i-manager's Journal on Software Engineering (JSE)


Volume 7 Issue 3 January - March 2013

Article

A Study on Intrusion Detection System Techniques in CLOUD

Aramudhan M * , N. Thirmoorthi**, V. Suresh Kumar***, S.S. Mourougan****, S. JayaPrakash*****
* Associate Professor, PKIET
**_** Research Scholar, Manonmaniam Sundaranar University, Trinelveli, Tamil Nadu, India
**** Research Scholar, Periyar University, Salem, Tamil Nadu, India.
***** Research Scholar, Bharathiyar University, Coimbatore, Tamil Nadu, India.
Aramudhan, M., Thirmoorthi, N., Kumar, S. V., Mourougan, S. S., and Jayaprakash, S. (2013). A Study on Intrusion Detection System Techniques in CLOUD. i-manager’s Journal on Software Engineering, 7(3), 1-8. https://doi.org/10.26634/jse.7.3.2168

Abstract

Cloud environment requires better security due to the exponential growth of information, policies, services, resources, application and users. Flooding attacks such as SYN flood, UDP flood, HTTP flood, and FIN-WAIT have been posing a dangerous threat to Web servers, DNS servers, Mail servers, VoIP servers, etc. These flooding attacks reduce the limited capacity of the server resources and legal users could not able to access the resources of the server. Existing detection techniques used in Firewalls, IPS, IDS, etc., fail to identify the illegitimate traffic due to its self-similarity nature of legitimate traffic, suffer from low detection accuracy and high false alarms. Hence, automatic self intelligent mechanism is needed to identify these attacks that reduce the performance of the server. Intrusion Detection System (IDS) is an updatable, extensible and flexible security component that essential needs for protecting resources from illegitimate traffic and users in cloud environment. This paper deals with the existing computational techniques available with respect to IDS in cloud, their merits and demerits. The contents of this study should provide useful insights into the current IDS literature and be a good source for anyone who is interested in the application of IDSs.

Research Paper

A Comparative Study of Prediction in Seabed Mapping

Ghedhban Swadi* , Karim Al-jebory**, Dave Holifield***
*-** Department of Engineering, University of Wales Institute, Cardiff, UK.
*** Faculty of Engineering, Al Isra University, Amman, Jordan.
Swadi, G., Aljebory, K. M., and Holifield, D. (2013). A Comparative Study of Prediction in Seabed Mapping. i-manager’s Journal on Software Engineering, 7(3), 9-14. https://doi.org/10.26634/jse.7.3.2169

Abstract

In this paper, the performance of two dynamic neural network based predictors in seabed mapping is investigated. The two types of predictors are; the Focused Time- Delay Neural Network (FTDNN) based predictor and the Nonlinear Auto regressive Network with Exogenous Inputs (NARX) predictor. A testing platform has been developed that consists of seabed simulator and sonar simulator. Results show the NARX predictor outperforms the FTDNN predictor.

Research Paper

Security Enhancement of Image Hiding Technique in Mobile Application Using SMS Module

Chandrakant Badgaiyan*
Assistant Professor, Department of Mechatronics Engg., Chhattisgarh Swami Vivekanand Technical University, Chattisgarh, India
Badgaiyan, C. (2013). Security Enhancement of Image Hiding Technique in Mobile Application Using SMS Module. i-manager’s Journal on Software Engineering, 7(3), 15-20. https://doi.org/10.26634/jse.7.3.2170

Abstract

Field of data security has attracted everybody’s attention due to digitization of whole world. Now shopping on internet, sending e-mails, transfer of documents, and all other type of data like text, image, audio or video is a common habit and need of mankind. But neither the medium used for data transfer is secured nor the storage media from hackers which encouraged data hiding techniques like Encryption and Steganography.  On the other hand the world is being mobile day by day and almost all type of services is being ported on mobile phones whether it is messaging services, internet services, entertainment services, sensor based services or financial services in form of various mobile applications. Millions of These applications are downloaded on mobile phones daily from all part of world.  In this paper, we are going to accomplish covert communication of images using mobile application as cover data and in order to provide authentication check to our technique we used SMS module concept. SMS module allows only registered or authorised user to download the application and has many other advantages. This technique has overcome the problem of other Steganographic techniques like limited payload capacity with added advantage of mobility and portability as it runs on mobile phones instead of PC. Proposed technique was developed in J2ME platform and tested on Nokia C5 series phones.

Research Paper

Intrusion Detection System using Binary Classifier Algorithm

Jeya S* , T. John Jeya Singh**
* Professor & Head M.C.A. Department, Dayananda Sagar Academy of Technology and Management, Bangalore, India.
** Assistant Professor, MCA Department, Sambhram Academy of Management studies, Bangalore, India.
Jeya., and Singh, J. J. T. (2013). Intrusion Detection System using Binary Classifier Algorithm. i-manager’s Journal on Software Engineering, 7(3), 21-23. https://doi.org/10.26634/jse.7.3.2171

Abstract

An intrusion detection system (IDS) is a security layer used to detect ongoing intrusive activities in information systems. Traditionally, intrusion detection relies on extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been deployed for intrusion detection. An IDS is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current systems depends on the system operators in working out the tuning solution and in integrating it into the detection model. In this paper, an automatically tuning IDS (ATIDS) is presented. The proposed system will automatically tune the detection model on-the-fly according to the feedback provided by the system operator when false predictions are encountered. The system is evaluated using the KDDCup’99 intrusion detection dataset.

Research Paper

Intrusion Detection System in Network Using Particle Swarm Optimization (PSO)

B. Mahalakshmi* , S. Anandamurugan**
*-** PG Scholar, Assistant Professor (SLG), Kongu Engineering College.
Mahalakshmi, B., and Murugan, A. S. (2013). Intrusion Detection System in Network Using Particle Swarm Optimization (PSO). i-manager’s Journal on Software Engineering, 7(3), 24-31. https://doi.org/10.26634/jse.7.3.2172

Abstract

The network intrusion detection techniques are important to prevent our systems and networks from malicious behaviors. However, traditional network intrusion prevention such as firewalls, user authentication and data encryption have failed to completely protect networks and systems from the increasing the attacks and malwares. Existing system has proposed a new hybrid intrusion detection system by using intelligent dynamic swarm based rough set (IDS-RS) for feature selection and simplified swarm optimization for intrusion data classification. The purpose of this new local search strategy is to get the better solution from the neighborhood of the current solution produced by Simplified Swarm Optimization SSO. Inorder to improve the performance of SSO and Rough Set Theory, Particle Swarm Optimization (PSO) and Enhanced Adaboost is used. It is also used to improve the detection rate and to reduce the false alarm rate.

Review Paper

Mobile Robot Path Planning: A review

Mohan Awasthy* , M. Kowar**
* Reader, Department of Electronics & Telecommunication ShriShankarcharya College of Engg.& Tech. Bhilai (C.G.)
** Professor, Department of Electronics Engg, Bhilai Institute of Technology.
Awasthy, M., and Kowar, M. K. (2013). Mobile Robot Path Planning: A Review. i-manager’s Journal on Software Engineering, 7(3), 32-35. https://doi.org/10.26634/jse.7.3.2173

Abstract

This paper reviews the development in the area of vision for path planning of mobile robot. The paper deals with the two major components namely indoor navigation and outdoor navigation Each component has further been subdivided on the basis of structured and unstructured environment. The cases of geometrical and topological models have been dealt separately.