Learn More
An ad-hoc network is a multi-hop wireless network where all nodes cooperatively maintain network connectivity without a centralized infrastructure. If these nodes change their positions dynamically, it is called a mobile ad-hoc network (MANET). Since the network topology changes frequently, efficient adaptive routing protocols such as AODV, DSR are used. As(More)
With the enormous growth of computer networks and the huge increase in the number of applications that rely on it, network security is gaining increasing importance. Moreover, almost all computer systems suffer from security vulnerabilities which are both technically difficult and economically costly to be solved by the manufacturers. Therefore, the role of(More)
This paper is deliberated to provide a model for Host-based Intrusion Detection and Prevention (HIDPS). HIDPS is increasingly becoming important to protect the host computer systems and its own network activities. HIDPS with intelligence is integrated into the computer systems to detect the intruder attacks activities, malicious Behaviour, application(More)
In this paper, Intrusion detection is to detect attacks(Intrusions) against a computer system. In the highly networked modern world, conventional techniques of network security such as cryptography, user authentication and intrusion prevention techniques like firewalls are not sufficient to detect new attacks. In this paper, we perform experiments on the(More)
— When a hacker changes the page of a website to something other than what was originally there, then it is called a web defacement. Website defacement is an attack on a website that changes the visual appearance of the site or a webpage [1]. These are typically the work of system crackers, who break into a web server and replace the hosted website with one(More)
Intrusion Detection Systems (IDS) are now becoming one of burning issue for any organization's network. Intruders always search for vulnerabilities or flaws in target system and attack using different techniques. An intrusion detection system (IDS) is needed to detect and respond effectively whenever the confidentiality, integrity, and availability of(More)
—Phishing is the combination of social engineering and technical exploits designed to convince a victim to provide personal information, usually for the monetary gain of the attacker. Phishing has become the most popular practice among the criminals of the Web. Phishing attacks are becoming more frequent and sophisticated. The impact of phishing is drastic(More)
To ride the tide of change which is inevitable, innovations are necessary. By using the concept of virtualization most of enterprises are trying to reduce their computing cost. This demand of reducing the computing cost has led to the innovation of Cloud Computing. Nowadays organizations recognized cloud for it different attractive property such as(More)