Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/15040
Title: | Investigations on computational intelligence based techniques for efficient security threat controls |
Researcher: | Sreelaja N K |
Guide(s): | Vijayalakshmi Pai G A |
Keywords: | Computational intelligene, security treat controls, genetic algorithms, ant coony optimization, particle swam optimization, Boolean function minization technique |
Upload Date: | 15-Jan-2014 |
University: | Anna University |
Completed Date: | 2011 |
Abstract: | Computer security is defined as the protection of computing systems against threats to confidentiality, integrity and availability. The threats to security in computing are interception, interruption, modification and fabrication. The work in the thesis centers around investigating computational intelligence based approaches such as Genetic Algorithms (GA) and the two paradigms of swarm intelligence viz Ant Colony Optimization (ACO) and Particle Swarm Optimization (PSO) to overcome the drawbacks existing in the traditional methods of controls available to combat threats in security in computing. Group rekeying for secure multicast is achieved using an ACO/GA based Boolean Function Minimization Technique (BFMT) when the users join in or leave a group. Ant Colony Optimization (ACO) based approach termed Ant Colony Optimization Boolean Expression Evolver (ABXE) is proposed to obtain a minimized boolean expression. A stream cipher method using swarm intelligence approach (ACO/PSO) of keystream generation is proposed. A firewall is a security guard placed at the point of entry between a private network and the outside network. An Ant Colony Optimization (ACO) based approach is proposed for packet filtering in the firewall rule set. Termed Ant Colony Optimization Packet Filtering (ACO-PF) algorithm, the scheme unlike its predecessors, considers all multiple occurrences of the same IP address or ports in the firewall rule set during its search process. The other parameters of the rule matching with the compared IP address or ports in the firewall ruleset are retrieved and the firewall decides whether the packet has to be accepted or rejected. The novelty is this scheme has a search space lesser than that of sequential search and binary search. It also strictly filters the packets according to the filter rules in the firewall rule set. It is shown that ACO-PF performs well when compared to other existing packet filtering methods. newline |
Pagination: | xxvii, 244 |
URI: | http://hdl.handle.net/10603/15040 |
Appears in Departments: | Faculty of Science and Humanities |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 49.69 kB | Adobe PDF | View/Open |
02_certificates.pdf | 1.03 MB | Adobe PDF | View/Open | |
03_abstract.pdf | 18.79 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 395.87 kB | Adobe PDF | View/Open | |
05_contents.pdf | 60.42 kB | Adobe PDF | View/Open | |
06_chapter 1.pdf | 46.68 kB | Adobe PDF | View/Open | |
07_chapter 2.pdf | 68.33 kB | Adobe PDF | View/Open | |
08_chapter 3.pdf | 249.71 kB | Adobe PDF | View/Open | |
09_chapter 4.pdf | 101.79 kB | Adobe PDF | View/Open | |
10_chapter 5.pdf | 335.22 kB | Adobe PDF | View/Open | |
11_chapter 6.pdf | 233.58 kB | Adobe PDF | View/Open | |
12_chapter 7.pdf | 101.71 kB | Adobe PDF | View/Open | |
13_chapter 8.pdf | 247.8 kB | Adobe PDF | View/Open | |
14_chapter 9.pdf | 23.2 kB | Adobe PDF | View/Open | |
15_references.pdf | 36.57 kB | Adobe PDF | View/Open | |
16_publications.pdf | 17.21 kB | Adobe PDF | View/Open | |
17_vitae.pdf | 12.99 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: