990 research outputs found
A Review-Botnet Detection and Suppression in Clouds
Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets is well-organized distributed network attacks, consist of a large number of bots that generate huge volumes of spam or launch Distributed Denial of Service (DDoS) attacks on victim hosts. Botnet attacks degrade the status of Internet security. Clouds provide botmaster with an ideal environment of rich computing resources where it can easily deploy or remove C&C server and perform attacks. It is of vital importance for cloud service providers to detect botnet, prevent attack, and trace back to the botmaster. It also becomes necessary to detect and suppress these bots to protect the clouds. This paper provides the various botnet detection techniques and the comparison of various botnet detection techniques. It also provides the botnet suppression technique in cloud. Keywords: Cloud computing, network security, botnet, botmmaster, botnet detection, botnet suppressio
Review Paper on Various Methods of Implicit Authentication
The quest (search) for a reliable and convenient security system to authenticate a computer user has existed since the inadequacy of conventional password mechanism was realized, first by the security community, and then gradually by the public. Verifying the identity of a user before granting access to objects or services is an vital step in nearly all applications or environments. Some applications (e.g. pervasive environment) may impose additional requirements for user authentication mechanism, such as to be continuous and unobtrusive. New system is hoped being transparent and with very minimum user involvement denoted as implicit authentication system. This paper tackles the issue of ambient systems adaptation to users' needs while the environment and users' preferences evolve continuously.
DOI: 10.17762/ijritcc2321-8169.150512
Analysis of Student Performance by using Data Mining Concept
Data mining methodology has a tremendous contribution for researchers to extract the hidden knowledge and information which have been inherited in the data used by researchers. Its related with developing and improving methods for discovering knowledge from data that extract from educational domain. This paper represents to categorize the students into grade order in all their education studies and it helps to improve ‘students’ academic performance. In this format of paper we used educational data mining techniques to improve ‘students’ performance, and detects the problem of low academic performance of students. For evaluation of better performance of students we use some interesting techniques like association rules, clustering, classification and outlier detection.
DOI: 10.17762/ijritcc2321-8169.15059
Review On : A Secure Encryption approach for Textual Data Transmission
Secure data transfer is the most important concern in today’s world. Data in transit is always in danger of getting compromised Communication of information over the Internet is rapidly increasing due to the availability of the Internet and increase in transmission speed. However, confidentiality, data security, reliability issues regarding to data transmission such as , data loss are becoming serious concerns. To fulfill the need of secure transmission of text data, we proposed algorithm in next paper. Secure data transfer is the most important concern in today’s world. Data in transit is always in danger of getting compromised
- …