A denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. The Internet is vulnerable to bandwidth distributed denial-of-service (BW-DDoS) attacks, wherein many hosts send a huge number of packets to cause congestion and disrupt legitimate traffic. Bandwidth DDoS (BW DDoS) attacks disrupt […]
Detection of Bandwidth Distributed Denial of Service Attacks
BW-DDoS attacks are usually generated from a large number of compromised computers (zombies or pup-pets). BW-DDoS attackers use different techniques and different types of attacking agents. The Internet is vulnerable to bandwidth distributed denial-of-service (BW-DDoS) attacks, wherein many hosts send a huge number of packets to cause congestion and disrupt legitimate traffic. So far, BW-DDoS […]
RUNTIME PERFORMANCE EVALUATION OF RELATIONAL KEYWORD SEARCH TECHNIQUE
Keyword search on semi structured data (e.g., XML) and relational data differs considerably from traditional IR. A discrepancy exists between the data’s physical storage and a logical view of the information. Relational databases are normalized to eliminate redundancy, and foreign keys identify related information. Extending the keyword search paradigm to relational data has been an […]
BEHAVIORAL MALWARE DETECTION SCHEME TOWARDS GENERAL BEHAVIORAL CHARACTERIZATION IN DELAY TOLERANT NETWORK
Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of executable code, scripts, active content, and other software. ‘Malware’ is a general term used to refer to a variety of forms of hostile or intrusive […]
BALANCING PERFORMANCE, ACCURACY AND PRECISION BASED ON TWO PHASE VALIDATION COMMIT PROTOCOL FOR SECURE CLOUD TRANSACTIONS
Recently the cloud computing paradigm has been receiving significant excitement and attention in the media and blogosphere. To some, cloud computing seems to be little more than a marketing umbrella, encompassing topics such as distributed computing, grid computing, utility computing, and software-as-a-service, that have already received significant research focus and commercial implementation. In this paper, […]
RUNTIME PERFORMANCE EVALUATION OF RELATIONAL KEYWORD SEARCH TECHNIQUE
Keyword search on semi structured data (e.g., XML) and relational data differs considerably from traditional IR. A discrepancy exists between the data’s physical storage and a logical view of the information. Relational databases are normalized to eliminate redundancy, and foreign keys identify related information. Extending the keyword search paradigm to relational data has been an […]
RELATIONAL KEYWORD SEARCH TECHNIQUES BASED ON AN EMPIRICAL PERFORMANCE EVALUATION
Keyword search (KWS) over relational databases has recently received significant attention. Many solutions and many prototypes have been developed. This task requires addressing many issues, including robustness, accuracy, reliability, and privacy. An emerging issue, however, appears to be performance related: current KWS systems have unpredictable running times. In this paper, we present the most extensive […]
TAG POLLUTION ATTACK DETECTION USING TAG ENCODING SCHEME TO LINEAR NETWORK CODING
Linear network coding is a technique which can be used to improve a network’s throughput, efficiency and scalability, as well as resilience to attacks and eavesdropping. Linear network coding is a technique which can be used to improve a network’s throughput, efficiency and scalability, as well as resilience to attacks and eavesdropping. Network coding allows […]
ANONYMIZE LARGE SCALE DATASETS USING MAPREDUCE ON CLOUD BASED ON TWO-PHASE TOP-DOWN SPECIALIZATION APPROACH
Data anonymization has been extensively studied and widely adopted for data privacy preservation in non inter active data publishing and sharing scenarios. Data anonymization refers to hiding identity and/or sensitive data for owners of data records. Then, the privacy of an individual can be effectively preserved while certain aggregate information is exposed to data users […]
ITRUST: AN EFFICIENT TRUST ESTABLISHMENT FOR PROBABILISTIC MISBEHAVIOR DETECTION IN DELAY TOLERANT NETWORK
In DTNs, a node could misbehave by dropping packets intentionally even when it has the capability to forward the data (e.g., sufficient buffers and meeting opportunities). Routing misbehavior can be caused by selfish (or rational) nodes that try to maximize their own benefits by enjoying the services provided by DTN while refusing to forward the […]
- « Previous Page
- 1
- …
- 7
- 8
- 9
- 10
- 11
- …
- 15
- Next Page »