Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/15040
Title: Investigations on computational intelligence based techniques for efficient security threat controls
Researcher: Sreelaja N K
Guide(s): Vijayalakshmi Pai G A
Keywords: Computational intelligene, security treat controls, genetic algorithms, ant coony optimization, particle swam optimization, Boolean function minization technique
Upload Date: 15-Jan-2014
University: Anna University
Completed Date: 
Abstract: Computer security is defined as the protection of computing systems against threats to confidentiality, integrity and availability. The threats to security in computing are interception, interruption, modification and fabrication. The work in the thesis centers around investigating computational intelligence based approaches such as Genetic Algorithms (GA) and the two paradigms of swarm intelligence viz Ant Colony Optimization (ACO) and Particle Swarm Optimization (PSO) to overcome the drawbacks existing in the traditional methods of controls available to combat threats in security in computing. Group rekeying for secure multicast is achieved using an ACO/GA based Boolean Function Minimization Technique (BFMT) when the users join in or leave a group. Ant Colony Optimization (ACO) based approach termed Ant Colony Optimization Boolean Expression Evolver (ABXE) is proposed to obtain a minimized boolean expression. A stream cipher method using swarm intelligence approach (ACO/PSO) of keystream generation is proposed. A firewall is a security guard placed at the point of entry between a private network and the outside network. An Ant Colony Optimization (ACO) based approach is proposed for packet filtering in the firewall rule set. Termed Ant Colony Optimization Packet Filtering (ACO-PF) algorithm, the scheme unlike its predecessors, considers all multiple occurrences of the same IP address or ports in the firewall rule set during its search process. The other parameters of the rule matching with the compared IP address or ports in the firewall ruleset are retrieved and the firewall decides whether the packet has to be accepted or rejected. The novelty is this scheme has a search space lesser than that of sequential search and binary search. It also strictly filters the packets according to the filter rules in the firewall rule set. It is shown that ACO-PF performs well when compared to other existing packet filtering methods. newline
Pagination: xxvii, 244
URI: http://hdl.handle.net/10603/15040
Appears in Departments:Faculty of Science and Humanities

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File49.69 kBAdobe PDFView/Open
02_certificates.pdf1.03 MBAdobe PDFView/Open
03_abstract.pdf18.79 kBAdobe PDFView/Open
04_acknowledgement.pdf395.87 kBAdobe PDFView/Open
05_contents.pdf60.42 kBAdobe PDFView/Open
06_chapter 1.pdf46.68 kBAdobe PDFView/Open
07_chapter 2.pdf68.33 kBAdobe PDFView/Open
08_chapter 3.pdf249.71 kBAdobe PDFView/Open
09_chapter 4.pdf101.79 kBAdobe PDFView/Open
10_chapter 5.pdf335.22 kBAdobe PDFView/Open
11_chapter 6.pdf233.58 kBAdobe PDFView/Open
12_chapter 7.pdf101.71 kBAdobe PDFView/Open
13_chapter 8.pdf247.8 kBAdobe PDFView/Open
14_chapter 9.pdf23.2 kBAdobe PDFView/Open
15_references.pdf36.57 kBAdobe PDFView/Open
16_publications.pdf17.21 kBAdobe PDFView/Open
17_vitae.pdf12.99 kBAdobe PDFView/Open


Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.