A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kannaiya Raja, N.
- Centralized Parallel Form of Pattern Matching Algorithm in Packet Inspection by Efficient Utilization of Secondary Memory in Network Processor
Authors
1 Department of CSE, Arulmigu Meenakshi Amman College of Engg, Thiruvannamalai Dt., Near Kanchipuram, IN
2 Department of CSE, Ganadipathy Tulsi's Jain Engineering College, Vellore, IN
3 Arulmigu Meenakshi Amman College of Engg, Thiruvannamalai Dt., Near Kanchipuram, IN
Source
Programmable Device Circuits and Systems, Vol 4, No 1 (2012), Pagination: 15-21Abstract
The network equipment has capable of inspecting packets in order to discover the worms and virus over the network. Many network users are hacked by attackers through malicious functions are mapped on network applications. Such unauthorized activities are required to delete by deep packet inspection in application layer. The high level network equipment provides in-depth packet inspection through pattern matching in network detection system. Researchers have developed high performance parallel deep packet filters for reconfigurable devices. Although some reconfigurable systems can be generated automatically from pattern database, obtaining high performance result from each subsequent reconfiguration can be a time consuming process. By presenting a novel architecture for programmable centralized parallel pattern matching algorithm for efficient packet inspection with network processor and coprocessor in order to retrieve the pattern with less time. Produce a hybrid system that is able to update the rules immediate during the time the new filter is being compiled reduction of resource-intensive task and increasing bandwidth used snort rule. We mapped our centralized multi parallel pattern matching algorithm [CNMPPMA] for filter packet in parallel. The simulation result reveals that CNMPPMA significantly improves the matching performance. Also achieves the matching process with less cost.Keywords
Intrusion Detection, Network Security, Pattern Matching, Packet Inspection.- Ultra High Tech Multi-Pipelining String Matching for Deep Packet Inspection
Authors
1 CSE Department, Arulmigu Meenakshi Amman College of Engineering, Thiruvannamalai district, Near Kanchipuram, IN
2 CSE Department, Ganadipathy Tulsi’s Jain Engineering College, Vellore, IN
3 Arulmigu Meenakshi Amman College of Engineering, Thiruvannamalai District, Near Kanchipuram, IN
Source
Networking and Communication Engineering, Vol 4, No 9 (2012), Pagination: 573-583Abstract
Multi-pattern string matching remains a major performance bottleneck in network intrusion detection and anti-virus systems for high-speed deep packet inspection (DPI). Although Aho-Corasick deterministic finite automaton (AC- DFA) based solutions produce deterministic throughput and are widely used in today's DPI systems such as Snort and ClamAV, the high memory requirement of AC-DFA (due to the large number of state transitions in AC-DFA) inhibits efficient hardware implementation to achieve high performance.. Novel and scalable pipeline architecture for memory- efficient multi-pattern string matching is then presented. The architecture can be easily extended to support multi-character input per clock cycle by mapping a compressed AC-DFA onto multiple pipelines. In this paper the architecture to support enhanced multi-character input per clock cycle to achieve multiplicative throughput improvement. By using multi pipelining Now we can use the efficient architecture also available to support much larger pattern sets by using a limited number of external memory and also work done integrating proposed string matching architecture with DPI processing engine such packet header and other flags with regular expressing. Very fast regular expression matching is currently used here for applications searching for large pattern sets with increasingly faster data streams and minimize the through put by pipelining process and comparing him high level to reduce the state and minimize the throughput.Keywords
Deep Packet Inspection, DFA, FPGA, Pipeline, String Matching.- Estimating the Video Registration Using Image Motions
Authors
1 Department of CSE, Arulmigu Meenakshi Amman College of Engg., Thiruvannamalai Dt., Near Kanchipuram, IN
2 Department of CSE, Ganadipathy Tulsi's Jain Engineering College, Vellore, IN
3 Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya University, IN
4 Department of Computer Science and Engineering, Anna University, IN
Source
Digital Image Processing, Vol 4, No 1 (2012), Pagination: 33-43Abstract
In this research, we consider the problems of registering multiple video sequences dynamic scenes which are not limited non rigid objects such as fireworks, blasting, high speed car moving taken from different vantage points. In this paper we propose a simple algorithm we can create different frames on particular videos moving for matching such complex scenes. Our algorithm does not require the cameras to be synchronized, and is not based on frame-by-frame or volume-by-volume registration. Instead, we model each video as the output of a linear dynamical system and transform the task of registering the video sequences to that of registering the parameters of the corresponding dynamical models. In this paper we use of a joint frame together to form distinct frame concurrently. The joint identification and the Jordan canonical form are not only applicable to the case of registering video sequences, but also to the entire genre of algorithms based on the dynamic texture model. We have also shown that out of all the possible choices for the method of identification and canonical form, the JID using JCF performs the best.Keywords
Dynamic Textures, Video Registration, Nonrigid Dynamical Scenes.- A Novel Fingerprint Reconstruction by Using Four Concrete Schemes of Pattern Matching to Enhance Accuracy Fields
Authors
1 CSE Department, Arulmigu Meenakshi Amman College of Engineering, Thiruvannamalai Dt, Near Kanchipuram, IN
2 CSE Department, Ganadipathy Tulsi's Jain Engineering College, Vellore, IN
3 Arulmigu Meenakshi Amman College of Engineering, Thiruvannamalai Dt, Near Kanchipuram, IN
Source
Digital Image Processing, Vol 3, No 17 (2011), Pagination: 1114-1121Abstract
Fingerprint system use in the pixel system for interacting to the problem of many fields. In this fingerprint system has generally represented by four schemes:grayscale image, phase image, skeleton image, and minutiae scheme which are used in this paper to find out spurious minutiae in the fingerprint. Most of the fingerprint reconstruction schemes has been existed which based on converting minutiae representation to phase (continuous phase and spiral phase). But this still contain a few spurious minutiae especially in high curvature region. For a direct use of the existing reconstruction algorithm to a latent fingerprint in NIST SD27. Both the ridge flow and minutiae in the reconstructed fingerprint match the original fingerprint well. But, apparently, the reconstructed ridge pattern does not match the original ridge skeleton exactly. This novel reconstruction method proposed the difficult and important problem of latent fingerprint restoration using significantly modified existing reconstruction algorithm to make the reconstructed fingerprints appear visually more realistic, brightness, ridge thickness, pores, and noise should be modeled. The accept rate of the reconstructed fingerprints can be further enhance by reducing the image quality around the spurious minutiae in the grayscale image and other features (such as ridge orientation and skeleton) manually marked by the latent expert.Keywords
Reconstruction, Enhancement, Minutiae, Ridge Matching, Curve Matching.- A Fast Positive Approach of P-DPL in the Packet Inspection
Authors
1 CSE Department, Arulmigu Meenakshi Amman College of Engineering, Thiruvannamalai Dt, Near Kanchipuram, IN
2 CSE Department, Ganadipathy Tulsi’s Jain Engineering College, Vellore, IN
3 Arulmigu Meenakshi Amman College of Engineering, Thiruvannamalai Dt, Near Kanchipuram, IN
Source
Digital Image Processing, Vol 2, No 12 (2010), Pagination:Abstract
One way to protect organizations from malware is to deploy high-speed network based intrusion detection systems on the communication lines. This approach is achieved by P-DPL. Such appliances perform deep-packet inspection in real- time and use simple signatures for detecting and removing attacks such as malware, propagating worms, denial-of-service, or remote exploitation of vulnerabilities. P-DPL is primarily intended for high-speed network traffic filtering devices that are based on deep-packet inspection. Malicious executables are analyzed using two approaches: disassembly, utilizing IDA-Pro, and the application of a dedicated state machine in order to obtain the set of functions comprising the executables. The signature extraction process is based on a comparison with a common function repository. By eliminating functions appearing in the common function repository from the signature candidate list, P-DPL can minimize the risk of false-positive detection errors. To minimize false-positive rates even further, P-DPL proposes intelligent candidate selection using an entropy score to generate signatures.Keywords
Automatic Signature Generation (ASG), Malware, Malware Filtering, Packet-Deployment Payload (P-DPL).- Data Optimization from a Multiple Species Network using Modified SFLA (Shuffled Frog Leaping Algorithm)
Authors
1 CSE Department, Arulmigu Meenakshi Amman College of Engineering, Thiruvannamalai Dt, Near Kanchipuram, IN
2 CSE Department, Ganadipathy Tulsi’s Jain Engineering College, Vellore, IN
3 CSE Department, Arulmigu Meenakshi Amman College of Engineering, Thiruvannamalai Dt, Near Kanchipuram, IN
Source
Data Mining and Knowledge Engineering, Vol 2, No 12 (2010), Pagination:Abstract
In this work we present a novel approach that uses interspecies sequences homology to connect the networks of multi species and possible more species and possible more species together with gene ontology dependencies in order to improve protein classification for research work. Proteins are involved in many for all biological process such energy metabolism, signal transduction and translation initiation. Even though for a large portion of proteins and their biological function are unknown or incomplete, therefore constructing efficient and reliable models for predicting the protein function has to be used in research work. Our method readily extends to multi species food and produce the improvements similar to them multi species. In the presence of multi interacting networks are using data mining for integration of a data from various sources and contributing increased accuracy of the function prediction of the multiple species for research work. We further enhance our model to account for the gene ontology dependencies by linking multiple related ontology categories such as, we have selected the food items from various countries such as from America the famous food items of yoghurt and Australia food items of oats and Indian food items of soya bean. The data sets are highly desirable for this use from various countries using logical networks from center for bioinformatics research institute (Chennai) and stored in the mining. SFLA aims to set a generic paradism of the efficient mining that acquire the data set of proteins for these food items and promotes predictions of protein functions with gene ontology for research work.Keywords
Biology and Genetics, Machine Learning, Bioinformatics (Genome or Protein) Databases.- A Novel Fingerprint Reconstruction by Using Four Concrete Schemes of Pattern Matching to Enhance Accuracy Fields
Authors
1 CSE Department, Arulmigu Meenakshi Amman College of Engineering, Thiruvannamalai District, Near Kanchipuram, IN
2 Arulmigu Meenakshi Amman College of Engineering, Thiruvannamalai District, Near Kanchipuram, IN
3 CSE Department, Ganadipathy Tulsi's Jain Engineering College, Vellore, IN
Source
Biometrics and Bioinformatics, Vol 4, No 5 (2012), Pagination: 211-216Abstract
Fingerprint system use in the pixel system for interacting to the problem of many fields. In this fingerprint system has generally represented by four schemes: grayscale image, phase image, skeleton image, and minutiae scheme which are used in this paper to find out spurious minutiae in the fingerprint. Most of the fingerprint reconstruction schemes has been existed which based on converting minutiae representation to phase (continuous phase and spiral phase).but this still contain a few spurious minutiae especially in high curvature region. For a direct use of the existing reconstruction algorithm to a latent fingerprint in NIST SD27. Both the ridge flow and minutiae in the reconstructed fingerprint match the original fingerprint well. But, apparently, the reconstructed ridge pattern does not match the original ridge skeleton exactly. This novel reconstruction method proposed the difficult and important problem of latent fingerprint restoration using significantly modified existing reconstruction algorithm to make the reconstructed fingerprints appear visually more realistic, brightness, ridge thickness, pores, and noise should be modeled. The accept rate of the reconstructed fingerprints can be further enhance by reducing the image quality around the spurious minutiae in the grayscale image and other features (such as ridge orientation and skeleton) manually marked by the latent expert.