Reduce the False Positive and False Negative from Real Trafficwith Intrusion Detection in Zigbee Wireless Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
Abstract: Denial-of-Service attack in particular is a threat to zigbee wireless networks. It is an attack in whichthe primary goal is to deny the legitimate users access to the resources. A node is prevented from receiving andsending data packets to its destinations.Typically the traffic through the network is heterogeneous and it flowsfrom multiple utilities and applications Considering todays threats in network there is yet not a single solutionto solve all the issues because the traditional methods of port-based and payload-based with machine learningalgorithm suffers from dynamic ports and encrypted application.Many internationalnetworkequipmentmanufactures like cisco, juniper also working to reduce these issues in the hardware side.Here this paperpresents a new approach considering the idea based on SOTC.This method adapts the current approaches withnew idea based on service-oriented traffic classification(SOTC) and it can be used as an efficient alternate toexisting methods to reduce the false positive and false negative traffic and to reduce computation and memoryrequirements.By evaluating the results on real traffic it confirm that this method is effective in improving theaccuracy of traffic classification considerably,and promise to suits for a large number of applications.Finally, itis also possible to adopt a service database built offline, possibly provided by a third party and modeled afterthe signature database of antivirus programs,which in term reduce the work of training procedure andoverfitting of parameters in case of parameteric classifier of supervised traffic classification.
Authors and Affiliations
Sivashanmugam . N
Classification Human Brain Images and Detection Suspicious Abnormal Area
Abstract: Magnetic Resonance Images (MRI) are widely utilized in the diagnosis of brain images. In this study we have developed a new approach for automatic classification of the normal and abnormal MRI images. Thepropos...
A Quantitative Measurement of Software Requirement Factors using Goal Question Metric (GQM) Approach
Abstract: Every application software that we propose to develop can be thought of a group or collection of related requirements specified by the user and these requirements are the foundation from which the quality...
Design Approach to Big data Systems in Developing and Maintaining the Information Security Systems
Abstract: Data is accumulating from almost all aspects of our everyday lives that it becomes huge and multistructuredand has hidden useful information. The challenges with Big Data include capture, curation, storage, sea...
Design and analysis of the redundancy allocation problem using a greedy technique
Abstract: We present a very computationally light and fast approximation algorithm and then verify it with genetic algorithm and simulated annealing. We show that our algorithm is on par with GA and SA in terms of output...
Experimental study of Web Page Ranking Algorithms
Today’s life is very much influenced by the internet. Everything can be accessed by making a search on the Internet. Web browsers and web search engines are the two major components of web searching. Web browsers are the...