|
|
Articles of Volume : 1 Issue : 2, May, 2021 | |
| Sensor Node Localization and Visualization in Underwater Sensor Networks | Author : Yashwanth N, Yogeshwary B H | Abstract | Full Text | Abstract :The localization of non-localized nodes is a crucial task in the underwater communication. The significance of localization is largely due to its role as a basic building block of several other capabilities, including the tagging of the monitored data, co-ordination of a group of node’s motion and the detection of the position of underwater targets. Moreover, the localization of nodes also helps to adjust the routing protocols and medium access and facilitates processes like geo-routing. On the whole, the localization of sensor nodes is an inevitable procedure to get useful location-aware data. |
| | Devops Methods for Automation of Server Management using Ansible | Author : Pranav T P, Charan S, Darshan M R, Girish L | Abstract | Full Text | Abstract :Cloud has become an advanced technology in the modern field of information technology and the need to meet the growing demand of customers. Pressure on information technology organizations is constantly increasing to apply for a client in a private cloud. This change has already occurred as a large number of customers have begun direct contact with cloud vendors through this support. In addition, DevOps teams are at a very focused level now because they are responsible for automation and universal delivery and client programming. This paper focuses on the automation of customer application from the provision of environment to the delivery of the system. |
| | Detection of Cyber Attack in Network using Machine Learning Techniques | Author : Diwakar Reddy M, Bhoomika T Sajjan, Anusha M | Abstract | Full Text | Abstract :Stood out from the past, enhancements in PC and correspondence advancements have given expansive and moved changes. The utilization of new developments give inconceivable benefits to individuals, associations, and governments, nevertheless, some against them. For example, the assurance of critical information, security of set aside data stages, availability of data, etc. Dependent upon these issues, advanced anxiety based abuse is perhaps the main issues nowadays. Computerized fear, which made a lot of issues individuals and foundations, has shown up at a level that could subvert open and country security by various social occasions, for instance, criminal affiliation, capable individuals and advanced activists. Thusly, Intrusion Detection Systems (IDS) has been made to keep an essential separation from advanced attacks. At this moment, learning the reinforce support vector machine (SVM) estimations were used to perceive port compass attempts reliant upon the new CICIDS2017 dataset with 97.80%, 69.79% accuracy rates were cultivated independently. Maybe than SVM we can present some different calculations like arbitrary woods, CNN, ANN where these calculations can obtain correctnesses like SVM – 93.29, CNN – 63.52, Random Forest – 99.93, ANN – 99.11. |
| | DDos Detection and Mitigation SDN using support vector machine | Author : Prajwal S, Siddhartha M, Charan S | Abstract | Full Text | Abstract :In recent years, the rise of software-defined
networks (SDN) have made network control more
flexible, easier to set up and manage, and have provided a
stronger ability to adapt to the changing demands of
application development and network conditions. The
the network becomes easier to maintain but also achieves
improved security as a result of SDN. The architecture of
SDN is designed for Control Plane and Forwarding
Plane separation and uses open APIs to realize
programmable control. SDN allows for the importing of
third- party applications to improve network service, or
even provide a new network service. In this paper, we
present a defense mechanism, which can find an attack
packets previously identified through the Sniffer function,
and once the abnormal flow is found, the protection
mechanism of the Firewall function will be activated. For
the capture of the packets, available libraries will be
used to determine the properties and contents of the
malicious packet, and to anticipate any possible attacks.
Through the prediction of all latent malicious behaviors,
our new defense algorithm can prevent potential losses
like system failures or crashes and reduce the risk of
being attacked |
|
|