Towards the Implementation of the Sudan Interpolated Geoid Model (Khartoum State Case Study)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63483.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63483/towards-the-implementation-of-the-sudan-interpolated-geoid-model-khartoum-state-case-study/ahmed-m-a-mohammed
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
Sudan is witnessing an acceleration in the processes of development and transformation in the performance of government institutions to raise the productivity and investment efficiency of the government sector. The development plans and investment opportunities have focused on achieving national goals in various sectors. This paper aims to illuminate the path to the future and provide geospatial data and information to develop the investment climate and environment for all sized businesses, and to bridge the development gap between the Sudan states. The Sudan Survey Authority SSA is the main advisor to the Sudan Government in conducting surveying, mappings, designing, and developing systems related to geospatial data and information. In recent years, SSA made a strategic partnership with the Ministry of Investment to activate Geospatial Information for Sudans Sustainable Investment and in particular, for the preparation and implementation of the Sudan investment map, based on the directives and objectives of the Ministry of Investment MI in Sudan. This paper comes within the framework of activating the efforts of the Ministry of Investment to develop technical investment services by applying techniques adopted by the Ministry and its strategic partners for advancing investment processes in the country. Kamal A. A. Sami "Activating Geospatial Information for Sudan's Sustainable Investment Map" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63482.pdf Paper Url: https://www.ijtsrd.com/engineering/information-technology/63482/activating-geospatial-information-for-sudans-sustainable-investment-map/kamal-a-a-sami
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
In a rapidly changing global landscape, the importance of education as a unifying force cannot be overstated. This paper explores the crucial role of educational unity in fostering a stronger and more inclusive society through the embrace of diversity. By examining the benefits of diverse learning environments, the paper aims to highlight the positive impact on societal strength. The discussion encompasses various dimensions, from curriculum design to classroom dynamics, and emphasizes the need for educational institutions to become catalysts for unity in diversity. It highlights the need for a paradigm shift in educational policies, curricula, and pedagogical approaches to ensure that they are reflective of the diverse fabric of society. This paper also addresses the challenges associated with implementing inclusive educational practices and offers practical strategies for overcoming barriers. It advocates for collaborative efforts between educational institutions, policymakers, and communities to create a supportive ecosystem that promotes diversity and unity. Mr. Amit Adhikari | Madhumita Teli | Gopal Adhikari "Educational Unity: Embracing Diversity for a Stronger Society" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64525.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64525/educational-unity-embracing-diversity-for-a-stronger-society/mr-amit-adhikari
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
The diversity of indigenous knowledge systems in India is vast and can vary significantly between different communities and regions. Preserving and respecting these knowledge systems is crucial for maintaining cultural heritage, promoting sustainable practices, and fostering cross cultural understanding. In this paper, an overview of the prospects and challenges associated with incorporating Indian indigenous knowledge into management is explored. It is found that IIKS helps in management in many areas like sustainable development, tourism, food security, natural resource management, cultural preservation and innovation, etc. However, IIKS integration with management faces some challenges in the form of a lack of documentation, cultural sensitivity, language barriers legal framework, etc. Savita Lathwal "Integration of Indian Indigenous Knowledge System in Management: Prospects and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63500.pdf Paper Url: https://www.ijtsrd.com/management/accounting-and-finance/63500/integration-of-indian-indigenous-knowledge-system-in-management-prospects-and-challenges/savita-lathwal
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
The COVID 19 pandemic has highlighted the crucial need of preventive measures, with widespread use of face masks being a key method for slowing the viruss spread. This research investigates face mask identification using deep learning as a technological solution to be reducing the risk of coronavirus transmission. The proposed method uses state of the art convolutional neural networks CNNs and transfer learning to automatically recognize persons who are not wearing masks in a variety of circumstances. We discuss how this strategy improves public health and safety by providing an efficient manner of enforcing mask wearing standards. The report also discusses the obstacles, ethical concerns, and prospective applications of face mask detection systems in the ongoing fight against the pandemic. Dilip Kumar Sharma | Aaditya Yadav "DeepMask: Transforming Face Mask Identification for Better Pandemic Control in the COVID-19 Era" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64522.pdf Paper Url: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/64522/deepmask-transforming-face-mask-identification-for-better-pandemic-control-in-the-covid19-era/dilip-kumar-sharma
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
Efficient and accurate data collection is paramount in clinical trials, and the design of Electronic Case Report Forms eCRFs plays a pivotal role in streamlining this process. This paper explores the integration of machine learning techniques in the design and implementation of eCRFs to enhance data collection efficiency. We delve into the synergies between eCRF design principles and machine learning algorithms, aiming to optimize data quality, reduce errors, and expedite the overall data collection process. The application of machine learning in eCRF design brings forth innovative approaches to data validation, anomaly detection, and real time adaptability. This paper discusses the benefits, challenges, and future prospects of leveraging machine learning in eCRF design for streamlined and advanced data collection in clinical trials. Dhanalakshmi D | Vijaya Lakshmi Kannareddy "Streamlining Data Collection: eCRF Design and Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63515.pdf Paper Url: https://www.ijtsrd.com/biological-science/biotechnology/63515/streamlining-data-collection-ecrf-design-and-machine-learning/dhanalakshmi-d
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Optimized Intrusion Detection System using Deep Learning Algorithm
1. International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume: 3 | Issue: 2 | Jan-Feb 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470
@ IJTSRD | Unique Reference Paper ID – IJTSRD21447 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 528
Optimized Intrusion Detection System using
Deep Learning Algorithm
Prof P. Damodharan1, K. Veena2,Dr N. Suguna3
1Associate Professor, 2PG Scholar,3Professor
Akshaya College of Engineering and Technology, Kinathukadavu, Coimbatotre, Tamil Nadu, India
ABSTRACT
A method and a system for the detection of an intrusion in a computer network compare the network traffic of the computer
network at multiple different points in the network. In an uncompromised network thenetworktrafficmonitored atthesetwo
different points in the network should be identical. A network intrusion detection systemis mostlyplaceatstrategicpoints in a
network, so that it can monitor the traffic traveling to or from different devices on that network.The existingSoftwareDefined
Network (SDN) proposes the separation of forward and controlplanes byintroducinga new independentplanecallednetwork
controller. Machine learning is an artificialintelligence approach thatfocuses onacquiring knowledgefrom rawdataand, based
at least in part on the identified flow, selectively causing the packet, or a packet descriptor associated with the packet. The
performance is evaluated using the network analysis metrics suchas keygenerationdelay, keysharingdelay andthehashcode
generation time for both SDN and the proposed machine learning SDN.
1. INTRODUCTION
1.1. NETWORK SECURITY
A series of devices or computing nodes interconnected by
communication link that allow to share and exchange the
data among all devices is defined by the term ‘Network’. A
device can be anything which is capable of sending or
receiving the data that is generated by the device and that is
exchanged over the medium or channel. In other words,
more than one autonomous computeris groupedtogether to
exchange the information using the communication channel
is called as ‘Network’. In computer networks, the following
characteristics or factors are mainly used to classify the
various types of networks.
1.2. INTRUSION DETECTION SYSTEM
An Intrusion detection system (IDS) is an active process or
device that analyzes system and network activity for
unauthorized entry or malicious activity.Theultimateaimof
any IDS is to catch perpetrators in the act before they do real
damage to resources. An IDS protects a system from attack,
misuse, and compromise. It can also monitor network
activity, audit network and system configurations for
vulnerabilities, analyze data integrity, and more. Intrusion
detection system (IDS) is software that automates the
intrusion detection process. The primary responsibility of
IDS is to detect unwanted and malicious activities.
Intrusion Prevention System (IPS)is softwarethat has allthe
capabilities of an intrusion detection system and can also
attempt to stop possible incidents. An intrusion detection
system (IDS) is a type of security software designed to
automatically alert administrators when someone or
something is trying to compromise information system
through malicious activities or through security policy
violations.
1.3. NETWORK INTRUSION DETECTION
A Network intrusion detection system (NIDS) is a
combination of hardware and software that monitors a
computer network for attempts to violate a security policy.
Network intrusion detection system identifies and
eliminates misbehaving malicious in thenetwork.A NIDS isa
system that analyzes the traffic crossing the network,
classifies packets according to header, content, or pattern
matching, and further inspects payload information with
respect to content/regular-expression matching rules for
detecting the occurrence of anomalies or attacks. FPGA
combined FA basedNIDSefficientlyhandles theanomalyand
intruded packet in the network.
Network intrusion detection systems (NIDS) are an
important tool to protect network systems from external
attack. NIDS are used to identify and analyze packets that
may signify an impending threat to organization’s network.
Traditional software-basedNIDS architecturesarebecoming
strained as network data rates increaseandattacks intensify
in volume and complexity. In recent years, researchers have
proposed using FPGAs to perform the computationally-
intensive components of a NIDS.
MODEL BASED INTRUSION DETECTION
It states that certain scenarios are inferred by certain other
observable activities. If these activities are monitored, it is
possible to find intrusion attempts by looking at activities
that infer a certain intrusion scenario. The model-based
scheme consists of three important modules.Theanticipator
uses the active models and the scenario models to try to
predict the next step in the scenario that is expected to
occur. A scenario model is a knowledge base with
specifications of intrusion scenarios. The planner then
translates this hypothesis into a format that shows the
behavior, as it would occur in the audit trail. It uses the
predicted information to plan what to search for next. A
NIDS aims at detecting possible intrusions such as a
malicious activity, computer attack or computer misuse,
spread of a virus, etc, and alerting the proper individuals
upon detection.
2. LITERATURE SURVEY
As more wireless and sensor networks are deployed, they
will increasingly become tempting targets for malicious
attacks. Due to the shared nature of the wireless medium,
attackers can gather useful identity information during
2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Reference Paper ID – IJTSRD21447 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 529
passive monitoring and further utilize the identity
information to launch identity-based attacks, in particular,
the two most harmful but easy to launch attacks:1) spoofing
attacks and 2) Sybil attacks. In identity-based spoofing
attacks, an attacker can forge its identity to masquerade as
another device or even create multipleillegitimateidentities
in the networks.
For instance, in an IEEE 802.11 network, it is easy for an
attacker to modify its Media Access Control address of
Network interface card to another device through vendor-
supplied NIC drivers or open-sourceNIC drivers.Inaddition,
by masquerading as an authorized wireless Access point or
an authorized client, an attackercan launchDenial-of-service
attacks, bypass access control mechanisms, or falsely
advertise services to wireless clients. On the other hand, in
Sybil attacks, a Sybil node can forge different identities to
trick the network with multiple fake nodes. The Sybil attack
can significantly reduce the network performance by
defeating group-based voting techniques and fault-tolerant
schemes.
Therefore, identity-based attacks will have a serious impact
to the normal operation of wireless and sensor networks. It
is thus desirable to detect the presence of identity-based
attacks and eliminate them from the network. The
traditional approach to address identity-based attacks is to
applycryptographicauthentication. However, authentication
requires additional infrastructural overhead and
computational power associated with distributing and
maintaining cryptographic keys. Due to the limited power
and resources available to the wireless devices and sensor
nodes, it is not always possible to deploy authentication.
Detecting the presence of identity-based attacks in the
network provides first order information toward defending
against attackers. Furthermore, learning the physical
location of the attackers allows the network administrators
to further exploit a wide range of defense strategies. This
explore and how can find the positions of the adversaries by
integrating our attack detector into a real-time indoor
localization system. Our cluster-analysis-based attack
detector is not specific to any RSS-based localization
algorithms and is thus general. For two kinds of algorithms,
area- and point-based algorithms, show that using the
centroids of the clusters that are returned by the attack
detector in signal space as the input to the localization
system, the positions of the attackers can be localized with
the same relative estimation errors as under normal
conditions.
Kerberos Authentication System
The Kerberos authentication system was introducedbyMIT
to meet the needs of Project Athena. It has since been
adopted by a number of other organizations for their own
purposes, and is being discussed as a possible standard.
These problems fall into several categories. Some stemfrom
the Project Athena environment. Kerberos was designed for
that environment; if the basic assumptions differ, the
authentication system mayneedtobe changedas well. Other
problems are simply deficiencies in the protocol design.
Some of these are corrected in the proposed version 5 of
Kerberos, but not all.
Kerberos is a security system. The functionality and
efficiency, our primary emphasis is on the security of
Kerberos in a general environment. This means that
security-critical assumptions must be few in number and
stated clearly. For the widest utility, the network must be
considered as completely open. Specifically, the protocols
should be secure even if the network is under the complete
control of an adversary. This means that defeating the
protocol should require the adversary to invert the
encryption algorithm or to subvert a principal specifically
assumed to be trustworthy. Only such a strong design goal
can justify the expense of encryption.
Authorization Model And Access Control
In this section, discuss about the secure information sharing
using the hierarchical path. Our focus is on maintaining the
hierarchy rather than maintaining a shortest path. U sage
policy: If user is authorized to access data of a particular
level in the network, then it performs the operation as many
times he wants. Essentially there is no predefined usage
control. In this model, the authorization starts with the level
selection of the network. At the time of choosing the levels,
the nodes can have their keys for the secure communication.
A node can have different paths to reach to other nodes; it
can choose any particular path based on the preference.
Attribute-Based Access Control: This kind of access control
uses attribute-based encryption techniques in which a
sender encrypts a data packet with an access policy and a
receiver decrypts the packet and reads its content only if its
attributes satisfy the access policy. An example of the
schemes which use such techniques is called Secure
symptom based handshake (SSH).
Confidentiality is the term used to prevent the disclosure of
information to unauthorized individuals orsystems.In other
words, it means that no one can gain, read, or manipulate
information other than for whom it is intended. Basically,
confidentiality is achieved in two steps: encryption and
decryption. Using encryption, the sender converts plaintext
to ciphertext with the aim of rendering it unintelligible to
parties except the intended recipient. Using decryption,
ciphertext is rendered intelligible to the intended recipient
by converting it back to the plaintext.
3. EXISTING SYSTEM
Cross Layer Design
Cross layer design, where the boundary among the protocol
layers is a violated by sharing internal information, helping
layers to become aware of the changes in the others and
provide higher quality of services to the user. To allow
communication between layers by permitting one layer to
access the data of the layer to exchange information and
enable integration. Cross-layer designs involve cross-layer
signaling which is not defined in the protocol architecture.
These signaling methods should consume as scarce
resources as possible reducing the overhead.
Packet headers: Information can beencodedin layerheaders
which can later be used by some other layer to glean the
desired information. This can be compared to have pipe like
flow of signals among the layers.
ICMP messages: In IP based networks, Internet Control
Message Protocol (ICMP) messages canbeusedforsignaling.
However, as ICMP messages are always encapsulated by IP
packets, the messages have to traverse through the network
3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Reference Paper ID – IJTSRD21447 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 530
layer, even if the interacting layer pairs are data link and
physical or transport and application.
The estimation of link available bandwidth from mac layer
information that take into account the activities of thenode’s
neighbours and adapt to change of channel condition
dynamicallyis used in the network layer to provide efficient
routing. And radio selection and channel assignment from
physical layer is used, Best-effort trafficand Real-timetraffic
from application layer is used to provide QoS guarantee for
real-time multimedia applications.
Network layer:
It is main layer which executes the DAWN process. The
following procedures are implemented in network layer
itself.
1. Traffic classification
2. Executing physical routing
3. Logical routing from bandwidth information
Mac layer:
Like all 802.11 network, nodes broadcasts RTS, CTS, Data
acknowledge handshake process and complete the
transmission for all packet. And each time of transmission
node maintains the used bandwidth value and calculates
remaining raw bandwidth value. Then idle duration is
calculated for each node. And available bandwidth value is
calculated from raw and idle values.
Physical layer:
Channel assignment and interface switching process is
executed in this layer. By selecting the maximum CSI value
interface to be selected for transmission is identified.
Security Management
SSL Certificates have a key pair: a public and a private key.
Device connects to a web server (website) secured with SSL
(https). Device requests that the server identifyitself.Server
sends a copy of its SSL Certificate, includingtheserverpublic
key. Device checks the certificate root againstalist of trusted
CAs and that the certificateis unexpired,unrevoked, and that
its common name is valid for thewebsitethatit isconnecting
to. If the Device trusts the certificate,it creates, encrypts,and
sends back a symmetric session key using the servers public
key. Server decrypts the symmetric session key using its
private key and sends back an acknowledgement encrypted
with the session key to start the encrypted session.
The cryptographic parameters of the session state are
produced by the SSL handshake protocol, which operates on
top of the SSL record layer the client sends a client hello
message to which the server must respond with a server
hello message, or else a fatal error will occur and the
connection will fail. The client hello and server hello
establish the following attributes: Protocol Version, Session
ID, Cipher Suite, and Compression Method.
Following the hello messages, the server will send its
certificate, if it is to be authenticated. Additionally, a server
key exchange message may be sent, if it is required .If the
server is authenticated, it may request a certificate from the
client, if that is appropriate to the cipher suite selected. Now
the server will send the server hello done message,
indicating that the hello-message phase of the handshake is
complete. The server will then wait for a client response. If
the server has sent a certificate request message, the client
must send either the certificate message or a no certificate
alert. The client key exchange message is now sent, and the
content of that message will depend on the public key
algorithm selected between the client hello and the server
hello. If the client has sent a certificate with signing ability, a
digitally-signed certificate verifymessageis senttoexplicitly
verify the certificate.
At this point, a change cipher spec message is sent by the
client, and the client copies the pending CipherSpec into the
current CipherSpec. The client then immediately sends the
finished message under the new algorithms, keys, and
secrets. In response, the server will send its own change
cipher spec message, transfer the pending to the current
CipherSpec, and send its finished message under the new
CipherSpec. At this point, the handshake is completeandthe
client and server may begin to exchange application layer
data.
Client Server
Client Hello -------->
Server Hello
Certificate*
Server Key Exchange*
Certificate Request*
<-------- ServerHelloDone
Certificate*
Client Key Exchange
Certificate Verify*
[Change Cipher Spec]
Finished -------->
[ChangeCipherSpec]
<-------- Finished
Application Data <-------> Application Data
*Indicates optional or situation-dependent messages that
are notalways sent.
4. IMPLEMENTATION
Implementing and using SSL to secure HTTP traffic
Security of the data stored on a file server is very important
these days. Compromised data can cost thousands of dollars
to company. In the last section, compiled LDAP
authentication module into the Apache build to provide a
Authentication mechanism. However, HTTP traffic is very
insecure, and all data is transferred in clear text - meaning,
the LDAP authentication (userid/passwd) will be
transmitted as clear text as well. This creates a problem.
Anyone can sniff these userid/passwd and gain access to
DAV store. To prevent this encrypt the HTTP traffic is
essentially as HTTP + SSL or HTTPS. Anything transferred
over HTTPS is encrypted,so theLDAP userid/passwdcan not
be easily deciphered. HTTPS runs on port 443.
Introduction to SSL
SSL is a protocol layer that exists between the Network
Layer and Application layer. As the name suggest SSL
provides a mechanism for encrypting all kinds of traffic -
LDAP, POP, IMAP and most importantly HTTP.
4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Reference Paper ID – IJTSRD21447 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 531
Encryption algorithms used in SSL
There are three kinds of cryptographic techniques used in
SSL: Public-Private Key, Symmetric Key, and Digital
Signature.
Public-Private Key Crytography - Initiating SSL connection:
In this algorithm, encryption and decryption is performed
using a pair of private and publickeys.TheWeb-serverholds
the private Key, and sends the Public key to the client in the
Certificate.
The following is a over-simplified structure of the layers
involved in SSL.
+-------------------------------------------+
| LDAP | HTTP | POP | IMAP |
+-------------------------------------------+
| SSL |
+-------------------------------------------+
| Network Layer |
+-------------------------------------------+
1. The client request content from the Web Server using
HTTPS.
2. The web server responds with aDigitalCertificatewhich
includes the server's public key.
3. The client checks to see if the certificate has expired.
4. Then the client checks if the Certificate Authority that
signed the certificate, is a trusted authority listed in the
Device. The client then checks to see if the Fully
Qualified Domain Name (FQDN) of the web server
matches the Comman Name (CN) on the certificate?
Anything encrypted with Private Key can only be decrypted
by using the Public Key. Similarly anything encrypted using
the Public Key can only be decrypted using the Private Key.
There is a common mis-conception that only the Public Key
is used for encryption and PrivateKeyis usedfordecryption.
This is not case. Any key can be used for
encryption/decryption. However if one key is used for
encryption then the other key must be used for decryption.
e.g. A message cannot encrypted and then decrypted using
only the Public Key.
Using Private Key to encrypt and a Public Key to decrypt
ensures the integrity of the sender (owner of the Private
Key) to the recipients. Using Public Key to encrypt and a
Private Key to decrypt ensures that only the inteded
recipient (owner of the Private Key) will have access to the
data.(i.e. only the person who holds the Private Key will be
able to decipher the message).
Symmetric Cryptography - Actualtransmission ofdata: After
the SSL connection has been established, Symmetric
cryptography is used for encrypting data as it uses less CPU
cycles. In symmetric cryptographythedatacan beencrypted
and decrypted using the same key. The Key for symmetric
cryptography is exchanged during the initiation process,
using Public Key Cryptography.
Message Digest The server uses message digest algoritm
such as HMAC, SHA-1, MD5 to verify the integrity of the
transferred data.
Ensuring Authenticity and Integrity
Encryption
Step1: In this step the Original "Clear Text" message is
encrypted using the Sender's Private Key, which
results in Cipher Text 1. This ensures the
Authenticity of the sender.
Step2: In this step the "CipherText 1" is encrypted using
Receiver's Public Key resulting in "CipherText 2".
This will ensure the Authenticity of the Receiver i.e.
only the Receiver can decipher the Messsage using
his Private Key.
Step3: Here the SHA1 Message Digest of the "Clear Text" is
created.
Step4: SHA1 Message Digest is then encrypted using
Sender's Private Key resulting in the Digital
Signature of the "ClearText". This Digital Signature
can be used by the receiver to ensure the Integrity
of the message and authenticity of the Sender.
Step5: The "Digital Signature" and the "CipherText 2" are
then send to the Receiver.
SSL Certificates have a key pair: a public and a private key.
1. Device connects to a web server (website) secured with
SSL (https). Device requests that the server identify
itself.
2. Server sends a copy of its SSL Certificate, including the
server’s public key.
3. Device checks the certificate root against alistof trusted
CAs and that the certificate is unexpired, unrevoked,and
that its common name is valid for the website that it is
connecting to. If the Device trusts the certificate, it
creates, encrypts, and sends back a symmetric session
key using the server’s public key.
4. Server decrypts the symmetric session key using its
private key and sends back an acknowledgement
encrypted with the session key to start the encrypted
session.
5. Server and Device now encrypt alltransmitted datawith
the session key.
The cryptographic parameters of the session state are
produced by the SSL handshake protocol, which operates on
top of the SSL record layer. When an SSL client and server
first start communicating, they agree on a protocol version,
select cryptographicalgorithms, optionallyauthenticate each
other, and use public key encryption techniques to generate
shared secrets. These processes are performed in the
handshake protocol, which can be summarized as follows:
the client sends a client hello message to which the server
must respond with a server hello message, or else a fatal
error will occur and the connection will fail.
A cryptography system design which are related to
generation, exchange,storage,safeguarding,use, vetting,and
replacement of keys in key management. It includes
cryptographic protocol design which includes key servers,
user procedures, and other relevant protocols. Key
management concerns keys at the user level, eitherbetween
users or systems. This is in contrast to key scheduling; key
scheduling typically refers to the internal handling of key
material within the operation of a cipher. Successful key
management is critical to the security of a cryptosystem.
SCALABILITY
The ability of a system, network, or process, to handle
growing amount of work in a capable manner or its ability to
be enlarged to accommodate that growth. Scalability, as a
property of systems, is generallydifficulttodefineandin any
5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Reference Paper ID – IJTSRD21447 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 532
particular case it is necessary to define the specific
requirements for scalability on those dimensions that are
deemed important. It is a highly significant issue in
electronics systems, databases, routers, and networking. A
system whoseperformanceimproves afteraddinghardware,
proportionally to the capacity added, is said to be a scalable
system. An algorithm, design,networkingprotocol,program,
or other system is said to scale,(e.g. a largeinputdatasetora
large number of participating nodes in the case of a
distributed system). If the design fails when the quantity
increases, it does not scale.
focuses on well-understood security attributes and features
such as integrity, authentication, authorization, key
management, and intrusion detection. A classification of IDS
risks and vulnerabilities has recently been published by
NIST. Working mechanism is as follows:Initially network is
deployed with server, router, commander and DDOS
attackers
1. Communication tree is formed between all wireless
devices using the router nodes as interface
2. Commander node initiates the DDOS attack by sending
the command message with victim id to all DDOS
attackers present in the network.
3. Command message is rebroadcasted to all DDOS
attackers and it launches the attack to reduce the
availability of resource of the victim node.
4. Flow monitoring is performed by all routernodes which
validate the each incoming flows.
5. It computes the data generation rate of each monitoring
flow and performs the IP trace back
IDS algorithm
1. Once the network deployment gets completed, data
transmission is originated between source and
destination.
2. A network device may fail to forward a packet due to
various reasons.
3. During the situation, the devices generates the ICMP
error message (path backscatter message)
4. But the packet contains the IP spoofed id as source id,
then the packet will sent to the source IP address
indicated in the original packet ie., the node who owns
the actual ip address
5. The ICMP message is generated during the high class
congestion occurred in the data transmission
The proposed system is designed by using the principle
component analysis. The proposed approach working
mechanism is as follows:
1. Network is deployed with set of mobile nodes including
major and minor player
2. Data transmission is initiated between mobilenodes by
forming the multihop route
3. DOS attacker nodes launches attacks against victimnode
(src and dst nodes)
4. Packet is captured and either dropped or content is
changed by the DOS attacker
5. Major and minor player game is invoked between
mobile nodes to perform the detection process
6. IDS nodes performs the data validation and attack
detection process by applying the Machine Learning.
The proposed system is designed byusingthereinforcement
learning in the machine learning model which significantly
improves accuracy of the intrusion and anomaly detection
system by employing the learning process using the
Boltzmann learning parameters. During the data
transmission, packet drop process and packet delaying can
be occurred due to the congestion and the collision along
with the unavailability of the channelbeau caseofthehidden
terminal and exposed terminal problem. This willleadtothe
false detection of the normal behaviour as malicious
behaviour in the network environment. In order to handle
this network dynamics, the learning system is employed
based on the reinforcement learning system.
1. The behavioural prediction and decision makingsystem
is operated from the input collected during the learning
process.
2. From the collected input, the collaborated view of the
hidden layer is formed by using the dynamic Bayesian
network with Boltzmann input.
3. The Dynamic Bayesian Network is constructed with the
3 input models,
A. Inference model
B. Parameter learning
C. Structured learning
4. The inference system collects the variation between the
Actual state and the expected state after performing the
initial IDS
5. For each inferences identified in the system, the
collected parameters are differentiated with respect to
the identified behaviour of the node and channel in
terms of state information in the parameter learning
process.
A deep Boltzmann machine (DBM) is a recently introduced
Markov random field model that has multiple layers of
hidden units. It has been shown empirically that it is difficult
to train a DBM with approximate maximum-likelihood
learning using the stochastic gradient unlike its simpler
special case, restricted Boltzmann machines (RBM)Deep
Boltzmann machine (DBM) is a recently introduced variant
of Boltzmann machines which extends widely used
restricted Boltzmann machines (RBM) to a model that has
multiple hidden layers. It differs from the popular deep
belief network (DBN) which is built by stacking multiple
layers of RBMs. DBMs facilitate propagating uncertainties
across multiple layers of hidden variables. Although it is
straightforward to derive a learning algorithm.
Deep Boltzmann machines are interesting for several
reasons. First, like deep belief networks, DBM’s have the
potential of learning internal representations that become
increasingly complex, which is considered to be a promising
way of solving object and speech recognition problems.
Second, high-level representations can be built from a large
supply of unlabeled sensory inputs and very limited labeled
data can then be used to only slightly fine-tune themodelfor
a specific task at hand. Finally, unlike deep belief networks,
the approximate inference procedure, in addition to an
initial bottom up pass, can incorporate top-down feedback,
allowing deep Boltzmann machines to better propagate
uncertainty about, and hence deal more robustly with,
ambiguous input.
RESULT AND DISCUSSION
OPERATIONAL ENVIRONMENT
The real world testing processis donein C#.netenvironment
by running the working design using the validation metrics.
This analysis is used to test the performance of the existing
protocols as well as newly derived protocols.The
6. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Reference Paper ID – IJTSRD21447 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 533
performance evaluation is conducted to validate the
execution of the proposed technique in terms of packet
related metrics such as key generation and key sharing
delay, hash code generation delay. The table shows that the
parameters used to perform the network performance
validation.
Key Sharing Delay: Sharing Delay refers the Time taken to
complete the key sharing process from user device to server
in the network using equation (2).
(2)
Hash Generation Delay: Hashing delay refers the time
required to complete the hash code generation and it is
estimated using equation (3).
(3)
5. PERFORMANCE EVALUATION
Figure 1, 2 and 3 shows the comparisons between Software
Defined Network (SDN) and Machine Learning Software
Defined Network (MLSDN) in terms of KeyGenerationDelay,
Key Sharing Delayand Hash Generation Delayrespectively.It
outcomes in key generation process andkeysharingprocess.
In case of Key Generation Delay, MLSDN achieves higher
performance by obtaining the lower delay. Similarly for Key
SharingDelay MLSDN in lower latency compare to SDN. In
case of Hash Generation Delay, MLSDN achieves lowerdelay
while generating the hash code.
Figure7.1. Key Generation Delay
Figure7.2. Key Sharing Delay
Figure7.3.Hash Generation Delay
Figure 4, 5 and 6 shows the average performance
comparisons between SDN and MLSDN in terms of Key
Generation Delay, Key Sharing Delayand Hash Generation
Delay respectively.
Figure7.4.Average Key Generation Delay
Figure7.5. Average Key Sharing Delay
CONCLUSION
The SDN model is the novel networkingmodel whichutilizes
the separation of forward and control planes by introducing
a new independent plane called network controller. The
architecture enhances the network resilient, decompose
management complexity,andsupport morestraightforward
network policies enforcement. Proposed IDS system
analyzes the network activity for unauthorized entry or
malicious activity using the machine learning algorithm
instead of software defined network. Proposed system that
analyzes the traffic crossing the network, classifies packets
according to header, content, or pattern matching, and
further inspects payload information with respect to
content/regular-expression matchingrules fordetecting the
occurrence of anomalies or attacks
7. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Reference Paper ID – IJTSRD21447 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 534
FUTURE WORK
It can enhance by deep learning optimization scheme for
secure channel processing. Compliance with real-time
constraints: In real-time applications, data is delay con-
strained and has a certain bandwidth requirement. For
instance, scheduling messages with deadlines is an
important issue in order to take appropriate actions in real
time. However, due to the interferenceand contention onthe
wireless medium, this is a challenging task. Multi-channel
communication can help to reduce the delay by increasing
the number of parallel transmissions and help the network
to achieve real-time guarantees. Assignment of overlapping
channels during run-time: Use of overlapping channels at
run time during medium access is an interesting and
challenging future research direction.
REFERENCES
[1] Khoshkbarforoushha, R. Ranjan, R.Gaire, E. Abbasnejad,
L. Wang, and A. Y. Zomaya. Distribution based workload
modelling of continuous queries in clouds. IEEE
Transactions on Emerging Topics in
Computing,5(1):120–133, 2017
[2] Benaloh.J, “Key Compression and Its Application to
Digital Fingerprinting” technical report, Microsoft
Research, 2009.
[3] D. D´ıaz-Pernil, A. Berciano,F.Pe˜na-Cantillana, andM. A.
Guti´errez- Naranjo. Bio-inspired parallel computing of
representative geometricalobjects of holesof binary2d-
images. International Journal of Bio-Inspired
Computation, 9(2):77–92, 2017.
[4] Chen, F., Ji, R., Su, J., Cao, D. and Gao, Y., 2018. Predicting
Microblog Sentiments via Weakly Supervised
Multimodal Deep Learning. IEEE Transactions on
Multimedia, 20(4), pp.997-1007.
[5] Jiang, F., Fu, Y., Gupta, B.B., Lou, F., Rho, S., Meng, F. and
Tian, Z., 2018. Deep Learning based Multi-channel
intelligent attack detection for Data Security. IEEE
Transactions on Sustainable Computing.
[6] G.-G. Wang, X. Cai, Z. Cui, G. Min, and J. Chen. High
performance computing for cyber physical social
systems by using evolutionary multi-objective
optimization algorithm. IEEE Transactionson Emerging
Topics in Computing, 2017. [26] L. Wang, H. Geng, P.Liu,
K. Lu, J. Kolodziej, R. Ranjan,
[7] Lei, L., You, L., Dai, G., Vu, T.X., Yuan, D. and Chatzinotas,
S., 2017, August. A deep learning approach for
optimizing content delivering in cache-enabled HetNet.
In Wireless Communication Systems (ISWCS), 2017
International Symposium on (pp. 449-453). IEEE.
[8] Loukas, G., Vuong, T., Heartfield, R., Sakellari, G., Yoon,Y.
and Gan, D., 2018. Cloud-based cyber-physicalintrusion
detection for vehicles using Deep Learning.IEEEAccess,
6, pp.3491-3508.
[9] Y. Ye, T. Li, D. Adjeroh, and S. S. Iyengar. A survey on
malware detection using data mining techniques. ACM
Computing Surveys(CSUR), 50(3):41, 2017
[10] Z. Cui, B. Sun, G. Wang, Y. Xue, and J. Chen. A novel
oriented cuckoo search algorithm to improve dv-hop
performance for cyber–physical systems. Journal of
Parallel and Distributed Computing, 103:42–52, 2017.