A Secured Communication Based On Knowledge Engineering Technique
نویسندگان
چکیده
Communication security has become the keynote of the "e" world. Industries like eComm, eGov were built on the technology of computer networks. Those industries cannot afford security breaches. This paper presents a methodology of securing computer communication based on identifying typical communication behavior of each system user based on the dominant set of protocols utilized between the network nodes. KeywordsComputer Communications; Computer/ communications Protocols; Network Security; Authentication; Scrambling; Encryption; Standard Protocols; ISO Open System Interconnections (OSI) Model; object behavior analysis; knowledge engineering.
منابع مشابه
Quantum Phase Shift For Energy Conserved Secured Data Communication In Manet
A Mobile Ad-Hoc Network(MANET) is a structure-less network where the mobile nodes randomly moved in any direction within the transmission range of the network. Due to this mobility, wide range of intrusion occurs in MANET. Therefore, Intrusion Detection Systems (IDS) are significant in MANETs to identify the malicious behavior. In order to improve the secured data communication an efficient Qua...
متن کاملTrusted Neighbors Based Secured Routing Scheme in Wireless Sensor Networks Using Agents
In Wireless Sensor Network (WSN) applications, nodes are deployed in public domains that are prone to be attacked by various types of attacks wherein the data confidentiality, integrity and authentication are compromised. In this paper, we propose Agent based SEcured Routing using Trusted neighbors (ASERT) in WSN. ASERT selects trustworthy neighbors and establishes secured routes using software...
متن کاملUsing Fuzzy Cognitive Maps for Prediction of Knowledge Worker Productivity Based on Real Coded Genetic Algorithm
Improving knowledge worker productivity has been one of the most important tasks of the century. However, we have few measures or management interventions to make such improvement possible, and it is difficult to identify patterns that should be followed by knowledge workers because systems and processes in an organization are often regarded as a death blow to creativity. In this paper, we se...
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملKnowledge of Grammar, Oral Communication Strategies, and oral Fluency: A Study of Iranian EFL Learners
This study tested the impact of implicit and explicit knowledge of grammar on learners’ use of oral communication strategies (OCSs) and the interface of OCSs and oral fluency. The study was performed on 24 male and 36 female Iranian university students of English Translation studying at Payame Nour Universities of Lar, Khonj, and Evaz chosen based on availability and ease of access. The data we...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012