International Journal of Trend in Scientific Research and Development: Computer Network

IJTSRD is a leading Open Access, Peer-Reviewed International Journal which provides rapid publication of your research articles and aims to promote the theory and practice along with knowledge sharing between researchers, developers, engineers, students, and practitioners working in and around the world in many areas. For any further information, feel free to write us on editor.ijtsrd@gmail.com

Showing posts with label Computer Network. Show all posts
Showing posts with label Computer Network. Show all posts

Thursday 23 September 2021

Correlation between Terms of 5G Networks, IoT and D2D Communication

September 23, 2021 0
Correlation between Terms of 5G Networks, IoT and D2D Communication
The proliferation of heterogeneous devices connected through large scale networks is a clear sign that the vision of the Internet of Things IoT is getting closer to becoming a reality. Many researchers and experts in the field share the opinion that the next to come fifth generation 5G cellular systems will be a strong boost for the IoT deployment. Device to Device D2D appears as a key communication paradigm to support heterogeneous objects interconnection and to guarantee important benefits. Future research directions are then presented towards a fully converged 5G IoT ecosystem. In this paper, we analyze existing data about D2D communication systems and its relation of 5G IoT networks. The enhancement of such networks will bring several spheres to learn for. 
by Nozima Musaboyeva Bahtiyor Qizi "Correlation between Terms of 5G Networks, IoT and D2D Communication" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, 



Wednesday 7 July 2021

Optical Network without Fiber Optical Cable for Communication

July 07, 2021 0
Optical Network without Fiber Optical Cable for Communication

Fiber optic cable is in extensive use in present era for communication. But still there is need for up gradation of fiber optic communication network. Can we go for wireless without fiber optic cable optical network for communication by using waves length of visible spectrum or other waves 

by Darnesh "Optical Network without Fiber Optical Cable for Communication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, 

URL: https://www.ijtsrd.com/papers/ijtsrd45215.pdf 

Paper URL: https://www.ijtsrd.com/computer-science/computer-network/45215/optical-network-without-fiber-optical-cable-for-communication/darnesh


callforpaperbiologicalscience, biologicalsciencejournal

Friday 18 June 2021

Healthcare Sensors Issues, Challenges and Security Threats in Wireless Body Area Network A Comprehensive Survey

June 18, 2021 0
Healthcare Sensors Issues, Challenges and Security Threats in Wireless Body Area Network A Comprehensive Survey

In recent events of the pandemic situation there is a heavy surge in the demand for health care applications for monitoring the vitals of the patients through real time monitoring of the human body. The major concerns which we face in Wireless Body Area Network WBAN sensors are security, data privacy, data integrity, confidentiality and dependability. Moreover it has issues such as standardization, energy efficiency, and quality of service. We are more concerned about the security of the data. The main purpose of WBAN sensors is to monitor the patients continuously without any assistance. The sensors are meant to be worn by the patients and the data has to be sent to the Healthcare applications which hold the backend system through a secured network. In this paper we are discussing the various security mechanisms and routing challenges which we are facing and the attacks which could occur over the network and also the summary of certain mechanisms which are present to overcome them. We have analysed the security for the different attack scenarios. This survey is to summarize the major difficulties which we face while designing a network in WBANs which is an emerging field of science in this pandemic situation. 


by M Ragul Vignesh | S Sivakumar "Healthcare Sensors Issues, Challenges & Security Threats in Wireless Body Area Network: A Comprehensive Survey" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, 

URL: https://www.ijtsrd.compapers/ijtsrd42454.pdf 

Paper URL: https://www.ijtsrd.comcomputer-science/computer-network/42454/healthcare-sensors-issues-challenges-and-security-threats-in-wireless-body-area-network-a-comprehensive-survey/m-ragul-vignesh

callforpapermathematics, mathematicsjournal, ugcapprovedjournalsinmathemetics

Assessment of Neural Network and Goal Programming on Cross Cultural Management

June 18, 2021 0
Assessment of Neural Network and Goal Programming on Cross Cultural Management

For achieving success in a global arena cross cultural training should be provided to employees to settle down between the global business environment and culture as one of the factors contributing to economic success, revenue generation, surplus booking, goodwill enhancement, market fame and many more. More the revenue, more the profit booking leads to rise company’s goodwill and builds customers faith as well as provides employee satisfaction which motivates employees to be more productive, more efficient, more energetic, more enthusiastic, and never let employees to get stressed from their work.AI ANN and goal programming is being used a method to find something fruitful to mitigate cross cultural issues in an organization. 


by Shefali G | Dr. Rajesh Singh "Assessment of Neural Network and Goal Programming on Cross Cultural Management" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, 

URL: https://www.ijtsrd.compapers/ijtsrd41217.pdf 

Paper URL: https://www.ijtsrd.comcomputer-science/computer-network/41217/assessment-of-neural-network-and-goal-programming-on-cross-cultural-management/shefali-g

callforpaperphysics, physicsjournal

Monday 14 June 2021

Study on Secure Cryptographic Techniques in Cloud

June 14, 2021 0
Study on Secure Cryptographic Techniques in Cloud

Cloud Computing is turning into an increasing number of popular day by day. If the safety parameters are taken care properly many organizations and authorities corporations will flow into cloud technology.one usage of cloud computing is statistics storage. Cloud affords considerable capability of garage for cloud users. It is more reliable and flexible to users to shop and retrieve their facts at whenever and everywhere. It is an increasingly more growing technology. Nowadays, many organizations have started using cloud garage because of its blessings. Even though the cloud keeps to advantage reputation in usability and attraction, the problems lie in statistics protection, statistics and different information safety issues. Security and privacy of information saved inside the cloud are major setbacks inside the area of Cloud Computing. Security and privateness are the important thing problems for cloud garage.Cloud computing is primarily based on the precept of virtualization, which means that there may be a single big system and multiple clients are sharing this gadget with a view that theyve their personal dedicated resources. It basically has 3 stage of services. First, Infrastructure as a carrier IaaS , on this method the hardware resources together with difficult disk, memory, networking assets etc. are furnished on rent and are charged as in line with the usage. Second, Platform as a provider PaaS , which now not simplest presents all the facilities as in IaaS but additionally presents running machine facilities, their updates, etc. for this reason make the overall work pretty clean.Cloud storage structures have become the primary garage space for cloud customers’ facts. Despite the big blessings and versatility of the cloud garage offerings, many demanding situations are hindering the migration of customers’ records into the cloud. Among them, the records privacy wishes to be considered.Cloud computing provider is valuable in diverse phase of human activities and it has been a future information generation layout for corporations, education sectors and other industrial sectors. Cloud garage services allows clients to place away information and experience the excessive quality on call for cloud programs without the stress of regular control of their personal software, hardware and data. It moves records maintained by cloud service company on the cloud storage servers which save you an excessive amount of burden on customers which include control of the bodily fact’s ownership. Although the welfares of cloud offerings are extra, however there are new threats related to facts safety because of bodily possession of outsourced facts. Users are setting away their touchy facts and for the reason that they havent any greater control over the offerings or their stored facts, there may be need to put into effect sturdy safety techniques so one can prevent unauthorized get admission to the machine functionalities and customers statistics. To deal with data safety threats at the same time as in cloud storage, sturdy authentication scheme and information encryption scheme became introduce in this paper the usage of Advanced Encryption Standard AES set of rules for the encryption of customers’ facts contents before setting into storage and Authentication scheme for legitimate person verification and safety of unauthorized get entry to all devices of system functionalities.Data integrity in the garage model of cloud computing is a massive safety subject. This could be due to the Multiple places wherein the facts are probably dwelling. After that privateness safety and security of this spread out facts may be at any stake. The facts at such multiple locations want to be relaxed in the cloud garage. What needs to be centered here is how a more relaxed version may be furnished to the cloud structure. 


by Mariam Fatima | M Ganeshan | Saif Ulla Shariff "Study on Secure Cryptographic Techniques in Cloud" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, 

URL: https://www.ijtsrd.compapers/ijtsrd42363.pdf 

Paper URL: https://www.ijtsrd.comcomputer-science/computer-network/42363/study-on-secure-cryptographic-techniques-in-cloud/mariam-fatima

internationaljournalsofcomputerscience, callforpapercomputerscience, ugcapprovedjournalsforcomputerscience 

Friday 4 June 2021

Neural Network and Applications An Overview

June 04, 2021 0
Neural Network and Applications An Overview

Models of the brain and nervous system for Highly parallel to the Process information much more like the brain than a serial computer like Learning and simple principles with complex behaviour as well Applications are powerful problem solvers and also used in biological models. 


by Dr. Mukesh Kumar Lalji | Dr. Ashish Dongre | Rajeev Gupta | Dr. Deepak Paliwal | O. P. Shrivastava | N. K. Jain | Mukesh Katariya | Manoj Sonkusre | Gaurav Lalji | Divya Lalji | Arvind Jain | AR. Sandhya Ekbote "Neural Network & Applications- An Overview" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, 

URL: https://www.ijtsrd.compapers/ijtsrd41171.pdf 

Paper URL: https://www.ijtsrd.comcomputer-science/computer-network/41171/neural-network-and-applications-an-overview/dr-mukesh-kumar-lalji

callforpaperlifesciences, lifesciencesjournal, researchpapers

Wednesday 14 April 2021

Internet of Things IoT Anytime Anywhere Anything Connectivity

April 14, 2021 0
Internet of Things IoT Anytime Anywhere Anything Connectivity

This paper presents the key challenges in the domain of IoT. The key challenges associated with the development of IoT, industry as well as government, Industrial IoT systems, the related security and privacy challenges has been reviewed and presented. Vulnerability of Internet of Things systems have been improved with the advent of new computational systems for IoT. However, the current design of IoT does not effectively address the higher security requirements posed by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to protect this emerging system. 


by Nidhi Chadha | Ramandeep Kaur "Internet of Things (IoT): Anytime-Anywhere-Anything Connectivity" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, 

URL: https://www.ijtsrd.com/papers/ijtsrd40008.pdf 

Paper URL: https://www.ijtsrd.com/computer-science/computer-network/40008/internet-of-things-iot-anytimeanywhereanything-connectivity/nidhi-chadha

callforpaperpharmacy, pharmacyjournal, internationalpeerreviewedjournal

Sunday 21 February 2021

Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime

February 21, 2021 0
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime

This paper discusses the need for energy efficient communication in wireless sensor networks and identifies the key energy dissipation sources as well as countermeasures to ensure a long lifetime of the network. In remote and dangerous settings, wireless sensor networks can collect trustworthy and reliable information and can be used in national defence, military affairs, industrial control, traffic management, medical care, smart home, etc. The sensor whose resources are reserved is low cost and relies on the battery to supply energy, so it is necessary to use its power efficiently for routing. In this research work, first we use the greedy chain to implement the LEACH and PEGASIS Protocol and then we use the Genetic Algorithm to construct the data routing chain, which uses its parameters of crossover and mutation and finds an optimised data collection routing route. For the same number of nodes, the Genetic Algorithm increases the network lifespan. Simulations are performed and, on the basis of energy consumption and number of rounds, the effects of PEGASIS and Genetic Algorithm are compared with each other. 


by Dipak Prasad Poudel | Preeti Sondhi "Wireless Sensor Network Protocol with PEGASIS (GA) to Enhance the Network Lifetime" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-2 , February 2021, 

URL: https://www.ijtsrd.com/papers/ijtsrd38645.pdf 

Paper Url: https://www.ijtsrd.com/computer-science/computer-network/38645/wireless-sensor-network-protocol-with-pegasis-ga-to-enhance-the-network-lifetime/dipak-prasad-poudel

openaccessjournalofengineering, engineeringjournal, paperpublicationforengineering

Saturday 13 February 2021

A Review of Wireless Body Area Network

February 13, 2021 0
A Review of Wireless Body Area Network

In the age of today, technology pays attention to how it can be implemented in keeping people alive. It is clear that technology is offering the healthcare industry a much needed upgrade to mobile apps from medical translation resources that help patients lead healthier lives. One of the dizzying innovations that could change the healthcare industry is the wireless body area network WBAN .WBAN derives from the wireless sensor network WSN that deploys sensors over the human body. Wireless Body Area Network WBAN is a wireless networking system based on radio frequency RF that interconnects tiny nodes with sensor or actuator capabilities in, on, or around a human body. WBAN also links large and local area networks. As compared to WSN, WBAN has its own characteristics. 


by Preeti Sondhi | Javaid Ahmad Malik "A Review of Wireless Body Area Network" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-2 , February 2021, 

URL: https://www.ijtsrd.com/papers/ijtsrd38384.pdf 

Paper Url: https://www.ijtsrd.com/computer-science/computer-network/38384/a-review-of-wireless-body-area-network/preeti-sondhi

callforpaperpapersinjournals, specialissuepublication, multidisciplinaryjournal

Friday 5 February 2021

New Improved Simple Protocol for Wireless Body Area Network

February 05, 2021 0
New Improved Simple Protocol for Wireless Body Area Network

The creation of Wireless Body Area Networks has been enabled by recent advancements in wearable computing and wearable sensor devices WBANs . The wireless body area network consists of remotely linked miniaturised sensors mounted in, on or around the human body, providing continuous monitoring of physiological signs to support applications for medicine, lifestyle and entertainment. We propose a secure, power efficient and high throughput routing protocol for Wireless Body Area Networks in this research work. To achieve minimum energy consumption and longer network lifespan, we use multi hop topology. In order to pick the parent node or forwarder, we propose a cost function. A parent node with high residual energy and a minimum distance to sink is selected by the pro posed cost function. The residual energy parameter balances the energy consumption between sensor nodes, while the distance parameter ensures that the packet is transmitted successfully to the sink. 


by Javaid Ahmad Malik | Preeti Sondhi "New Improved Simple Protocol for Wireless Body Area Network" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-2 , February 2021, 

URL: https://www.ijtsrd.com/papers/ijtsrd38446.pdf 

Paper Url: https://www.ijtsrd.com/computer-science/computer-network/38446/new-improved-simple-protocol-for-wireless-body-area-network/javaid-ahmad-malik

ugcapprovedjournalswithlowpublicationfees

Monday 1 February 2021

Creating an Effective Network Sniffer

February 01, 2021 0
Creating an Effective Network Sniffer

The sniffer catches these bundles by setting the NIC card in the promiscuous mode and inevitably unravels them. The decoded data can be utilized in any capacity relying on the expectation of the individual concerned who translates the information for example malevolent or useful reason . Contingent upon the organization structure one can sniff all or just pieces of the traffic from a solitary machine inside the organization. Nonetheless, there are a few techniques to dodge traffic narrowing by changes to access traffic from different frameworks on the organization. This paper centers around the essentials of packet sniffer and its working, creation of packet sniffer on Linux environment and its utilization Intrusion Detection System IDS . 

BY Suyash Garg "Creating an Effective Network Sniffer" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, 

URL: https://www.ijtsrd.com/papers/ijtsrd35802.pdf

Paper URL : https://www.ijtsrd.com/computer-science/computer-network/35802/creating-an-effective-network-sniffer/suyash-garg

callforpaperinternationaljournal, ugclistofjournals, bestinternationaljournal 

Friday 25 December 2020

A New VSLMS Algorithm for Performance Analysis of Self Adaptive Equalizers

December 25, 2020 0
A New VSLMS Algorithm for Performance Analysis of Self Adaptive Equalizers

 The fundamental feature of the LMS Least Mean Squares algorithm is the step size, and it involvesa cautious adjustment. Large step size may lead to loss of stability which are required for fast adaptation. Small step size leads to low convergence which are needed for insignificant excess mean square error. Consequently, several changes of the LMS algorithm in which the step size modifications are made throughout the adaptation method which depend on certain specific features, were and are still under development. A new variable step size LMS algorithm is examined to solve the problem of LMS algorithm. The algorithm will be based on the sigmoid function which develops the non linear functional relation among error and step. The algorithm solves the problem of setting parameters in the function by introducing the error feedback strategy to adjust the parameters adaptively. Compared with other algorithms, simulation results show that the algorithm performs perfect at convergence rate and steady state error with a better applicability. 


by B. R. Kavitha | P. T. Jamuna Devi "A New VSLMS Algorithm for Performance Analysis of Self Adaptive Equalizers" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, 

URL: https://www.ijtsrd.com/papers/ijtsrd38229.pdf

Paper URL : https://www.ijtsrd.com/computer-science/computer-network/38229/a-new-vslms-algorithm-for-performance-analysis-of-self-adaptive-equalizers/b-r-kavitha

callforpaperpapersinjournals, specialissuepublication, multidisciplinaryjournal

Tuesday 15 December 2020

Comparative Study on Machine Learning Algorithms for Network Intrusion Detection System

December 15, 2020 0
Comparative Study on Machine Learning Algorithms for Network Intrusion Detection System

Network has brought convenience to the earth by permitting versatile transformation of information, however it conjointly exposes a high range of vulnerabilities. A Network Intrusion Detection System helps network directors and system to view network security violation in their organizations. Characteristic unknown and new attacks are one of the leading challenges in Intrusion Detection System researches. Deep learning that a subfield of machine learning cares with algorithms that are supported the structure and performance of brain known as artificial neural networks. The improvement in such learning algorithms would increase the probability of IDS and the detection rate of unknown attacks. Throughout, we have a tendency to suggest a deep learning approach to implement increased IDS and associate degree economical. 


by Priya N | Ishita Popli "Comparative Study on Machine Learning Algorithms for Network Intrusion Detection System" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, 

URL: https://www.ijtsrd.com/papers/ijtsrd38175.pdf

Paper URL : https://www.ijtsrd.com/computer-science/computer-network/38175/comparative-study-on-machine-learning-algorithms-for-network-intrusion-detection-system/priya-n

callforpapercommerce, ugcapprovedjournalsincommerce, commercejournal

Saturday 21 November 2020

CipherKey Algorithm

November 21, 2020 0
CipherKey Algorithm

Converting a plain text into non readable format to maintain a confidentiality and integrity of data is called Encoding. And the technique used to decode that into readable format, is called Decryption. To encrypt and decrypt, algorithms we have developed. This entire theory, The whole technology is called Cryptography. Many algorithms were developed, many are Decoded, and many of the algorithms are still running nowadays also. So, here I came up with the new algorithm, with new technique, with new idea in algorithm. 


by Sweety Gone | Kuldeep B. Vayadande "CipherKey Algorithm" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, 

URL: https://www.ijtsrd.com/papers/ijtsrd37924.pdf

Paper URL : https://www.ijtsrd.com/computer-science/computer-network/37924/cipherkey-algorithm/sweety-gone

callforpapereconomics, economicsjournal

Sunday 15 November 2020

Ecosystem of Virtualization Technologies

November 15, 2020 0
Ecosystem of Virtualization Technologies

 Virtualization technology, which forms the infrastructure of data centers and cloud technology, is constantly evolving. The process that started with machine virtualization has turned into taking applications into containers and virtualizing applications. Virtualization aims at efficient use of hardware by sharing resources. Today, hypervisor and container based virtualization approach are widely used. Powerful servers that are physically operated thanks to hypervisor platforms are operated by installing different operating systems according to the need. When virtual machines use all the resources of the operating system on which they run, the container is shared only with the kernel of the operating system on which it is located. Thus, it offers faster and more services using fewer system resources. Container technology is widely used to operate data centers with minimum energy consumption and maximum business capacity with an environmentally friendly approach that is becoming widespread today. The ecosystem of virtualization and container technologies that constitute the infrastructure of cloud computing is presented in our study. 


by Atilla Erguzen | Ahmet Ozcan | Erdal Erdal "Ecosystem of Virtualization Technologies" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, 

URL: https://www.ijtsrd.com/papers/ijtsrd38081.pdf

Paper URL : https://www.ijtsrd.com/computer-science/computer-network/38081/ecosystem-of-virtualization-technologies/atilla-erguzen

callforpaperarts, artsjournal, peerreviewedjournal 

Wednesday 11 November 2020

Survey Paper on SDN and its Security Flaws

November 11, 2020 0
Survey Paper on SDN and its Security Flaws

The Internet has prompted the production of an advanced society, where everything is associated and is open from anyplace. The conventional IP networks are brimming with intricacy and extremely difficult to oversee. It is both hard to design the organization as indicated by predefined strategies, and to reconfigure it to react to stack, blames and changes. To make things more troublesome current organizations are likewise vertically incorporated the control and information planes are packaged together. Programming characterized organizing is an arising worldview that vows to change this situation, by breaking vertical coordination, isolating the organizations control rationale from the switches a lot, advancing centralization of the organization control, and presenting programmability of the organization. The worries, presented between the meaning of organization approaches, their execution in exchanging equipment, and the sending of traffic, is vital to the adaptability by breaking the organization control issue into manageable pieces, SDN makes it simpler to make and present new deliberations in systems administration, streamlining network the board and empowering network advancement. In this paper, we present an overview on SDN and its security imperfections. 


by Nirsen Amal. A | Mr. Kuldeep Baban Vayadande "Survey Paper on SDN and its Security Flaws" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, 

URL: https://www.ijtsrd.com/papers/ijtsrd38029.pdf

Paper URL : https://www.ijtsrd.com/computer-science/computer-network/38029/survey-paper-on-sdn-and-its-security-flaws/nirsen-amal-a

callforpaperphysics, physicsjournal

Friday 30 October 2020

Review Paper on Predicting Network Attack Patterns in SDN using ML

October 30, 2020 0
Review Paper on Predicting Network Attack Patterns in SDN using ML

Software Defined Networking SDN provides several advantages like manageability, scaling, and improved performance. SDN has some security problems, especially if its controller is defense less over Distributed Denial of Service attacks. The mechanism and communication extent of the SDN controller is overloaded when DDoS attacks are performed against the SDN controller. So, as results of the useless flow built by the controller for the attack packets, the extent of the switch flow table becomes full, leading the network performance to decline to a critical threshold. The challenge lies in defining the set of rules on the SDN controller to dam malicious network connections. Historical network attack data are often wont to automatically identify and block the malicious connections. In this review paper, we are going to propose using ML algorithms, tested on collected network attack data, to get the potential malicious connections and potential attack destinations. We use four machine learning algorithms C4.5, Bayesian Network BayesNet , multidimensional language DT , and Naive Bayes to predict the host which will be attacked to support the historical data. DDoS attacks in Software Defined Network were detected by using ML based models. Some key features were obtained from SDN for the dataset in normal conditions and under DDoS attack traffic. 

by Dr. C. Umarani | Gopalshree Kushwaha "Review Paper on Predicting Network Attack Patterns in SDN using ML" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, 

URL: https://www.ijtsrd.com/papers/ijtsrd35732.pdf

Paper Url: https://www.ijtsrd.com/computer-science/computer-network/35732/review-paper-on-predicting-network-attack-patterns-in-sdn-using-ml/dr-c-umarani

callforpapercommerce, ugcapprovedjournalsincommerce, commercejournal

Thursday 29 October 2020

Cloud Control Evidence Access Authority and Secrecy with Completely Secretive Element Based Encryption

October 29, 2020 0
Cloud Control Evidence Access Authority and Secrecy with Completely Secretive Element Based Encryption

Cloud computing is a drastically new enrolling point of view, which connects with flexible, on request, and straightforwardness utilization of figuring assets, anyway the information is given to some cloud workers, and assorted security concerns reach out of it. In this paper, a semi anonymous advantage control plot AnonyControl to address the information security, and the clients confirmation in current get the chance to control organizes. AnonyControl decentralizes the central master to confine the personality root and therefore satisfies semi mystery. Moreover, it in like way totals up the report find the opportunity to control to the occasion control, which amuse of all procedure on the cloud information can be controlled in a restricted figured out way. We present the AnonyControl F, which completely forestalls the personality spillage and accomplish the full obscurity. Our security investigation shows that both AnonyControl and AnonyControl F are secure under the decisional bilinear Diffie–Hellman supposition, and our presentation assessment shows the attainability of our plans. 

by Nandini HC | Feon Jaison "Cloud Control Evidence Access Authority and Secrecy with Completely Secretive Element Based Encryption" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, 

URL: https://www.ijtsrd.com/papers/ijtsrd35715.pdf

Paper Url: https://www.ijtsrd.com/computer-science/computer-network/35715/cloud-control-evidence-access-authority-and-secrecy-with-completely-secretive-element-based-encryption/nandini-hc

callforpapermathematics, mathematicsjournal, ugcapprovedjournalsinmathemetics

Wednesday 28 October 2020

Double Server Public Key Encryption with Keyword Search for Secure Cloud Storage

October 28, 2020 0
Double Server Public Key Encryption with Keyword Search for Secure Cloud Storage

Accessible encryption Technique is expanding the enthusiasm to ensure the information protection in secure accessible distributed storage. In this task, explore the security of a notable cryptographic crude, specifically, public key encryption with watchword search PEKS which is valuable in numerous utilizations of distributed storage. Tragically, it has been demonstrated that the customary PEKS structure experiences an intrinsic frailty called inside watchword speculating assault KGA dispatched by the malignant worker. To address this security weakness, we propose another PEKS structure named double worker PEKS DS PEKS . As another fundamental commitment, characterize another variation of the smooth projective hash capacities SPHFs alluded to as straight and homomorphic SPHF LH SPHF . at that point show a conventional development of secure DS PEKS from LH SPHF. To represent the plausibility of our new system, it give an effective launch of the overall structure from a Decision Diffie–Hellman based LH SPHF and show that it can accomplish the solid protection from inside the KGA. 

by A. Brahma Reddy | K. V. Ranga Rao | V. Vinay Kumar "Double Server Public-Key Encryption with Keyword Search for Secure Cloud Storage" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, 

URL: https://www.ijtsrd.com/papers/ijtsrd35726.pdf

Paper Url: https://www.ijtsrd.com/computer-science/computer-network/35726/double-server-publickey-encryption-with-keyword-search-for-secure-cloud-storage/a-brahma-reddy

internationaljournalofmanagement, callforpapermanagement, managementjournal 

Tuesday 27 October 2020

Fraud and Malware Detection in Google Play by using Search Rank

October 27, 2020 0
Fraud and Malware Detection in Google Play by using Search Rank

Fraudulent behaviors in Google Play, the most popular Android app market, fuel search rank abuse and malware proliferation. To identify malware, previous work has focused on app executable and permission analysis. In this paper, we introduce FairPlay, a novel system that discovers and leverages traces left behind by fraudsters, to detect both malware and apps subjected to search rank fraud. . Fair Play discovers hundreds of fraudulent apps that currently evade Google Bouncer’s detection technology. 

by A. Brahma Reddy | K. V. Ranga Rao | V. Vinay Kumar "Fraud and Malware Detection in Google Play by using Search Rank" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, 

URL: https://www.ijtsrd.com/papers/ijtsrd35728.pdf

Paper Url: https://www.ijtsrd.com/computer-science/computer-network/35728/fraud-and-malware-detection-in-google-play-by-using-search-rank/a-brahma-reddy

internationaljournalofscience, openaccessjournalofscience, ugcapprovedjournalsforscience 

Ad