Learn More
BcN(Broadband convergence Networks) is being deployed in order to support a variety of network applications such as E-Commerce, DMB(Digital Multimedia Broadcasting), Home Network, VoIP(Voice over IP), and other services. As network bandwidth is growing rapidly and services are converged, the opportunity and severity of network intrusions are growing as(More)
The brown planthopper (BPH) is a major insect pest in rice, and damages these plants by sucking phloem-sap and transmitting viral diseases. Many BPH resistance genes have been identified in indica varieties and wild rice accessions, but none has yet been cloned. In the present study we report fine mapping of the region containing the Bph1 locus, which(More)
In this paper, we propose an intrusion detection system(IDS) architecture which can detect and respond against the generation of abnormal traffic such as malicious code and Internet worms. We model the system, design and implement a simulator using OPNET Modeller, for the performance analysis on the response capacity of alert information in the proposed(More)
On behalf of all the ICACT2016 international conference committees, we would like to welcome all of you to ICACT2016. It is a great pleasure for us to host The ICACT is annual international conference in the communications field, where all experts from home and abroad come together to present their work, and share new ideas and visions for achieving the(More)
BcN(Broadband convergence Network) is being deployed in order to support a variety of network applications, with enhanced capabilities of QoS(Quality of Service) provisioning and security, and IPv6. In a high-speed network environment such as BcN, it is more likely for the network resources to be exposed to various intrusion activities. The propagation(More)
This paper titled " Proposed Intrusion Detection System " is an intrusion detection system (IDS) proposed by analyzing the principle of the intrusion detection system based on host and network. Here we are concentrating and analyzing overall performance as well as security of the proposed IDS. Moreover the proposed IDS approve the effectiveness of the(More)
Many Network Intrusion Detection System(NIDS)s have been developed to detect and respond against several kinds of intrusion activities in widespread networks. Due to the explosive growth of network bandwidth, software approach in developing a high-speed NIDS is becoming impractical due to the performance constraint. Accordingly, it seems unavoidable to(More)