Indian Institute of Technology Roorkee

Displaying 1-28 of 28 results

  • White Papers // Jul 2013

    A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment

    Cloud computing provides network based access to computing and data storage services on a pay per usage model. Cloud provides better utilization of resources and hence a reduced service access cost to individuals. Cloud services include software as a service, platform as a service, and infrastructure as a service. Cloud...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Sep 2012

    Packet Monitoring Approach to Prevent DDoS Attack in Cloud Computing

    In cloud environment, cloud servers providing requested cloud services, sometimes may crash after receiving huge amount of requests. This is exactly what happens in a Denial of Service (DoS) attack. It prevents the authentic clients from getting service. DoS attack is accompanied by IP Spoofing so as to hide the...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Jul 2012

    Density-Based Clustering of Streaming Data Using Weighting Scheme

    Clustering of data streams is an important issue in data mining. A large number of algorithms exist for clustering data streams but most of these algorithms give equal weights to all the dimensions of the data stream. Some of the dimensions of the data stream may play important role in...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Mar 2012

    ANN Based Scheme to Predict Number of Zombies in a DDoS Attack

    A real time estimation of the number of zombies in DDoS attack scenario is helpful to suppress the effect of attack by choosing predicted number of most suspicious attack sources for either filtering or rate limiting. In this paper, ANN is employed to estimate number of zombies involved in a...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Feb 2012

    Secondary Constructions on Generalized Bent Functions

    In this paper, the authors construct generalized bent Boolean functions in n + 2 variables from 4 generalized Boolean functions in n variables. They also show that the direct sum of two generalized bent Boolean functions is generalized bent. Finally, they identify a set of affine functions in which every...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Jan 2012

    Recent Results on Generalized Q-Ary Bent Functions

    Boolean bent functions were introduced by Rothaus in 1976. In 1985, Kumar et al. extended the notion of bent functions in generalized setup. Then provided an analogue of classical Maiorana-McFarland type bent functions. In this paper, the authors study the cross-correlation of a subclass of such Generalized Maiorana-McFarland (GMMF) type...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Dec 2011

    Purging of Untrustworthy Recommendations From a Grid

    In grid computing, trust has massive significance. There is lot of research to propose various models in providing trusted resource sharing mechanisms. The trust is a belief or perception that various researchers have tried to correlate with some computational model. Trust on any entity can be direct or indirect. Direct...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Nov 2011

    RWP Mobility Model Based Performance Evaluation of OLSR and LAR1 Routing Protocols in MANET

    Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes that are arbitrarily located such that the interconnections between nodes are dynamically changing. In MANET, mobile nodes form a temporary network without using any kind of existing network infrastructure or centralized administration. A routing protocol is used to find...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Jul 2011

    Median Predictor Based Data Compression Algorithm for Wireless Sensor Network

    Wireless Sensor Network (WSN) consists of spatially distributed self-organizing, low-powered sensing devices with limited computational and communication resources to cooperatively monitor conditions, such as temperature, sound, vibration, pressure and humidity over a specific area for some specific purposes like target tracking, area monitoring, industrial monitoring, health monitoring, surveillance, environmental monitoring,...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Mar 2011

    Multidimensional QoS Oriented Task Scheduling in Grid Environments

    High availability of resources is the key requirement in grids where computational and network resources are highly dynamic and unpredictable. QoS (Quality of Service) based resource management and scheduling is an important issue in such dynamic and heterogeneous grid environments. The computational resources in the grid vary from dedicated clusters...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Jan 2011

    Performance Study of Broadcast Based Mobile Adhoc Routing Protocols AODV, DSR and DYMO

    The Mobile Ad-hoc NETwork (MANET) is a collection of self-configuring mobile node without any infrastructure. The mobile nodes with wireless radio interface are connected by wireless links where each device in a MANET is free to move independently and randomly with the capability of changing its links to other devices...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Dec 2010

    Energy Efficient Cooperative Caching in Mobile Ad Hoc Networks

    MANETs or mobile ad hoc networks are a form of wireless networks which do not require a base station for providing network connectivity. Mobile ad hoc networks have many characteristics which distinguish them from other wireless networks. Frequent network disconnection is one among various characteristics, due to which data availability...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Dec 2010

    Null Steering in Failed Antenna Array

    Creation of nulls in specified directions is desirable in order to reduce the effect of interfering signals. But in large antenna arrays there possibility of getting a fault from some of the radiating elements can not be denied. In such a situation, the pattern of the array get distorted mostly...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Dec 2010

    Fault Finding in Antenna Arrays Using Bacteria Foraging Optimization Technique

    Task of finding position and level of fault in antenna arrays from its far field pattern information is formulated as an optimization problem and solved using Bacteria Foraging Optimization (BFO) technique. A Chebyshev array of specific sidelobe level is taken as the candidate antenna and the developed formulation is tested...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Dec 2010

    A Simplified Analytical Model for End-to-End Delay Analysis in MANET

    In order to provide quality delivery to delay sensitive applications such as voice and video, it is extremely important that mobile Ad hoc networks provide Quality of Service (QoS) support in terms of bandwidth and delay. In spite of using IEEE 802.11 as Medium Access Control (MAC), most of the...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Dec 2010

    Vectorization of Constant-Time Gray-Scale Morphological Processing Algorithm Using AltiVec

    Mathematical morphology is widely used in the area of signal and image analysis. It has enormous applications in detection of weak targets, object recognition and feature extraction, edge detection, image enhancement and many more. However, its use has long been hampered by its algorithmic complexity as the size of the...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Oct 2010

    Traffic Load Based Performance Analysis of DSR, STAR & AODV Adhoc Routing Protocol

    The wireless adhoc network is comprised of nodes (it can be static or mobile) with wireless radio interface. These nodes are connected among themselves without central infrastructure and are free to move. It is a multihop process because of the limited transmission range of energy constrained wireless nodes. Thus, in...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Sep 2010

    Mobility Metrics Based Classification & Analysis of Mobility Model for Tactical Network

    In the tactical network scenario mobile nodes are required to attain high degree of mobility without the aid of prior network infrastructure. To access the efficient and reliable communication it must be based on tactic scenario like specified area, task specified unit etc. in real time. The performance of this...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Sep 2010

    A Proactive Load-Aware Gateway Discovery in Ad Hoc Networks for Internet Connectivity

    When a Mobile Ad Hoc NETwork (MANET) is connected to the Internet, it is important for mobile nodes to detect available Internet GateWay (IGW) providing access to the Internet. Gateway discovery time have strong influence on packet delay and throughput. In most of the cases, a mobile node uses min-hops...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Jul 2010

    Review Strategies and Analysis of Mobile Ad Hoc Network-Internet Integration Solutions

    The desire to be connected anytime and anywhere has led to the development of wireless networks, opening new vista of research in pervasive and ubiquitous computing. Mobile Ad Hoc Networks (MANETs) use portable devices such as mobile phones, laptops or personal digital assistants (PDAs) for spontaneous establishment of communication. Most...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Jan 2010

    Supporting Different QoS Levels in Multiple-Cluster Wireless Sensor Networks

    Recent advancement in technology and rapid reduction in costs have led to the uses of Wireless Sensor Networks (WSNs) for applications with requirements significantly differing form traditional monitoring applications. Sensor nodes are now being increasingly used for real-time embedded applications having stringent QoS requirements in terms of timeliness and reliability....

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Dec 2009

    An Improvement of Wang et al.'s Authentication Scheme Using Smart Cards

    In 2009, Wang et al. argued that Das et al.'s scheme is vulnerable to stolen smart card attack if an attacker obtains the smart card of legitimate user and chooses any random password. Then the attacker gets through the authentication process to get access of the remote server. Therefore, Wang...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Oct 2009

    Privacy Preserving Fuzzy Association Rules Hiding in Quantitative Data

    Data mining is the process of extracting useful patterns or knowledge from large databases. However, data mining also poses a threat to privacy and information protection if not done or used properly. Therefore, researchers need to investigate data mining algorithm from a new point of view that is of personal...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Jul 2009

    Concurrency Control for Multilevel Secure Databases

    A Multi-Level Secure (MLS) database is intended to protect classified information from unauthorized users based on the classification of the data and the clearances of the users. The concurrency control requirements for transaction processing in Multi-Level Secure Data-Base Management Systems (MLS/DBMSs) are different from those in conventional transaction processing systems....

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Jun 2009

    Hybrid Machine Learning System for Stock Market Forecasting

    In this paper, the authors propose a hybrid machine learning system based on Genetic Algorithm (GA) and Support Vector Machines (SVM) for stock market prediction. A variety of indicators from the technical analysis field of study are used as input features. They also make use of the correlation between stock...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Jun 2009

    A Logic Based Framework for Planning for Mobile Agents

    The objective of the paper is twofold. First, to develop a formal framework for planning for mobile agents. A logical language based on a temporal logic is proposed that can express a type of tasks which often arise in network management. Second, to design a planning algorithm for such tasks....

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Apr 2009

    An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain

    In this paper, an analytical model for DDoS attacks detection is proposed, in which propagation of abrupt traffic changes inside public domain is monitored to detect a wide range of DDoS attacks. Although, various statistical measures can be used to construct profile of the traffic normally seen in the network...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Apr 2009

    An Anti-Phishing Application for the End User

    Seeking sensitive user data in the form of online banking user-id and passwords or credit card information, which may then be used by 'Phishers' for their own personal gain is the primary objective of the phishing e-mails. With the increase in the online trading activities, there has been a phenomenal...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Jul 2012

    Density-Based Clustering of Streaming Data Using Weighting Scheme

    Clustering of data streams is an important issue in data mining. A large number of algorithms exist for clustering data streams but most of these algorithms give equal weights to all the dimensions of the data stream. Some of the dimensions of the data stream may play important role in...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Sep 2012

    Packet Monitoring Approach to Prevent DDoS Attack in Cloud Computing

    In cloud environment, cloud servers providing requested cloud services, sometimes may crash after receiving huge amount of requests. This is exactly what happens in a Denial of Service (DoS) attack. It prevents the authentic clients from getting service. DoS attack is accompanied by IP Spoofing so as to hide the...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Apr 2009

    An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain

    In this paper, an analytical model for DDoS attacks detection is proposed, in which propagation of abrupt traffic changes inside public domain is monitored to detect a wide range of DDoS attacks. Although, various statistical measures can be used to construct profile of the traffic normally seen in the network...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Jul 2013

    A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment

    Cloud computing provides network based access to computing and data storage services on a pay per usage model. Cloud provides better utilization of resources and hence a reduced service access cost to individuals. Cloud services include software as a service, platform as a service, and infrastructure as a service. Cloud...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Jul 2009

    Concurrency Control for Multilevel Secure Databases

    A Multi-Level Secure (MLS) database is intended to protect classified information from unauthorized users based on the classification of the data and the clearances of the users. The concurrency control requirements for transaction processing in Multi-Level Secure Data-Base Management Systems (MLS/DBMSs) are different from those in conventional transaction processing systems....

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Apr 2009

    An Anti-Phishing Application for the End User

    Seeking sensitive user data in the form of online banking user-id and passwords or credit card information, which may then be used by 'Phishers' for their own personal gain is the primary objective of the phishing e-mails. With the increase in the online trading activities, there has been a phenomenal...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Jul 2010

    Review Strategies and Analysis of Mobile Ad Hoc Network-Internet Integration Solutions

    The desire to be connected anytime and anywhere has led to the development of wireless networks, opening new vista of research in pervasive and ubiquitous computing. Mobile Ad Hoc Networks (MANETs) use portable devices such as mobile phones, laptops or personal digital assistants (PDAs) for spontaneous establishment of communication. Most...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Oct 2010

    Traffic Load Based Performance Analysis of DSR, STAR & AODV Adhoc Routing Protocol

    The wireless adhoc network is comprised of nodes (it can be static or mobile) with wireless radio interface. These nodes are connected among themselves without central infrastructure and are free to move. It is a multihop process because of the limited transmission range of energy constrained wireless nodes. Thus, in...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Dec 2010

    A Simplified Analytical Model for End-to-End Delay Analysis in MANET

    In order to provide quality delivery to delay sensitive applications such as voice and video, it is extremely important that mobile Ad hoc networks provide Quality of Service (QoS) support in terms of bandwidth and delay. In spite of using IEEE 802.11 as Medium Access Control (MAC), most of the...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Sep 2010

    Mobility Metrics Based Classification & Analysis of Mobility Model for Tactical Network

    In the tactical network scenario mobile nodes are required to attain high degree of mobility without the aid of prior network infrastructure. To access the efficient and reliable communication it must be based on tactic scenario like specified area, task specified unit etc. in real time. The performance of this...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Jun 2009

    Hybrid Machine Learning System for Stock Market Forecasting

    In this paper, the authors propose a hybrid machine learning system based on Genetic Algorithm (GA) and Support Vector Machines (SVM) for stock market prediction. A variety of indicators from the technical analysis field of study are used as input features. They also make use of the correlation between stock...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Sep 2010

    A Proactive Load-Aware Gateway Discovery in Ad Hoc Networks for Internet Connectivity

    When a Mobile Ad Hoc NETwork (MANET) is connected to the Internet, it is important for mobile nodes to detect available Internet GateWay (IGW) providing access to the Internet. Gateway discovery time have strong influence on packet delay and throughput. In most of the cases, a mobile node uses min-hops...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Mar 2011

    Multidimensional QoS Oriented Task Scheduling in Grid Environments

    High availability of resources is the key requirement in grids where computational and network resources are highly dynamic and unpredictable. QoS (Quality of Service) based resource management and scheduling is an important issue in such dynamic and heterogeneous grid environments. The computational resources in the grid vary from dedicated clusters...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Jun 2009

    A Logic Based Framework for Planning for Mobile Agents

    The objective of the paper is twofold. First, to develop a formal framework for planning for mobile agents. A logical language based on a temporal logic is proposed that can express a type of tasks which often arise in network management. Second, to design a planning algorithm for such tasks....

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Oct 2009

    Privacy Preserving Fuzzy Association Rules Hiding in Quantitative Data

    Data mining is the process of extracting useful patterns or knowledge from large databases. However, data mining also poses a threat to privacy and information protection if not done or used properly. Therefore, researchers need to investigate data mining algorithm from a new point of view that is of personal...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Jan 2010

    Supporting Different QoS Levels in Multiple-Cluster Wireless Sensor Networks

    Recent advancement in technology and rapid reduction in costs have led to the uses of Wireless Sensor Networks (WSNs) for applications with requirements significantly differing form traditional monitoring applications. Sensor nodes are now being increasingly used for real-time embedded applications having stringent QoS requirements in terms of timeliness and reliability....

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Jan 2011

    Performance Study of Broadcast Based Mobile Adhoc Routing Protocols AODV, DSR and DYMO

    The Mobile Ad-hoc NETwork (MANET) is a collection of self-configuring mobile node without any infrastructure. The mobile nodes with wireless radio interface are connected by wireless links where each device in a MANET is free to move independently and randomly with the capability of changing its links to other devices...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Nov 2011

    RWP Mobility Model Based Performance Evaluation of OLSR and LAR1 Routing Protocols in MANET

    Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes that are arbitrarily located such that the interconnections between nodes are dynamically changing. In MANET, mobile nodes form a temporary network without using any kind of existing network infrastructure or centralized administration. A routing protocol is used to find...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Dec 2011

    Purging of Untrustworthy Recommendations From a Grid

    In grid computing, trust has massive significance. There is lot of research to propose various models in providing trusted resource sharing mechanisms. The trust is a belief or perception that various researchers have tried to correlate with some computational model. Trust on any entity can be direct or indirect. Direct...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Mar 2012

    ANN Based Scheme to Predict Number of Zombies in a DDoS Attack

    A real time estimation of the number of zombies in DDoS attack scenario is helpful to suppress the effect of attack by choosing predicted number of most suspicious attack sources for either filtering or rate limiting. In this paper, ANN is employed to estimate number of zombies involved in a...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Jan 2012

    Recent Results on Generalized Q-Ary Bent Functions

    Boolean bent functions were introduced by Rothaus in 1976. In 1985, Kumar et al. extended the notion of bent functions in generalized setup. Then provided an analogue of classical Maiorana-McFarland type bent functions. In this paper, the authors study the cross-correlation of a subclass of such Generalized Maiorana-McFarland (GMMF) type...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Feb 2012

    Secondary Constructions on Generalized Bent Functions

    In this paper, the authors construct generalized bent Boolean functions in n + 2 variables from 4 generalized Boolean functions in n variables. They also show that the direct sum of two generalized bent Boolean functions is generalized bent. Finally, they identify a set of affine functions in which every...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Dec 2010

    Energy Efficient Cooperative Caching in Mobile Ad Hoc Networks

    MANETs or mobile ad hoc networks are a form of wireless networks which do not require a base station for providing network connectivity. Mobile ad hoc networks have many characteristics which distinguish them from other wireless networks. Frequent network disconnection is one among various characteristics, due to which data availability...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Jul 2011

    Median Predictor Based Data Compression Algorithm for Wireless Sensor Network

    Wireless Sensor Network (WSN) consists of spatially distributed self-organizing, low-powered sensing devices with limited computational and communication resources to cooperatively monitor conditions, such as temperature, sound, vibration, pressure and humidity over a specific area for some specific purposes like target tracking, area monitoring, industrial monitoring, health monitoring, surveillance, environmental monitoring,...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Dec 2010

    Vectorization of Constant-Time Gray-Scale Morphological Processing Algorithm Using AltiVec

    Mathematical morphology is widely used in the area of signal and image analysis. It has enormous applications in detection of weak targets, object recognition and feature extraction, edge detection, image enhancement and many more. However, its use has long been hampered by its algorithmic complexity as the size of the...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Dec 2010

    Null Steering in Failed Antenna Array

    Creation of nulls in specified directions is desirable in order to reduce the effect of interfering signals. But in large antenna arrays there possibility of getting a fault from some of the radiating elements can not be denied. In such a situation, the pattern of the array get distorted mostly...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Dec 2010

    Fault Finding in Antenna Arrays Using Bacteria Foraging Optimization Technique

    Task of finding position and level of fault in antenna arrays from its far field pattern information is formulated as an optimization problem and solved using Bacteria Foraging Optimization (BFO) technique. A Chebyshev array of specific sidelobe level is taken as the candidate antenna and the developed formulation is tested...

    Provided By Indian Institute of Technology Roorkee

  • White Papers // Dec 2009

    An Improvement of Wang et al.'s Authentication Scheme Using Smart Cards

    In 2009, Wang et al. argued that Das et al.'s scheme is vulnerable to stolen smart card attack if an attacker obtains the smart card of legitimate user and chooses any random password. Then the attacker gets through the authentication process to get access of the remote server. Therefore, Wang...

    Provided By Indian Institute of Technology Roorkee