A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Chandran, M.
- A Study on Website Quality Evaluation Based on Sitemap
Authors
1 SRMV CAS, Coimbatore, Tamilnadu, IN
Source
Software Engineering, Vol 6, No 2 (2014), Pagination: 47-50Abstract
Website quality evaluation can be made based on creating site map for the WebPages for a single website which works properly. A website is taken for the analysis where we check every link under that website are checker and split it according to status code. By analyzing every status code from all those webpage links, we are ignoring every other link except the page contains status code 200. Then we are developing the sitemap for those links which is working perfectly.
Keywords
Sitemap, Website, Search Engine Optimization, SMGA.- Random Based Unit Testing For Automated Test Report Generation
Authors
1 Department of Master of Computer Applications, SRMVCAS, Coimbatore, IN
Source
Software Engineering, Vol 5, No 9 (2013), Pagination: 332-335Abstract
Random based Testing is the practice of using randomization for some aspects of test input data selection. Random based unit testing is unit testing where there is some randomization in the selection of the target method call sequence Software testing involves running a piece of software on selected input data and checking the outputs for correctness. The optimization techniques for GA tools Using feature subset selection techniques; It is able to achieve high coverage of complex, real-world Java units, while retaining the most desirable feature of randomized testing, the ability to generate many new high-coverage test cases quickly.Keywords
Software Testing, Genetic Algorithms, Test Automation, Unit Testing.- Prediction of Web Users Browsing Behaviour Using Fast Longest Common Sub-Sequence
Authors
1 Department of Computer Application, Sri Ramakrishna Mission Vidyalaya College of Arts and Science, IN
2 Sri Ramakrishna Mission Vidyalaya College of Arts and Science, IN
Source
Data Mining and Knowledge Engineering, Vol 8, No 9 (2016), Pagination: 279-285Abstract
As the Web and its usage continues to grow, so grows the opportunity to analyze Web data and extract all manner of useful knowledge from it. The past nine years have seen the emergence of Web mining as a rapidly growing area, due to the efforts of the research community as well as various organizations that are practicing it. The various works proposed in this area with particular emphasize on web usage mining. In the present work, the application of clustering to extract user navigation behaviour pattern is probed and the methods and techniques used are explained in the Methodology. Experiments were conducted on a Pentium IV system with 512MB memory, running in Windows environment. The application was developed in MATLAB 7.3. The results of this study are divided into the following sections: Preprocessing results, Pattern Discovery and Performance Analysis.
Keywords
World Wide Web, Web Usage Mining, Clustering, Classification, Fast Longest Common Subsequence.- Outlier Detection in Secure Shell Honeypot using Particle Swarm Optimization Technique
Authors
1 Department of Computer Science, SRMV College of Arts and Science, Coimbatore-20, IN
2 Department of Computer Applications, SRMV College of Arts and Science, Coimbatore-20, IN
3 Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women University, Coimbatore-43, IN
Source
International Journal of Advanced Networking and Applications, Vol 9, No 3 (2017), Pagination: 3443-3450Abstract
With trends and technologies, developments and deployments, network communication has become vital and inevitable with human beings. On the other side, a network communication without security is powerless. There are so many technologies and developments have been ischolar_mained to provide a secure and an efficient means of communication through network. Parallel to this, network threats and attacks are also trendy and much technologized. In order to detect such a kind of threats and attacks, this research work proposes honeypot technology. Honeypot is a supplemented active defense system for network security. It traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound from the compromised system. This research work implements a kind of honeypot called Secure Shell (SSH) honeypot. SSH honeypot is a secure communication channel which allows users to remotely control computer systems. With the implementation of SSH honeypot, this research work collects the incoming and outgoing traffic data in a network. The collected traffic data can be then analyzed to detect outliers in order to find the abnormal or malicious traffic. This research work detects outliers from the collected SSH honeypot data using Particle Swarm Optimization technique which belongs to the category of cluster-based outlier detection method. With experiments and results, Particle Swarm Optimization shows best results in detecting outliers and has best cost function when compared to other cluster-based algorithms like Genetic Algorithm and Differential Evolution algorithm.Keywords
Differential Evolution, Genetic Algorithm, Honeypots, Particle Swarm Optimization, Secure Shell.References
- Feng Zhang, Shijie Zhou. Zhiguang Qin, Jinde Liu, Honeypot: A Supplemented Active Defense System for Network Security, IEEE, 2003, 231-235.
- Ioannis Koniaris, Georgios Papadimitriou, Petros Nicopolitidis, Mohammad Obaidat, Honeypots Deployment for the Analysis and Visualization of Malware Activity and Malicious Connections, IEEE, 2014, 1825-1830.
- Aaditya Jain, Dr. Bala Buksh, Advance Trends in Network Security with Honeypot and its Comparative Study with other Techniques, International Journal of Engineering Trends and Technology, 29, 2015, 304-312.
- Shaik Bhanu, Girish Khilari, Varun Kumar, Analysis of SSH attacks of Darknet using Honeypots, International Journal of Engineering Development and Research, 3, 2014, 348- 350.
- Abdallah Ghourabi, Adel Bouhoula, Data Analyzer Based on Data Mining for Honeypot Router, IEEE, 2015, 1-7.
- Ren Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi, A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection, IEEE, 2005, 1-5.
- Adam Slowik, Application of an Adaptive Differential Evolution Algorithm with Multiple Trial Vectors to Artificial Neural Network Training, IEEE, 58, 2011, 3160-3167.
- Russell C. Eberhart, Yuhui Shi, Particle Swarm Optimization: Developments, Applications and Resources, IEEE, 2001, 81-86.
- Enrique Alba and Marco Tomassini, Parallelism and Evolutionary Algorithms, IEEE, 6, 2002, 443462.
- P. Garcı´a-Teodoro, J. Dı´az-Verdejo, G. Macia´Ferna´ndez, E. Va´zquez, Anomaly-Based Network Intrusion Detection: Techniques, Systems and Challenges, Elsevier, 2009, 18-28.
- Roshan Chitrakar, Huang Chuanhe, Anomaly based Intrusion Detection using Hybrid Learning Approach of Combining k-Medoids Clustering and Naïve Bayes Classification, IEEE, 2015, 1-5.
- Robin Berthier, Michel Cukier, Profiling Attacker Behaviour Following SSH Compromises, IEEE, 2007, 1-7.
- A. M. Riad, Ibrahim Elhenawy, Ahmed Hassan and Nancy Awadallah, Visualize Network Anomaly Detection by Using K-Means Clustering Algorithm, International Journal of Computer Networks & Communications (IJCNC), 5, 2013, 195-208.
- Naila Belhadj Aissa, Mohamed Guerroumi, SemiSupervised Statistical Approach for Network Anomaly Detection, Elsevier, 2016, 1090 – 1095.
- Amandeep Singh, Navdeep Singh, Review of Implementing a Working Honeypot System, International Journal of Advanced Research in Computer Science and Software Engineering, 3(6), 2013, 1007-1011.
- Financial Performance of Gold Jewellery Merchants of Cuddalore District, Tamilnadu
Authors
1 VELS Institute of Science, Technology and Advanced Studies, Pallavaram, Chennai, IN
2 Department of Commerce, VELS Institute of Science, Technology and Advanced Studies, Pallavaram, Chennai, IN