Loading...
  • Home
  • Search Results
31-32 of 4327 Papers

IMPLEMENTATION OF NETWORK BASED WORM INFECTION AND DETECTION

Published In: INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, COMMUNICATION AND NETWORKS
Author(s): C.SHOBA BINDU , P.DORAVELU REDDY

Abstract: Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without any human interaction and launch the most destructive attacks against computer networks. In this paper, we have successfully detected the worm propagation characteristics of different and using permutation scanning to find the worms using branch process model to provide total number of scan that ensure the worm will eventually die out.

  • Publication Date: 03-Jun-2011
  • DOI: 10.15224/978-981-07-1847-3-1027
  • Views: 0
  • Downloads: 0

PATTERN EVALUATION OF AES USING MONTE CARLO TEST

Published In: INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, COMMUNICATION AND NETWORKS
Author(s): KARANVEER SINGH , RUPALI SYAL , SANDEEP MAHAPATRA , SURAJ KUMAR SUNAR

Abstract: Security is the important concern in the area of data communication. Through encryption security has been provided in data communication. Several encryption techniques are available for security where AES (Advance Encryption Standard) is one of the strongest symmetric cipher techniques which is not easy for any attacker to make attack on this technique.

  • Publication Date: 03-Jun-2011
  • DOI: 10.15224/978-981-07-1847-3-1027
  • Views: 0
  • Downloads: 0