DocumentCode :
1776466
Title :
An optimized secured service selection under mobile adhoc networks
Author :
Bibiana, A. Annie ; Shaji, R.S. ; Jayan, J.P.
Author_Institution :
Dept. of Software Eng., Noorul Islam Centre for Higher Educ., Thuckalay, India
fYear :
2014
fDate :
10-11 July 2014
Firstpage :
1048
Lastpage :
1054
Abstract :
Optimized secure service is more important in our transaction. Now a day´s many centers such as computer emergency response publishes more and more vulnerability disclosures every year. Therefore many securities are needed to protect the file from various attacks. My work is based on proposing a mobile vulnerability detection and restoration (mavdrs) based on multiple mobile agent technologies. In the networks the worm may consist of some list of vulnerable in particular targeted network. While the targeted hosts occurs it start propagates rapidly using the list. This factor may lead to the transactions terminal and it cannot guarantee for safety. Most detecting methods don´t detect the worms in effective manner. For this purpose my works implements with intrusion detection system based on multi mobile agent technologies. In this vulnerability detection and restoration system, which restoration mechanism adopts ant colony optimization can reduce the vulnerability. In this transaction takes place first, at that time if any vulnerable presents it denotes that the file presents with worms and it specifies the worm in which stage. The stages are stable, vulnerable presence, exploit and zombie. By using this we can easily identify the worms and it can be detected. Intrusion detection method performs a major task. First vulnerability scanning is an activity, second is selecting infection targets, and our system detects the vulnerable and restore the activities. By performing this action our file can be transferred in securable manner.
Keywords :
ant colony optimisation; computer network security; mobile ad hoc networks; MAVDRS; ant colony optimization; computer emergency response; intrusion detection system; mobile adhoc networks; mobile vulnerability detection and restoration; multiple mobile agent technologies; optimized secured service selection; targeted hosts; transactions terminal; Ant colony optimization; Grippers; Intrusion detection; Mobile agents; Mobile communication; Mobile computing; Computer Emergency Response; Intrusion Detection System; MAVDRS; Vulnerability detection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2014 International Conference on
Conference_Location :
Kanyakumari
Print_ISBN :
978-1-4799-4191-9
Type :
conf
DOI :
10.1109/ICCICCT.2014.6993115
Filename :
6993115
Link To Document :
بازگشت