International Journal of Scientific & Engineering Research

Displaying 1-40 of 277 results

  • White Papers // Sep 2013

    Cloud Computing : Service Level Agreements(SLA)

    Cloud computing is a very complex system. It involves integration of many information communication technologies, like internet, distributed computing, grids, client-server, etc. main issue with any cloud is user's trust. To achieve this user-trust many solutions are put forth by scientists one of which is service-usage agreement based cloud development....

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Sep 2013

    The Secure Dynamic Source Routing Protocol in MANET to Authenticate the Node

    The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. DSR allows the network to be completely self-organizing and self-configuring, without the need for any existing network infrastructure or administration. The protocol is composed...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Aug 2013

    Secured Broadband Data Access System In WiMAX

    Security mechanism is to meet the expectations from mobile users to provide seamless services in mobile WiMAX. Handover should take place in highly secured and in most improved means. The main motive of the mobile technologies is to provide seamless cost effective mobility. But this is affected by Authentication cost...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Aug 2013

    Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing

    Cloud computing delivers the computing resources to the user as a service over an internet. It uses wireless services with a user's data, software and computation. So spreaded over almost all it sector and become a rich area of research. Cloud computing composes of virtualization, on demand deployment. Here, user...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jun 2013

    Survey Paper of Fuzzy Data Mining Using Genetic Algorithm for Intrusion Detection

    In spite of growing information technology widely, security has remained one challenging area for computers and networks. Recently many researchers have focused on intrusion detection system based on data mining techniques as an efficient strategy. Intrusion detection is one of the important and essential area of research. This paper has...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Enhancing the Security of Biometrics in ATM

    Biometrics based authentication provides various advantages over other authentication methods, it has replaced the password based authentication and token based authentication. Biometrics plays a major role in Automated Teller Machine (ATM) system, e-commerce, online banking and passports. The growth in electronic transactions has been increased tremendously; there is a greater...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Improving Security & QoS in IP-Based MANETs

    A Mobile Ad-hoc NETwork (MANET) is a temporary network formed by the collection of mobile nodes. The network formed doesn't require any physical infrastructure. There is no central authority to administer the services and configurations of the network. Securing MANETs is still an active area of research. In this paper,...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Progressive Image Hotspot Navigation for Progressive Image Hotspot Navigation for successful Security Evaluation

    Storing the images in a secure database through file stream data type is one of the options used to secure the images instead of storing the images in the server. Users will be provided an option of selecting the images to create the authentication page which is not included in...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Context-Sensitive Modeling for Intrusions Detection in Multitier Web Applications

    This strategy is mainly focus on to detect intrusion in multitier web applications. Multitier web application include two ends that is front end as well as back end of the applications. Modern multi-tier application systems are generally based on high performance database systems in order to process and store business...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    A Survey on RFID Authentication with Different Protocols

    Security is an important concept in the process of communicating data across network. Although there are many authentication protocols implemented for the security of message from the sender to the receiver. It is also necessary in various communication devices such as RFID where the data from the tag can be...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Scheduling in Instance-Intensive Cost-Constrained Workflows in a Cloud

    Cloud computing has been growing tremendously, as it has been accepted recently. Cloud computing has many unique strengths which can be utilized to facilitate workflow execution. This paper investigates the issue of dynamic scheduling in cloud computing with a special attention to the case of instance-intensive cost-constrained workflows. This paper...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    A Review Model on Query Optimization Using Open Source Database

    Query optimization is used to optimize the efficient result with less time and minimum cost. The query formatted according to particular search engine and then the translated query is passed to the search engines. HTML screen scrapping is used to parse the data from each individual search engine. Then these...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Cryptographic Provenance Verification for Secure Hosts

    To improve the trustworthiness of a host and system data cryptographic verification technique is used. From these approach users keystroke to identify the legitimate user's to get the service from the server by using integrity verification and malicious traffic detection. But the main issue of this approach is keystroke hacking...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Email Spam Zombies Scrutinizer In Email Sending Network Infrastructures

    Email spammers are constantly pioneering the techniques to bypass anti-spam filters forcing many organizations to invest in spam email prevention mechanisms and solutions. Traditional email spam filters aims at analyzing the email content to characterize the best features that are commonly included in email spams. However, this is observed that...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Wormhole Attack Prevention By Next Hop Analysis

    A Mobile Ad-hoc NETwork (MANET) is an autonomous network that consists of mobile nodes that communicate with each other over wireless links. It uses open medium, dynamic topology and distributed co-operation. In the absence of a fixed infrastructure, nodes have to cooperate in order to provide the necessary network functionality....

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    File and Database Integrated Databse Transformations: An Middleware

    Database transformation is the process of transferring a table or whole schema of a database, from one database to another. The database transformations have either been performed using 'Command line interface' or import tools. This traditional process is complex and becomes tedious when same set of transformation has to be...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Controlling Database Access by Providing Access Permissions on Database Objects

    In this paper, the authors focus on securing a table in the database, to the row level, implying that not all the rows in a database can be accessed by the end user. A user can access and perform operations on only those rows which he has been assigned right...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    Fuzzy-GA Optimized Multi-Cloud Multi-Task Scheduler for Cloud Storage and Service Applications

    Computing clusters have been one of the most popular platforms for solving Many Task Computing (MTC) problems, especially in the case of loosely coupled tasks. However, building and managing physical clusters exhibits several drawbacks: major investments in hardware, specialized installations, and qualified personal; long periods of cluster under-utilization; cluster overloading...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    NIDS Using Attack Patterns

    Now-a-days intrusion detection system becomes important topic because of its capabilities. Intrusion detection becomes a vital part of a systems as it detects various network attacks. Various intrusion detection systems are developed up till now, depending upon their capabilities. This paper proposes the intrusion detection system based on pattern matching...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    Cloud Storage Gateway for Industry Data Base

    In the present time cloud storage gateway are important to the Industry. These appliances are growing in popularity and with clear indicators that the cloud storage space is growing. Object base storage has lack of standardized cloud storage Application Programming Interfaces (APIs) means customers will have to deploy cloud storage...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    Biometric Security Systems and Contemporary Affirmation of State of Art

    Biometrics is playing vital role in applications that are centric to tasks such as identification, verification and classification. One distinctive illustration is a biometric verification structure that concludes the user's authorization by validating the biometric traits submitted by the user. The human traits preferred for biometric systems are universally unique...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    Security from Threats on Vehicular Adhoc Network

    A Vehicular Ad-hoc NETwork (VANET) is a new type of ad hoc network that is becoming even more popular than the original ad hoc concept. A Vehicular Ad-hoc NETwork (VANET) is a technology that uses moving cars as nodes in a network to create a mobile network. VANET turns every...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    FP Tree Algorithm using Hybrid Secure Sum Protocol in Distributed Database

    At the enhancement of new technology and growth of the network the new data is coming and being added to the database at every fraction of seconds. For accessing and storing data a specialized tool is required. An FP Tree mining algorithm increases the environmental growth for accessing the data...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    Mobile Cloud Computing: Security Challenges for Threats Reduction

    Now-a-days, with the remarkable advances in information technology, mobile cloud computing with the security challenges and with factors privacy and trust is faced. MCC, in cloud computing technology for mobile devices is important. In MCC technology considering the hardware limitations of the device such as mobile phones, tablets and smart...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    Effective Discovery Of E-mail Spam Using Spot Detection System

    Compromised machines on the Internet are generally referred to as bots, and the set of bots controlled by a single entity is called a botnet. Botnets have multiple nefarious uses: mounting Distributed denial of service attacks, stealing user passwords and identities, generating click fraud, and sending spam email. Compromised machines...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    A Survey on Mobile Databases and Query Processing in Mobile Databases

    Mobile computing is increasingly becoming more and more popular as people need information even on the move in this rapid changing information world. Mobile computing is an environment where user is mobile and can change its place while communicating. A mobile database is a database that can be connected to...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    A Survey on Data Mining: Tools, Techniques, Applications, Trends and Issues

    Data mining is a process which finds useful patterns from large amount of data. It is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses. It uses machine learning, statistical and visualization techniques to discovery and present knowledge in...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Feb 2013

    The Secure Cluster and Energy Efficient in Geocast for Manets Using Selection Gateway Method

    The secure and energy efficient geocast method using for a mobile ad hoc network, it's based on a secure clustered agreement with data declaration release from the basis node of the system and all nodes located in one or more geocast regions on the network. To improving the energy efficient...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Feb 2013

    Classification of Attacks in Network Intrusion Detection System

    The authors have designed a network intrusion detection system based on the artificial neural networks using Multi Layer Perception (MLP) and Modified signature Apriory algorithm; and the testing results of the prototype system proved the validity of the method and the advantages over other methods suggested. In the present study...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Feb 2013

    Secure Routing Using Trust Based Mechaniam in Wireless Sensor Networks(WSNs)

    Wireless Sensor Networks (WSN) is a most challenging and emerging technology for the research. Today wireless sensor networks are broadly used in environmental control, surveillance tasks, maintaining tracking, controlling, etc. On the top of all this the wireless sensor networks need very secure communication. Ensuring confidence between every pair of...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2013

    To Overcome DoS and DDoS Flooding Attacks in IP Multimedia Subsystem (NGN) Using the Genetic Intrusion Detection Systems (IDS)

    IP Multimedia Subsystem designed by the third Generation Partnership Project to provide the access networks services and telecommunication services, plans to merge services like multimedia, data and voice conversation under one umbrella. In this research, network based anomaly detection system is proposed by using Genetic Algorithm rules to avoid such...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2013

    A CRM Based Cryptography Service for Ensuring Security in Cloud Computing

    Cloud Computing is more than a technology. It is more than a platform. It is more than just a hosting provider. It is more than just an application hosted as a service. It is more than providing storage services on the Internet. It is a combination of all the above....

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2013

    Cooperative Provable Data Retention for Integrity Authentication in Multi-Cloud Storage

    Provable Data Retention (PDR) is a technique which certain the integrity of data in storage outsourcing. In this paper the authors propose an efficient PDR protocol that prevent attacker in gaining information from multiple cloud storage node. Their technique is for distributed cloud storage and support the scalability of services...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2013

    Cloud Computing: The Base of Future Operating Systems

    Operating system, the soul of an electronic device, has been turned into a subject of great competition among the companies and of fascination among the techies. New operating systems are being developed by different companies while olds are getting updates. Now come to the word 'Cloud computing'. Though it has...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2013

    Impact of Database Security in Cloud Computing

    In this paper, the authors discuss about the database services available in cloud computing environment, analyses the security risks combination and propose the possible counter measures to minimize the risks. And also analyzes the cloud database service providers namely; Amazon and Xeround, RackSpace2. The reason behind choosing these are providers...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2013

    A Highly Secure Integrated Biometrics Authentication Using Finger-Palmprint Fusion

    Biometric authentication is the verification and identification of a person uniquely based on physical characteristics such as finger print, palm print, retina, iris, face etcetera or behavioral characteristics such as signature, gait, typing patterns, voice etcetera. Existing single modal biometric system has more error rate and provides less security than...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2013

    Types of Malware and its Analysis

    Malware - the increasingly common vehicle by which criminal organizations facilitate online crime - has become an artifact whose use intersects multiple major security threats (e.g., botnets) faced by information security practitioners. The paper explores the still-growing threat of website malware, specifically how hackers compromise websites and how users become...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Dec 2012

    VoIP Cell Phones : Security Concerns and Countermeasures

    In this paper, the authors deal with modern cellular phones that operate on Voice over Internet Protocol, their current development, several Information security risks associated with them and various countermeasures that can be undertaken to prevent data theft/misuse. VoIP is vulnerable to well known traditional modes of attack such as...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Dec 2012

    Enhancing Data Security in Cloud Computing

    Cloud computing is a new mechanism to deliver products from producer to consumer in a very different and efficient style of computing. It has revolutionized not only the IT industry but has also revolutionized the hardware and software industry. It is growing leaps and bounds and has only bright sky...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Nov 2012

    Review of Challenges in Accessing Cloud Services Through Mobile Devices

    Mobile cloud computing is an emerging branch of cloud computing. Mobile cloud computing is a 3+ combination of cloud computing, mobile computing and internet. Nature of accessing cloud services through mobile devices increases as there is continues growth in the number of mobile users. But, there are several problems in...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2013

    Cooperative Provable Data Retention for Integrity Authentication in Multi-Cloud Storage

    Provable Data Retention (PDR) is a technique which certain the integrity of data in storage outsourcing. In this paper the authors propose an efficient PDR protocol that prevent attacker in gaining information from multiple cloud storage node. Their technique is for distributed cloud storage and support the scalability of services...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Enhancing the Security of Biometrics in ATM

    Biometrics based authentication provides various advantages over other authentication methods, it has replaced the password based authentication and token based authentication. Biometrics plays a major role in Automated Teller Machine (ATM) system, e-commerce, online banking and passports. The growth in electronic transactions has been increased tremendously; there is a greater...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Oct 2012

    Secure Wireless Network System Against Malicious Rogue Threats (System Attacks) within Cooperative Distributed Network and Wireless Network

    With the expanse of the Internet and the increased reliance on computer networking technology for everyday business, the need to protect electronic data and communication from malicious attack has become increasingly critical. This paper addresses the rogue system problem, a significant threat in modern networks. A rogue system is a...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // May 2012

    Usage & Issues of Cloud Computing Techniques in Small & Medium Business Organizations

    In cloud computing large accessible computing resources are provided \"Software-as-a-service\" to users on internet because it is \"It is internet based system development\". It includes SaaS, web infrastructure, web and other technologies. Industry and research community are attracting towards it. In this paper construction and the problems that arise during...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jul 2012

    Exploring the Malware Analysis Landscape for Forensic Investigation

    The computer crime explosion in World Wide Web has increased in both commercial and personal areas. Study of poor users; provide valuable information in their system to their individual needs or for the efficient organization. Among the several attacking approaches like virus, worm, Trojan horse etc. to extract confidential data...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Feb 2013

    The Secure Cluster and Energy Efficient in Geocast for Manets Using Selection Gateway Method

    The secure and energy efficient geocast method using for a mobile ad hoc network, it's based on a secure clustered agreement with data declaration release from the basis node of the system and all nodes located in one or more geocast regions on the network. To improving the energy efficient...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Improving Security & QoS in IP-Based MANETs

    A Mobile Ad-hoc NETwork (MANET) is a temporary network formed by the collection of mobile nodes. The network formed doesn't require any physical infrastructure. There is no central authority to administer the services and configurations of the network. Securing MANETs is still an active area of research. In this paper,...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jun 2012

    A Survey on Infrastructure Platform Issues in Cloud Computing

    Cloud computing providers have setup several data centers at different geographical locations over the internet in order to optimally serve needs of their customers around the world. However, existing systems do not support mechanisms and policies for dynamically coordinating load distribution among different cloud-based data centers in order to determine...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Progressive Image Hotspot Navigation for Progressive Image Hotspot Navigation for successful Security Evaluation

    Storing the images in a secure database through file stream data type is one of the options used to secure the images instead of storing the images in the server. Users will be provided an option of selecting the images to create the authentication page which is not included in...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Oct 2012

    JAVA-MySQL Based Asset Management System

    Dealing with enormous amount of information has become an integral part of complex systems across all sectors. This concept of efficient management of data when extended to the personal level can go a very long way in saving an individual's time. In the current era, an individual owns a variety...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Feb 2012

    A Framework for Spatial Data Mining

    The authors' framework for spatial data mining heavily depend on the efficient processing of neighborhood relations since the neighbors of many objects have to be investigated in a single run of a typical algorithm. Therefore, providing general concepts for neighborhood relations as well as an efficient implementation of these concepts...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2012

    Geo-Processing Using Oracle Spatial Geo Database

    In the last two decades, Geographic Information Systems (GIS) has been widely developed and is applied to various fields, which include resources management, environment management, prevention of disaster, planning area, education and national defense etc in many sections and subjects. However, traditional GIS application systems can't interact with each other...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2013

    Cloud Computing: The Base of Future Operating Systems

    Operating system, the soul of an electronic device, has been turned into a subject of great competition among the companies and of fascination among the techies. New operating systems are being developed by different companies while olds are getting updates. Now come to the word 'Cloud computing'. Though it has...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Nov 2012

    Review of Challenges in Accessing Cloud Services Through Mobile Devices

    Mobile cloud computing is an emerging branch of cloud computing. Mobile cloud computing is a 3+ combination of cloud computing, mobile computing and internet. Nature of accessing cloud services through mobile devices increases as there is continues growth in the number of mobile users. But, there are several problems in...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Feb 2012

    Introducing P2P in Cloud Computing

    Cloud computing platform is a set of scalable large-scale data server clusters, it provides computing and storage services to customers. The basic study about the architecture of current cloud computing system shows that it's a central structured one; i.e. All the data nodes are indexed by a master server, but...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Oct 2012

    Educational Cloud: Utilization of IaaS versus PaaS Services

    Cloud computing is the provision of dynamically scalable and often virtualized resources as a service over the Internet on a utility basis. Users need not have knowledge of, expertise in, or control over the technology infrastructure in the \"Cloud\" that supports them. Cloud computing services often provide common business applications...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // May 2012

    Cloud Service Publication and Discovery Using Ontology

    The emergences of cloud computing deals in various internet applications developers for hosting various applications which users are in need in this day to day life. This paper offers different features which is related to the resources which has been provisioned as a services over this enhancing field called Internet,...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    Fuzzy-GA Optimized Multi-Cloud Multi-Task Scheduler for Cloud Storage and Service Applications

    Computing clusters have been one of the most popular platforms for solving Many Task Computing (MTC) problems, especially in the case of loosely coupled tasks. However, building and managing physical clusters exhibits several drawbacks: major investments in hardware, specialized installations, and qualified personal; long periods of cluster under-utilization; cluster overloading...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Aug 2012

    Efficient Dynamic Resource Allocation Using Nephele in a Cloud Environment

    Today, Infrastructure-as-a-Service (IaaS) cloud providers have incorporated parallel data processing framework in their clouds for performing Many-Task Computing (MTC) applications. Parallel data processing framework reduces time and cost in processing the substantial amount of users' data. Nephele is a dynamic resource allocating parallel data processing framework, which is designed for...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Nov 2012

    JVM Based Cloud Computing for Android

    The number of Smartphone users and mobile application offerings are growing rapidly. A Smartphone is often expected to offer PC-like functionality. In this paper, the authors present \"JVM based cloud computing for android\" system that allows users to deploy applications in the cloud system and to customize each application to...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Oct 2012

    Energy Efficient Scheduling Framework for Cloud Computing Using Ranking Algorithm

    Cloud computing provides everything as a service and solves high performance and high throughput computing problems through sharing resources ranging from personal computers to super computers distributed around the world. In cloud computing, one of the major problems is resource scheduling, i.e. allocating tasks to resources efficiently. In addition to...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Sep 2012

    Conventional Software Testing Vs. Cloud Testing

    Software Testing is one of the important activities in software development process. Depending on the testing method employed, software testing can be implemented at any time in the development process. Traditionally most of the test effort occurs after the requirements have been defined and the coding process has been completed,...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Sep 2013

    Cloud Computing : Service Level Agreements(SLA)

    Cloud computing is a very complex system. It involves integration of many information communication technologies, like internet, distributed computing, grids, client-server, etc. main issue with any cloud is user's trust. To achieve this user-trust many solutions are put forth by scientists one of which is service-usage agreement based cloud development....

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jun 2012

    Data Leakage and Detection of Guilty Agent

    Organizations apply data or information security only in terms of protecting their network from intruders (e.g. hackers) but with growing amount of sensitive data and rapid growth in the sizes of organizations (e.g. due to globalization), rise in number of data points (machines and servers) and easier modes of communication,...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Aug 2012

    Recent DDoS Incidents and Their Impact

    In the present era Internet has changed the way of traditional essential services such as banking, transportation, power, health, and defense being operated. These operations are being replaced by cheaper, more efficient Internet-based applications. The explosive growth of the Internet and its increasingly critical role in supporting electronic commerce, transportation,...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Aug 2013

    Secured Broadband Data Access System In WiMAX

    Security mechanism is to meet the expectations from mobile users to provide seamless services in mobile WiMAX. Handover should take place in highly secured and in most improved means. The main motive of the mobile technologies is to provide seamless cost effective mobility. But this is affected by Authentication cost...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Oct 2012

    Finger and Face Recognition Biometric System

    For human authentication the biometric systems are widely used to increase the systems security. In this paper, the authors propose the multimodal biometric system using the biometric traits i.e. face and fingerprint. Gabor filter and haar transformation technique is used for extracting the features from fingerprint and face. The final...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Sep 2013

    The Secure Dynamic Source Routing Protocol in MANET to Authenticate the Node

    The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. DSR allows the network to be completely self-organizing and self-configuring, without the need for any existing network infrastructure or administration. The protocol is composed...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // May 2012

    Reputation Based Intrusion Detection System

    The unique characteristics of mobile ad hoc networks, such as shared wireless channels, dynamic topologies and a reliance on cooperative behavior, makes routing protocols employed by these networks more vulnerable to attacks than those employed within traditional wired networks. The authors consider the security of control traffic generated by pro-active...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2012

    Windows API Based Malware Detection and Framework Analysis

    Detection of zero day malware has been the great challenge for researchers from long time. Traditional signature based anti-malware scanners detect malware based on their unique signatures. The major drawback of such traditional signatures based scanners is that it has no protection against zero-day or unseen malware. Further usage of...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    NIDS Using Attack Patterns

    Now-a-days intrusion detection system becomes important topic because of its capabilities. Intrusion detection becomes a vital part of a systems as it detects various network attacks. Various intrusion detection systems are developed up till now, depending upon their capabilities. This paper proposes the intrusion detection system based on pattern matching...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Context-Sensitive Modeling for Intrusions Detection in Multitier Web Applications

    This strategy is mainly focus on to detect intrusion in multitier web applications. Multitier web application include two ends that is front end as well as back end of the applications. Modern multi-tier application systems are generally based on high performance database systems in order to process and store business...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Aug 2012

    Neural Network Intrusion Detection Architecture for Distributed System

    Attacks on network infrastructure presently are main threats against network and information security. With the rapid expansion of computer networks, security has become a crucial issue for distributed systems. Unauthorized activities in networks, Intrusion Detection (ID) as a component of defense-in-depth is very necessary because traditional firewall techniques cannot provide...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Feb 2013

    Classification of Attacks in Network Intrusion Detection System

    The authors have designed a network intrusion detection system based on the artificial neural networks using Multi Layer Perception (MLP) and Modified signature Apriory algorithm; and the testing results of the prototype system proved the validity of the method and the advantages over other methods suggested. In the present study...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2012

    Data Mining Techniques for Real Time Intrusion Detection Systems

    Due to the widespread proliferation of computer networks, attacks on computer systems are increasing day-by-day. Preventive measures can stop these attacks to some extent, but they are not very effective due to various reasons. This lead to the development of intrusion detection as a second line of defense. In information...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jun 2013

    Survey Paper of Fuzzy Data Mining Using Genetic Algorithm for Intrusion Detection

    In spite of growing information technology widely, security has remained one challenging area for computers and networks. Recently many researchers have focused on intrusion detection system based on data mining techniques as an efficient strategy. Intrusion detection is one of the important and essential area of research. This paper has...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    A Survey on RFID Authentication with Different Protocols

    Security is an important concept in the process of communicating data across network. Although there are many authentication protocols implemented for the security of message from the sender to the receiver. It is also necessary in various communication devices such as RFID where the data from the tag can be...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jun 2012

    Solution to PKI Inter- Domain Interoperability Issue

    PKI is a framework for the management of public keys and certificates that is responsible for issuing, maintaining and revoking of the public key certificates over the internet. A number of serious security issues have already occurred with the rapid deployment of electronic transaction. One approach to guaranteeing security is...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Scheduling in Instance-Intensive Cost-Constrained Workflows in a Cloud

    Cloud computing has been growing tremendously, as it has been accepted recently. Cloud computing has many unique strengths which can be utilized to facilitate workflow execution. This paper investigates the issue of dynamic scheduling in cloud computing with a special attention to the case of instance-intensive cost-constrained workflows. This paper...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    A Review Model on Query Optimization Using Open Source Database

    Query optimization is used to optimize the efficient result with less time and minimum cost. The query formatted according to particular search engine and then the translated query is passed to the search engines. HTML screen scrapping is used to parse the data from each individual search engine. Then these...

    Provided By International Journal of Scientific & Engineering Research