Volume 5 Issue 4- April 2015
Page | Title | Full Text |
---|---|---|
66-68 | Detecting Spam Zombies Vivek Fernando, Siddharth Nayak, Suraj Naik Abstract
One of the key security threats on the Internet are compromised machines which are often used to launch various security attacks such as spamming and spreading malware, DDoS, and identity theft. Spamming provides a key economic incentive for attackers to recruit a large number of compromised machines hence we focus on the detection of the compromised machines in a network that are involved in the spamming activities. These are commonly known as spam zombies. We have developed an effective detection system named SPOT which detects spam zombties by monitoring outgoing messages of a network. SPOT is designed based on a powerful statistical tool called Sequential Probability Ratio Test, which bounds false positive and false negative error rates. |
Full Text PDF |
69-72 | A Comparative Study of Pedestrian Identification
Approaches for Traffic Light Simulation Kadamvari, Monika Mehta, Dr. Shailendra Narayan Singh Abstract
This paper presents the different approaches for the pedestrians (who cross the road), there is different type of systems developed now days for pedestrians and to control the traffic so that time consumption to reaching the destination by road become less. This type of system is very helpful for both, the one who drive on the road or who walk on the road (pedestrians). There are different approaches used for making such related systems like wise an autofocus study of traffic light and using multi-objective optimization to control the traffic lights timing. As we know that the good management of traffic lights system will ensure the good flow of vehicles and it impact on the less traffic jams and less accidents and all other aspects. This paper presents the comparative study on the field of traffic lights simulation for pedestrians in detail in this paper. To identify the pedestrian who walked over the road and accordingly traffic light system will show the light red, green and yellow. To provide overview in this field, we present this paper so that different systems that are developed till today will be reviewed for the improvement of current system.
|
Full Text PDF |
73-75 | Key Based Secured Data and Data Storage in
Cloud P.Sailaja , S.Sarath kumar ,K.Jagadeesh ,A.T.Vignesh Abstract
Cloud computing is used to store, manage, and process data using a network which is hosted rather than a local server or a personal computer.We proposed how data are stored and shared in the cloud ,we use a key aggregate cryptosystem which uses both public and private key to encrypt and decrypt the data we are uploading in the cloud. Then using cpabe algorithm the attribute policy is created so that unauthorized person cannot modify the data and share data to the others in offline.The user who is downloading the uploaded data has to send the aggregate key request to the user who has uploaded the data file,then the user has to send the aggregate key to decrypt the downloaded file,by checking the authenticated user. Key words— Data sharing, key-aggregate encryption, patient-controlled encryption , cpabe.
|
Full Text PDF |
76-80 | Detecting Human from Environment: Using AI for
embellishing preprocessing step of Human
Accedence Monika , Madhulika, Kadamvari Abstract
In order to enhance the surveillance system, detecting human and acceding their behavior is a must requirement. This research paper is presenting a methodology towards improvement of human detection approaches. Human dataset is created through 2D images by developing feature vector of humans using various image processing techniques in order to extract the human contours from the environment. As per the studies head is a most distinct part of human, head features are extracted to train the neural network and make it able to perform classification between human and a non-human entity. Keywords- human detection, feature extraction, classification.
|
Full Text PDF |
81-85 | Heuristic Approach for Cluster-Based Wireless
Sensor Network Design Reshma Jayesh Rasal, Gajanan S. Deokate Abstract
Wireless sensor networks give the alternative to assembling diverse sorts of information at continous intervals, even various times every second and over tremendous zones. WSNs grant the environmentalists and field researchers to partake in heightened, broad testing and accumulate new sorts of information with no issue. Wireless sensor networks have extending recurring pattern limits and will allow analysts to lead analyzes that are not reasonable at this point. Frequently, sensors have limited energy and are at risk to the parts in the territory. System operations, all things considered, incorporate infrequently changing decisions of system stream to enhance the system lifetime which remotely supervised for recuperating the assembled information by a customer through web. This paper considers the cluster based data gathering get-together issue related to a fused topology control and routing in WSNs. To upgrade the system lifetime by successfully using the limited energy at the sensors, this proposed framework pick a decision of hierarchical system structure with diverse sinks at which the information assembled by the sensors are collected through the ClusterHeads(CHs). Keywords - Benders decomposition (BD), network design, wireless sensor networks (WSNs), mixed-integer linear programming (MILP)model.
|
Full Text PDF |
86-89 | Traceability Mechanism for Sharing Data in Cloud Kedar Jayesh Rasal, Sandip A. Kahate Abstract
Cloud is basic place to store information and imparted to various users. In any case some framework issue or human error produces more issues about integrity of cloud data. Couple of systems has been intended to allow both data owners and public verifiers to effectively auditing cloud data integrity without getting to the whole information from the cloud server. Specifically, we consider the work of third party auditor (TPA), for the advantage of the data owner, to check the integrity of the information/data put away in the cloud. Likewise, our method has the capacity perform a several auditing task in the meantime as opposed to conforming them one by one. In our work we utilize ring signatures to gauge conformation meta-data anticipated that would review the rightness of different data, additionally the Key Distribution Center (KDC) which is a part of a cryptosystem proposed to decrease the risk intrinsic in exchanging keys. With our technique, the recognizable identification of the signer on every piece in distributed data is kept private from Third party auditors, who have the capacity to effectively check the circulated data unwavering quality without recovering the entire record. The plan supports creation, alteration, and reading data put away in the cloud, and it additionally supports traceability (tracking the fake users). Keywords- Cloud Computing, Public Auditing, Shared Data, Key Distribution Center, Traceability
|
Full Text PDF |
- Home
- Author Instruction
- Editorial Board
- Call for Paper
- Current volume
- Archives
- Indexing
- FAQ
- Publication Fees
- Contact
- Citation Index 0.47
Email: ijcsetonline@gmail.com / editor@ijcset.net