M Tech Dissertations

Permanent URI for this collectionhttp://drsr.daiict.ac.in/handle/123456789/3

Browse

Search Results

Now showing 1 - 2 of 2
  • Item
    ACIDS: automated co-stimulation based intrusion detection system with a sense of dynamic self
    (Dhirubhai Ambani Institute of Information and Communication Technology, 2005) Kamra, Pooja; Mathuria, Anish M.
    Automated Co-stimulation based Intrusion detection system with a sense of Dynamic Self, or ACIDS, is a distributed architecture for intrusion detection systems. Other than the already used aspects of human immune systems like negative selection, clonal selection, gene expression etc., the novelty of ACIDS is that it incorporates two features of the human system not used previously, namely thymus and vaccination.

    Self is defined as the set of normal connections observed on the network. All the existing systems are modeling the self as a static entity, when it should have been otherwise. Also, human immune system needs two disparate signals before taking some action against the antigen. The first signal is generated at the point of attack and stimulates the immune system for rigorous detection. The second signal is known as co-stimulation, and it stimulates the immune system for taking the action against an antigen. All the existing artificial immune models are also seeking co-stimulation, but it is generated through human intervention. This makes them unusable in real time. Another drawback in the existing systems is that they start from the scratch, i.e. they do not derive knowledge from the existing data of the intrusions.

    ACIDS aims to overcome the above drawbacks of existing models. It includes a module called thymus that dynamically updates the self’s definition of the system. To best of our knowledge, this concept is being used for the first time in intrusion detection systems. In CIDS, hosts are monitored at two levels, network level and operating system level. Whenever an anomaly is detected at the network level, ACIDS monitors the activity of the processes in the host. If anomaly is detected there, system automatically generates the co-stimulation.

  • Item
    Novel approach for localization in Ad-Hoc sensor networks
    (Dhirubhai Ambani Institute of Information and Communication Technology, 2004) Desai, Vishal; Ranjan, Prabhat
    The ability of a sensor node to move itself or to otherwise influence its location will be critical in sensor networks. Today, the wireless community is putting great effort on the possibility of deploying thousands of tiny sensors all over the place and measuring all kinds of data within. Sensor network is a network of small devices, collaborating with each other to produce a larger sensing task. Most of the current literature on location discovery in wireless and sensor networks assumes the availability of GPS receivers at some nodes or beacon nodes with known position. But as we know having a GPS receiver at sensor nodes may not be feasible due to the limitations of satellite coverage inside the building or due to cost reasons. Further for ad hoc deployment of nodes, it is unreasonable to assume the presence of beacon nodes with prior position information. Hence, the main objective behind this research work is to introduce a localization/positioning method that would be GPS-free and beaconless, and finally we come up with a method called “LRT - Localization using Routing Table” which is also scalable, distributed and able to support the ad hoc deployment of large-scale sensor networks quickly and efficiently.