Entity

Time filter

Source Type

Indore, India

Arya K.V.,ABV IIITM Gwalior
Lecture Notes in Electrical Engineering | Year: 2014

Intrusion Detection Systems (IDSs) are an indispensable part of a network infrastructure where inordinate attacks such as Distributed Denial-of-Service (DDoS) and metasploits have posed a major problem to the public and private computer networks. IDS assist the network administrators to monitor activities like gaining unauthorized access, session hijacking etc. These unlawful activities can result in losses to an enterprise, both in terms of money and resources. In this paper we detect and prevent one of the commonly occurring server attacks and follow it up with a fatal attack that can fully immobilize and destroy a server. We study and analyze the responses of the intrusion detection server when the network is exploited and the security of the network is compromised. Several dissimilar exploits are made on various Linux distributions hence, assisting the network administrators relying on the IDS to take appropriate action. © 2014 Springer. Source


Jain P.,ABV IIITM Gwalior | Singh P.K.,ABV IIITM Gwalior | Abraham A.,VSB - Technical University of Ostrava
Proceedings of the 2011 7th International Conference on Next Generation Web Services Practices, NWeSP 2011 | Year: 2011

This paper describes a novel approach for the network security based on the combination of biological intrusion detection and self-healing concepts. The presented approach integrates an artificial immune intrusion detection system for network security inspired by idiotypic networks. The IDS detects and analyzes the malicious activities in the network and their effects to trigger the self-healing system. It means the detection of the damage caused by malicious activities is used to start the self-healing mechanism. It is an automated system and enhances the fault repair and system recovery. © 2011 IEEE. Source


Yadav K.K.,ABV IIITM Gwalior | Tapaswi S.,ABV IIITM Gwalior
Wireless Personal Communications | Year: 2015

This paper deals with the security of wireless networks such as Google Wi-Fi. We have considered the rogue mobile access points which impersonate legitimate roadside access points to attract users to connect to them. Since these rogue access points are mobile, they are able to make connection with the users for a long time which favors them to make attack on users and steal the important information. Since the rogue access is in moving state, it will communicate to different–different access point based on received signal strength so if the user want to detect the access point, it will have very less time to detect it because after some time till it get response from the access point the vehicle will have been moved to other location and connect to another access point. We have proposed an algorithm which is based on two parameters—one is the speed of vehicle and other is received signal strength. Our algorithm state that the rate of change in the value of received signal strength will be proportional to the speed of the vehicle. This algorithm does not require any extra hardware such as the GPS system and also does not require any modification to existing network. © 2014, Springer Science+Business Media New York. Source


Dagar A.,ABV IIITM Gwalior | Trivedi A.,ABV IIITM Gwalior
Proceedings on 2012 1st International Conference on Emerging Technology Trends in Electronics, Communication and Networking, ET2ECN 2012 | Year: 2012

Multiple-input multiple-output (MIMO) in wireless systems are capable of meeting the increasing demand of higher data rates. When combined with beamforming and user scheduling, these systems provide high diversity order. In this paper, a MIMO wireless system is considered where users are served in downlink transmission by a single base station (BS) according to their pre-defined data transfer rate (DTR). Here, an approach used by BS for joint scheduling and beamforming in conjunction with superposition coding (JSB-SC) is explained. For the case, when the available DTR for a user is much higher than its demand, JSB-SC allows another user to share the same transmission link without affecting their performance and efficiently utilizes the available resource under the total power constraint. The simulation results show that JSB-SC outperforms JSB in terms of lesser power wastage and increased number of scheduled users with guaranteed DTR. © 2012 IEEE. Source


Tapaswi S.,ABV IIITM Gwalior | Gupta A.S.,ABV IIITM Gwalior
Proceedings - 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2013 | Year: 2013

With the introduction of new and new services in the market every day, the internet is growing rapidly. The network traffic generated by these network protocols and applications needs to be categorised which is an important task of network management. Among these, p2p has the largest share of the bandwidth. This great demand in the bandwidth has increased the importance of network traffic engineering. So, in order to meet the current demand and develop new architectures which help in improving the network performance, a broad understanding of the network traffic properties is required. The flow based methods classify p2p and non-p2p traffic using the characteristics of flows on the internet. In this paper, Naïve Bayes estimator is used to categorize the traffic into p2p and non-p2p. Our results show that with the right set of features and good training data, high level of accuracy is achievable with the simplest of Naïve Bayes estimator. © 2013 IEEE. Source

Discover hidden collaborations