Problem Of Multiple Network Attacks

Read Complete Research Material



Problem of Multiple Network Attacks

[Name of the Institute]

Problem of Multiple Network Attacks

Problem Statement

Hacking is the biggest problem these days. There are multiple attackers who are hiding behind. It is essential to identify these trackers who are providing harm to the network. The problem statement for this major issue is that, “How to track multiple attackers that is attempting to hide at the same time?” It is the major problem which needs to be identified so that the rate of hacking reduces to maximum level.

Internet has become an essential part of our lives these days, and our life has been dependent on the internet. Cyber world has opened numerous opportunities for us, for example, reference material, electronic commerce, email, collaborative computing, information distribution and advertisements etc (Prowell, 2010). Cyber attacks are defined as breaking into some computer which results in undermining of the integrity, availability and confidentiality of the computer or the data saved within it. The most common form of cyber attack is hacking. Hacking can be defined as creative innovation as well as a form of unlawful behavior. This is a form of activity that has occupied two extreme positions. Hacking is defined as cut chop, something that is used to improve the performance of the battle boredom by the mainframe operators (Timm, 2010). There are different types of hacking including, software hacking and information hacking etc. Multiple attackers who are hidden needs to be identified so that there is no hacking, and eventually leads to less cyber crime.

Dissertation Goal

The goal of the dissertation is that to identify the multiple attackers and to reduce the rate of crime which is conducted because of negative use of network. The goal is to reduce the rate of crime up to 80%, which is not impossible to achieve. It needs proper planning, and it can be achieved.

Introduction

Target tracking in forward-looking infrared imagery in general is a challenging problem, especially when the target object is jammed arti?cially. The target tracking in forward looking infrared imagery is usually jammed. We de?ne the jammed forward-looking images with four Features (Dorffner, 2001):

Forward-looking infrared. The image sequence is obtained from infrared device which is moving towards the target. If the tracker works well the center of target almost stays in the middle of the image and size of target object grows from a bunch of pixels to a larger one, so the size and other features change signi?cantly in the IR image, as shown in the figure below:

Similar in Color. Most of the infrared images are, or can be treated as gray level images. In fact, the color represents the temperature of the target, so colors from one object are usually similar as a result of the heat conduction.

Low in SNR. SNR, signal-to-noise ratio, is usually extremely low in IR image from the IR sensor.

Jammed. The most important Feature is that the object target usually gets interfered intentionally. So the shape, texture and edge of the target are always unreliable. This makes most tracking algorithm ...
Related Ads