Refine your search
Collections
Co-Authors
Journals
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Ganeshkumar, K.
- An Inception of DDoS Attacks for Popular Websites - Identifying on Application-Layer
Abstract Views :219 |
PDF Views:0
Authors
Affiliations
1 Department of Information Technology, Academy of Maritime Education and Training (AMET), 135,East Coast Road, Kanathur – 603112, Chennai, Tamil Nadu, IN
2 Department of E-Governance, Academy of Maritime Education and Training (AMET), 135,East Coast Road, Kanathur – 603112, Chennai, Tamil Nadu, IN
3 Research and Development Division, AMET University135, ECR, Kannathur – 603112, Chennai, Tamil Nadu, IN
1 Department of Information Technology, Academy of Maritime Education and Training (AMET), 135,East Coast Road, Kanathur – 603112, Chennai, Tamil Nadu, IN
2 Department of E-Governance, Academy of Maritime Education and Training (AMET), 135,East Coast Road, Kanathur – 603112, Chennai, Tamil Nadu, IN
3 Research and Development Division, AMET University135, ECR, Kannathur – 603112, Chennai, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 47 (2016), Pagination:Abstract
The later tide from claiming conveyed refusal about management strike Distributed Denial of Service (DDOS) towards excessive-profile net sites, exhibit how harming the ones DDOS strike are added to entryway uncovered the web could be underneath such strike. The advantages for those web destinations had been inaccessibility to hours or indeed going days in addition as an after effect of the strike. In this strike the same time as ship an extensive quantity approximately movement will an exploited character group or arrange. The exploited character can be overpowered subsequently time perusing to such an extent motion that it got here to gatherings deliver minimal alternately no management to its actual clients utility(App)-DDOS strike may a danger to be stealthier also a more amount risky for the normal websites. The blast motion also secondary volume are the as a relatable point qualities for App-DDoS strike additionally streak crowds, it may be no longer difficult for present systems will recognize them simply through measurable elements from claiming movement. The display really worth of effort characterizes the entry grid (AM) to catch fleeting examples of regular streak swarm moreover with screen App-DDoS strike in the course of streak swarm off danger stowed away Semi-Markov version will be used to portray those progress of am will also accomplish an numerical additionally programmed identity.Keywords
Application Layer, Distributed Denial of Service, Hidden Semi-Markov Model and Access Matrix.- New Cryptography Algorithm with Fuzzy Logic for Effective Data Communication
Abstract Views :165 |
PDF Views:0
Authors
Affiliations
1 IT Department, AMET University, Kanathur, Chennai - 603112, Tamil Nadu, IN
2 Department of E-Governance, AMET University, Kanathur, Chennai - 603112, Tamil Nadu, IN
1 IT Department, AMET University, Kanathur, Chennai - 603112, Tamil Nadu, IN
2 Department of E-Governance, AMET University, Kanathur, Chennai - 603112, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
In this communicative world, people forget to care about the security when the data communication gets the importance than the privacy most of the time. There the data theft takes place effortlessly. Many methodologies have been devised for making the effective communication either over the internet or intranet. However, the hackers enrich themselves than the new technologies whenever are launched. As need arises for cultivate the security key generation while secure data communication has to be ensured, we propose a new cryptography algorithm along with the fuzzy logic through this paper that materializes the secure communication possible. Firstly, we observed the flaw that causes for hacking effortlessly by the intruder during the data transmission over the network. Then the evaluation part could be done with the same context without losing data because of this proposed algorithm. This algorithm concentrates on image and text data encryption using fuzzy logic and on secured sharing theme which provides highly authenticated data transferring. The existing security algorithms had nod in many ways only for the secure data transmission rather than the complexity in which they have when need to be executed. Henceforth the aspirants who want to have the communication have to spend more time than the actual. Obviously the precious algorithms should have less processing time and high secure in nature. With keeps it as a main aspect the New Cryptography algorithm with fuzzy logic is proposed and has low process time and high security logics using various key for encryption and decryption. The results which produced by this proposed algorithm have been compared with exist algorithms and finally could arrive the conclusion that the proposed is highly effective in security aspects and needs minimum amount of time to be executed.Keywords
Cryptography, Fuzzy Logic, Private Key, Public Key, RSA Algorithm, Security Key- Implementing Inference Revelation System for a Database
Abstract Views :149 |
PDF Views:0
Authors
Affiliations
1 Information Technology, AMET University, Chennai - 603112, Tamil Nadu, IN
2 Department of E-Governance, AMET University, Chennai - 603112, Tamil Nadu,, IN
3 Information Technology, AMET University, Chennai - 603112, Tamil Nadu,, IN
1 Information Technology, AMET University, Chennai - 603112, Tamil Nadu, IN
2 Department of E-Governance, AMET University, Chennai - 603112, Tamil Nadu,, IN
3 Information Technology, AMET University, Chennai - 603112, Tamil Nadu,, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Dispatched client of the database may endeavour change those relationship «around the data so as will derive or understand those fragile information beginning with those threatening data get. Acceptance will be a system a client could use ought to whip right control instruments to database structure. An enlistment recognizable proof structure might be required to make sense of whether customers could utilize charged got to data with interpret sensitive information. In perspective of the space of the database semantic acceptance distinguishing proof system will be framed. That probability about getting access to span of the season of the customer is registered when each shot the customer acts those request. That client requests a will an opportunity to be blocked in the acceptance probability quality outperforms those pre-indicated edge restrain. By this, those will be abstained from beginning with surmising the fragile data. Thusly we make a model for evaluating acceptance subordinate upon those request progressions.Keywords
Access, Database, Framework, Information, Security- Reproductive Performance in Large White Yorkshire Crosses
Abstract Views :161 |
PDF Views:0
Authors
Affiliations
1 Department of Animal Genetics and Breeding, Madras Veterinary College, Chennai-600 007, IN
2 Department of Livestock Production and Management, Madras Veterinary College, Chennai-600007, IN
1 Department of Animal Genetics and Breeding, Madras Veterinary College, Chennai-600 007, IN
2 Department of Livestock Production and Management, Madras Veterinary College, Chennai-600007, IN