The document presents a PhD synopsis on network security and quality of service. It discusses common security attacks such as eavesdropping, viruses, worms, Trojans, phishing, IP spoofing, and denial of service. It also covers security technologies including cryptographic systems, firewalls, intrusion detection systems, anti-malware software, and secure socket layer. The proposed research focuses on enhancing data security through improved encryption methods and dynamic bandwidth allocation to improve quality of service for different data types. The goal is to develop more secure and efficient network communication.
This slide explains the design part as well as implementation part of the firewall. And also tells about the need of firewall and firewall capabilities.
A Study on Data Mining Based Intrusion Detection SystemAM Publications
In recent years security has remained unsecured for computers as well as data network systems. Intrusion detecting
system used to safeguard the data confidentiality, integrity and system availability from various types of attacks. Data mining
techniques that can be applied to intrusion detection system to detect normal and abnormal behavior patterns. This paper studies
nature of network attacks and the current trends of data mining based intrusion detection techniques
Internet Worm Classification and Detection using Data Mining Techniquesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Network Forensics is scientifically proven technique to accumulate, perceive, identify, examine, associate, analyse and document digital evidence from multiple systems for the purpose of uncovering the fact of attacks and other problem incident as well as performing the action to recover from the attack. Many systems are proposed for designing the network forensic systems. In this paper we have prepared comparative analysis of various models based on different techniques.
This slide explains the design part as well as implementation part of the firewall. And also tells about the need of firewall and firewall capabilities.
A Study on Data Mining Based Intrusion Detection SystemAM Publications
In recent years security has remained unsecured for computers as well as data network systems. Intrusion detecting
system used to safeguard the data confidentiality, integrity and system availability from various types of attacks. Data mining
techniques that can be applied to intrusion detection system to detect normal and abnormal behavior patterns. This paper studies
nature of network attacks and the current trends of data mining based intrusion detection techniques
Internet Worm Classification and Detection using Data Mining Techniquesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Network Forensics is scientifically proven technique to accumulate, perceive, identify, examine, associate, analyse and document digital evidence from multiple systems for the purpose of uncovering the fact of attacks and other problem incident as well as performing the action to recover from the attack. Many systems are proposed for designing the network forensic systems. In this paper we have prepared comparative analysis of various models based on different techniques.
Presented by Paul Wilson, Director General of APNIC and Chair of APrIGF Multistakeholder Steering Group at the Asia Pacific Internet Leadership Program as part of 2016 APrIGF Taipei
Implementing a Robust Network-Based Intrusion Detection Systemtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Network Security: Experiment of Network Health Analysis At An ISPCSCJournals
This paper presents the findings of an analysis performed at an internet service provider. Based on netflow data collected and analyzed using nfdump, it helped assess how healthy is the network of an Internet Service Providers (ISP). The findings have been instrumental in reflection about reshaping the network architecture. And they have also demonstrated the need for consistent monitoring system.
A Study on Data Mining Based Intrusion Detection SystemAM Publications
In recent years security has remained unsecured for computers as well as data network systems. Intrusion detecting
system used to safeguard the data confidentiality, integrity and system availability from various types of attacks. Data mining
techniques that can be applied to intrusion detection system to detect normal and abnormal behavior patterns. This paper studies
nature of network attacks and the current trends of data mining based intrusion detection techniques
Analysis and Design for Intrusion Detection System Based on Data MiningPritesh Ranjan
Reference:
Dyuanyang Zhao, Zhilin Feng, Qingxiang Xu, “Analysis and design for Intrusion detection system based on data mining” in proceedings of 2010 IEEE second international workshop on education technology and computer science
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Presented by Paul Wilson, Director General of APNIC and Chair of APrIGF Multistakeholder Steering Group at the Asia Pacific Internet Leadership Program as part of 2016 APrIGF Taipei
Implementing a Robust Network-Based Intrusion Detection Systemtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Network Security: Experiment of Network Health Analysis At An ISPCSCJournals
This paper presents the findings of an analysis performed at an internet service provider. Based on netflow data collected and analyzed using nfdump, it helped assess how healthy is the network of an Internet Service Providers (ISP). The findings have been instrumental in reflection about reshaping the network architecture. And they have also demonstrated the need for consistent monitoring system.
A Study on Data Mining Based Intrusion Detection SystemAM Publications
In recent years security has remained unsecured for computers as well as data network systems. Intrusion detecting
system used to safeguard the data confidentiality, integrity and system availability from various types of attacks. Data mining
techniques that can be applied to intrusion detection system to detect normal and abnormal behavior patterns. This paper studies
nature of network attacks and the current trends of data mining based intrusion detection techniques
Analysis and Design for Intrusion Detection System Based on Data MiningPritesh Ranjan
Reference:
Dyuanyang Zhao, Zhilin Feng, Qingxiang Xu, “Analysis and design for Intrusion detection system based on data mining” in proceedings of 2010 IEEE second international workshop on education technology and computer science
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Prof. Mridul M. Panditrao, from his University/ medical College days, gives tips on how to write your synopsis for your dissertation after you have registered and started your MD/ MS training programme. he also gives ideas/ steps to come up with a well constructed synopsis. Very useful for the first year MD/ MS PG students
Lessons from scientific research for happiness. Research conducted by F. M. Bhuiyan and R. S. Szulga; Extreme bounds of subjective well-being: economic development and micro determinants of life satisfaction published by Applied Economics (2016)
Anesh Jagtiani talks about the 3 components of happiness where there's a classic study done on 380 UBS Managers on stress. Your perspective alters your experience.
Udalberriak 156 - Noviembre 2012 - Día Internacional contra la violencia haci...encartaciones
Revista municipal de Balmaseda. Temas principales: Beldur Barik (25 de noviembre) en el Día Internacional contra la violencia hacia las Mujeres, Aprobación del PAES, que pretende reducir en un 20% las emisiones de CO2 para el 2020; el nuevo Pintxo-pote de la asociación de hosteleros de Balmaseda Ostabal y la nueva subasta de locales del Ayuntamiento.
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsEditor IJCATR
Due to extensive growth of the Internet and increasing availability of tools and methods for intruding and attacking
networks, intrusion detection has become a critical component of network security parameters. TCP/IP protocol suite is the defacto
standard for communication on the Internet. The underlying vulnerabilities in the protocols is the root cause of intrusions. Therefor
Intrusion detection system becomes an important element in network security that controls real time data and leads to huge
dimensional problem. Processing large number of packets and data in real time is very difficult and costly. Therefor data preprocessing
is necessary to remove redundant and unwanted information from packets and clean network data. Here, we are focusing on
two important aspects of intrusion detection; one is accuracy and other is performance. The layered approach of TCP/IP model can be
applied to packet pre-processing to achieve early and faster intrusion detection. Motivation for the paper comes from the large impact
data preprocessing has on the accuracy and capability of anomaly-based NIPS. In this paper it is demonstrated that high attack
detection accuracy can be achieved by using layered approach for data preprocessing in Internet. To reduce false positive rate and to
increase efficiency of detection, the paper proposed framework for preprocessing in intrusion prevention system. We experimented
with real time network traffic as well as he KDDcup99 dataset for our research.
Module 3 Lectures 6 hrs.
Infrastructure and Network Security: Introduction to System Security, Server Security,
OS Security, Physical Security, Introduction to Networks, Network packet Sniffing,
Network Design Simulation. DOS/DDOS attacks. Asset Management and Audits,
Vulnerabilities and Attacks. Intrusion detection and Prevention Techniques, Host based
Intrusion prevention Systems, Security Information Management, Network Session
Analysis, System Integrity Validation.
Open Source/ Free/ Trial Tools: DOS Attacks, DDOS attacks, Wireshark, Cain & abel,
iptables/
Windows Firewall, snort, suricata, fail2ban
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Digital Artifact 2 - Investigating Pavilion Designs
Synopsis presentation uu Purna Chandra Sethi
1. An Effective method for Network Security and Improving the
Quality of Service
Submitted by : Purna Chandra Sethi
PhD Scholar
Dept. of CSA
Utkal University
Supervised by : Dr. P. K. Behera
Reader Dept CSA
Utkal University
Ph. D Synopsis Presentation
08/03/15 1/30Ph. D Synopsis Presentation (Dept. CSA), UU
2. Overview
• What is security?
• Why do we need security?
• What is QoS? Why QoS?
• Common security attacks
• Research Proposal
• Conclusion
08/03/15 2/30
Ph. D Synopsis Presentation (Dept. CSA), UU
3. What is Security?
1. Freedom from risk or danger; safety.
2. Freedom from doubt, anxiety, or fear; confidence.
3. Something that gives or assures safety, as:
• 1. A group or department of private guards: Call building
security if a visitor acts suspicious.
• 2. Measures adopted by a government to prevent interrupt or
attack.
• 3. Measures adopted, by a business or homeowner, to prevent
a crime such as theft or attack: Security was lax at the firm's
smaller plant.
08/03/15 3/30
Ph. D Synopsis Presentation (Dept. CSA), UU
4. Why do we need security?
• Protect vital information while still allowing
access to those who need it
– Trade secrets, medical records, etc.
• Provide authentication and access control for
resources
– Ex: AES
• Guarantee availability of resources
– Ex: 99.999% reliability
08/03/15 4/30
Ph. D Synopsis Presentation (Dept. CSA), UU
5. Data Security & Network Security
08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 5/30
6. Common security attacks in IPv4
• Eavesdropping
• Virus
• Worms
• Trojans
• Phishing
• IP Spoofing
• Denial of Service
etc…
08/03/15 6/30
Ph. D Synopsis Presentation (Dept. CSA), UU
7. Eavesdropping
• Interception of communications by an unauthorized party is
called eavesdropping.
• Passive eavesdropping is when the person only secretly listens
to the networked messages.
• Active eavesdropping is when the intruder listens and inserts
something into the communication stream. This can lead to the
messages being distorted. Sensitive information can be stolen
this way.
• Protocols defend against Eavesdropping attacks by using
encryption for confidentiality.
• Eg: Man in the middle attack
08/03/15
Ph. D Synopsis Presentation (Dept. CSA), UU
7/30
8. VIRUS
• Computer virus refers to a program which
damages computer systems and/or destroys or
erases data files
• Virus are self-replicating programs that use
files to infect the information. Once a file is
opened, the virus will activate the system.
08/03/15
Ph. D Synopsis Presentation (Dept. CSA), UU
8/30
9. WORM
• Worm are self replicating replicating in nature.‐
• There are two main types of worms, mass mailing‐
worms and network-aware worms.
• Mass mailing worms use email as a means to
infect other computers.
• Network aware worm selects a target and once‐
the worm accesses the target host, it can infect it
by means of a Trojan or otherwise.
08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 9/30
10. Trojan Horse
• Trojan Horse is a malicious program that
usually comes with monitoring tools and key
loggers.
• It enters into the system with general program
elements and then generates it replica.
• It can be used to control the total system by an
intruder present remotely.
08/03/15
Ph. D Synopsis Presentation (Dept. CSA), UU
10/30
11. Phishing
• Phishing is an attempt to obtain confidential
information from an individual, group, or
organization.
• Phishers trick users into disclosing personal
data, such as credit card numbers, online
banking credentials, and other sensitive
information.
08/03/15
Ph. D Synopsis Presentation (Dept. CSA), UU
11/30
12. IP Spoofing
• Spoofing means to have the address of the computer
mirror the address of a trusted computer in order to
gain access to other computers.
• The identity of the intruder is hidden by different
means making detection and prevention difficult.
With the current IP protocol technology, IPspoofed
packets cannot be eliminated.
08/03/15
Ph. D Synopsis Presentation (Dept. CSA), UU
12/30
13. Denial of Service
• Denial of Service is an attack when the system receiving too many
requests cannot return communication with the requestors. The main
purpose of DoS is to make network service unusable, usually by
overloading the server or network.
• Until the handshaking is complete, the system consumes resources.
Eventually, the system cannot respond to any more requests
rendering it without service.
• Many different kinds of DoS attacks
– SYN flooding
– SMURF
– Distributed attacks
etc …
08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 13/30
14. Technologies for Internet Security
• Cryptographic Systems
• Firewall
• Intrusion Detection System
• Anti-Malware Software and scanners
• Secure Socket Layer
etc…
08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 14/30
15. Cryptographic Systems
• It involved the use of codes and ciphers to transform
information into unintelligible data.
08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 15/30
16. Firewalls
• Firewall is a typical border control mechanism or perimeter
defense.
• The purpose of a firewall is to block traffic from the outside,
but it could also be used to block traffic from the inside.
• A firewall is the front line defense mechanism against
intruders.
• It is a system designed to prevent unauthorized access to or
from a private network.
• Firewalls can be implemented in both hardware and software,
or a combination of both
08/03/15 16/30
Ph. D Synopsis Presentation (Dept. CSA), UU
17. Intrusion Detection System
• Used to monitor for “suspicious activity” on a network and
Can protect against known software exploits, like buffer
overflows.
• IDS systems can be software and hardware devices used to
detect an attack.
• IDS products are used to monitor connection in determining
whether attacks are been launched.
• Some IDS systems just monitor and alert of an attack, whereas
others try to block the attack.
• Open Source IDS: Snort, www.snort.org
08/03/15 17/30
Ph. D Synopsis Presentation (Dept. CSA), UU
18. Anti Malware Software and scanners‐
• Viruses, worms and Trojan horses are all
examples of malicious software, or Malware.
• Anti Malware tools are used to detect them‐
and cure an infected system.
• Eg: Anti- virus softwares
08/03/15 18/30
Ph. D Synopsis Presentation (Dept. CSA), UU
19. Secure Socket Layer (SSL)
• The Secure Socket Layer (SSL) is a suite of protocols that
is a standard way to achieve a good level of security
between a web browser and a website.
• SSL is designed to create a secure channel, between a
web browser and the web server, so that any information
exchanged is protected within the secured channel.
• SSL provides authentication of clients to server through
the use of certificates. Clients present a certificate to the
server to prove their identity.
08/03/15 19/30
Ph. D Synopsis Presentation (Dept. CSA), UU
20. Security Issues of IP Protocol IPv6
1. Header manipulation issues
2. Flooding issues
3. Mobility issues
08/03/15 20/30
Ph. D Synopsis Presentation (Dept. CSA), UU
21. Security in different Networks
1. Firewalls that detect and report intrusion attempts
2. Sophisticated virus checking at the firewall
3. Enforced rules for employee opening of email
attachments
4. Encryption for all connections and data transfers
5. Authentication by synchronized, timed passwords
or security certificates
08/03/15 21/30
Ph. D Synopsis Presentation (Dept. CSA), UU
22. PROPOSED STATEMENT
The research proposal is based on two types of
issues:
•Enhancement of Data Security by increasing the
level of confidentiality.
•Improving the Quality of Service for faster and
accurate data transmission.
08/03/15 22/30
Ph. D Synopsis Presentation (Dept. CSA), UU
23. PROPOSED STATEMENT contd…
• RSA, AES, IDEA uses single key value for encryption.
Though RSA provides a good level of security, still it can be
cracked.
• Multi signer key implementation by means of ring signature
so that multiple keys can be generated using s single prime
number shared by the group members but the identity of the
key generator can be secure and it will be convertible i.e. only
the actual message signer will be capable of generating the
signature.
• Cross- organizational key assignment by mean of multiple key
implementation at a time, so that using both the keys at a time
the information can be accessed. It will work like a locker
system.
08/03/15
Ph. D Synopsis Presentation (Dept. CSA), UU
23/30
Enhancement of Data Security
24. Improving the Quality of Service
• The quality of service for streaming image,
audio and videos are much difficult than the
standard text.
• Dynamic assignment of bandwidth for proper
utilization of resources.
• The protocols does not have the functionality
of dynamic QoS that changes based on the
type of data being communicated.
08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 24/30
PROPOSED STATEMENT contd…
25. RESEARCH PERSUED
• In paper [10], I have proposed a group
communication technique based on clustering
approach called incremental clustering.
• It guarantees the transmission of information
to the destination.
• It was implemented using the different ARQ
protocols .
High Impact Event Processing using Incremetal Clustering in Unsupervised Feature Space through Genetic
algorithm by Selective Repeat ARQ protocol [ICCCT – 2011 (IEEE International Conference) pp – 310 –
315]
08/03/15 25/30
Ph. D Synopsis Presentation (Dept. CSA), UU
26. RESEARCH PERSUED Contd…
• In paper [12], I had proposed a dynamic mechanism
called UPnP (Universal Plug and Play) mechanism.
• Here, each user has to register in the group before any
type of operation. After that it can be released such
that unnecessarily the candidate has to participate in
each type of activities. This provides well utilization
of resources of a group connected in the network.
UPnP and Secure Group communication Technique for Zero-configuration Environment construction using
Incremental Clustering [International Journal of Engineering & Technology (IJERT) – ISSN : 2278 –
0181, Vol -02, Issue -12, December – 2013 ]
08/03/15 26/30
Ph. D Synopsis Presentation (Dept. CSA), UU
27. CONCLUSION
• Network security and QoS is an important field that is
increasingly getting attention as the Internet expands.
• Due to the complex set of applications being executed over
Internet, the security issues such that information can’t be
leaked.
• QoS has to be enhanced for smarter and faster application
processing.
08/03/15
Ph. D Synopsis Presentation (Dept. CSA), UU
27/30
28. Reference
[1] Kartalopoulos, S. V., "Differentiating Data Security and Network Security,"
Communications, 2008. ICC '08. IEEE International Conference on, pp.1469 1473, 19‐ ‐
23 May 2008
[2] Molva, R., Institut Eurecom, “ Internet Security Architecture”, in Computer Networks
& ISDN Systems Journal, vol. 31, pp. 787 804, April 1999‐
[3] Sotillo S., East Carolina University, “ IPv6 security issues ”, August 2006,
www.infosecwriters.com/text_resources/pdf/IPv6_SSot illo.pdf.
[4] “Improving Security,” http://www.cert.org/tech_tips, 2006.
[5] Andress J., “IPv6: the next internet protocol”, April 2005, www.usenix.com
/publications /login / 2005 04/pdfs/andress0504.pdf.‐
[6] Adeyinka, O., "Internet Attack Methods and Internet Security Technology," Modeling &
Simulation, 2008. AICMS 08. Second Asia International Conference on, vol., no.,
pp.77 82, 13 15 May 2008‐ ‐
[7] Marin, G.A., "Network security basics," Security & Privacy, IEEE , vol.3, no.6, pp. 68‐
72, Nov. Dec. 2005‐
[8] Tyson, J., ”How Virtual private networks work,” ttp://www.howstuffworks.com/vpn.htm
.
08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 28/30
29. Reference Contd…
• [9] Jian Ren, Member, IEEE, and Lein Harn: Generalized Ring Signatures, IEEE
TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5, NO. 3,
JULY-SEPTEMBER 2008.
• [10] P. C. Sethi, C. Dash: High Impact Event Processing using Incremental Clustering in
Unsupervised Feature Space through Genetic algorithm by Selective Repeat ARQ protocol:
ICCCT- 2nd IEEE Conference – 2011, pp. 310-315.
• [11] Atul Kamble, Incremental Clustering in Data Miningusing Genetic Algorithm,
International Journal of Computer Theory and Engineering, Vol. 2, No. 3, June, 2010. 1793-
8201.
• [12] P. C. Sethi: “UPnP and Secure Group communication Technique for Zero-configuration
Environment construction using Incremental Clustering”, International Journal of Engineering
Research & Technology (IJERT), ISSN: 2278 – 0181, Vol. 02 Issue 12, December – 2013.
• [13] Tzu-Fang Sheu, Nen-Fu Huang, and Hsiao-Ping Lee, “In-Depth Packet Inspection Using
a Hierarchical Pattern Matching Algorithm”, IEEE TRANSACTIONS ON DEPENDABLE
AND SECURE COMPUTING, VOL. 7, NO. 2, APRIL-JUNE 2010, Page175-188
• [14] Kaoru Kurosawa, Member, IEEE, and Tsuyoshi Takagi, “One-Wayness Equivalent to
General Factoring”, IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO.
9, SEPTEMBER 2009, Page 4249 - 4262
• [15] R.L. Rivest, A. Shamir, and Y. Tauman, “How to Leak a Secret, Advances in
Cryptology”, ASIACRYPT, 2001
08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 29/30
30. 08/03/15 Ph. D Synopsis Presentation (Dept. CSA), UU 30/30