2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)最新文献

筛选
英文 中文
Traceback techniques against DDOS attacks: A comprehensive review 针对DDOS攻击的回溯技术:全面回顾
Krishan Kumar, A. L. Sangal, A. Bhandari
{"title":"Traceback techniques against DDOS attacks: A comprehensive review","authors":"Krishan Kumar, A. L. Sangal, A. Bhandari","doi":"10.1109/ICCCT.2011.6075132","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075132","url":null,"abstract":"Distributed denial-of-service (DDoS) is a rapidly growing problem. In a typical DDOS attacks a large number of compromised hosts (Zombies) are amassed to send useless packets to jam the victim, or its Internet connection or both. The problem of identifying the attack sources is one of the hardest threats in internet security due to the similarity between the legitimate and illegitimate traffic. Firstly, it is important characteristics of the DDOS attacks that they hide their identities/origins (IP Spoofing). Secondly, the stateless nature of the IP routing where routers normally know only the next hop for the forwarding of packets rather than the complete end to end route taken by each packet make IP traceback difficult. IP traceback (the ability to trace IP packets from source to destination) is a significant step toward identifying and, thus, stopping, attackers. This Review paper evaluates and describes the effectiveness of different existing traceback methods. These methods are based on the enhanced router functions or modifications of the current protocols. Advantages and Disadvantages have also been described in existing techniques to carry out research in this problem.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115054634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A framework for vulnerability minimization — Object oriented design perspective 一个漏洞最小化的框架——面向对象的设计视角
A. Agrawal, R. Khan
{"title":"A framework for vulnerability minimization — Object oriented design perspective","authors":"A. Agrawal, R. Khan","doi":"10.1109/ICCCT.2011.6075131","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075131","url":null,"abstract":"The research on software security is still in its infancy. Moreover, the design phase of software development is much ignored. Though, enough research is done for improvement of object oriented design quality, the improvement of object oriented design security has received little attention. The unavailability of any existing framework for minimization of object oriented design vulnerability has made the task complicated and haphazard. The research proposes a metric based framework for minimization of object oriented design vulnerability. The framework minimizes vulnerability by restricting the flow of vulnerable information.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114471089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A host based intrusion detection system for DDoS attack in WLAN 基于主机的无线局域网DDoS入侵检测系统
Anuradha, Anita Singhrova
{"title":"A host based intrusion detection system for DDoS attack in WLAN","authors":"Anuradha, Anita Singhrova","doi":"10.1109/ICCCT.2011.6075142","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075142","url":null,"abstract":"Intrusion detection system (IDS) plays a vital role in a computer security scheme as the number of security-breaking attempts originating inside organizations is increasing steadily. In this paper, we describe an architecture of Host based Intrusion Detection System for DoS attack in distributed WLAN (HIDS). The proposed system is an intelligent system that will detect the intrusion dynamically and periodically on estimating the intruder association respective to the current node with its neighbor nodes. It also uses the concept of Bloom filter, in which it stores destination IP address that is used to detect an intruder with misuse detection approach.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125831756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
On the approach of combining trust and security for securing mobile agents: Trust enhanced security 浅谈信任与安全相结合的移动代理安全保护方法:信任增强安全
Priyanka Dadhich, Kamlesh Dutta, M. C. Govil
{"title":"On the approach of combining trust and security for securing mobile agents: Trust enhanced security","authors":"Priyanka Dadhich, Kamlesh Dutta, M. C. Govil","doi":"10.1109/ICCCT.2011.6075149","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075149","url":null,"abstract":"Mobile Agent systems employ a number of security features to address the various threats. Despite the employment of various security features by most systems, there is a lack of security standard that covers all the aspects of their operations. Due to the mobility feature in distributed systems, various security concerns like auditing, secure communication, availability, accountability becomes further complicated and hence prove to abuse and misuse. Examining the above problems and uncertainty in behavior of mobile agents, it is thought to combine security with trust. We refer it to trust enhanced security that combines trust decisions into security decisions-making processes through explicit specification and management of security-related trust relationships. Trust Management entails collecting the information necessary to establish a trust relationship and dynamically monitoring and adjusting the existing trust relationships.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125836122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Proposed cellular network for Indian conditions for enhancement of spectral density and reduction of power consumption & RF pollution 为提高频谱密度和减少功耗和射频污染而提出的印度蜂窝网络
Sumit Katiyar, R. Jain, N. K. Agrawal
{"title":"Proposed cellular network for Indian conditions for enhancement of spectral density and reduction of power consumption & RF pollution","authors":"Sumit Katiyar, R. Jain, N. K. Agrawal","doi":"10.1109/ICCCT.2011.6075182","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075182","url":null,"abstract":"With the exponentially increasing demand for wireless communications the capacity of current cellular systems will soon become incapable of handling the growing traffic. Since radio frequencies are diminishing natural resources, there seems to be a fundamental barrier to further capacity increase. The solution can be found by using smart antenna systems. Smart or adaptive antenna arrays consist of an array of antenna elements with signal processing capability that optimizes the radiation and reception of a desired signal, dynamically. Smart antenna can place nulls in the direction of interferers via adapting adaptive updating of weights linked to each antenna element. They thus cancel out most of the co-channel interference resulting in better quality of reception and lower dropped calls. Smart antenna can also track the user within a cell via direction of arrival algorithms. This paper focuses on about the smart antenna in hierarchical cell clustering (overlay-underlay) with demand based frequency allocation techniques in cellular mobile radio networks in INDIA.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121808962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An aspect-oriented conceptual level design for semantic web based application 面向方面的语义web应用程序的概念层设计
Abhijit Sanyal, S. Choudhury
{"title":"An aspect-oriented conceptual level design for semantic web based application","authors":"Abhijit Sanyal, S. Choudhury","doi":"10.1109/ICCCT.2011.6075154","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075154","url":null,"abstract":"Advanced web application design demands the concern of the customers to be used for describing the inherent semantics in an integrated way. In this paper we have proposed a graph-based aspect-oriented conceptual data model, ‘Semantic Graph Data Model’ (SGDM), for web based application. This not only offers a pictorial view with better understandability but also provides the procedure for describing the semantic resources. SGDM represents them in a structured manner with reasoning through aspect orientation. The proposed model also supports the automatic domain model development for similar business problems by effective domain-knowledge reuse. Moreover, SGDM supports the object-oriented paradigm and also flexible to represent semi-structured as well as hypertext data through a multilayered graph structure. The Product Specific Model (PSM) SQL: 2003 implementation of our proposed model SGDM is being done through GME tool.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122333881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed system protocol verification: A modal tableau based model checking approach 分布式系统协议验证:基于模态表的模型检查方法
T. Samanta, D. Sarkar
{"title":"Distributed system protocol verification: A modal tableau based model checking approach","authors":"T. Samanta, D. Sarkar","doi":"10.1109/ICCCT.2011.6075119","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075119","url":null,"abstract":"Distributed system protocol verification has the intrinsic problem of mechanizability of intricate reasoning pattern and/or state-space explosion. The former arises in case of theorem proving approach due to the ingenuity involved in constructing a proof and the latter is encountered in model checking approach while carrying out composition of a large number of processes that constitute a typical distributed system. In the present paper, the authors have improvised a technique combining the tableau based theorem proving approach and model checking. The process has been illustrated using the example of Leader Election Protocol in synchronous rings.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126411501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Clustering method based on fuzzy equivalence relation 基于模糊等价关系的聚类方法
A. Raut, G. Bamnote
{"title":"Clustering method based on fuzzy equivalence relation","authors":"A. Raut, G. Bamnote","doi":"10.1109/ICCCT.2011.6075209","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075209","url":null,"abstract":"Fuzzy clustering techniques are used to construct clusters with uncertain boundaries and allows that one object belongs to overlapping clusters with some membership degree. In other words, the fuzzy clustering is to consider not only the belonging status of object to the clusters, but also to consider to what degree do the object belong to the cluster. In this paper, a technique called “fuzzy hierarchical clustering” is being proposed that creates the clusters of web documents using fuzzy equivalence relation","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127923053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance comparison of MCML and PFSCL gates in 0.18 μm CMOS technology 0.18 μm CMOS工艺下MCML与PFSCL栅极的性能比较
K. Gupta, Ranjana Sridhar, Jaya Chaudhary, N. Pandey, Maneesha Gupta
{"title":"Performance comparison of MCML and PFSCL gates in 0.18 μm CMOS technology","authors":"K. Gupta, Ranjana Sridhar, Jaya Chaudhary, N. Pandey, Maneesha Gupta","doi":"10.1109/ICCCT.2011.6075165","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075165","url":null,"abstract":"In this paper, the performance of two popular source coupled logic styles, namely, MOS Current Mode Logic (MCML) and Positive Feedback Source Coupled Logic (PFSCL) is investigated. A number of SPICE simulation runs have been carried out using 0.18 μm CMOS technology parameters. The PFSCL circuit show better results than the MCML circuit in terms of propagation delay and area. The effect of process variations through Monte Carlo simulations however shows lower variations in MCML circuits style.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117200489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
New proxy signature scheme with message recovery using verifiable self-certified public keys 新的代理签名方案,使用可验证的自认证公钥进行消息恢复
Namita Tiwari, Sahadeo Padhye
{"title":"New proxy signature scheme with message recovery using verifiable self-certified public keys","authors":"Namita Tiwari, Sahadeo Padhye","doi":"10.1109/ICCCT.2011.6075130","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075130","url":null,"abstract":"A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former when the former is not available. In this paper, we present a new proxy signature scheme with message recovery using verifiable self-certified public key. The self-certified public key has an advantage which can withstand public key substitution attacks. Proposed scheme is secure against several active attacks and forgery attacks also. Another advantage of the proposed scheme is that the use of verifiable self-certified public key overcomes the weakness of repudiability of the self-certified public key and accomplishes the tasks of public key verification, proxy signature verification, and message recovery in a logically single step. In addition, the proposed scheme satisfies all properties of strong proxy signature and does not use secure channel in the communication between the original signer and the proxy signer.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114260223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信