Search Results

1 - 10 of 19 items :

  • "survivability" x
  • Computer Sciences x
Clear All
Rqa based approach to detect and prevent ddos attacks in voip networks

Abstract

Voice over Internet Protocol (VoIP) is a family of technologies for the transmission of voice over Internet. Voice is converted into digital signals and transmitted as data packets. The Session Initiation Protocol (SIP) is an IETF protocol for VoIP and other multimedia. SIP is an application layer protocol for creating, modifying and terminating sessions in VoIP communications. Since SIP is a more flexible and simple protocol, it is quite easy to add features to it.

Distributed Denial of Service Attack (DDoS) floods the server with numerous requests from various hosts. Hence, the legitimate clients will not be able to get their intended services. A major concern in VoIP and almost in all network domains is availability rather than data consistency. Most of the surviving techniques could prevent VoIP network only after collision. This paper proposes a Recurrence Quantification based approach to detect and prevent VoIP from a DDoS attack. This model detects the attack at an earlier stage and also helps to prevent from further attacks. In addition, this techniques enables the efficient utilization of resources. QUALNET has been used to simulate the operation of the proposed technology.

Open access
Homeostatic Agent for General Environment

Abstract

One of the essential aspect in biological agents is dynamic stability. This aspect, called homeostasis, is widely discussed in ethology, neuroscience and during the early stages of artificial intelligence. Ashby’s homeostats are general-purpose learning machines for stabilizing essential variables of the agent in the face of general environments. However, despite their generality, the original homeostats couldn’t be scaled because they searched their parameters randomly. In this paper, first we re-define the objective of homeostats as the maximization of a multi-step survival probability from the view point of sequential decision theory and probabilistic theory. Then we show that this optimization problem can be treated by using reinforcement learning algorithms with special agent architectures and theoretically-derived intrinsic reward functions. Finally we empirically demonstrate that agents with our architecture automatically learn to survive in a given environment, including environments with visual stimuli. Our survival agents can learn to eat food, avoid poison and stabilize essential variables through theoretically-derived single intrinsic reward formulations.

Open access
Escape-on-Sight: An Efficient and Scalable Mechanism for Escaping DDoS Attacks in Cloud Computing Environment

-Sale: Surviving Organized DDoS Attacks that Mimic Flash Crowds. - In: NSDI ’05: 2nd Symposium on Networked Systems Design & Implementation, 2005, 287-300. 12. Wang, K., C-Y Huang, S-J Lin, Y-D Lin. A Fuzzy Pattern-Based Filtering Algorithm for Botnet Detection, Computer Networks. - The International Journal of Computer and Telecommunications Networking, Vol. 55 , 2011, 3275-3286. 13. Tripathi, A., A. Mishra. Cloud Computing Security Considerations, IT Division. DOEACC Society, Gorakhpur Centre, Gorakhpur, India, 2010, IEEE

Open access
Mitigation of Distributed Denial of Service Attacks in the Cloud

. Berger. Botz-4-Sale: Surviving Organized DDo S Attacks that Mimic Flash Crowds. - In: Proc. of 2nd Symp. Networked Syst. Des. Implement, 2005, pp. 287-300. http://dl.acm.org/citation.cfm?id=1251224 21. Kaur, K., S. Vashisht. Data Separation Issues in Cloud Computing. - Int. J. Adv. Res. Eng. Technol., Vol. 1, 2013, No X, pp. 26-29. 22. Keromytis, A., V. Misra, D. Rubenstein. SOS: Secure Overlay Services. - In: Proc. of SIGCOMM, ACM, 2002, pp. 61-72. 23. Khan, A., N. Fisal, S. Hussai n. Man-in-the-Middle Attack and

Open access
Emphasis on Cloud Optimization and Security Gaps: A Literature Review

. Sudargho. Survivable Network Design under Optimal and Heuristic Interdiction Scenarios. – Journal of Global Optimization, Vol. 38 , June 2007, No 2, pp. 181-199. 62. Akgun, L., B. C. Tansel, R. K. Wood. The Multi-Terminal Maximum-Flow Network-Interdiction Problem. – European Journal of Operational Research, Vol. 211 , June 2011, No 2, pp. 241-251. 63. Marquez, J. E. R., C. M. Rocco, G. Levitin. Optimal Network Protection against Diverse Interdictor Strategies. – Reliability Engineering & System Safety, Vol. 96 , March 2011, No 3, pp. 374-382. 64

Open access
The Predictive Maintenance Concept in the Maintenance Department of the “Industry 4.0” Production Enterprise

Abstract

Modern technical environments require a high degree of reliability both in machinery and in equipment. Technological progress has, on the one hand, increased this efficiency but on the other hand, it has changed the way in which this equipment and these machines have traditionally been maintained. The authors have set the following assumptions. In order to survive in the market and develop, modern production enterprises realize the assumptions of Industry 4.0, wherein the optimization of maintenance processes is important because of the financial situation. This includes the profits made by the production company and differs from traditional maintenance, by shifting towards new trends such as predictive maintenance; as such, it is crucial for the development of the company. The article is devoted to the most modern predictive maintenance strategy, in the maintenance department of a manufacturing company. The publication describes the meaning of the method, its potential and the theory of action.

Open access
Acceleration of Digital Transformation as a Result of Launching Programs Financed from Public Funds: Assessment of the Implementation of the Operational Program Digital Poland

: Digital Transformation: The Only Choice for Business to Survive Smash and Conquer. Mississauga: Smashbox Consulting Inc. [21] Ministerstwo Cyfryzacji, 2016. E-administracja w oczach internautów - raport z badania 2016. (E-administration in the Eyes of Internet Users - Report From the 2016 Study). [online] Available at: <https://www.gov.pl/cyfryzacja/e-administracja-w-oczach-internautow-raport-z-badania-2016> [Accessed 20 December 2017]. [22] Ministerstwo Cyfryzacji, 2017. Lista dofinansowanych projektów. Stan na 30 września 2017. (List of

Open access
The effective management approach: integration of business, quality management and knowledge management processes

The effective management approach: integration of business, quality management and knowledge management processes

In the nowadays' dynamic environment only those organizations can survive that are able quickly react to opportunities and threats from the environment and to produce innovation ideas and turn them into products and services at a quicker pace then the competition. Therefore organizations seek different ways how to get ahead competitors. As quality management and knowledge management have proved themselves as perspective fields author of the paper proposes the integrated approach of both areas in order organizations can gain the most possible benefit from applying them. This paper shows the deeper aspects of both of these fields from the point of view of the process approach. Here is discussed the interactions of quality management, knowledge management and business processes. An elaborated organizational business and quality management process chart shows how quality management processes support the organization's management by providing information about system effectiveness, process performance, customer satisfaction and requirements. This information can be successfully used as a basis for decision-making concerning the necessary improvements and organization future goals. An integrated organizational business, quality management and knowledge management process chart demonstrates how effective management of an organization's knowledge assets can help to improve the organization's tasks in the sense of organizational performance, effectiveness and innovations. This paper is a beginning of the research toward the development of knowledge management services for quality management.

Open access
Unified Evaluation System for Audio Steganography Methods

References M. Wu, Multimedia Data Hiding. Princeton: Princeton University, Department of Electrical Engineering, 2001. B. Basile, K. Threlkeld, D. Valvano, Surviving Attacks on Information Hiding and Audio Watermarking , December 2008. [Online]. Available: http://cnx.org/content/m19003/1.1 Don H. Johnson, Signal-to-noise ratio. Scholarpedia, 2006. [Online]. Available: http://www.scholarpedia.org/article/Signal-to-noise_ratio [Accessed: Sept. 30, 2010]. http

Open access
Recognizing and Imitating Programmer Style: Adversaries in Program Authorship Attribution

): 12. [5] Caliskan-Islam, Aylin, Richard Harang, Andrew Liu, Arvind Narayanan, Clare Voss, Fabian Yamaguchi, and Rachel Greenstadt. “De-anonymizing programmers via code stylometry.” 24th USENIX Security Symposium (USENIX Security 15). 2015. [6] Caliskan-Islam, Aylin, Fabian Yamaguchi, Edwin Dauber, Richard Harang, Konrad Rieck, Rachel Greenstadt, and Arvind Narayanan. “When coding style survives compilation: De-anonymizing programmers from executable binaries.” arXiv preprint arXiv:1512.08546 (2015). [7] https

Open access