Notice Board :

Call for Paper
Vol. 5 Issue 5

Submission Start Date:
May 01, 2018

Acceptence Notification Start:
May 10, 2018

Submission End:
May 15, 2018

Final MenuScript Due:
May 30, 2018

Publication Date:
June 04, 2018
                         Notice Board: Call for PaperVol. 5 Issue 5      Submission Start Date: May 01, 2018      Acceptence Notification Start: May 10, 2018      Submission End: May 15, 2018      Final MenuScript Due: May 30, 2018      Publication Date: June 04, 2018




Volume III Issue VI

Author Name
Omendra Singh Diwakar
Year Of Publication
2016
Volume and Issue
Volume 3 Issue 6
Abstract
Intrusion detection is one of core technologies of computer security. It is required to protect the security of computer network systems. Most of existing IDs use all features in the network packet to look for known intrusive patterns. Some of these features are irrelevant or redundant. A well-defined feature extraction algorithm makes the classification process more effective and efficient. The Feature extraction step aims at representing patterns in a feature space where the highest discrimination between legitimate and attack patterns is attained. The Classification step perform the intrusion detection task either by alerting if an observed pattern is described by an attack patterns model, usually called signature or misuse-based IDS, or by alerting if it is not described by a model of legitimate activity, usually called anomaly-based IDs.
PaperID
2016/IJTRM/6/2016/6750

Author Name
Aruna Singh, Anurag Jain, Chetan Agrawal
Year Of Publication
2016
Volume and Issue
Volume 3 Issue 6
Abstract
Routing plays an important role for the efficient network performance. Proposed methodology present a novel routing protocol for multipath energy efficient routing over wireless sensor network that encapsulate advantage of two different predefine method in order to overcome their limitation. Proposed protocol tries to provide supplement support to lower energy node at heavy traffic by higher energy node from lower traffic of network. In this work outlier detection and the Linear Regression approach has been use as a hybrid approach to find the high energy node. This approach helps to enhance the network survival. The simulation results also provide the batter results as compare to previous approach. The technique has been simulated for different number of nodes. For all the scenarios, the proposed technique demonstrates an efficient performance as compare to existing methodology.
PaperID
2016/IJTRM/6/2016/6752

Author Name
Neha Lastami, Mrs. Hansa Acharya
Year Of Publication
2016
Volume and Issue
Volume 3 Issue 6
Abstract
Mobile Ad hoc Network is self-organizing, multi hop and dynamic network because of mobile nodes. Due to frequently changing network topology, this type of network requires efficient dynamic routing protocol. In Mobile Ad hoc Network, node operates on battery power of limited capacity and very often node fails due to energy limitation. To reduce nodes failure due to limited energy it is require to establishing of efficient energy saving protocol based on AOMDV named (EES_AOMDV) which works on the checking the energy level of each node while route discovery procedure to remove the abrupt route failure and also in packet transmission time to reduce packets loss. EES_AOMDV maintains multiple routes from source to destination if one route is failed, then it uses the alternate route to transmit packet rather than establishing another path discovery procedure.
PaperID
2016/IJTRM/6/2016/6755

Author Name
Sarita, Shubha Dubey
Year Of Publication
2016
Volume and Issue
Volume 3 Issue 6
Abstract
The mobile ad-hoc network (MANET) is a new wireless technology, having features like dynamic topology and self-configuring ability of nodes. The self configuring ability of nodes in MANET made it popular among the critical situation such as military use and emergency recovery. But due to open medium and broad distribution of nodes make MANET vulnerable to different attacks. So to protect MANET from various attacks, it is important to develop an efficient and secure system for MANET. Intrusion means any set of actions that attempt to compromise the integrity, confidentiality, or availability of a resource. Intrusion Prevention is the primary defense because it is the first step to make the systems secure from attacks by using passwords, biometrics etc. Even if intrusion prevention methods are used, the system may be subjected to some vulnerability. So we need a second wall of defense known as Intrusion Detection Systems (IDSs), to detect and produce responses whenever necessary. In this
PaperID
2016/IJTRM/6/2016/6758