Proposed Algorithm for Network Traffic Classification Based On DB Scan
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 2, Issue 11
Abstract
The trend of using internet is increasing rapidly. Everyone wants to share their information on the urgent basis but in the secured manner. Security issues have posed the giant problems within the organization. Many researchers have given their solution for intrusion detection system. In this they are unable to find labeled and unlabeled data. Due to this the efficiency of IDS gets decreased and it generates the wrong alarm in place. In this paper we have given an algorithm called DBSCAN that increases the efficiency of the IDS system.
LASER IGNITION SYSTEM FOR INTERNAL COMBUSTION ENGINE
Laser ignition is considered to be one of the most promising future ignition concepts for internal combustion engines. It not only combines requirement of reduction of pollutant emissions but also improves engine...
EXPERIMENTAL ANALYSIS OF TRACTOR TROLLEY CHASSIS
This paper aims to redesign a modified chassis for tractor trolley by keeping the material and dimension similar and using ‘I’ cross section area instead of ‘C’ resulted in more safer stresses than ‘C’ and the mat...
An Enhanced Paillier’s Algorithm Using Homomorphic Encryption
Homomorphic encryption is a form of encryption text and obtain an encrypted result which decrypted matches the result of operations performed on the the data is transferred to the sink we use standard encryption...
ELEARNING : TEACHING INFORMATION SYSTEM BASED ON CLOUD COMPUTING
E-Learning system, as a great product of modern information technology, is an important way to implement education modernization. Many e-Learning systems have been developed in recent years. Through the system tea...
System Security by Measuring and Analyzing Biological Data Authentication Modalities
Most biometric verification systems are done based on knowledge base and token based identification these are prone to fraud. Biometric authentication employs unique combinations of measurable physical characteris...