Network Vulnerability Detection Using Ant Colony Optimization

dc.contributor.authorKumar, Yogesh
dc.contributor.supervisorSingh, Maninder
dc.date.accessioned2010-08-05T12:37:43Z
dc.date.available2010-08-05T12:37:43Z
dc.date.issued2010-08-05T12:37:43Z
dc.descriptionM.E.(CSED) Thesis, Aug 2010en
dc.description.abstractSecurity of the information in the computer networks has been one of the most important Research Area. To preserves the secure condition it is essential to be aware of the behavior of the incoming data. Is it a normal or abnormal data? It is a too vulnerable and complicated Question. Owing to the fact that intrusive data are in several and similar forms, distinguishing them from the normal ones is so astounding. Network Security is becoming an important issue for all the organizations, and with the increase in knowledge of hackers and intruders they have made many successful attempts to bring down high-pro le company networks and web services. Ant-colony optimization algorithm is an evolutionary learning algorithm which could be applied to solve the complex problems. ACO algorithm fundamental idea has been inspired by the behavior of the real ants. Ants deposit pheromone as a trace to direct the other ones in nding foods. They choose their path according to the congestion of the pheromone. The above behavior of the real ants has inspired an algorithm which a set of arti cial ants, as a group of simple agents, cooperate with each other to solve a problem by exchanging information via pheromone deposited on the edges of the graph. One of the most surprising behavioral patterns exhibited by ants is the ability of certain ant species to nd what computer scientists call shortest paths. Biologists have shown experimentally that this is possible by exploiting communication based only on pheromones.en
dc.format.extent1344917 bytes
dc.format.mimetypeapplication/pdf
dc.identifier.urihttp://hdl.handle.net/10266/1091
dc.language.isoenen
dc.subjectNessusen
dc.subjectACOen
dc.subjectNMAPen
dc.subjectNCen
dc.titleNetwork Vulnerability Detection Using Ant Colony Optimizationen
dc.typeThesisen

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Yogesh_Kumar_800832027_ME_CSE.pdf
Size:
1.5 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.79 KB
Format:
Item-specific license agreed upon to submission
Description: