Application Layer Based Packet Analysis And Intrusion Detection
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2012, Vol 3, Issue 4
Abstract
Network forensics is basically a new approach when it comes to the network information security, because the IDS and firewall cannot always discover and stop the misuse in the whole network. This proposed work is used to capture and analyze the data exchanged among the many different IP traceback techniques like packet marking that assist a forensic investigator to recognize the promicious ip source packets. The proposed network forensics only focus on the network traffic capture,arp spoofing,mac spoofing,attack alerting and traffic replay, that often results in the performance of forensics analysis difficulties. In this particular paper, the frameworks of distributed real time network intrusion forensics system, that's deployed in local area network environment is analyzed and investigated.
Authors and Affiliations
BONTHAGORLA VENKATA KOTESWARAO#1 , SHAIK SALMA BEGUM#2
Peak Monitoring the Egotistic Nodes in MANET During Duplication Allocation
Mobile Ad Hoc Network is a collection of mobile hosts. The mobility nature of the MANET causes the mobile host to move freely in the network, due to that network disconnections occurs frequently and this causes frequent...
Feature Extraction of ECG Signal Using HHT Algorithm
This paper describe the features extraction algorithm for electrocardiogram (ECG) signal using Huang Hilbert Transform and Wavelet Transform. ECG signal for an individual human being is different due to unique heart stru...
Relevance Feedback Techniques Implemented in CBIR: Current Trends and Issues
The semantic gap problem and the performance accuracy issues in a Content Based Image Retrieval System (CBIR) can be efficiently overcome by the Relevance Feedback mechanism. Based on this feedback the CBIR system modifi...
Improved Transformerless Inverter for PV Grid Connected Power System by using ISPWM Technique
This paper presents an improved transformerless inverter with common mode leakage current elimination for a photovoltaic grid connected power system by using inverse sine carrier pulse width modulation (ISPWM). To...
Optimal Rescheduling of Generators for Congestion Management by using Godlike Algorithm
Congestion charges can be analyzed in both the cases. In a pool market mode, the sellers (competitive generators) may propose their rise and reduce bid prices in a real-time balancing market. Correspondingly, in the crat...