23 research outputs found

    Different Techniques to Detect Botnet

    Get PDF
    Botnets are now considered as one of the most serious security threats. In contrast to previous malware, botnets have the characteristics of command and control (C&C) channel. Botnets usually use existing common protocols, eg IRC, HTTP and in protocol conforming manners, this makes the detection of botnet C&C a difficult problem. In this paper we tend to proposed 3 techniques specifically signature based detection, firewall IP blocking and anomaly based detection so as to detect bot and provide secure network services to the users

    Key Retrieval Mechanism for Data Aggregation in IPKE Managed WSN

    No full text
    Abstract -Establishment of pairwise keys in wireless sensor networks is a fundamental security service, which forms the basis of other security services such as authentication and encryption. However, due to the resource constraints on sensor nodes, establishing pairwise keys in wireless sensor networks is not a trivial task. For the existing key pre-distribution schemes, as the number of compromised nodes increasing, the fraction of affected pairwise keys will increase quickly. As a result, a small number of compromised nodes may affect a large fraction of pairwise. The main purpose of providing security for node is to send data to sink node securely. In existing scheme IPKE node to node delivery is secured but if any node is compromised then data passing through it is also visible to attacker. This problem can be solved if a tunnel is formed between source node and sink node. In this case no intermediate node can interpret data as it is encrypted with the key shared by source node and sink node

    ENHANCING PRIVACY USING COLLABORATIVE ATTRIBUTE ENCRYPTION TECHNIQUES

    No full text
    In the era where computers dominate the other facilities, it becomes even more productive once connected to the world with the help of internet. Although it possesses certain challenges to connect oneself to the world. The challenges of Authenticity, confidentiality, and anonymity and all of the notions of security with the concern aspects. Depending on the application the encryption techniques differs the most recent assortment that is the attribute based encryption, unlike traditional encryption technique this technique doesn’t reveals its identity Security tends to be the most important aspect when it comes to enter in the visual world thus the cryptographic technique is very much essential to be optimally developed so the transactions made cannot be read or changed in the network that is the data have to be securely traverse via internet, Attribute based cryptography techniques are dominating the aspects of security. The innovative use of attributes can improve the traditional techniques of data sharing which was by using trusted mediated servers. These attributes have been exploited to generate the public key and have been used as user’s access policy to restrict the user’s access. It is attribute-based, as it allows encrypting under logical combinations of attributes, that is, properties that users satisfy. It is hybrid, as it combines ciphertext policy attribute-based encryption (CP-ABE) with location-based encryption (LBE) on the level of symmetric keys. It supports encryption under expressive policies, since it can efficiently handle dynamic attributes with continuous values, such as location. Public key encryption techniques provide authenticity through digital signature and confidentiality with the help of public key encryption technique. Security also overcomes the bottleneck of centralization since there is no central authority, it works as distributed attribute based encryption where the load is well distributed among every participating node

    RNAi screens for Rho GTPase regulators of cell shape and YAP/TAZ localisation in triple negative breast cancer

    Get PDF
    In order to metastasise, triple negative breast cancer (TNBC) must make dynamic changes in cell shape. The shape of all eukaryotic cells is regulated by Rho Guanine Nucleotide Exchange Factors (RhoGEFs), which activate Rho-family GTPases in response to mechanical and informational cues. In contrast, Rho GTPase-activating proteins (RhoGAPs) inhibit Rho GTPases. However, which RhoGEFs and RhoGAPS couple TNBC cell shape to changes in their environment is very poorly understood. Moreover, whether the activity of particular RhoGEFs and RhoGAPs become dysregulated as cells evolve the ability to metastasise is not clear. Towards the ultimate goal of identifying RhoGEFs and RhoGAPs that are essential for TNBC metastasis, we performed an RNAi screen to isolate RhoGEFs and RhoGAPs that contribute to the morphogenesis of the highly metastatic TNBC cell line LM2, and its less-metastatic parental cell line MDA-MB-231. For similar to 6 million cells from each cell line, we measured 127 different features following the depletion of 142 genes. Using a linear classifier scheme we also describe the morphological heterogeneity of each gene-depleted population
    corecore