Signature Analyzer Block for Secure Node Entry

(*) Corresponding author

Authors' affiliations

DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)


We address the problem of secure transmission between two or more systems involved in communication and to overcome those using Hardware and Software co-design. With the spreading of the Internet and online forums the trusted request for a channel is diminishing and at the same time safeguarding the data and the channel from intrusion has become an inevitable requirement. Apart from the concept, the use of the existing secured transmission nodes tends to travel either toward the theorems of advancements, syllogisms, techniques and algorithms of the software issues. Hence, data could be protected, via the software & hardware co-design, from the intruders. The focus is to identify the untrusted nodes in the initial stage itself into the transmission from the physical and data link layer without using firewalls. Signature-based IDSs aim to distinguish those events that deviate from the system’s network terms and conditions. Signature-based schemes (also denoted as misuse-based) identifies the defined patterns, or signatures, within the examined data and also defends the Distributed denial of service attacks.
Copyright © 2013 Praise Worthy Prize - All rights reserved.


Inevitable; Firewalls; Syllogisms; Signature Based IDS; Distributed Denial of Service

Full Text:



Context Switching Semaphore with Data Security Issues using Self-healing Approach, International Journal of Advanced Computer Science and Applications, Volume.2, No. 6, 2011.

Dynamic Multi-Layer Signature Based Intrusion Detection System Using Mobile agents, Department of Information System, Faculty of Computer Science, Isra University Pakistan, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010.

Intrusion Detection Systems - Analysis and Containment of False Positives Alerts, International Journal of Computer App. Volume 5 No.8, August 2010.

A study of DES algorithm with cellular automata, International Journal of Innovative Management, Information & Production ISME International ⓒ2011 ISSN 2185-5439 Volume 3, Number 1, March 2012 PP. 10-16 .

A Link Signature Based DDoS Attacker Tracing Algorithm under IPv6,Future Genertion Communication and Networking(FGCN 2007),Author(s):Xinyu, Xian Jiaotong Univ., Xian Ting ma, VOL 1,6-8 Dec. 2007.

Y.Cliff-S.Tin and C.Boyd,password based server aides key exchange, In applied cryptography and network security. Fourth International Conference-ACNS 2006.Springer-Verlag, Volume 3986 of Lecture Notes in Computer Science.

A Fuzzy approach to detect and detect and control congestion in wireless sensor networks Rekha chakravarthi et al.Indian journal of computer science and engineering (IJCSE).

Peer to peer Networking and applications based on B.Zheng,W.C.Lee and D.Lun Lee by Xuemin Shen,H.Yu.Journal No. 12083.

Design and Implementation of a short message service based on peer to peer application.Adamu Murtala Zungeru,Ufarna Victoria Edu,Ambafi James Garba,Computer Engineering and Intelligent systems.ISSN 2222-1719.Vol 3,No.4,2012.

A cost effective symmetric key Cryptographic Algorithm for small amount of data.9th International multihop.Vol.2 Conference Publications, IEEE INMIC 2005, Sarker, Mohammad Zakir Hossain.

”Towards self healing in wireless sensor networks.Wearable and Implantable body sensor networks”, 2009, Sixth International conference on Sensor Networks.Imperial,London,UK.


  • There are currently no refbacks.

Please send any question about this web site to
Copyright © 2005-2024 Praise Worthy Prize