Bhushan Trivedi

  • Citations Per Year
Learn More
To detect and classify the anomaly in computer network, KDD CUP 1999 dataset is extensively used. This KDD CUP 1999 data set was generated by domain expert at MIT Lincon lab. To reduced number of features of this KDD CUP data set, various feature reduction techniques has been already used. These techniques reduce features from 41 into range of 10 to 22.(More)
The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of intrusion detection systems (IDS). Autonomous software agents, especially when equipped with mobility, promise an interesting design approach for such applications. We evaluate the implications of(More)
Information security has been one of the most important aspects in today’s technology driven world. By encrypting information we can secure information from unauthorized access, even in case where use has information he/she can not make out meaning of message unless they have a key to decrypt information. We review different techniques to exchange keys(More)
From the last decade, Mobile Agent has been extensively used to detect distributed attack in the computer networks. However, literature survey of existing mobile agent based intrusion detection systems clearly shows poor response time and large agent size as major challenges. In this paper, we discussed reasons and solutions for these challenges. We had(More)
The employee turnover ratio is comparatively very high in Information Technology industry. Because of time constraint, HR managers are not able to identify the preferences of each employee in the process of designing motivational strategies. Hence, there is need for an expert system, which can help HR managers in designing motivation strategies. We are(More)
Network as well as Host security has become an essential requirement to guard important network resources against unauthorized and unauthenticated access. The reason is that due to technology advancements, the threats and attacks are becoming all the more intelligent and insensitive to existing security measures implemented by an Network Intrusion Detection(More)