Papers by SARIKA CHOUDHARY
This Paper gives an introduction of Data Mining System and development of different data mining s... more This Paper gives an introduction of Data Mining System and development of different data mining systems. How many data mining tools or systems really exist? What are different platform under which these tools or systems has been designed? What are different areas for which these data mining system has been devised or developed. After doing study and research on data mining system. we have to decide which platform is best for the development of Data Mining System and to understand the importance of data mining system and platform on which it has been developed. As we know what is importance of data mining system for big and large organization, when the company is working in different parts of country and producing large amount of data then it very important to analyze that data which account for productivity and cost benefits from that data. Now it is important to understand that which part of the organization is giving benefit and where the organization is losing. So to take any dec...
Bookmarks Related papers MentionsView impact
Journal of Scientific & Industrial Research
Bookmarks Related papers MentionsView impact
The problems start during data acquisition, when the bulk data requires us to make decisions, cur... more The problems start during data acquisition, when the bulk data requires us to make decisions, currently in an ad hoc manner, about what data to keep and what to discard, and how to store what we keep reliably with the right metadata. Many data today is not natively in structured format, for e.g.: blogs and tweets are weakly structured pieces of text, while images and video are structured for storage and display, but not for semantic content and search, so transforming such content into a structured format for later study is a major test. The objective of this paper is to discuss the characteristics of big data as well as the challenges and opportunities for big data analytics-the process of extracting knowledge from sets of big data. However, it is hard, requiring us to rethink data analysis systems in fundamental ways. A major speculation in Big Data, properly directed, can result not only in major scientific advances, but also place the foundation for the next generation of advanc...
Bookmarks Related papers MentionsView impact
The study of this paper will describe the perspective view of legal issues and propose the altern... more The study of this paper will describe the perspective view of legal issues and propose the alternative approaches to protecting software. Some legal issues like copyright, patent and trademark are used for providing the security to the data and computer software. The main motive of this paper is to aware all the authors about the protection of data and their programs.
Bookmarks Related papers MentionsView impact
CAPTCHAs are short for Completely Automated Public Turing test to tell Computer and Humans Apart.... more CAPTCHAs are short for Completely Automated Public Turing test to tell Computer and Humans Apart. The purpose of a CAPTCHA is to block form submissions from spam bots - automated scripts that harvest email addresses from publicly available web forms. The term "CAPTCHA" was coined in 2000 by Luis Von Ahn, Manuel Blum, Nicholas J. Hopper (all of Carnegie Mellon University, and John Langford (then of IBM). CAPTCHAs are used because of the fact that it is difficult for the computers to extract the text from such a distorted image, whereas it is relatively easy for a human to understand the text hidden behind the distortions. Therefore, the correct response to a CAPTCHA challenge is assumed to come from a human and the user is permitted into the website. The CAPTCHA test helps identify which users are real human beings and which ones are computer programs.
Bookmarks Related papers MentionsView impact
Study of this paper will represent a perspective view on sockets which are used for communication... more Study of this paper will represent a perspective view on sockets which are used for communication purpose between two processes. In this paper we will discuss on types of sockets and their functions. Aim of brief discussion about TCP and UDP protocol sockets and functions.
Bookmarks Related papers MentionsView impact
SN Comput. Sci., 2021
Bookmarks Related papers MentionsView impact
The study of this paper will describe the perspective view of legal issues and propose the altern... more The study of this paper will describe the perspective view of legal issues and propose the alternative approaches to protecting software. Some legal issues like copyright, patent and trademark are used for providing the security to the data and computer software. The main motive of this paper is to aware all the authors about the protection of data and their programs.
Bookmarks Related papers MentionsView impact
The advancements of technology are playing a significant role in protecting the data from intrude... more The advancements of technology are playing a significant role in protecting the data from intruders. In this paper, a robust network intrusion detection system (IDS) is proposed for Internet of Things (IoT) using deep learning approaches. The type of intrusions we adopted in this work are distributed denial of service (DDoS) and replay attack. Our proposed work is divided into three sections, namely, node deployment, threat detection modelling, and prevention modelling. For detection, ensemble algorithm has been used, i.e., deep neural network (DNN) and support vector machine (SVM). SVM is used to identify the suspected route and DNN is used to identify the suspected node out of suspected routes. The chosen route ensures that it is prevented from attackers by incorporating the throughput and packet delivery ratio (PDR). The simulation results are obtained on the basis of accuracy, recall, precision, and F-measure to determine the effectiveness of the proposed approach. The precision...
Bookmarks Related papers MentionsView impact
The problems start during data acquisition, when the bulk data requires us to make decisions, cur... more The problems start during data acquisition, when the bulk data requires us to make decisions, currently in an ad hoc manner, about what data to keep and what to discard, and how to store what we keep reliably with the right metadata. Many data today is not natively in structured format, for e.g.: blogs and tweets are weakly structured pieces of text, while images and video are structured for storage and display, but not for semantic content and search, so transforming such content into a structured format for later study is a major test. The objective of this paper is to discuss the characteristics of big data as well as the challenges and opportunities for big data analytics – the process of extracting knowledge from sets of big data. However, it is hard, requiring us to rethink data analysis systems in fundamental ways. A major speculation in Big Data, properly directed, can result not only in major scientific advances, but also place the foundation for the next generation of adva...
Bookmarks Related papers MentionsView impact
Internet of Things (IoT) is an advanced network which joins intelligent devices with the internet... more Internet of Things (IoT) is an advanced network which joins intelligent devices with the internet. Most of IoT devices are having sensors, and their work is to monitor the behavior near us. As all the "things" are connected, it also increases the susceptibility of the network. Security attacks may happen at any time in the network and may adversely affect the network. One such attack that we have tried to address in this paper is intrusion detection. We proposed an intrusion detection algorithm in our paper. We worked on the detection of selective forwarding and sinkhole attack in the 6LoWPAN environment using routing protocol RPL. It consists of a hybrid intrusion detection method for detecting two routing attacks. The experimental results of our algorithm showed that it achieved a true positive rate of 96.3% and false positive rate of 6.1% when routing attacks (sinkhole and selective-forwarding) were launched simultaneously.
Bookmarks Related papers MentionsView impact
Security is the primary concern in the modern world. The main focus of this paper is the security... more Security is the primary concern in the modern world. The main focus of this paper is the security of our information and its supporting infrastructure. By keeping the computer system secure we can provide the security to the computerized information and vital to that is the operating system. In order to have a secure operating system it must be supported by the suitable computer architecture. If the technology from which the OS is built and on which it is supported is not secure then there is no confidentiality in the security of the OS and of the information it maintains for the users. This is the short overview of OS Security. In this paper we will discuss about the security policies that can be supported by the system. Keywords-OS, infrastructure, integrity, scheduling, security
Bookmarks Related papers MentionsView impact
2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
Bookmarks Related papers MentionsView impact
IOP Conference Series: Materials Science and Engineering
Bookmarks Related papers MentionsView impact
Journal of Statistics and Management Systems
Internet of Things (IoT) is a buzzword, where all digital devices are connecting with each other ... more Internet of Things (IoT) is a buzzword, where all digital devices are connecting with each other to exchange some information. These devices are encroaching on our daily life including home appliances, offices, health etc. Security is the major concern for the Internet of Things (IoT). Whenever devices are connected then authentication is required for secure communication. So, authentication forms the gateway for a secure communication system. Authentication with text passwords still widely used but have become insecure. Therefore, it is an important concern to address by using biometric authentication. This paper presents the conceptual idea of securing internet of Things network using biometric authentication with iris recognition.
Bookmarks Related papers MentionsView impact
International Journal of Information Security and Privacy
The latest buzzword in internet technology nowadays is the Internet of Things. The Internet of Th... more The latest buzzword in internet technology nowadays is the Internet of Things. The Internet of Things (IoT) is an ever-growing network which will transform real-world objects into smart or intelligent virtual objects. IoT is a heterogeneous network in which devices with different protocols can connect with each other in order to exchange information. These days, human life depends upon the smart things and their activities. Therefore, implementing protected communications in the IoT network is a challenge. Since the IoT network is secured with authentication and encryption, but not secured against cyber-attacks, an Intrusion Detection System is needed. This research article focuses on IoT introduction, architecture, technologies, attacks and IDS. The main objective of this article is to provide a general idea of the Internet of Things, various intrusion detection techniques, and security attacks associated with IoT.
Bookmarks Related papers MentionsView impact
Procedia Computer Science, Elsevier, 2020
Internet of Things (IoT) network is the latest technology which is used to connect all the object... more Internet of Things (IoT) network is the latest technology which is used to connect all the objects near us. Implementation of IoT technology is latest and growing day-by-day, it is coming with risk itself. So, it required the most efficient model to detect malicious activities as fast as possible and accurate. In our paper, we considered Deep Neural Network (DNN) for identifying the attacks in IoT. Intelligent intrusion detection system can only be built if there is availability of an effective data set. Performance of DNN to correctly identify the attack has been evaluated on the most used data sets, i.e., KDD-Cup’99, NSL-KDD, and UNSW-NB15. Our experimental results showed the accuracy rate of the proposed method using DNN. It showed that accuracy rate is above 90% with each dataset.
Bookmarks Related papers MentionsView impact
Journal of Statistics and Management Systems, 2019
Internet of Things (IoT) is a buzzword, where all digital devices are connecting with each other ... more Internet of Things (IoT) is a buzzword, where all digital devices are connecting with each other to exchange some information. These devices are encroaching on our daily life including home appliances, offices, health etc. Security is the major concern for the Internet of Things (IoT). Whenever devices are connected then authentication is required for secure communication. So, authentication forms the gateway for a secure communication system. Authentication with text passwords still widely used but have become insecure. Therefore, it is an important concern to address by using biometric authentication. This paper presents the conceptual idea of securing internet of Things network using biometric authentication with iris recognition.
Bookmarks Related papers MentionsView impact
— The study of this paper will tell you that how an anti-virus detect the viruses and disinfect t... more — The study of this paper will tell you that how an anti-virus detect the viruses and disinfect the files. The main motive of this paper is to tell how it works and secure your system from different type of malwares, viruses and worms.
Bookmarks Related papers MentionsView impact
The study of this paper will present perspective view of viruses which can harm our computer syst... more The study of this paper will present perspective view of viruses which can harm our computer system or valuable data. Main focus in this paper on various types of viruses and how they work and what type of methods they use to destroy our data. Aim is to brief discussion about type of viruses so that we can aware about viruses and can protect our system.
Bookmarks Related papers MentionsView impact
Uploads
Papers by SARIKA CHOUDHARY