Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Rathika, R.
- A Study on Web Ontologies-Based Reengineering Software for Cloud Computing Using Probabilistic Topic Models
Abstract Views :188 |
PDF Views:4
Authors
R. Rathika
1,
M. Ambika
2
Affiliations
1 PRIST University, Vallam, Thanjavur, IN
2 P.R. Engineering College, Vallam, Thanjavur, IN
1 PRIST University, Vallam, Thanjavur, IN
2 P.R. Engineering College, Vallam, Thanjavur, IN
Source
Networking and Communication Engineering, Vol 3, No 11 (2011), Pagination: 701-705Abstract
Customer Relationship Management, is an area where cloud computing can really shine. Applications for CRM can help a business organize and track its contacts with customers. Thus knowledge discovery and management plays vital role in these area. In this article we propose a new approach for automatic learning of terminological ontologies from text corpus based on probabilistic topic models .In our approach topic models are used as efficient dimension reduction techniques, which are able to capture semantic relationships between word-topic and topic-document interpreted in terms of probability distributions. This article proposed a method to create and handle ontology object model. The work has also involve testing the performance of the proposed algorithm. Thus compared to manual approaches, the automated building of ontology has the advantages of fast development, cost effectiveness, and being resistant to obsolescence.Keywords
Cloud Computing, Web Ontology, Ontology Generation, Probabilistic Topic Models, CRM.- Detecting the DDOS Attacks in Application Layer
Abstract Views :189 |
PDF Views:3
Authors
Affiliations
1 Sri Ramakrishna Engineering College, Coimbatore-22, IN
2 Sri Ramakrishna Engineering College, Coimbatore -22, IN
3 Sri Ramakrishna Engineering College, Coimbatore-22, IN
1 Sri Ramakrishna Engineering College, Coimbatore-22, IN
2 Sri Ramakrishna Engineering College, Coimbatore -22, IN
3 Sri Ramakrishna Engineering College, Coimbatore-22, IN
Source
Networking and Communication Engineering, Vol 3, No 4 (2011), Pagination: 265-271Abstract
Distributed Denial of Service (DDoS) attacks is flattering ever more challenging with the vast resources and techniques increasingly available to attackers. Distributed Denial of Service (DDoS) attacks constitutes one of the most important threats and among the hardest security problems in today's Internet of particular concern are Distributed Denial of Service (DDoS) attacks, whose collision can be proportionally severe. In this paper, consider sophisticated attacks that are protocol-compliant, non-intrusive, and utilize legitimate application-layer requests to overwhelm system resources. I have characterize application-layer resource attacks as either request flooding, asymmetric, or repeated one-shot, on the basis of the application workload parameters that they exploit. To protect servers from these attacks, propose a counter-mechanism that consists of a suspicion assignment mechanism and a DDoS-resilient scheduler, DDoS Shield. In contrast to prior work, our distrust mechanism assigns a continuous valued vs. binary measure to each client session, and the scheduler utilizes these values to determine if and when to schedule a session’s requests. Using tested experiments on a web application, demonstrate the strength of these resource attacks and evaluate the efficiency of our counter-mechanism. For instance, affect an asymmetric attack which overwhelms the server resources, increasing the response time of legitimate clients from 0.1 seconds to 10 seconds. Under the same attack scenario, DDoS Shield limits the effects of false-negatives and false-positives and improves the victims’ performance to 0.8 seconds.Keywords
Distributed Denial of Service Attack (DDos), Web Application, Application Layer.- A Survey on Various DDoS Attacks on Websites
Abstract Views :164 |
PDF Views:3