This document summarizes a research paper that proposes methods for user authentication and authorization to protect relational databases from insider and outsider attacks. It discusses using digital signatures, user roles, and access policies to control what resources different users can access. The proposed methods aim to detect anomalies in database access, such as SQL injection attacks, based on profiling typical application queries and constraints. A user-to-user relationship graph is also used to help with online access control. The document outlines related work on smart grid security and presents the proposed framework and modules before discussing expected experimental results.
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
This document proposes an intrusion detection framework that uses multiple binary classifiers optimized by a genetic algorithm. It analyzes decision trees, naive Bayes, and support vector machines to classify network connections as normal or attacks based on the NSL-KDD dataset. The classifiers are aggregated and a genetic algorithm is used to generate high-quality solutions. Experimental results show that the proposed method achieves 99% accuracy in intrusion detection, outperforming single classification techniques. The goal is to develop an application that can efficiently process network data and identify intrusion risks.
Secure intrusion detection and countermeasure selection in virtual system usi...
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Network Intrusion detection and Countermeasure Election in virtual network systems (NICE) are used to establish a
defense-in-depth intrusion detection framework. For better attack detection, NICE incorporates attack graph analytical procedures into
the intrusion detection processes. We must note that the design of NICE does not intend to improve any of the existing intrusion
detection algorithms; indeed, NICE employs a reconfigurable virtual networking approach to detect and counter the attempts to
compromise VMs, thus preventing zombie VMs. NICE includes two main phases: deploy a lightweight mirroring-based network
intrusion detection agent (NICE-A) on each cloud server to capture and analyze cloud traffic. A NICE-A periodically scans the virtual
system vulnerabilities within a cloud server to establish Scenario Attack Graph (SAGs), and then based on the severity of identified
vulnerability toward the collaborative attack goals, NICE will decide whether or not to put a VM in network inspection state. Once a
VM enters inspection state, Deep Packet Inspection (DPI) is applied, and/or virtual network reconfigurations can be deployed to the
inspecting VM to make the potential attack behaviors prominent.
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET Journal
This document discusses network security visualization and proposes a classification system for network security visualization systems. It begins by introducing the importance of visualizing network security data due to the large quantities of data produced. It then reviews existing network security visualization systems and outlines key aspects they monitor like host/server monitoring, port activity, and intrusion detection. The document proposes a taxonomy to classify network security visualization systems based on their data sources and techniques. It concludes by stating papers were selected for review based on their relevance to network security, novelty of techniques, and inclusion of evaluations.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...Telefónica
A computer implemented method and computer program
products to prevent attacks against authorization systems
The computer implemented method comprising controlling
the access to different resources and actions de?ned for a user
by a ?rst server, reducing the exposure time at Which such
operations are available and establishing a dual channel verification through the use of a second server.
The computer programs implement the method.
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET Journal
This document proposes an intrusion detection framework that uses multiple binary classifiers optimized by a genetic algorithm. It analyzes decision trees, naive Bayes, and support vector machines to classify network connections as normal or attacks based on the NSL-KDD dataset. The classifiers are aggregated and a genetic algorithm is used to generate high-quality solutions. Experimental results show that the proposed method achieves 99% accuracy in intrusion detection, outperforming single classification techniques. The goal is to develop an application that can efficiently process network data and identify intrusion risks.
Secure intrusion detection and countermeasure selection in virtual system usi...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Editor IJCATR
Network Intrusion detection and Countermeasure Election in virtual network systems (NICE) are used to establish a
defense-in-depth intrusion detection framework. For better attack detection, NICE incorporates attack graph analytical procedures into
the intrusion detection processes. We must note that the design of NICE does not intend to improve any of the existing intrusion
detection algorithms; indeed, NICE employs a reconfigurable virtual networking approach to detect and counter the attempts to
compromise VMs, thus preventing zombie VMs. NICE includes two main phases: deploy a lightweight mirroring-based network
intrusion detection agent (NICE-A) on each cloud server to capture and analyze cloud traffic. A NICE-A periodically scans the virtual
system vulnerabilities within a cloud server to establish Scenario Attack Graph (SAGs), and then based on the severity of identified
vulnerability toward the collaborative attack goals, NICE will decide whether or not to put a VM in network inspection state. Once a
VM enters inspection state, Deep Packet Inspection (DPI) is applied, and/or virtual network reconfigurations can be deployed to the
inspecting VM to make the potential attack behaviors prominent.
The International Journal of Engineering and Science (The IJES)theijes
This document summarizes a research paper that proposes a new intrusion detection system (IDS) to identify distributed denial-of-service (DDoS) attacks in multitier web applications. The system models relationships between web server requests and database queries to detect attacks where normal traffic is used maliciously. It handles both deterministic and non-deterministic relationships. For static websites, the system classifies traffic into patterns and builds a mapping model. For dynamic websites, it aims to extract one-to-many mappings despite parameter variations and overlapping operations. The paper also discusses SQL tautology attacks, which exploit input fields to bypass authentication or extract all data.
Vulnerabilities detection using attack recognition technique in multi-factor ...TELKOMNIKA JOURNAL
Authentication is one of the essentials components of information security. It has become one of the most basic security requirements for network communication. Today, there is a necessity for a strong level of authentication to guarantee a significant level of security is being conveyed to the application. As such, it expedites challenging issues on security and efficiency. Security issues such as privacy and data integrity emerge because of the absence of control and authority. In addition, the bigger issue for multi-factor authentication is on the high execution time that leads to overall performance degradation. Most of existing studies related to multi-factor authentication schemes does not detect weaknesses based on user behavior. Most recent research does not look at the efficiency of the system by focusing only on improving the security aspect of authentication. Hence, this research proposes a new multi-factor authentication scheme that can withstand attacks, based on user behavior and maintaining optimum efficiency. Experiments have been conducted to evaluate this scheme. The results of the experiment show that the processing time of the proposed scheme is lower than the processing time of other schemes. This is particularly important after additional security features have been added to the scheme.
This document proposes a technique called "web service oriented XPATH authentication" to prevent SQL injection attacks. The proposed system uses two filtration models - an active guard model to detect and prevent suspicious characters, and a service detector model that validates user input against stored data. The system aims to effectively secure applications like banking by preventing all forms of SQL attacks while allowing legitimate users to access databases. Modules described include information gathering, identifying input parameters, and employing various techniques to prevent SQL injection attacks like tautologies, malformed queries, and inference.
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...Rana sing
This document proposes a technique called "web service oriented XPATH authentication" to prevent SQL injection attacks. The proposed system uses two filtration models - an active guard model to detect and prevent suspicious characters, and a service detector model that validates user input against stored data. The system aims to effectively secure applications like banking by identifying input parameters and applying prevention techniques to queries before they access the database.
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...journal ijrtem
An intrusion detection system (IDS) is designed to monitor all inbound and outbound network
activity and identify any suspicious patterns that may indicate a network or system attack from someone
attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the
main function of an IDS product is to warn you of suspicious activity taking place − not prevent them. An IDS
essentially reviews your network traffic and data and will identify probes, attacks, exploits and other
vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an
alert, logging the event or even paging an administrator. In some cases, the IDS may be prompted to reconfigure
the network to reduce the effects of the suspicious intrusion. The proposed protocol called Password Guessing
Resistant Protocol (PGRP), helps in preventing such attacks and provides a pleasant login experience for
legitimate users. PGRP limits the number of login attempts for unknown users. In additional we propose an attack
detector for cloud spoofing that utilizes MAC (Media access Control) and RSS (Received Signal strength) analysis.
Next, we describe how we integrated our attack detector into a real-time indoor localization system, which is also
capable of localizing the positions of the attackers
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...IRJET Journal
This document proposes a risk assessment framework for wireless sensor networks (WSNs) deployed in a sensor cloud. The framework utilizes a distributed approach to code dissemination, allowing multiple authorized users to directly update sensor node code images without a base station. A secure and efficient proxy signature technique is used to satisfy requirements like integrity, freshness, resistance to denial-of-service attacks, and support for different user privileges. Seven potential attacks on the system are identified and analyzed to assess their impact level. The framework generates a PDF report with risk levels in different regions and solutions to overcome identified risks.
— in distributed computing environment, Mobile agents
are mobile autonomous processes which operate on behalf of
users (e.g., the Internet). These applications include a specialized
search of a middleware services such as an active mail system,
large free-text database, electronic malls for shopping, and
updated networking devices. Mobile agent systems use less
network bandwidth, increase asynchrony among clients and
servers, dynamically update server interfaces and introduce
concurrency. Due to software components, security of mobile
agent is essential in any mobile agent based application. Security
services such as Confidentiality, Integrity, Authentication,
Authorization and Non-Repudiation are discussed and combat
with by the researchers. This work is proposing a new technique
for access control area of security for the mobile agents and it
will be implemented using an example of shopping cart data
sharing for multiple levels.
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARDIJCI JOURNAL
Today, the use of distinct internet services and their applications by people are increase in very large amount. Due to its usage, it results the increase in data complexity. So, web services turn their focus on multi-tier design where web server acts as front-end and database server acts as back-end. Attackers try to hack personal data by targeting database server, hence it need to provide more security to both web server and database server. In this paper, the doubleguard system proposes an efficient intrusion detection and prevention system which detects and prevents various attacks in multi-tier web applications. This IDS system keeps track of all user sessions across both web server and database server. For this, it allocates the dedicated web container to each user’s session. Each user is associated with unique session ID which enhances more security. The system built well correlated model for website and detects and prevents various type of attacks. The system is implemented by using Apache webserver with MySQL.
Break Loose Acting To Forestall Emulation BlastIRJET Journal
This document proposes a new approach to detect phishing sites using visual cryptography, linear programming algorithms, and random pattern algorithms. The approach involves generating an image captcha during user registration by encoding a secret key into an image. This image is then split into two shares - one stored on the server and one given to the user. During login, the shares are combined to reconstruct the original image captcha, which the user must enter correctly to log in. This helps validate that the site is legitimate and not a phishing site impersonating it. The approach aims to improve online security and prevent fraud by making it difficult for phishing sites to steal users' credentials.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDIJNSA Journal
In a distributed system, authentication protocols are the basis of security to ensure that these protocols function properly. Passwords are one of the most common authentication protocol used nowadays. Because of low entropy of passwords makes the systems vulnerable to password guessing attacks. This paper presents a simple scheme that strengthens password-based authentication protocols and helps prevent dictionary attacks, replay attacks and man in the middle attacks etc., The proposed scheme presents a new password authentication protocol by using the user and server system identification/serial number. Here there is no possibility to store the user passwords so an attacker who gets the password cannot use it directly to gain immediate access and compromise security.
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTIJNSA Journal
The document proposes a distributed trust-based framework to protect mobile agents and host platforms in mobile ad hoc networks (MANETs) from attacks. The framework uses a distributed reputation model where mobile agents deployed in the network collaborate with visited host nodes to form a consistent trust view. Agents share information about suspected malicious nodes. A node's trustworthiness is quantified based on direct observations from agent experiences and indirect observations from neighboring nodes, using concepts from Dempster-Shafer theory. Simulation results show the approach can robustly detect malicious nodes like blackholes and wormholes, even in large networks, helping to secure mobile agents in the dynamic MANET environment.
The Practical Data Mining Model for Efficient IDS through Relational DatabasesIJRES Journal
Enterprise network information system is not only the platform for information sharing and information exchanging, but also the platform for enterprise production automation system and enterprise management system working together. As a result, the security defense of enterprise network information system does not only include information system network security and data security, but also include the security of network business running on information system network, which is the confidentiality, integrity, continuity and real-time of network business. Network security technology has become crucial in protecting government and industry computing infrastructure. Modern intrusion detection applications face complex requirements – they need to be reliable, extensible, easy to manage, and have low maintenance cost. In recent years, data mining-based intrusion detection systems (IDSs) have demonstrated high accuracy, good generalization to novel types of intrusion, and robust behavior in a changing environment. Still, significant challenges exist in the design and implementation of production quality IDSs. Incrementing components such as data transformations, model deployment, and cooperative distributed detection remain a labor intensive and complex engineering endeavor. This paper describes DAID, a database-centric architecture that leverages data mining within the Relational RDBMS to address these challenges. DAID also offers numerous advantages in terms of scheduling capabilities, alert infrastructure, data analysis tools, security, scalability, and reliability. DAID is illustrated with an Intrusion Detection Center application prototype that leverages existing functionality in Relational Database 10g. Intrusion detection system work at many levels in the network fabric and are taking the concept of security to a whole new sphere by incorporating intelligence as a tool to protect networks against un-authorized intrusions and newer forms of attack. We have described formal model for the construction of network security situation measurement based on d-s evidence theory, frequent mode, and sequence model extracted from the data on network security situation based on the knowledge found method and convert the pattern on the related rules of the network security situation, and automatic generation of network security situation.
Intrusion Detection in Industrial Automation by Joint Admin AuthorizationIJMTST Journal
Intrusion response is a more important part of security protection. In industrial automation systems (IASs) have achieved maximum and availability attention. Real-time security policy of intrusion response has big challenge for intrusion response in IASs. The loss caused by the security threats may even increase the industrial automation. However, traditional approach in intrusion detection pays attention on security policy decisions and removes security policy execution. Proposed system presents a general, real-time control depends on table driven scheduling of intrusion detection and response in IASs to resolve the problem of security policy like assigning rights to use the system. Security policy created of a security service group, with every kind of security techniques supported by a realization task set. Realization tasks from different task sets can be combined to form a response task set. In this approach, first, a response task set is created by a non dominated genetic algorithm with joint consideration of security performance and cost. Then, the system is re- configured via an integrated scheduling scheme in which system tasks and response tasks are mapped and scheduled together based on a GA. Additionally, this system proposed Joint Admin Model (JTAM) model to control over unauthorized access in industrial automation system. Furthermore, proposed method shows result of industrial automation for security mechanism. Security policy helps to authenticate user request to access industrial resources.
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless...IRJET Journal
This document proposes a risk assessment framework for wireless sensor networks (WSNs) deployed in a sensor cloud. The framework utilizes a distributed approach to code dissemination, allowing multiple authorized users to directly update sensor node code images without a base station. A secure and efficient proxy signature technique is used to satisfy requirements like integrity, freshness, resistance to denial-of-service attacks, and support for different user privileges. Seven potential attacks on the system are identified and analyzed to assess their impact level. The framework generates a PDF report with risk levels in different regions and solutions to overcome identified risks.
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding SchemesIRJET Journal
The document proposes a novel privacy enhancing routing algorithm called Optimal Privacy Enhancing Routing Algorithm (OPERA) for wireless networks. OPERA uses a statistical game-theoretic framework to optimize privacy given a utility function. It considers a global adversary that can observe transmissions in the whole network. OPERA formulates the privacy-utility tradeoff problem as a linear program that can be efficiently solved. Simulation results show that OPERA reduces the adversary's identification probability compared to random and greedy heuristics and the information-theoretic mutual information approach. The algorithm provides improved privacy protection while balancing overhead in wireless networks.
IRJET- A Review of the Concept of Smart GridIRJET Journal
This document proposes a novel privacy enhancing routing algorithm called Optimal Privacy Enhancing Routing Algorithm (OPERA) for wireless networks. OPERA uses a statistical game-theoretic framework to optimize routing privacy given a utility function. It considers a global adversary that can observe transmissions across the entire network. OPERA formulates the privacy-utility tradeoff problem as a linear program that can be efficiently solved. Simulation results show that OPERA reduces the adversary's identification likelihood by up to half compared to random and greedy heuristics, and up to five times compared to a pattern matching scheme. OPERA also outperforms traditional information-theoretic approaches.
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORKIRJET Journal
The document proposes a multi-stage approach to intrusion detection in networks. The approach consists of multiple stages: 1) pre-processing and feature extraction of network traffic data, 2) applying machine learning algorithms to build models that recognize normal behavior and identify potential intrusions, 3) using a rule-based system to further improve accuracy by classifying network activity, and 4) leveraging anomaly detection techniques to identify novel attacks. The goal is to provide a more accurate and efficient intrusion detection system to enhance network security.
This document describes a proposed vulnerability management system (VMS) that aims to automate the process of scanning software applications to identify vulnerabilities. The proposed system uses a hybrid algorithm approach that incorporates features from existing vulnerability detection tools and algorithms. The algorithm involves five main phases: inspection, scanning, attack detection, analysis, and reporting. The algorithm is intended to increase the accuracy of vulnerability detection compared to existing systems. The proposed VMS system and hybrid algorithm were tested using various vulnerability scanning tools on virtual machines, and results demonstrated that the VMS could automate the vulnerability assessment process and generate reports on detected vulnerabilities with severity levels. The main limitation is that scans using the VMS may take more time than some existing tools.
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET Journal
The document discusses various security mechanisms for cloud computing including encryption, hashing, digital signatures, public key infrastructure, identity and access management, single sign-on, cloud-based security groups, hardened security server images, user behavior profiling, and decoy technology. It focuses on how user behavior profiling and decoy technology can play an important role in detecting unauthorized access by monitoring a user's behavior and sending fake data to verify genuine user information. The document concludes that while most security mechanisms provide a level of protection, user behavior profiling and decoy technology are particularly effective for enhancing cloud computing security.
IRJET- Insider Interruption Identification and Protection by using Forens...IRJET Journal
This document proposes an Internal Intrusion Detection and Protection System (IIDPS) to detect insider attacks at the system call level using data mining and forensic techniques. The IIDPS creates user profiles by analyzing system calls to track user usage habits over time. When a user logs in, the IIDPS compares their current system usage behaviors to their profile to determine if they are the legitimate account holder or an insider attacker. The IIDPS was able to identify insider attackers with 94.29% accuracy and respond in under 0.45 seconds, showing its ability to effectively prevent insider attacks.
1. The document discusses intrusion detection systems and proposes a cluster-based intrusion detection system for wireless sensor networks.
2. It proposes a multi-level intrusion detection architecture with detection at both the cluster head and network-wide levels.
3. The proposed system would detect intrusions through anomaly detection and has been evaluated through a survey of 50 experts in the field.
Systematic Review Automation in Cyber SecurityYogeshIJTSRD
Many aspects of cyber security are carried by automation systems and service applications. The initial steps of cyber chain mainly focus on different automation tools with almost same task objective. Automation operations are carried only after detail study on particular task pre engagement phase , the tool is going to perform, measurement of dataset handling of tool produced output. The algorithm is going to make use of after comparing the existing tools efficiency, the throughput time, output format for reusable input and mainly the resource’s consumption. In this paper we are going to study the existing methodology in application and system pen testing, automation tool’s efficiency over growing technology and their behaviour study on unintended platform assignment. Nitin | Dr. Lakshmi J. V. N "Systematic Review: Automation in Cyber Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41315.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41315/systematic-review-automation-in-cyber-security/nitin
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
This document proposes a two-factor validation control framework for online distributed services. Specifically, it implements an attribute-based access control framework that requires both a customer secret key and a lightweight security device. This two-factor authentication mechanism enhances security, especially when multiple customers share the same computer. It also allows fine-grained access control based on user attributes while preserving privacy, as the cloud server only knows that a user satisfies certain attributes, not their identity. A simulation is performed to demonstrate the feasibility of the proposed two-factor framework.
Two Aspect Endorsement Access Control for web Based Cloud Computing IRJET Journal
This document proposes a two-factor authentication access control system for web-based cloud computing. The system uses attribute-based access management enforced with both a user's secret key and a lightweight security device. This enhances security by requiring both factors for access. Attribute-based management also allows the cloud server to limit access based on user attributes while preserving privacy, as the server only knows if a user satisfies an access predicate, not their identity. The paper introduces an object-sensitive role-based access control model called ORBAC that can parameterize roles based on object properties. It also aims to formally validate programs against ORBAC policies using a dependent type system for Java.
IRJET- Machine Learning based Network SecurityIRJET Journal
The document discusses using machine learning algorithms to classify network traffic as malicious or non-malicious. It describes capturing packets from a dummy website under distributed denial of service (DDoS) attack to create a dataset. Two machine learning algorithms, naive Bayes and support vector machines (SVM), are used to classify the network traffic. Both algorithms achieved over 98% accuracy in detecting spam traffic. The paper proposes creating a real-time network traffic classification system using machine learning algorithms to improve network security.
1) The document discusses a proposed Vulnerability Management System (VMS) to identify and manage software vulnerabilities.
2) It provides an overview of vulnerability management and discusses related work that has been done in vulnerability databases and tracking systems.
3) The proposed VMS would use morphological inspection and static analysis to assess vulnerabilities, store information in a database, and rank vulnerabilities based on severity. It would consist of a vulnerability scanner, process control platform, and data storage.
This document discusses enhancing security through token generation in a distributed environment. It proposes a new token generation scheme to encrypt user data with specified key parameters, making resources more robust. The token generation scheme would add security for both authentication and authorization. Existing algorithms focus on encrypting data on the user side, which incurs high computational and communication costs. The document suggests a token generation algorithm for distributed data files that provides secure and dependable server storage while maintaining low overhead. It analyzes related work on token-based authentication and security techniques to provide context.
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...IRJET Journal
This document discusses machine learning techniques for detecting distributed denial of service (DDoS) attacks. It reviews related work applying methods like decision trees, support vector machines, naive Bayes, and deep learning to identify DDoS attacks based on network traffic patterns. The document evaluates these algorithms based on accuracy metrics and processing time. It also explores feature selection and parameter tuning to optimize model performance and training efficiency for detecting DDoS attacks.
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...IJRTEMJOURNAL
An intrusion detection system (IDS) is designed to monitor all inbound and outbound network
activity and identify any suspicious patterns that may indicate a network or system attack from someone
attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the
main function of an IDS product is to warn you of suspicious activity taking place − not prevent them. An IDS
essentially reviews your network traffic and data and will identify probes, attacks, exploits and other
vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an
alert, logging the event or even paging an administrator. In some cases, the IDS may be prompted to reconfigure
the network to reduce the effects of the suspicious intrusion. The proposed protocol called Password Guessing
Resistant Protocol (PGRP), helps in preventing such attacks and provides a pleasant login experience for
legitimate users. PGRP limits the number of login attempts for unknown users. In additional we propose an attack
detector for cloud spoofing that utilizes MAC (Media access Control) and RSS (Received Signal strength) analysis.
Next, we describe how we integrated our attack detector into a real-time indoor localization system, which is also
capable of localizing the positions of the attackers.
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGpharmaindexing
This document discusses a survey on multimodal biometric authentication systems in cloud computing. It begins with introducing the authors and purpose of studying multimodal biometrics. It then discusses how combining multiple biometric modalities can improve authentication by reducing errors. The document reviews different biometric traits like fingerprints, iris scans, and behavioral patterns. It also covers challenges of single biometric systems and how fusing modalities can help. The goal is to provide more secure authentication as a cloud service using multimodal biometrics.
IRJET- A Review on Security Attacks in Biometric Authentication SystemsIRJET Journal
This document summarizes security attacks on biometric authentication systems. It discusses how biometric systems are vulnerable to different types of attacks, including attacks at the user interface, interfaces between modules, software modules, and the biometric template database. These attacks aim to compromise the biometric template and reduce system security. The document also reviews intrinsic system failures and adversary attacks as reasons for system failure. It concludes by outlining several countermeasures that can help resist different security attacks, such as liveness detection, biometric cryptosystems, steganography, watermarking, and cancellable biometrics.
Similar to Authentication and Authorization for User Roles and Device for Attack Detection in Relational Data (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
20CDE09- INFORMATION DESIGN
UNIT I INCEPTION OF INFORMATION DESIGN
Introduction and Definition
History of Information Design
Need of Information Design
Types of Information Design
Identifying audience
Defining the audience and their needs
Inclusivity and Visual impairment
Case study.
Online music portal management system project report.pdfKamal Acharya
The iMMS is a unique application that is synchronizing both user
experience and copyrights while providing services like online music
management, legal downloads, artists’ management. There are several
other applications available in the market that either provides some
specific services or large scale integrated solutions. Our product differs
from the rest in a way that we give more power to the users remaining
within the copyrights circle.
Development of Chatbot Using AI/ML Technologiesmaisnampibarel
The rapid advancements in artificial intelligence and natural language processing have significantly transformed human-computer interactions. This thesis presents the design, development, and evaluation of an intelligent chatbot capable of engaging in natural and meaningful conversations with users. The chatbot leverages state-of-the-art deep learning techniques, including transformer-based architectures, to understand and generate human-like responses.
Key contributions of this research include the implementation of a context- aware conversational model that can maintain coherent dialogue over extended interactions. The chatbot's performance is evaluated through both automated metrics and user studies, demonstrating its effectiveness in various applications such as customer service, mental health support, and educational assistance. Additionally, ethical considerations and potential biases in chatbot responses are examined to ensure the responsible deployment of this technology.
The findings of this thesis highlight the potential of intelligent chatbots to enhance user experience and provide valuable insights for future developments in conversational AI.
Exploring Deep Learning Models for Image Recognition: A Comparative Reviewsipij
Image recognition, which comes under Artificial Intelligence (AI) is a critical aspect of computer vision,
enabling computers or other computing devices to identify and categorize objects within images. Among
numerous fields of life, food processing is an important area, in which image processing plays a vital role,
both for producers and consumers. This study focuses on the binary classification of strawberries, where
images are sorted into one of two categories. We Utilized a dataset of strawberry images for this study; we
aim to determine the effectiveness of different models in identifying whether an image contains
strawberries. This research has practical applications in fields such as agriculture and quality control. We
compared various popular deep learning models, including MobileNetV2, Convolutional Neural Networks
(CNN), and DenseNet121, for binary classification of strawberry images. The accuracy achieved by
MobileNetV2 is 96.7%, CNN is 99.8%, and DenseNet121 is 93.6%. Through rigorous testing and analysis,
our results demonstrate that CNN outperforms the other models in this task. In the future, the deep
learning models can be evaluated on a richer and larger number of images (datasets) for better/improved
results.
Unblocking The Main Thread - Solving ANRs and Frozen FramesSinan KOZAK
In the realm of Android development, the main thread is our stage, but too often, it becomes a battleground where performance issues arise, leading to ANRS, frozen frames, and sluggish Uls. As we strive for excellence in user experience, understanding and optimizing the main thread becomes essential to prevent these common perforrmance bottlenecks. We have strategies and best practices for keeping the main thread uncluttered. We'll examine the root causes of performance issues and techniques for monitoring and improving main thread health as wel as app performance. In this talk, participants will walk away with practical knowledge on enhancing app performance by mastering the main thread. We'll share proven approaches to eliminate real-life ANRS and frozen frames to build apps that deliver butter smooth experience.
How to Manage Internal Notes in Odoo 17 POSCeline George
In this slide, we'll explore how to leverage internal notes within Odoo 17 POS to enhance communication and streamline operations. Internal notes provide a platform for staff to exchange crucial information regarding orders, customers, or specific tasks, all while remaining invisible to the customer. This fosters improved collaboration and ensures everyone on the team is on the same page.
Response & Safe AI at Summer School of AI at IIITHIIIT Hyderabad
Talk covering Guardrails , Jailbreak, What is an alignment problem? RLHF, EU AI Act, Machine & Graph unlearning, Bias, Inconsistency, Probing, Interpretability, Bias