Security Suite for IT and Telecom Industries
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4
Abstract
Abstract: Security is the biggest concern nowadays faced by various companies as security threats are more prevalent. This „openness‟ is the reason because of which protecting networks and business data is even more difficult. The solution in response to this threat is to provide a single aggregated view of all the threats observedin the network, to prioritize them so the worst are dealt first. It can happen only through “Security Suite”. It offers insight of Front-end-Perimeter protection (FEP), Advanced Breach Detection (ABD), Distributed Denialof –Service(DDOS) protection. But, what when they are not accessed from the same simulator. This paper refersto the working of Security Suite in real time, to provide a more user friendly working and reduce the tedious task of switching between simulators. It states how the products of the organization and the Security Suite can go hand in hand.
Authors and Affiliations
Ruda Khare , Prof. Nandana Prabhu
Name Entity Detection and Relation Extraction from Unstructured Data by N-gram Features on Hidden Markov Model and Kernel Approach
Abstract: In recent years Name entity extraction and linking have received much attention. However, correct classification of entities and proper linking among these entities is a major challenge for researcher. We propo...
Displaying All Bangla Compound Letters & Alphabets By 32-Segment
Abstract: Different approaches have been proposed for representing Bangla and English alphabets and numerals by segment display. But there is no complete and accurate scheme has been done yet for Bangla compound...
Twitter Sentiment Classification on Sanders Data using HybridApproach
Abstract : Sentiment analysis is very perplexing and massive issue in the field of social data mining. Twitter isone of the mostly used social media where people discuss on various issues in a dense way. The tweets about...
An Efficient implementation of PKI architecture based Digital Signature using RSA and various hash functions (MD5 and SHA variants
Digital Signature technique is widely being used to detect unauthorized modification to data and to authenticate the identity of the signatory. It is essential for secure transaction over unsecure/ open networks....
Artificial Neural Network To Detect Know And Unknown DDOS Attack
The key objective of Disturbed Denial of Service (DdoS) attack is to compile multiple systems across the internet with the infected zombies/agents and form the botnets of network. The infected systems are remotely contro...