Version-1 (Sep-Oct 2018)
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In the present day situation, individuals are on a typical stage in that they should be associated with the Internet to anyplace and at whenever throught the world. This can be incredibly ascribed to advancement of Information correspondence innovations (ICT) with developing select administrations (shrewd homes, telemedicine, e-Health applications and so forth.) which are accessible for the clients through heterogeneous Internet of Things (IoT) systems, driven by machine to machine (M2M) correspondence. Disregarding the correspondence that is set up essentially by utilizing gadgets, the human clients are genuine "generators" and "customers..........
Keywords–Radio Frequency Identification (RFID), Electronic Product Code (EPC), Close Filed Communication (NFC), The Trust Communication Module (TCM), Representational State Transfer (REST)
[1]. ―The internet of things‖ [Online]. Available: http://www.iot-i.eu/iot/public/news/resources/TheThingsintheInternetofThings_SH.pdf. [Accessed: 31-Mar-2015].
[2]. Jeroen van den Hoven, ―Fact sheet- Ethics Subgroup IoT - Version 4.0.‖ [Online]. Available: http://www.ethicsinside.eu/contact. [Accessed: 31-Mar-2015].
[3]. M. V. Moreno, J. L. H. Ramos, and A. F. Skarmeta, ―User role in IoT-based systems,‖ 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 141–146.
[4]. ―Internet of People: Technology 2015-2025: IDTechEx.‖ [Online]. Available:
[5]. http://www.idtechex.com/research/reports/internet-of-people-technology-2015-2025-000388.asp. [Accessed: 31-Mar-2015]..
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Log Based Intrusion Detection System |
| Country | : | India |
| Authors | : | Umesh K. Raut |
| : | 10.9790/0661-2005011522 ![]() |
Abstract: The idea of making everything readily available and universally has led to a revolution in the field of networks. In spite of the tremendous growth of technologies in the field of networks and information, we still lack in preventing our resources from cyber-attacks. This may not concern small organizations but it is a serious issue as far as industries, companies or national securities are concerned. Since many different mechanisms were opted by organizations in the form of intrusion detection and prevention systems to protect themselves from these kinds of attacks, there are many security breaches which go undetected. A host-based intrusion detection system (HIDS) is a system that monitors a computer system on which it is installed to detect an intrusion and/or misuse, and responds by logging the activity and notifying the designated authority. In this paper, we develop a HIDS using logs generated by services running on the systems. We will discuss about the client-server architecture used in HIDS.
Keywords–Terms: IDS, HIDS, security, threat detection, log analysis
[1]. Piyush Nimbalkar, Varish Mulwad, Nikhil Puranik, Anupam Joshi and Tim Finin, "Semantic Interpretation of Structured Log Files", 2016 IEEE 17th International Conference on Information Reuse and Integration.
[2]. K. Kent and M. Souppaya, "Guide to computer security log management recommendations of the national institute of standards and technology" NIST, 2006.
[3]. A. Joshi, R. Lal, T. Finin, and A. Joshi, "Extracting cyber-security related linked data from text" in Seventh International Conference on Semantic Computing (ICSC). IEEE, 2013,pp. 252259.
[4]. C. H. do Nascimento, R. E. Assad, B. F. Loscio, and S. R. L. Meira, "Ontology: A security log analyses tool using web semantic and ontology," in 2nd OWASP Ibero-American Web Applications Security Conference, 2010, pp. 112.
[5]. Sreenivas Sremath Tirumala, Hira Sathu, Abdolhossein Sarrafzadeh, "Free and open source Intrusion Detection Systems: A study", Interna-tional Conference on Machine Learning and Cybernetics, Guangzhou, 12-15 July 2015..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The hydrocarbon fractions of the gasoline or Diesel can be detected at the in-situ with the application of the Internet of Things and can be accessed through the remote and data can be perceived through the smart phone. This will help in the finding the tailpipe exhaust, pollutants released into the air. The use of cheaper fuels in the transport field is causing more concern with respect to the health hazard. If the exhaust gas elements/composition is detected in advance, the environmental pollution can be contained to the limiting factors. This will help is limit the global warming so also the carcinogenic diseases, the health hazard in a long way. Multivariate Analysis (MVA) is one of the statistical principles of multivariate statistics, it refers to any statistical technique used to analyze data that arises from more than one variable, which involves observation and analysis of data...........
Keywords– Transport Fuels, Adulteration, Computational Techniques, Internet of Things, Multivariate Analysis, Principal component analysis, pandas, Machine learning.
[1]. Iftak Hussain, Munmun Das, Kamal Uddin Ahmad, Pabitra Nath, Water salinity detection using a smartphone (2017), Sensors and Actuators B 239 (2017) 1042-1050, Sensors and Actuators B: Chemical
[2]. Helga G. Aleme, Let¡cia M. Costa, Paulo J.S. Barbeira, (2009), Determination of ethanol and specific gravity in gasoline by distillation curves and multivariate analysis, Talanta 78 (2009) 1422-1428,
[3]. Mohammadreza Khanmohammadi, Amir Bagheri Garmarudi, Miguel de la Guardia, (2012) Characterization of petroleum-based products by infrared spectroscopy and chemometrics, Trends in Analytical Chemistry, Vol. 35, 2012.
[4]. Helga G. Aleme, Let¡cia M. Costa, Paulo J.S. Barbeira, (2008) Fuel Determination of gasoline origin by distillation curves and multivariate analysis, Fuel 87 (2008) 3664-3668.
[5]. A Little Book of Python for Multivariate Analysis by Yiannis Gatsoulis is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. little-book-of-r-for-multivariate-analysis.readthedocs.org Based on a work at A Little Book of R for Multivariate Analysis by Avril Coghlan licensed under CC-BY-3.0.
