Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Singh, Yashwant
- On Botnet Detection in Networks, based on Traffic Monitoring
Abstract Views :161 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Information Technology, Central University of Jammu, Jammu and Kashmir, 181143, IN
1 Department of Computer Science and Information Technology, Central University of Jammu, Jammu and Kashmir, 181143, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 27, No 1 (2018), Pagination: 61-68Abstract
One of the serious and widespread attacks in cyber security is Botnet. Using command and control infrastructure or peer-to-peer communication between bots, botmasters can perform a variety of attacks on internet system-users. To mitigate this, multiple techniques have been developed for botnet detection over the past two decades. In this paper we have discussed various botnet structures and the different techniques of botnet detection proposed in literature. We evaluated these techniques based on their distinctive features and presented their detailed comparative analysis. We also proposed a method for botnet detection using network traffic monitoring. Our approach is based on combining signature and anomaly detection systems that complement each other. Our proposed hybrid detection system may decrease false positive rate in anomaly detection by finding the well-known bots using signature detection and thereby may increase overall detection efficiency.Keywords
Botnet, Malicious Activities, P2P, Anomaly Detection.References
- H. Choi, H. Lee, H. Lee, and H. Kim, “Botnet detection by monitoring group activities in DNS traffic,” CIT 2007 7th IEEE Int. Conf. Comput. Inf. Technol., pp. 715–720, 2007.
- “64 BotMiner_ Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.” .
- A. K. Tyagi and G. Aghila, “A Wide Scale Survey on Botnet,” Int. J. Comput. Appl., vol. 34, no. 9, pp. 975–8887, 2011.
- D. Geer, “Malicious bots threaten network security,” Computer (Long. Beach. Calif)., vol. 38, no. 1, pp. 18–20, 2005.
- W. Lu, G. Rammidi, and A. A. Ghorbani, “Clustering botnet communication traffic based on n-gram feature selection,” Comput. Commun., vol. 34, no. 3, pp. 502–514, 2011.
- G. Gu, J. Zhang, and W. Lee, “BotSniffer : Detecting Botnet Command and Control Channels in Network Traffic Georgia Institute of Technology Roadmap • BotSniffer Experimental Evaluation,” pp. 1–27, 2008.
- I. Technology, H. R. Zeidanloo, A. B. Manaf, P. Vahdani, F. Tabatabaei, and M. Zamani, “Botnet Detection Based on Traffic Monitoring,” pp. 97–101, 2010.
- A. Karim, R. Bin Salleh, M. Shiraz, S. A. A. Shah, I. Awan, and N. B. Anuar, “Botnet detection techniques: review, future trends, and issues,” J. Zhejiang Univ. Sci. C, vol. 15, no. 11, pp. 943–983, 2014.
- S. Khattak, N. R. Ramay, K. R. Khan, A. A. Syed, and S. A. Khayam, “A Taxonomy of botnet behavior, detection, and defense,” IEEE Commun. Surv. Tutorials, vol. 16, no. 2, pp. 898–924, 2014.
- P. V. Amoli, “A Taxonomy of Botnet Detection Techniques Hossein Rouhani Zeidanloo , Moh amm ad Jorjor Zadeh M . Safari , Mazdak Zamani B . Intrusion Detection System ( IDS ),” Ind. Eng., pp. 158–162, 2010.
- A. R. Baker et al., Snort 2.1 Intrusion Detection. 2004.
- V. Krmicek, “Inspecting DNS Flow Traffic for Purposes of Botnet Detection,” GEANT3 JRA2 T4 Intern. Deliv., pp. 1–9, 2011.
- D. Hutchison and J. C. Mitchell, Detection of Intrusions and Malware , and Vulnerability Assessment. 1973.
- “62 29BotHunter Detecting Malware Infection Through IDS-Driven Dialog Correlation.” .
- “62 28BotMiner Clustering Analysis of Network Traffic for.” .
- “77 37Adaptive pattern mining model for early detection of botnet-propagation scale.” .
- A. Karasaridis, B. Rexroad, and D. Hoeflin, “Wide-scale Botnet Detection and Characterization.”
- J. Goebel and T. Holz, “Rishi : Identify Bot Contaminated Hosts by IRC Nickname Evaluation.”
- T. Strayer and R. Walsh, “Botnet Detection,” vol. 36, no. June 2014, pp. 0–29, 2008.
- U. Snort and M. Tcp, “n s t i t u t e u t h o r r e t a i n s f u l l r i g h t s.”
- D. Dagon, “Botnet Detection and Response The Network is the Infection,” 2005.
- “Revealing Botnet Membership Using DNSBL Counter-Intelligence.”.
- Comparative Analysis of Medical Diagnostic Techniques Using ANN
Abstract Views :130 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science & Technology, Central University of Jammu, Jammu & Kashmir, IN
1 Department of Computer Science & Technology, Central University of Jammu, Jammu & Kashmir, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 27, No 1 (2018), Pagination: 104-114Abstract
An immense and immeasurable amount of data is available to medical experts, extending from points of interest of clinical manifestations to different sorts of biochemical information and yields of imaging gadgets. Each kind of information yields data that must be assessed and relegated to a specific pathology amid the diagnostic process. To rationalize the diagnosis in every day routine and maintain a strategic distance from misdiagnosis, methods of machine learning (particularly ANNs) may be utilized. The versatile learning algorithms of machine learning may deal with several kinds of restorative heterogeneous information and classify them into various class outputs. In this paper, we concisely survey and examine the logic, capacities, and performance of ANNs in medical diagnosis of various diseases by making comparative analysis and focusing more on the medical diagnosis of Diabetes. The use of PID dataset for diagnosis is also demonstrated.Keywords
Multi-Layer Perceptron Neural Networks (MLPNN), PID (Pima Indian Diabetes Dataset), MLFFN (Multilayer Feedforward Network), BPN (Backpropagation Network), General regression neural network (GRNN), Radial basis function (RBF).References
- Yusuke Sugomori, Bostjan Kaluza, Fabio M. Soares, Alan M.F Souza: Deep Learning Practical Neural Networks with Java, 2017
- O. Er, N. Yumusak and F. Temurtas, "Chest disease diagnosis using artificial neural networks", Expert Systems with Applications, Vol.37, No.12, 2010, pp. 7648-7655.
- R. Das, I. Turkoglu and A. Sengur, "Effective diagnosis of heart disease through neural networks ensembles", Expert Systems with Applications, Vol.36, No.4, 2009, pp. 7675-7680.
- D. Gil, M. Johnsson, J. M. Garicia Chemizo, A. S. Paya and D. R. Fernandez, "Application of Artificial Neural Networks in the Diagnosis of Urological Dysfunctions", Expert Systems with Applications, Vol.36, No.3, 2009, pp. 5754-5760.
- S. Altunay, Z. Telatar, O. Erogul and E. Aydur, "A New Approach to urinary system dynamics problems: Evaluation and classification of uroflowmeter signals using artificial neural networks", Expert Systems with Applications, Vol.36, No.3, 2009, pp. 4891-4895.
- Filippo Amato, Alberto López, Eladia María Peña-Méndez, Petr Vaňhara, Aleš Hamp, Josef Havel1: “Artificial neural networks in medical diagnosis”
- P. S. Heckerling, G. Canaris, S. D. Flach, T. G. Tape, R. S. Wigton and B. S. Gerber, "Predictors of urinary tract infection based on artificial neural networks and genetic algorithms", International Journal of Medical Informatics; Vol.76, No.4, 2007, pp. 289-296.
- M. P. Francisco, G. C. Juan Manuel, S. P. Antonio and R. F. Daniel, "A robust model of the neuronal regulator of the lower urinary tract based on artificial neural networks", Neurocomputing, Vol.71, No.4-6, 2008, pp. 743-754.
- S. A. Monadjemi and P. Moallem, "Automatic Diagnosis of Particular Diseases Using a Fuzzy-Neural Approach", International Review on Computers & Software, Vol.3, No.4, 2008, pp. 406-411.
- R. Lin, "An intelligent model for liver disease diagnosis", Artificial Intelligence in Medicine, Vol.47, No.1, 2009, pp. 53-62.
- N. Kumar and S. Khatri, “Implementing WEKA for medical data classification and early kidney disease prediction,” 2017 3rd Int. Conf. Comput. Intell. Commun. Technol., pp. 1–6, 2017.
- M. A. Mazurowski, P. A. Habas, J. M. Zurada, J. Y. Lo, J. A. Baker and G. D. Tourassi, "Training Neural Network Classifiers for Medical Decision Making: The Effects of Imbalanced Datasets on Classification Performance", Special Issue on Advances in Neural Networks Research: IJCNN ’07, 2007 International Joint Conference on Neural Networks IJCNN’07 Orlando, Florida, USA, April, 2008, Vol.21, No.3, pp. 427-436, http://ci.louisville.edu/zurada/publications/mazurowski.nn2008.pdf.
- Y. Xing, J. Wang, Z. Zhao, and andYonghong Gao, “Combination Data Mining Methods with New Medical Data to Predicting Outcome of Coronary Heart Disease,” 2007 Int. Conf. Converg. Inf. Technol. (ICCIT 2007), pp. 868–872, 2007.
- G. Zhang, P. Yan, H. Zhao and X. Zhang, "A Computer Aided Diagnosis System in Mammography Using Artificial Neural Networks", 2008 International Conference on BioMedical Engineering and Informatics, 2008, Vol.2, pp. 823-826.
- K. Higuchi, K. Sato, H. Makuuchi, A. Furuse, S. Takamoto and H. Takeda, "Automated diagnosis of heart disease in patients with heart murmurs: application of a neural network technique", Journal of Medical Engineering & Technology, Vol.30, No.2, 2006, pp. 61- 68
- K. Viswanath and R. Gunasundari, “Design and analysis performance of kidney stone detection from ultrasound image by level set segmentation and ANN classification,” Proc.
- F. Xie, H. Fan, Y. Li, Z. Jiang, R. Meng, and A. Bovik, “Melanoma classification on dermoscopy images using a neural network ensemble model,” IEEE Trans. Med. Imaging, vol. 36, no. 3, pp. 849–858, 2017.
- N. Ganesan, “Application of Neural Networks in Diagnosing Cancer Disease Using Demographic Data,” Int. J. Comput. Appl. (0975, vol. 1, no. 26, pp. 76–85, 2010.
- R. Dey and V. Bajpai, “Application of Artificial Neural Network ( ANN ) technique for Diagnosing Diabetes Mellitus,” IEEEexplorer, no. 155, pp. 8–11, 2008.
- Smith, J. W., Everhart, J. E., Dickson, W. C., Knowler, W. C., Johannes, R. S., “Using the ADAP learning algorithm to forecast the onset of diabetes mellitus”, Proc. Symp. on Computer Applications and Medical Care (Piscataway, NJ: IEEE Computer Society Press), pp. 261–5, 1988.
- Kamer Kayaer and Tulay Yildirim, “Medical Diagnosis on Pima Indian Diabetes Using General Regression Neural Networks
- Carpenter, G.A., Markuzon, N., “ARTMAP-IC and medical diagnosis: Instance counting and inconsistent cases”, Neural Networks, 11:323-336, 1998.
- A Fairness Framework for Resource Allocation in Cloud Computing
Abstract Views :216 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science & Information Technology, Central University of Jammu, Jammu and Kashmir, IN
1 Department of Computer Science & Information Technology, Central University of Jammu, Jammu and Kashmir, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 27, No 1 (2018), Pagination: 115-121Abstract
Cloud computing is a model for empowering request to arrange access to a common pool of configurable registering resource. In distributed computing frameworks the resource pool is built from an extensive number of heterogeneous servers. The multi-resource distribution component, called DRFH is a Predominant Resource Reasonableness (DRF) from a solitary server to various heterogeneous servers. The DRFH has various profoundly attractive properties. With DRFH, no client lean towards the allotment of another client; nobody can enhance its portion without diminishing that of the others; and all the more imperatively, no client has an impetus to lie about its resource request. As a direct application, we outline a straightforward heuristic that actualizes DRFH in true frameworks. Expansive scale reenactments driven by Google group follows demonstrate that DRFH altogether outflanks the conventional opening based scheduler, prompting substantially higher asset/resource use with considerably shorter occupation finish times.References
- E. J. Qaisar, “Introduction to cloud computing for developers: Key concepts, the players and their offerings,” 2012 IEEE TCF Inf. Technol. Prof. Conf. TCF Pro IT 2012, 2012.
- L. Popa et al., “FairCloud: Sharing the Network in Cloud Computing,” Sigcomm’12, vol. 42, pp. 187–198, 2012.
- S. Gong, B. Yin, W. Zhu, and K.-Y. Cai, “Adaptive Resource Allocation of Multiple Servers for Service-Based Systems in Cloud Computing,” 2017 IEEE 41st Annu. Comput. Softw. Appl. Conf., no. 61402027, pp. 603–608, 2017.
- S. Mneimneh, “Computer Networks Fairness,” vol. 2.
- V. Jeyakumar, M. Alizadeh, S. Narayana, R. Gopalakrishnan, and A. Kabbani, “Fairness and Efficiency in Network Performance Isolation.”
- M. S. Ahuja, R. Kaur, and D. Kumar, “Trend Towards the Use of Complex Networks in Cloud Computing Environment,” Int. J. Hybrid Inf. Technol., vol. 8, no. 3, pp. 297–306, 2015.
- R. Chang, “Network Virtualization for Cloud Computing p g,” pp. 1–41, 2010.
- A. K. Jain, S. C. Dass, and K. Nandakumar, “Soft Biometric Traits for Personal Recognition Systems,” no. July, pp. 731–738, 2004.
- P. Cloud and S. Options, “Cloud Storage,” Nonprofit Technology Collab., pp. 3–6, 2013.
- D. Sarddar, P. Sen, and M. K. Sanyal, “Central controller framework for mobile cloud computing,” Int. J. Grid Distrib. Comput., vol. 9, no. 4, pp. 233–240, 2016.
- R. Patel and S. Patel, “Survey on Resource Allocation Strategies in Cloud Computing,” Int. J. Eng. Res. Technol. IJERT, vol. 2, no. 2, pp. 1–5, 2013.
- Y. Ito, H. Koga, and K. Iida, “A Bandwidth Allocation Scheme to Improve Fairness in Data Center Networks,” Proc. 2014 Conex. Student Work. - Conex. Student Work. ’14, pp. 7–8, 2014.
- S. Akintoye, A. Bagula, Y. Djemaiel, and N. Bouriga, “A Survey on Storage Techniques in Cloud Computing,” Int. J. Comput. Appl., vol. 163, no. 2, pp. 22–30, 2017.
- K. Choi, Y. Chun, S. Park, and Y. Shin, “Method for Calculation of Cloud Computing Server Capacity Hardware Capacity Calculation for Cloud Computing,” vol. 87, no. 11, pp. 38–41, 2015.