network security research papers 2013







Federated Network Security Administration Framework
free download

ABSTRACT In today's world, Internet is now ubiquitous. Most of Applications are based on Internet. Web and Internet technologies are becoming critical to many enterprises, and their huge potential in facilitating communication, decision making, and better business 

Wireless Sensor Network Security
free download

Wireless sensor networks consist of a large number of low-cost, lowpower, and multi- functional sensor nodes that communicate over short distances through wireless links. Such sensor networks are ideal candidates for a wide range of applications such as monitoring 

Body area network security: A fuzzy attribute-based signcryption scheme
free download

ABSTRACT Body Area Networks (BANs) are expected to play a major role in the field of patient-health monitoring in the near future. While it is vital to support secure BAN access to address the obvious safety and privacy concerns, it is equally important to maintain the 

Network Security Management
free download

ABSTRACT Systems and communications networks has grown increasingly over the years with a proportional increase in hacking software, studies and supportive forums that illegally encourage network intrusions. This paper presents the classes of intrusion, methods, tools 

International Journal of Scientific Research in Network Security and Communication
free download

ABSTRACT In wireless sensor networks the deployment of nodes is an important factor that affects all the aspects of system like coverage, connectivity, bandwidth, packet loss and lifetime of network. In this work, we propose a new clustering technique for enhanced 

Computer  Network Security Threats
free download

ABSTRACT Modern organizations depend heavily on their information systems and large investments are made on them annually. These systems are now computerized and networking has been the common trend during the last decade. The availability of 

Security Enhancing of a LAN Network Using Hardening Technique
free download

ABSTRACT Computer Networks allows access to information and services in an organized as well as controlled manner. Security is needed to make your data immune to any kind of data breach or malicious virus attacks. Hardening is to make system hard to protect from 

NETWORK SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY
free download

ABSTRACT Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. These techniques have many applications in computer science and other related fields. They are used to protect 

International Journal of Scientific Research in Network Security and Communication
free download

ABSTRACT Wireless mesh network (WMN) is a new emerging field with its potential applications in extremely unpredictable and dynamic environments. WMN has the feather of self-organization, distributed structure. WMN is going to address the internet provision to 

Design and Application of a Network Security Model
free download

ABSTRACT This paper analyzes the deficiency of P2DR security model, and proposes a kind of new active dynamic security model AD-RPPDRRM, in which risk analysis, management and recovery are imported. On the basis of this model, basic technologies used to implement 

Security Issues In Mobile Ad-hoc Network With Implication of Key Management: A Review
free download

ABSTRACT Mobile ad-hoc network is a special kind of wireless network. Security in mobile ad- hoc network is difficult to achieve because of vulnerability of wireless links. This paper will work on nodes to provide security over transmission with finding the shortest path over 

Design of the Security Component in Reconfigurable Network
free download

ABSTRACT New threats to and requirements of security come forth endlessly while the network technology progresses continually. Security equipment has little adaptive capacity in the existing rigid network. It has bad influence on network security in Mainland China. A 

ENSREdm: E-government Network Security Risk Evaluation Method Based on Danger Model
free download

ABSTRACT In this study, we propose a danger model based security risk evaluation method to ensure the security of E-government networks. With the concepts and formal definitions of antigen, antibody, danger signal and detection lymphocyte presented, the architecture is 

De-complicating Network security
free download

De-complicating Network Security Network security does not need to be complicated. The current methods that are commonly deployed on networks around the world today are a complicated mess and are generally ineffective at keeping hackers from successfully 

International Journal of Scientific Research in Network Security and Communication
free download

ABSTRACT Network Management Systems have played a great important role in information systems. There are different network management systems such as Remote monitoring, Desktop Sharing, Bandwidth management etc. This paper elaborates the above 

Optimal Grid Topology using Genetic Algorithm to Maintain Network Security
free download

The generating stations, the transmission systems and the distribution systems are the three principles which compose an electric power system. It is through the transmission system that the electric power produced by generators will be consumed by loads. In the present 

Security Overview of Wireless Sensor Network
free download

ABSTRACT There are several types of security threats that can give rise to vulnerability issues and performance degradation for the Wireless Sensor Network (WSN). The existing protocols that incorporate security features for authentication, key management, and 

A Pipelined Scalable Virus Detection Processor for Embedded Network Security
free download

ABSTRACT The goal of this work is to provide a systematic virus detection hardware solution for network security for real time systems. Virus Detection Processor is a complete network simulation from virus threats can be handled only using VLSI chip without any software 

Network Security Awareness and Tracking Method by GT
free download

ABSTRACT According to the increasing frequency of current network attack s, the existing network security situational awareness model is unable to meet the network security detection and early warning needs in confrontational environment. The research mainly in 

Network Database Security Issues and Defense
free download

ABSTRACT Database security is the mechanisms that secure the database against deliberate or accidental threats, unauthorized users, hackers and ip snoopers. In this paper we proposed two mixed techniques to secure the database ie one is authentication followed 

A New Approach to Enhance Security in MPLS Network
free download

ABSTRACT As Multiprotocol Label Switching (MPLS) is becoming a more widespread technology For providing virtual private network (VPN) services, MPLS architecture security is of increasing concern to service providers (SPs) and VPN customers. MPLS suffers from 

NETWORK AND NETWORK SECURITY
free download

The components in each layer communicate with those in the corresponding layer at the other end through a virtual linked connection, while the data actually go all the way from the upper layers to the lowest layer of one system, traveling through the physical channel, 

Network Security (CE-365)
free download

The RSA algorithm encrypts messages m n, where n= pq is the modulus used in computations, and p and q are two primes. So, messages are treated as numbers and the value of these numbers have to be less than n. When encrypting large messages, RSA is  ABSTRACT This draft discusses the security requirements and several issues which need to be considered in securing a virtualized data center network for multiple tenants. In addition, the draft also attempts to discuss how such issues could be addressed or mitigated.

A REVIEW OF RESPONSIBILITIES OF INTERNET SERVICE PROVIDERS TOWARD THEIR CUSTOMERS'NETWORK SECURITY
free download

ABSTRACT The use of the internet in the 21st century is indisputable to the people worldwide. People have become dependent on the internet's connectivity to conduct business, share information, and collaborate. Yet, some people use the internet as an 

Cloud Implications on Software Network Structure and Security Risks
free download

ABSTRACT By software vendors offering, via the cloud, software as a service (SaaS) versions of traditionally on-premises products, security risks associated with software usage become more diversified which can greatly increase the value associated with network software. In 

Project: Security issues with 802.22 Wide Regional Area Network (WRAN)
free download

ABSTRACT This research paper analyzed various security issues related to the 802.22 Wide Regional Area Network (WRAN), and discussed ways to mitigate these vulnerabilities. One example of the threats researched was a Denial of Service (DOS) attack, such as jamming 

Roll of Distributed Firewalls in Local Network for Data Security
free download

ABSTRACT Network Security is needed to prevent hacking of data and to provide authenticated data transfer. Network Security can be achieved by Firewall. Firewall is a hardware or software device designed to permit or deny network transmissions based 

International Journal of Scientific Research in Network Security and Communication
free download

ABSTRACT A mobile ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services regularly available in wide-area networks to which the hosts may normally be 

Integrating Neural Network and Colonial Competitive Algorithm: A New Approach for Predicting Bankruptcy in Tehran Security Exchange
free download

ABSTRACT Bankruptcy filings are as high today as ever, calling into question the efficacy of existing bankruptcy prediction models. This paper tries to provide an alternative for bankruptcy prediction by integrated Multi Layered Perceptron with Imperialist Competitive 

Devices of Computer Network Security and Visualization Control System: Design and Implementation
free download

ABSTRACT Depending on the applications of analysis for the control technology in the computer visualization network security protection and security procedures, from the corners of the natural/physical environment and software of the network system and environmental 

Analysis of Streaming Services and Security Issues in Peer-to-Peer Network
free download

ABSTRACT A P2P network is a special type of computer network that exhibits self-organization, symmetric communication, and distributed control. P2P streaming systems can be classified into P2P live streaming systems and P2P VoD systems. P2P live streaming systems can 

Time Division Multiplexing of Network Access by Security Groups in High Performance Computing Environments
free download

ABSTRACT It is commonly known that High Performance Computing (HPC) systems are most frequently used by multiple users for batch job, parallel computations. Less well known, however, are the numerous HPC systems servicing data so sensitive that administrators 

NEW PATTERN MATCHING ALGORITHMS FOR NETWORK SECURITY APPLICATIONS
free download

 Page 2. NEW PATTERN MATCHING ALGORITHMS FOR NETWORK SECURITY APPLICATIONS BY LIU YANG A dissertation submitted to the  Page 3.ABSTRACT OF THE DISSERTATION New Pattern Matching Algorithms for Network Security Applications by Liu Yang 

Development of a Privacy and Security Policy Framework for a Multistate Comparative Effectiveness Research Network.
free download

General governance, eg, information displays on login screen, agreements, authentication Sh if dt–Sharing of summary data–Sharing of de-identified data and limited data Sh i fid ifi dd (ii i)–Sharing of identified data (participant or patient)–Special health 

Implementing Differentiated Security Service in OSPF Network?
free download

ABSTRACT Network-based Intrusion Prevention Systems (IPS) have been widely implemented to build security infrastructures. Some works have proposed the operation of IPS running on programmable routers. Accordingly, a Traffic Engineering (TE) approach for placement 

THE REGIONAL NETWORK ON AIDS, LIVELIHOODS, AND FOOD SECURITY (RENEWAL)
free download

As the magnitude and scope of the AIDS epidemic grew during the 1990s, it transformed the international development landscape: HIV/AIDS became a global development issue with socioeconomic implications for livelihoods, rather than an isolated health issue. Sub- 

Protecting Against Distributed Denial of Service Attacks and its Classification: An Network Security Issue
free download

ABSTRACT DoS/DDoS attacks are a strong, comparatively new type of Internet attacks, they have basis some Biggest web sites on the world--owned by the mainly famous E-Commerce companies such as Yahoo, eBay, Amazon--became unreachable to customers, partners, 

Comprehensive Security System for Mobile Network Using Elliptic Curve Cryptography over GF (p)
free download

ABSTRACT Mobile devices have many differences in their capabilities, computational powers and security requirements. Mobile devices can be used as the enabling technology for accessing Internet based services, as well as for personal communication needs in 

Information Security Blueprint For Nationwide Health Information Network
free download

ABSTRACT With the increasing costs and the decreasing quality of care in the US healthcare industry, there are substantial incentives by the US government to move towards an integrated national health network. The sensitive nature of the healthcare data to be 

Ethernet-based Mass Volume Train Security Detection Network
free download

ABSTRACT As the existing train communication network transmission rate is low, large capacity status and fault diagnosis data, the event log data, passenger information which are stored in different vehicles equipments, it is difficult to realize fault diagnosis and intelligent 

Security Enhancement of AODV Protocol for Mobile Ad hoc Network
free download

ABSTRACT Here, authors presents a smart encryption algorithm integrated with existing AODV protocol that enhances the security of routing in MANET. Mobile Ad hoc Network's because of maliciousness that intentionally disrupts the network by using variety of attacks 

Randomized Replication based on Multilevel of Security for Opportunistic Network
free download

ABSTRACT Networks have become a big part of the critical infrastructure of most operations. Several research funding agencies are encouraging research on revolutionary networking architectures to succeed traditional inefficient networks. The ability to rapidly create 

Review of Security Approaches in Routing Protocol in Mobile Adhoc Network
free download

ABSTRACT In this paper the objective is to present a review of routing protocols in mobile ad hoc network (MANET) exclusively from security viewpoint. In MANET, the mobile nodes often move randomly for which reason the cumulative network experiences rapid and much 

International Journal of Scientific Research in Network Security and Communication
free download

ABSTRACT Position based routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Correctness of location messages. These routing protocols use geographical information to make forwarding decisions, resulting in a significant 

Wireless Sensor Network Monitoring Using Three Tier Security Scheme
free download

ABSTRACT Wireless sensor network (WSN) uses mobile sinks for web application which provides efficient data accumulation, localized sensor reprogramming, and for distinguishing and revoking compromised sensors. An attacker can easily obtain the key by means of 

Architecting the Network for the Cloud using Security Guidelines
free download

ABSTRACT Cloud computing offers reduced capital expenditure, operational risks, complexity and maintenance, and increased scalability while providing services at differentAbstraction levels, namely Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and 

Analysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic Information
free download

ABSTRACT In this paper, we investigate the multiple attribute decision making problems to evaluate the key technology for P2P network route security with 2-tuple linguistic information. We extended the TOPSIS model to solve the evaluation problems of key  ABSTRACT This document presents current recommended practice for managing SSH user keys for automated access. It provides guidelines for discovering, remediating, and continuously managing SSH user keys and other authentication credentials.

A Security Routing Algorithm of P2P Network Based on Multiple Encryption and Positive Detection
free download

ABSTRACT Routing plays a fundamental role in the P2P network. Most attacks are aiming at P2P routing. We proposed a novel security routing algorithm to fight against those attacks. The algorithm adopt the means of multiple encryption and positive detection and 

Design the maximization of shareholder profit model by approach of suppliers' needssecurity in Iran's banking network
free download

ABSTRACT Purpose of research is description the maximization model of shareholder profit that secure needs of suppliers in the banking system. Beneficiaries' analysis is important because it can have an effective role in strategic management process of organization. 

Enhancing Security and Response Time for Secure Search in Unstructured Peer to PeerNetwork
free download

ABSTRACT In a peer-to-peer (P2P) network, every machine plays the role of client and server at the same time. Peer to peer networks can be categorized into structured and unstructured peer to peer networks. In structured networks, the peer or system which start to search a 

Voice Security in Virtual Private Network
free download

ABSTRACT The commercial deployment of VoIP inside a vitual private network leads to the employment of security mechanisms that can assure availability, reliability, confidentiality and integrity. The Session Initiation Protocol (SIP) is considered as the dominant signaling 

A Formal Framework for Network Security Design Synthesis
free download

Today, most of the organizations are not only emphasizing the enforcement of the security requirements but also requiring satisfaction of different business constraints on usability and security deployment cost. The organizational security requirements can be indicated by 

Context-aware Alert Verification for Network Security using the Extension Method based on Basic-Elements
free download

ABSTRACT As for network security, post-IDS alert analysis has become a fashion in view of collaboration and correlation, and context-aware alert verification is one of the main solutions. In order to guarantee a unified representation of related information and 

Network Security Fundamentals
free download

Popular arguments-v output headers to console-d output packet data too-e output layer 2 header too-ld log packets to directory d-ha home network is ab tcpdump log to single file-cc config file c (nids mode)-rf read packets from file f-ii read packets from interface i 04/13 37 

A survey on soft computing techniques in network security
free download

Network servers are vulnerable to attack, and this state of affairs, shows no sign of abating. Therefore security measures to protect vulnerable software is an important part of keeping systems secure, Intrusion detection systems have the potential to improve the state of 

-SOFTWARE SALES SERVICE-https://www.engpaper.net--