Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
SHAIK AKBAR

    SHAIK AKBAR

    Objective: Network security plays a key role for many organizations. Host based and network based Intrusion Detection Systems are available in the market depending upon the detection technology used by them. The objective of this research... more
    Objective: Network security plays a key role for many organizations. Host based and network based Intrusion Detection Systems are available in the market depending upon the detection technology used by them. The objective of this research paper is maintaining security across the heterogeneous data from homogeneous sources and co-relating the heterogeneous data from different sources using hybrid strategy. Methods/Statistical Analysis: A real time detection Intrusion Prevention Systems (IPS), prevents security intrusions by gathering and composing with technologies. Findings: Heterogeneous data from different sources has been collected from KDD Cup Dataset and segregated into learning phase and detection phase. In the learning phase, known attacks will be identified. Similarly detection phase also will consider the same. Applications/Improvements: The proposed system specifies a set of rules and high DoS, R2L, U2R, Probe. One may attempt to get good results by improving the efficiency and reducing the complexity present in the model. In future several reduction techniques may be studied to get more features.
    Objective: Network security plays a key role for many organizations. Host based and network based Intrusion Detection Systems are available in the market depending upon the detection technology used by them. The objective of this research... more
    Objective: Network security plays a key role for many organizations. Host based and network based Intrusion Detection Systems are available in the market depending upon the detection technology used by them. The objective of this research paper is maintaining security across the heterogeneous data from homogeneous sources and co-relating the heterogeneous data from different sources using hybrid strategy. Methods/Statistical Analysis: A real time detection Intrusion Prevention Systems (IPS), prevents security intrusions by gathering and composing with technologies. Findings: Heterogeneous data from different sources has been collected from KDD Cup Dataset and segregated into learning phase and detection phase. In the learning phase, known attacks will be identified. Similarly detection phase also will consider the same. Applications/Improvements: The proposed system specifies a set of rules and high DoS, R2L, U2R, Probe. One may attempt to get good results by improving the efficiency and reducing the complexity present in the model. In future several reduction techniques may be studied to get more features.
    495 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Retrieval Number: ES2146017519/19©BEIESP Abstract: Security in today’s world has become a critical issue. Information should be made very secure providing access... more
    495 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Retrieval Number: ES2146017519/19©BEIESP Abstract: Security in today’s world has become a critical issue. Information should be made very secure providing access only to authorized persons. Unaccredited persons should not be given access to the data. Cyber Department is the one which in search of the innovative ideas in order to secure this crime data. Forensic Science that is an application of science plays a vital role in undertaking the investigation of crimes and criminal justice using some scientific methodologies. Also, Steganography is the skill with which the data can be hidden or protected within another data (i.e data inside data with security). This paper brings out the integration of both Forensic Science and Steganography that gives rise to a hybrid technology for securing the crime data. The concept of Data embedding strengthens the Steganography method. The most appropriate method adapted in t...
    the certificates mostly required by a person after completing the Technical Education are Migration Certificate and Genuineness Certificate. Interim Certificate and Duplicate Marks Memo are used in the cases of Original marks memo still... more
    the certificates mostly required by a person after completing the Technical Education are Migration Certificate and Genuineness Certificate. Interim Certificate and Duplicate Marks Memo are used in the cases of Original marks memo still not issued and Marks memo loss respectively. The current process of applying for Migration Certificate, Interim Certificate, Genuineness Certificate and Duplicate marks memo is offline i.e., either the student has to apply by post or by consulting the concerned department directly. Our Project involves making the complete application process online so that the student and the verifying officer can do their job easily. The Student needs to fill the application and upload the scanned documents as proofs, required by the particular application. The concerned officer verifies the documents and details filled in the application and issue the certificate or reject the application. The platform we are going to develop will help the student and the concerned...
    In the time of big data, it is a difficulty to be solved for encouraging the strong growth of the Internet and the Internet+, caring the information protection of individuals, institutions and countries. Therefore, this manuscript creates... more
    In the time of big data, it is a difficulty to be solved for encouraging the strong growth of the Internet and the Internet+, caring the information protection of individuals, institutions and countries. Therefore, this manuscript creates a mutual finding system of cyber security threats in big data. Initially, it explains the record group model of Flume, the data store of Kafka, and the data procedure of Esper; then it plans one-to-many record compilation, reliable data store, CEP data procedure using incident query and event model corresponding. Future implementation of this structure results good consistency and high competence. Furthermore, this system implementation also results recompense of low cost and bendy operation.