MINING E-MAIL CONTENT FOR CYBER FORENSIC INVESTIGATION
Published In: 1ST INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER, ELECTRONICS AND ELECTRICAL ENGINEERING
Author(s): R. V. DHARASKAR , SMITA M. NIRKHI , SOBIYA R. KHAN
Abstract: E-mail is a widely used mechanism for communication, due to its cost and expediency. However, the concern lies when along with its legitimate usage; it is being abused for committing various cyber crimes. E-mail system security lacks adequate proactive mechanism, to defend against such vulnerabilities and misuses. A cyber forensic investigation is employed for gathering significant evidences against adversaries by examining suspected e-mail accounts, in order to prosecute criminals in court of law. In this context, data mining techniques and tools based on them have been used extensively for extracting evidences from huge e-mail ensembles. This can provide assistance to the forensic investigator, to perform a multi-staged analysis of e-mail ensembles. In this paper, we briefly discuss various applications of data mining techniques with respect to cyber forensic investigation. Specifically, we describe our proposed framework and give implementation of first module,e-mail statistical ana
- Publication Date: 12-Mar-2012
- DOI: 10.15224/978-981-07-1847-3-930
- Views: 0
- Downloads: 0
TOKEN BASED LOAD BALANCING STRATEGY IN DISTRIBUTED SYSTEMS
Published In: 1ST INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER, ELECTRONICS AND ELECTRICAL ENGINEERING
Author(s): ANKITA SINGHAL , ANUJ TIWARI , ARCHANA NIGAM
Abstract: Load balancing in a distributed system is the process of redistributing the workload among various nodes so as to improve resource utilization and the mean response time and also to balance the workload among the nodes of the system to avoid the situation in which one node is overloaded while other is sitting idle. A dynamic load balancing approach needs no prior knowledge about the global status of the distributed system and does balancing based on the current status of the system. Most of the techniques involve communication between the nodes to exchange their load information to make load balancing decisions i.e. where the arrived task can be best executed from. But this considerably increases mean response time. This paper presents a token based technique for load balancing in which there is no communication among the nodes and so no exchange of load information messages. Each individual node is configured to make its own decision whether to accept the arriving request or not and
- Publication Date: 12-Mar-2012
- DOI: 10.15224/978-981-07-1847-3-939
- Views: 0
- Downloads: 0