Enhanced Database Security using Genetic Algorithm
نویسندگان
چکیده
منابع مشابه
A Technique for Improving Web Mining using Enhanced Genetic Algorithm
World Wide Web is growing at a very fast pace and makes a lot of information available to the public. Search engines used conventional methods to retrieve information on the Web; however, the search results of these engines are still able to be refined and their accuracy is not high enough. One of the methods for web mining is evolutionary algorithms which search according to the user interests...
متن کاملEnhanced Security using Hybrid Encryption Algorithm
Information Security plays a major role in today’s scenario. Cloud computing is a technology that provides access to information and computing resources from anywhere that a network is available. There is a need to secure the data stored on cloud. The main goal behind the design of encryption algorithm must be security against unauthorized attacks. However, for all cloud computing applications,...
متن کاملImproving network security using genetic algorithm approach
With the expansion of Internet and its importance, the types and number of the attacks have also grown making intrusion detection an increasingly important technique. In this work we have realized a misuse detection system based on genetic algorithm (GA) approach. For evolving and testing new rules for intrusion detection the KDD99Cup training and testing dataset were used. To be able to proces...
متن کاملInformation Security using Genetic Algorithm and Chaos
Security, integrity, non-repudiation, confidentiality, and authentication services are the most important factors in information security. Genetic algorithms (GAs) are a class of optimization algorithms. Many problems can be solved using genetic algorithms through modeling a simplified version of genetic processes. The application of a genetic algorithm (GA) to the field of cryptology is rather...
متن کاملReview on QoS and Security of Database System using Genetic Algorithm
Both network security and quality of service (QoS) used up computational reference connected with IT procedure thereby could unsurprisingly influence the application form services. When it comes to confined computational reference, it is essential to type your communal impact concerning multi-level protection as well as QoS, which may be concurrently run optimization procedures to be able to gi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2019
ISSN: 2321-9653
DOI: 10.22214/ijraset.2019.4008