PSG College of Technology

Displaying 1-12 of 12 results

  • White Papers // Nov 2011

    Statistical Segregation Method to Minimize the False Detections During DDoS Attacks

    DDoS attack aims at occupying the victim resources so as to defy the legitimate requests from reaching it. Even though the attack traffic is generated in intimidating measures, the attack traffic mostly is disguised as the genuine traffic. Hence, most of the mitigation methods cannot segregate the legitimate flows from...

    Provided By PSG College of Technology

  • White Papers // Nov 2011

    Ontology-Based Emergency Management System in a Social Cloud

    The need for Emergency Management continually grows as the population and exposure to catastrophic failures increase. The ability to offer appropriate services at these emergency situations can be tackled through group communication mechanisms. The entities involved in the group communication include people, organizations, events, locations and essential services. Cloud computing...

    Provided By PSG College of Technology

  • White Papers // May 2011

    Setting Up of an Open Source Based Private Cloud

    Cloud Computing is an attractive concept in IT field, since it allows the resources to be provisioned according to the user needs. It provides services on virtual machines whereby the user can share resources, software and other devices on demand. Cloud services are supported both by proprietary and Open Source...

    Provided By PSG College of Technology

  • White Papers // Jan 2011

    Public Key Cryptosystem Based on Number Theoretic Transforms

    In this paper a Public Key Cryptosystem is proposed using the Number Theoretic Transforms (NTT) over a ring of integer modulo a composite number. The key agreement is similar to ElGamal public key algorithm. The security of the system is based on solution of multivariate linear congruence equations and discrete...

    Provided By PSG College of Technology

  • White Papers // Dec 2010

    Fingerprint Compression Using Multiwavelets

    Large volumes of fingerprints are collected and stored every day in a wide range of applications, including forensics, access control etc. It is evident from the database of Federal Bureau of Investigation (FBI) which contains more than 70 million finger prints. Compression of this database is very important because of...

    Provided By PSG College of Technology

  • White Papers // Oct 2010

    Lightweight C&C Based Botnet Detection Using Aho-Corasick NFA

    Botnet distinguishes itself from the previous malware by having the characteristics of a C&C channel, using which a Botmaster can control the constituents of the botnet. Even though protocols like IRC, HTTP and DNS are exploited to incorporate C&C channels, previous analysis have shown that the majority of the botnets...

    Provided By PSG College of Technology

  • White Papers // Sep 2010

    A Cluster Based Replication Architecture for Load Balancing in Peer-to-Peer Content Distribution

    In P2P systems, large volumes of data are declustered naturally across a large number of peers. But it is very difficult to control the initial data distribution because every user has the freedom to share any data with other users. The system scalability can be improved by distributing the load...

    Provided By PSG College of Technology

  • White Papers // Aug 2010

    Delay Specific Investigations on QoS Scheduling Schemes for Real-Time Traffic in Packet Switched Networks

    Packet switched data network like Internet, which has traditionally supported throughput sensitive applications such as email and file transfer, is increasingly supporting delay-sensitive multimedia applications such as interactive video. These delay-sensitive applications would often rather sacrifice some throughput for better delay. Unfortunately, the current packet switched network does not offer...

    Provided By PSG College of Technology

  • White Papers // Jun 2010

    Performance Analysis of Broadcasting in Mobile Ad Hoc Networks Using Cluster Approach

    Broadcasting is a fundamental service in Mobile Ad hoc NETworks (MANETs). Cluster based approach are proposed in literature to reduce the network collision, to reduce delay of packet transmission, to reduce the energy consumption and improves the throughput. In this paper, a cluster-based infrastructure is proposed for broadcasting in MANETs....

    Provided By PSG College of Technology

  • White Papers // Apr 2010

    Trust Based Content Distribution for Peer-to-Peer Overlay Networks

    In peer-to-peer content distribution the lack of a central authority makes authentication difficult. Without authentication, adversary nodes can spoof identity and falsify messages in the overlay. This enables malicious nodes to launch man-in-the-middle or denial-of-service attacks. In this paper, the authors present a trust based content distribution for peer-to-peer overlay...

    Provided By PSG College of Technology

  • White Papers // Mar 2010

    NEWQUE: A New Approach to Active Queue Management for TCP With ECN

    Active Queue Management (AQM) can potentially reduce packet drop rate in the Internet. This is used by routers to control congestion, where packets are dropped before queue become full. In order to improve the performance of congestion routers, a new framework of AQM, namely NEWQUE active queue management algorithm supporting...

    Provided By PSG College of Technology

  • White Papers // Dec 2009

    A QoS-Aware Intelligent Replica Management Architecture for Content Distribution in Peer-to-Peer Overlay Networks

    The large scale content distribution systems were improved broadly using the replication techniques. The demanded contents can be brought closer to the clients by multiplying the source of information geographically, which in turn reduce both the access latency and the network traffic. The system scalability can be improved by distributing...

    Provided By PSG College of Technology

  • White Papers // Oct 2010

    Lightweight C&C Based Botnet Detection Using Aho-Corasick NFA

    Botnet distinguishes itself from the previous malware by having the characteristics of a C&C channel, using which a Botmaster can control the constituents of the botnet. Even though protocols like IRC, HTTP and DNS are exploited to incorporate C&C channels, previous analysis have shown that the majority of the botnets...

    Provided By PSG College of Technology

  • White Papers // Sep 2010

    A Cluster Based Replication Architecture for Load Balancing in Peer-to-Peer Content Distribution

    In P2P systems, large volumes of data are declustered naturally across a large number of peers. But it is very difficult to control the initial data distribution because every user has the freedom to share any data with other users. The system scalability can be improved by distributing the load...

    Provided By PSG College of Technology

  • White Papers // Jun 2010

    Performance Analysis of Broadcasting in Mobile Ad Hoc Networks Using Cluster Approach

    Broadcasting is a fundamental service in Mobile Ad hoc NETworks (MANETs). Cluster based approach are proposed in literature to reduce the network collision, to reduce delay of packet transmission, to reduce the energy consumption and improves the throughput. In this paper, a cluster-based infrastructure is proposed for broadcasting in MANETs....

    Provided By PSG College of Technology

  • White Papers // Apr 2010

    Trust Based Content Distribution for Peer-to-Peer Overlay Networks

    In peer-to-peer content distribution the lack of a central authority makes authentication difficult. Without authentication, adversary nodes can spoof identity and falsify messages in the overlay. This enables malicious nodes to launch man-in-the-middle or denial-of-service attacks. In this paper, the authors present a trust based content distribution for peer-to-peer overlay...

    Provided By PSG College of Technology

  • White Papers // Dec 2010

    Fingerprint Compression Using Multiwavelets

    Large volumes of fingerprints are collected and stored every day in a wide range of applications, including forensics, access control etc. It is evident from the database of Federal Bureau of Investigation (FBI) which contains more than 70 million finger prints. Compression of this database is very important because of...

    Provided By PSG College of Technology

  • White Papers // Dec 2009

    A QoS-Aware Intelligent Replica Management Architecture for Content Distribution in Peer-to-Peer Overlay Networks

    The large scale content distribution systems were improved broadly using the replication techniques. The demanded contents can be brought closer to the clients by multiplying the source of information geographically, which in turn reduce both the access latency and the network traffic. The system scalability can be improved by distributing...

    Provided By PSG College of Technology

  • White Papers // Aug 2010

    Delay Specific Investigations on QoS Scheduling Schemes for Real-Time Traffic in Packet Switched Networks

    Packet switched data network like Internet, which has traditionally supported throughput sensitive applications such as email and file transfer, is increasingly supporting delay-sensitive multimedia applications such as interactive video. These delay-sensitive applications would often rather sacrifice some throughput for better delay. Unfortunately, the current packet switched network does not offer...

    Provided By PSG College of Technology

  • White Papers // Jan 2011

    Public Key Cryptosystem Based on Number Theoretic Transforms

    In this paper a Public Key Cryptosystem is proposed using the Number Theoretic Transforms (NTT) over a ring of integer modulo a composite number. The key agreement is similar to ElGamal public key algorithm. The security of the system is based on solution of multivariate linear congruence equations and discrete...

    Provided By PSG College of Technology

  • White Papers // May 2011

    Setting Up of an Open Source Based Private Cloud

    Cloud Computing is an attractive concept in IT field, since it allows the resources to be provisioned according to the user needs. It provides services on virtual machines whereby the user can share resources, software and other devices on demand. Cloud services are supported both by proprietary and Open Source...

    Provided By PSG College of Technology

  • White Papers // Mar 2010

    NEWQUE: A New Approach to Active Queue Management for TCP With ECN

    Active Queue Management (AQM) can potentially reduce packet drop rate in the Internet. This is used by routers to control congestion, where packets are dropped before queue become full. In order to improve the performance of congestion routers, a new framework of AQM, namely NEWQUE active queue management algorithm supporting...

    Provided By PSG College of Technology

  • White Papers // Nov 2011

    Statistical Segregation Method to Minimize the False Detections During DDoS Attacks

    DDoS attack aims at occupying the victim resources so as to defy the legitimate requests from reaching it. Even though the attack traffic is generated in intimidating measures, the attack traffic mostly is disguised as the genuine traffic. Hence, most of the mitigation methods cannot segregate the legitimate flows from...

    Provided By PSG College of Technology

  • White Papers // Nov 2011

    Ontology-Based Emergency Management System in a Social Cloud

    The need for Emergency Management continually grows as the population and exposure to catastrophic failures increase. The ability to offer appropriate services at these emergency situations can be tackled through group communication mechanisms. The entities involved in the group communication include people, organizations, events, locations and essential services. Cloud computing...

    Provided By PSG College of Technology