Free Essay

Nid Using Ga

In:

Submitted By shri916
Words 2519
Pages 11
International Journal of Advanced Science and Technology Vol. 29, April, 2011

A Mutual Construction for IDS Using GA
S. Selvakani Kandeeban Professor and Head, MCA Department, Francis Xavier Engineering College, Tirunelveli, Tamilnadu, India sselvakani@hotmail.com R. S. Rajesh Reader, Department of CSE, Manonmanium Sundaranar University,, Tirunelveli, Tamilnadu, India rs_rajesh@yahoo.co.in Abstract
A variety of intrusion prevention techniques, such as user authentication using passwords, avoidance of programming errors and information protection, has been used to protect computer systems. However information prevention alone is not sufficient to protect our systems as those systems become even more complex with the rapid growth and expansion of Internet technology and local network systems. Moreover, programming errors, firewall configuration errors and ambiguous or undefined security policies add to the system’s complexity. An Intrusion Detection system (IDS) is therefore needed as another layer to protect computer systems. The IDS is one of the most important techniques of information dynamic security technology. It is defined as a process of monitoring the events occurring in a computer system or network and analyzing them to differentiate between normal activities of the system and behaviors that can be classified as suspicious or intrusive. Current Intrusion Detection Systems have several known shortcomings, such as low accuracy (registering high False Positives and False Negatives); low real-time performance (processing a large amount of traffic in real time); limited scalability (storing a large number of user profiles and attack signatures); an inability to detect new attacks (recognizing new attacks when they are launched for the first time); and weak system reactive capabilities (efficiency of response). This makes the area of IDS an attractive research field. In recent years, researchers have investigated techniques such as artificial intelligence, autonomous agents and distributed systems for detecting intrusion in network environments. In this work we have realized an Intrusion Detection System based on Genetic algorithm (GA) approach. For evolving and testing new rules for intrusion detection system the KDD99Cup training and testing dataset were used. Keywords Anomaly detection, Genetic Algorithm, KDD 99 Cup Set, False Positives.

1. Introduction
Intrusion detection is one of the most challenging problems in network security Detection of attacks on a particular network is not an easy task. In this paper, we present a collaborative architecture for Intrusion detection system using Genetic algorithm. IDS is a system that can be placed in a network to stop and detect network intrusions and anomalies. After the emergence of computer networks and especially the internet, the communication of data and the exchange of information have become quite easy and fast. The easy access and exchange of information over the network brings the question of how to

1

International Journal of Advanced Science and Technology Vol. 29, April, 2011

ensure the security of the information that is stored or exchanged against attacks by the intruders. There are two kinds of intruders; external intruders and internal intruders. External intruder are unauthorized users that enter the system and make disastrous changes in the system or use the network resources. On the other hand, an internal intruder is the one who is an authorized user of the system and wants to gain access to the network resources which he/she is not allowed to use. ID techniques can be partitioned into two complementary approaches: misuse detection and anomaly detection. Misuse detection systems, such as [9], [11], model the known attacks and scan the system data for occurrences of these patterns. Anomaly detection systems, such as [2], [7], flag intrusions by observing significant deviations from typical or expected behavior of the system or users. However, these two kinds of IDS have their weaknesses. The former cannot detect novel attacks because their signatures are not yet available for pattern matching. The latter, in general for most such existing systems, have a high false alarm rate because it is difficult to generate practical normal behavior profiles for protected systems. The model is verified on the dataset taken from KDD99Cup which is a standard dataset used for intrusion detection. Earlier studies have utilized a rule-based approach for intrusion detection, but had a difficulty in identifying new attack that had no previously describe patterns. Lately the emphasis is being shifted to learning by examples and data mining paradigms. The use of Artificial Intelligence (AI) for ID is widely considered as the only way to build efficient and adaptive intrusion detection systems. Recently many researches have been conducted on the application of neural networks for ID. Neural networks have been extensively used to identify both misuse and anomalous patterns. Several researchers proposed data mining techniques to identify key patterns that help in detecting intrusions. Distributed agent technology is being proposed by a few researchers to overcome the inherent limitations of the client-server paradigm and to detect intrusions in real time. However, these techniques have some significant shortages. The number of neurons affects the network‟s performance. Increasing the number of output nodes will increase the resolution of the map, but the computation time will dramatically increase. Moreover, feature selection, structure design and weight training are three key tasks for the application of neural network, and a number of researches on these three problems have been done. Traditional leaning algorithms of neural network take single detection task mostly they are difficult to solve the problem of Omission alarm, false alarm, and in distinguish ability of unknown attacks

2. Related Works
M A. Chittur [1] extended their idea by using GA for anomaly detection. Random numbers were generated using GA. Random numbers were generated using GA. A threshold value was established and any certainty value exceeding this threshold value was classified as a malicious attack. The experimental result showed that GA successfully generated an empirical behavior model from training data. The biggest limitation of this model was the difficulty of establishing the threshold value which might lead to detect novel or unknown attacks. J. Gomez et al [3] proposed a linear representation scheme for evolving fuzzy rules using the concept of complete binary tree structure. GA is used to generate genetic operators for producing useful and minimal structure modification to the fuzzy expression tree represented by chromosomes. The biggest drawback of the proposed approach was that the training was time consuming. Liao and Vemuri used the K-nearest Vector Machine for profiling computer

2

International Journal of Advanced Science and Technology Vol. 29, April, 2011

programs. The KNN classifier was employed with an interesting analogy between classifying text documents and detecting intrusion using the sequences of system calls. Wang et al. [10] used the evolutionary algorithm for discovering neural networks for intrusion detection. The connections of the network and its weights were encoded with binary bits and evolved simultaneously. Their detection system was evaluated with www log data and showed an accuracy rate of 95%. However, in their experiment, they used their own data set rather than a public bench mark dataset. Hofmann et al [5] proposed the evolutionary learning of radial basis function networks for intrusion detection. They targeted a network based IDS. Their evolutionary algorithm performed two tasks simultaneously selecting the optimal feature set and learning the RBFN. The binary bits system was used to encode the 137 possible features of the network packet headers and three components of the RBFN, including the type of basis function, the number of hidden neurons, and the number of training epochs. In the experiments with the network audit data set, the RBFN optimized with the evolutionary algorithm outperformed the normal MLP and the normal RBFN. Gonzalez et al. [4] proposed an intrusion detection technique based on evolutionary generated fuzzy rules. The conditional part of the fuzzy detection rules was encoded with binary bits and fitness was evaluated using two factors: the accuracy and the coverage of the rule. The performance was compared to the methods of different genetic algorithms and without the fuzziness of rules using two network audit datasets their own wireless dataset and the knowledge discovery and data mining cup 99 data set.

3. Genetic Algorithm
Genetic algorithm is an evolutionary optimization technique based on the principles of natural selection and genetics. The working of genetic algorithm was explained by John Holland [6]. It has been successfully employed to solve wide range of complex optimization problems where search space is too large. GA evolves a population of initial individuals to a population of high quality individuals, where each individual represents a solution of the problem to be solved. Each individual is called a chromosome, and is composed of a predetermined number of genes. The quality of fitness of each chromosome is measured by a fitness function that is based on the problem being solved. The algorithm starts with an initial population of randomly generated individuals. Then the population is evolved for a number of generations while gradually improving the qualities of the individuals in the sense of increasing the fitness value as the measure of quality. During each generation, three basic genetic operators are applied to each individual with certain probabilities, i.e. selection (rank selection, roulette wheel selection and tournament based selection), crossover and mutation.

4. Parameters in Genetic Algorithm
There are many parameters to consider for the application of GA. Each of these parameters heavily influences the effectiveness of the genetic algorithm. We will discuss the methodology and related parameters in the following section. 4.1 Fitness Function The fitness function is one of the most important parameters in genetic algorithm. To evolve input features and network structure simultaneously, the fitness, which is based on the detection accuracy rate, includes a penalty factor for the number of operative input nodes and

3

International Journal of Advanced Science and Technology Vol. 29, April, 2011

a penalty factor for the number of operative hidden nodes. The fitness function of the individual a is defined by Fitness (a) = drate (a) × (a) × (a) (1)

Where drate is the detection accuracy rate,  is the penalty factor for the number of operative input nodes;  is the penalty factor for the number of operative hidden nodes. The detection accuracy rate of the individual a is defined by drate (a) = correct (a) / sum (2)

Where correct is the number of accurate detections, sum is the total number of detections which include both normal instances and abnormal instances. Once a mismatch happens, the penalty value is computed using the absolute difference. The penalty is defined by Penalty (a) =1-fitness (a) 4.2 Crossover and Mutation Operator The generated subnet of an input node is the set of its all output connections. The generated subnet of a hidden node is the set of itself, its all input and output connections. The generated subnet of an output node is the set of itself and its all input connections. The connection information includes whether or not the connection exists and the connection weight value. The node information includes bias and activation function. Obviously, the generated subnet of inoperative nodes is empty. The employed mutation operator, which can prevent the premature convergence in evolution, includes five operations: node deletion, connection deletion, connection addition, node addition and weight adjustment. The number of output nodes is invariable, so the deletion and addition of node are limited for input and hidden nodes. The node deletion means making a node inoperative and deleting its generated subnet. The node addition is that an inoperative node is turned operative and assigned connection weights with the other operative nodes. The mutation operator has the same influence as the crossover, thus the necessary step following mutation operation is the same as the crossover. There are also other parameters that need to be considered. These parameters should be adjusted according to the application environment of the system and the organization‟s security policy. (3)

Figure 1: Genetic Algorithm Flow

4

International Journal of Advanced Science and Technology Vol. 29, April, 2011

5. Kddcup99 Dataset Description
The KDDCUP99 data set [8] is having 41 features and one target class feature. The dataset contains six million records. The raw training data was about four gigabytes of compressed binary TCP dump data from seven weeks of network traffic. This was processed into about five million connection records. A connection is a sequence of TCP packets starting and ending at some well defined times, between which data flows to and from a source IP address to a target IP address under some well defined protocol. Each connection is labeled as either normal, or as an attack, with exactly one specific attack type. Each connection record consists of about 100 bytes. Attacks fall into four main categories: • DOS: denial-of-service, e.g. SYN flood; • R2L: unauthorized access from a remote machine, e.g. guessing password; • U2R: unauthorized access to local super user (root) privileges, e.g., various ``buffer overflow'' attacks; • Probing: surveillance and other probing, e.g., port scanning. Table 1: Attacks Present in DARPA 1999 Data Set Attack Class
Probe DoS

Attack Type portsweep, ipsweep, lsdomain, ntinfoscan, mscan, illegal-sniffer, queso, satan apache2, smurf, neptune, dosnuke, land, pod, back, teardrop, tcpreset, syslogd, crashiis, arppoison, mailbomb, selfping, processtable, udpstorm, warezclient dict, netcat, sendmail,imap, ncftp, xlock, xsnoop, sshtrojan, framespoof, ppmacro, guest, netbus, snmpget, ftpwrite, httptunnel, phf, named sechole, xterm, eject, ntfsdos, nukepw, secret, perl, ps, yaga, fdformat, ppmacro ffbconfig, casesen, loadmodule, sqlattack

R2L U2R

6. Experiments and Results
The proposed approach contains two stages. In the first one, the training stage, a set of rules for detecting intruders is generated using network audit data offline. In the second stage, the best rules, i.e. the rules with the highest fitness values, are used for intrusion detection in the real-time environment. As some of the network characteristics have higher possibilities to be involved in network intrusions, we have deployed Correlation approach to identify these characteristics. The correlation algorithm was implemented in MATLAB and deployed over the training dataset in order to define the features that participate most frequently in a machinery of an attack. According to the obtained results, we have selected nine features out of forty one used to describe each connection of KDD99Cup dataset as mentioned in the Figure 2. The objective was to select the smallest possible number of the features while maintaining high detection rate of intrusions. In such a way detection could be performed as a real-time one. Every feature represents one gene of the chromosome. As one byte is being used to represent every feature, i.e. every gene, a chromosome that represents each individual is composed of nine bytes.

5

International Journal of Advanced Science and Technology Vol. 29, April, 2011

Figure 2: System Flow We have also exploited the possibility of GA to detect the exact type of an attack. Detecting the type of each intrusion is not very important for intrusion detection, but it is important for forensics in order to recover from an attack. In this case a rule can be presented as: if (duration = “1” and src_bytes =”0” and dst_host_srv_serror_rate = “50”) then (attack_name = “portsweep”); if protocol_type = tcp then if service = http then back Else if service= private then neptune else if service =finger | telnet then if count=1 then land if count >=1&&

Similar Documents

Premium Essay

Oil Spill

...Keith Niesen ENV/100 July 22, 2013 Nash Saleh Gulf Oil Spill In 2010 America had a major disasters on its hands the BP oil spill, not only did some people die from this spill, but the oil spill contaminated the Gulf of Mexico. This was a representation of bad technology it also revealed many environmental risks that many people rather ignore. The oil spill also sparked huge outrage as to why this happened and what we must do to prevent another disaster like this. How can we change the way we drill oil and not affect our precious ecosystems and ruin wildlife or are ocean. What is some of the new technology we are using to help with preventing another oil spill from happening? After the oil rig explosion many pollutants were introduced into the air and water. Many of these pollutants were smoke and or hydrocarbon fumes. The water pollutants was the oil and natural gas that was constantly gushing out of the well. The primary pollutants are the smoke and hydrocarbon because they are pollutants that are directly being emitted into the air from a source. There are many concerns with air pollution and scientist have found many chemicals such as alkyl nitrates, methane, hexane and butane compounds the can irritate and burn skin and the eyes and can cause dizziness as well. With all of these samples that have been collected they have not shown levels above government safety regulations (Roosevelt, 2013). Oil pollution we know is dangerous for the environment our ocean is very important...

Words: 873 - Pages: 4

Premium Essay

Prospects of Shale Gas Development in India

...PROSPECTS OF SHALE GAS DEVELOPMENT IN INDIA: A term paper by Tejal Johri (MPE1296) and Shruti Sharma (MPE1293) for Semester 1 Course: Environment and Development Department of Policy Studies, The Energy and Resource Institute (New Delhi) Submitted on 9th December 2012 Table of Contents Executive Summary 1 Literature Review 4 Scope 6 Conclusion 10 Works Cited 11 Executive Summary The gradual shift of the US gas sector- from one of deficit to one of surplus has gathered appreciative appraisals from the rest of the world and initiated talks about the prospect of harnessing shale gas in other countries, as US reached the lowest CO2 emission level in the last 20 years due to shift to natural gas. It has been referred to as “the biggest energy innovation of the decade”, in light of the growing need for suitable alternatives to conventional oil and gas with increasing pressure on energy over time. 90% of global shale gas is currently produced by the US. India meets two-thirds of its petroleum requirements by importing of fuels that include coal, and this figure is expected to rise in the future in spite of India being a coal-rich country. Even with introduction of more efficient technologies and cases of higher CO2 emission reduction, our country’s import dependence on petrol, oil and gas will significantly rise in the future, raising the pressure on the resources. This concern for energy security calls for further research in technological solutions for greater...

Words: 3059 - Pages: 13

Free Essay

International Journal of Network Security & Its Applications (Ijnsa), Vol.4, No.2, March 2012

...AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM Mohammad Sazzadul Hoque1, Md. Abdul Mukit2 and Md. Abu Naser Bikas3 1 Student, Department of Computer Science and Engineering, Shahjalal University of Science and Technology, Sylhet, Bangladesh sazzad@ymail.com 2 Student, Department of Computer Science and Engineering, Shahjalal University of Science and Technology, Sylhet, Bangladesh mukit.sust027@gmail.com 3 Lecturer, Department of Computer Science and Engineering, Shahjalal University of Science and Technology, Sylhet, Bangladesh bikasbd@yahoo.com ABSTRACT Nowadays it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions and misuses. So Intrusion Detection Systems have become a needful component in terms of computer and network security. There are various approaches being utilized in intrusion detections, but unfortunately any of the systems so far is not completely flawless. So, the quest of betterment continues. In this progression, here we present an Intrusion Detection System (IDS), by applying genetic algorithm (GA) to efficiently detect various types of network intrusions. Parameters and evolution processes for GA are discussed in details and implemented. This approach uses evolution theory to information evolution in order to filter the...

Words: 4796 - Pages: 20

Free Essay

Nanotechnology Within Energy Markets

...Castro, Jonathon / Daniels, Willie / Davis, Brian / Dugan, David /Dees, Jeffery DeVry HUMN 432 Nanotechnology within Energy Markets: Progress in Efficiency Professor Stephen Carter We will be creating a presentation that will explain how important nanotechnology has exploded with new developments within Energy sectors. We will go into detail, explain, and educate our audience with history in nanotechnology, its importance within many different markets but its unprecedented progress in creating clean, efficient energy to the future. We will be stating all the main stream objections, the notion that nanotechnology is not the key and we can support other technologies, we should not support with government funding, and even the small but valid arguments with dealing with ethical objections. We are going to fully touch base on every point of interjection so that you as a viewer of our presentation will have more than enough information to make an informed decision and create your stance on nanotechnology and how it has affected Energy in the 21th century. We will be creating a presentation that will explain how important nanotechnology has exploded with new developments within Energy sectors. We will go into detail, explain, and educate our audience with history in nanotechnology, its importance within many different markets but its unprecedented progress in creating clean, efficient energy to the future. We will be stating all the main stream objections, the notion that nanotechnology...

Words: 2858 - Pages: 12

Free Essay

Psychology

...title of your paper as the heading for the abstract page. Start the introduction of your paper on a new page. Guide to Formatting Psychology Papers: APA Style If you have used an abstract, the third page of the paper will start with the introduction section. If you have not used an abstract, then page two will be the beginning of your paper. You will use the title of your paper as the first-level heading (see above for example). APA Style Headings Headings and subheadings are used to help organize the paper into coherent sections that guide the reader from topic to topic. The heading style you use is dependent upon the number of headings you will be using in your paper. Most papers will have 1-3 levels of headings. One Level Headings If you are only using one level of heading (you have no subheadings under a main heading), then each heading is centered, with the first letter of each main word capitalized. The text starts on the next double-spaced line and is indented. Do not underline this heading. Two Level Headings If you will have subheadings under...

Words: 2198 - Pages: 9

Free Essay

Pchem

...f Name:/,fwn/ue Student lM'o3 n: //? w COURSE DATE VENUE DURATION 1. 2. 3. 4. 5. : CBB1023/CC81023 PHYSICAL CHEM|STRY (Friday) : 15 July2011 : TestRoomBlockN : 20:00 22:00hrs (120minutes) TNSTRUCT|QNS ALL TESTEES TO write NAME,lD & SIGNATURE top of EVERY pageof the Testsheets. on ThisTestSheets contains FIVE(5) aUESTIONS withtotalof max.20 markseach. Answerin inkALL questions the provided on spaces.Eachsub-question countto max of 4 markseach. Answer all quantitative questions to mustbe NUMERICAL VALUESnotonlyequation. Forthe purpose thistest,convert results S.l. UNITS of all to ONLY. A/ofe; (6) Thereare S_lX PAGESin thisTestSheets including coverpase this SELECTED CONSTANTS, CONVERSION FACTORS MATHEMATICAL & RELATIONSHIPS Constants A:0.509 e : 1. 60 2 1 7 6 1 0 - 1e x C eo: 8.85419 10-12 C2m-l x J-r er= 78.54(water) Ne:6.02214x 1023 mol-r tr - 3.141592 R: 8 . 3 1 4 4 7 l K-m ol -r r Data A,(C) = 12.01 A,(H): 1.0079 A,(O): 16.00 A.(N): 14.01 A,(Na):22.99 cp,,'[co26)]: +37.11 K-l J mol-' cp,,'[Flzo(t)]: +75.291 K-t J mol'' +46.4J K-r mol'r cp,n'[Na*(aq)]--84 Cp,"[CHTCOO-(aq)]: J K-r mol-' : cp,,'[NaHCos(s)] +53.00 K-r J mol-' : A1H'[COz(S)]-393.51 mol-r kJ : -285.83 mol-r A1I{'[H2O(/)] kJ AfI'[Na*(aq)]: -240.12 mol-' kJ A1H'[CH3C (aq)]: + I 50.6kJ OO' mol-' : ArH'[NaHCOr(s)] -23L00kJ mol'' pm r(K *): 1 51 r(C l -): 1 81 pm Conversion I a tm= 1 01325 Pa I b a r: 1 05 Pa lTl,cp,,', /trrH** lorU^: pMp/p(fl * //P(a)l I = %Eizibi log yn: -lz*z-lA1/' lP: vrlp lp: Mlp/p nolo: nBlB...

Words: 1903 - Pages: 8

Premium Essay

Ratio Analysis of Acommercial Bank

...INTERNSHIP REPORT ON “Performance of a branch over a period of time” SUBMITTED BY: Priyanka Tarafdar Bristi ID No: 05-007 BBA 16th Batch, MIS 5th Batch Department of Management Information Systems University of Dhaka SUBMITTED To: Dr. Md. Hasibur Rashid Professor Department of Management Information Systems University of Dhaka Contents EXECUTIVE SUMMERY..................................................................................................................... 4 Chapter 1:INTRODUCTION ...................................................................................................................... 4 PURPOSE OF THE REPORT ................................................................................................................... 6 SCOPE OF THE REPORT ....................................................................................................................... 6 SIGNIFICANCE OF THE STUDY ............................................................................................................. 6 LIMITATIONS ....................................................................................................................................... 6 METHODOLOGY .................................................................................................................................. 7 DATA COLLECTION PERIOD ................................................................................................................. 7 Chapter 2: Company...

Words: 7227 - Pages: 29

Premium Essay

Riordan Finance and Accounting Process Improvement Proposal Cis/207

...Riordan Finance and Accounting Process Improvement Proposal CIS/207 December 04, 2012 Executive Summary Riordan Manufacturing, Inc. is composed of three primary facilities in the United States, with locations in Georgia, Michigan, and California. Headquarters is located in San Jose, California. In addition to the core entities, Riordan Manufacturing has a joint business venture located in Hangzou, China. Investigation into the company’s operating procedures and expenses revealed several shortfalls requiring immediate attention. The implementation of a streamlined Enterprise Resource Plan (ERP) and Electronic Database Interchange (EDI) is expected to reduce operational costs by 10% while improving cycle time by 15%. The finance and accounting departments are struggling with their existing record keeping and database configuration. The resources identified at each facility are made up of disparate and antiquated equipment. Current operations for the consolidated close of the General Ledger are completed, at a minimum, 15-20 days past deadline. Additionally, the current system adds unnecessary administrative costs for personnel re-adding documents that are manually written or not compatible with HQ IT systems. Monthly audits are daunting, costly, and labor intensive. Additionally, there is an immediate need for government compliance to meet the specific demands of that customer base. The entire financial and accounting focus can benefit greatly and exceed current...

Words: 2329 - Pages: 10

Premium Essay

Middle Class Growth in South Africa

...RACE, GENDER AND GROWTH OF THE AFFLUENT MIDDLE CLASS IN POSTAPARTHEID SOUTH AFRICA BIENNIAL CONFERENCE OF THE ECONOMIC SOCIETY OF SOUTH AFRICA, UNIVERSITY OF THE FREE STATE, BLOEMFONTEIN, SOUTH AFRICA, 25-27 SEPTEMBER 2013 Justin Visagie justinvisagie@gmail.com Abstract This paper examines the development of the middle class in post-apartheid South Africa, using data from the 1993 Project for Statistics on Living Standards and Development, the 2000 Income and Expenditure Survey/Labour Force Survey and the 2008 National Income Dynamics Study. The affluent middle class are defined as individuals residing in a household with a per capita income of R1,400 – R10,000 per month in 2008 prices. The paper explores changes in the size of the middle class as well as the racial and gender profile of the middle class within the context of Black Economic Empowerment in South Africa. The affluent middle class experienced very modest growth over the period, only slightly ahead of population growth. There was however substantial churning in the racial composition of the middle class, with a large increase in the number of Africans accompanied by a fewer number of Whites. The gender profile of the middle class showed less conclusive evidence of transformation. The upper class similarly experienced significant racial transformation and more than doubled in size, and also accrued a higher share of total income (at the expense of the income shares of middle and lower classes). 1. Introduction...

Words: 2518 - Pages: 11

Premium Essay

Hackng

...Anti-Hacking: The Protection of Computers Chadd Schlotter In the Computer Security industry, there are many solutions available to help combat cyber crime. Firewalls and Intrusion Detection systems are in place across the Internet to help protect more networks than ever before. Teams at software corporations work diligently on creating patches for known vulnerabilities, yet everyday the number of computers that are compromised increases. It seems like almost every week a big Internet or software company has a security incident, so what does this say about the Computer Security industry? Even with the software available to defend the networks of companies, it takes more than that. The education of the security administrators is the key to using those software packages correctly. Anti-Hacking is a topic that should...

Words: 4983 - Pages: 20

Premium Essay

Green Banking

...TERM PAPER ON GREEN BANKING AND ITS PRACTICES IN BANGLADESH Submitted to: Mrs.Dipannita Battacharjee Assistant Professor Department of Marketing Studies University of Chittagong Submitted By: M.Ariful Aziz Kanon 4th Year, BBA (Hons.) ID-07304020 Session: 2006-2007 Department of Marketing Studies University of Chittagong. Date of Submission: …… July 2012 Introduction: Green Banking is no more new concept in today`s world.The concept of Green is to minimize environmental degradation and making this planet habitable and its being used in Banking sector which is presently known as Green Banking.The concept of Green Banking was developed in the western countries. Green Banking is a general term, which can cover a multitude of areas from a bank being environmentally friendly to how and also where their money is invested. Green Banking refers and emphases on environmental-friendly practices and reducing carbon footprint from banking activities. A green bank is a bank that promotes environmental and social responsibility but operates as a traditional community bank and provides excellent services to investors and clients. Its progressive approach to the community and the earth makes it different from the crowd. A green bank is also called ethical bank, environmentally responsible bank, socially responsible bank, or a sustainable bank, and is expected to consider all the social and environmental factors. These...

Words: 6855 - Pages: 28

Premium Essay

Investment Simulation Project

...COURSE: FIN 435 SECTION: 3 GROUP: 3 INVESTMENT SIMULATION PROJECT NORTH SOUTH UNIVERSITY INVESTMENT SIMULATION PROJECT PREPARED FOR Saif Rahman (SfR) Lecturer COURSE: FIN 435 SECTION: 03 GROUP: 03 PREPARED BY NAME | ID | Md. Sarwar Hossain | 0930068030 | Fatima Tuz Zahra | 0930785530 | Ahmed Aman Yousoof | 0930274530 | Yakin Reza | 0930042030 | Naima Rahman | 0930283030 | Date of Submission: August 08, 2012 TABLE OF CONTENTS | | | Executive Summary | 03 | Introduction | 04 | Objective | 04 | Asset Allocation | 05 | Macroeconomic & Industrial Scene | 07 | Diversification | 07 | Trading Strategies & Economic Rationale for Selecting Stocks | 07 | Portfolio Performance | 10 | Holding Period Return | 13 | Portfolio Risk & Return | 14 | Security Market Line | 15 | Lessons Learned from Trading | 16 | Conclusion | 17 | References | 18 | Appendix | 19 | Executive Summary The investment simulation project is a fictitious investment in the Dhaka Stock Exchange that started from June 4, 2012 and ended on August 01, 2012 over a period of two months and separated in three phases. The initial investment in the portfolio was around BDT 1,000,000. The objective of the project was to maximize the after tax wealth through a well diversified portfolio. Given the consistent market fall at the Dhaka Stock Exchange...

Words: 3910 - Pages: 16

Premium Essay

Major Determinants and Hindrances of Fdi Inflow in Bangladesh: Perceptions and Experiences of Foreign Investors and Policy Makers

...Major Determinants and Hindrances of FDI inflow in Bangladesh: Perceptions and Experiences of Foreign Investors and Policy Makers An assignment on Major Determinants and Hindrances of FDI inflow in Bangladesh: Perceptions and Experiences of Foreign Investors and Policy Makers Submitted To: S. M. Zahidur Rahman Associate Professor Submitted By: Tasnuba Nowrin ID-090316 Fatema Khatun ID- 090349 KHULNA UNIVERSITY Business Administration Discipline BBA Program 4th Year, 1st Term Course Title: Financial Management and Institution Course No: FIN-4203 September 10, 2012 Summary on previous article Foreign Direct Investment (FDI) is considered as a crucial component for economic development of a developing country. Countries that are lagging behind to attract FDI are now formulating and implementing new policies for attracting more investment. The determinants which play as a driving force for attracting FDI are geographical location, cheap labour cost, and government attitude towards liberalization of the existing laws of the host country, skilled manpower, incentives for investors, and exemption of taxes etc. According to Bangladesh Board of Investment Handbook (2007) Bangladesh offers an attractive investment climate compared to other South Asian Economies. But among the emerging economies India and China are the desired choice for investment (Baskaran and Muchie, 2008). FDI is considered as an important tool for economic development in a developing country. If...

Words: 13565 - Pages: 55

Premium Essay

Corporate Social Activites

...CORPORATE SOCIAL RESPONSIBILITY IN BANGLADESH: PRACTICE AND PERPETUITY Promoting Safety, Enforcing Rights Corporate Social Responsibility in Bangladesh: Practice and Perpetuity Supported by Published by Promoting Safety, Enforcing Rights Corporate Social Responsibility in Bangladesh: Practice and Perpetuity Researcher Rumana Sobhan Porag Safety and Rights Society Published by Safety and Rights Society 14/23 Babor Road (4th floor) Block B, Mohamadput Dhaka 1207 Tel: +88 02 - 9119903-4 Mobile: +88- 01193 200207, +88- 01191 797414 www.safetyandrights.org info@safetyandrights.org Date of Publication January, 2014 Copyright Safety & Rights Society Printed by Chowdhury Printers and Supply 48/A/ Badda Nagar, B.D.R. Gate No. 1 Pilkhana, Dhaka-1205 ISBN : 978-984-33-6453-1 2 ACKNOWLEDGEMENTS We wish to express our appreciation to the following individuals and organisations, without whose support this research would not be possible to accomplish. Our appreciation goes to the business leaders who provided their valuable time in sharing their views and CSR practices, and for the in-depth discussions on the current situation and ways and means of improving CSR practice in Bangladesh. We were encouraged by the enthusiasm shown by the private sector and their willingness to meet with us and share their experience, often at very short notice. Without the support from these leaders, our study would not have been possible. We would...

Words: 19988 - Pages: 80

Premium Essay

Global Business Plan Paper

...China’s Global Business Plan Team Memners MGT/448 January 22, 2012 Professor China’s Global Business Plan In week five Team C has to prepare a final global business plan paper for the venture in China. The team first had to summarize the findings from the previous team assignments. After summarizing the team had to integrate the week five assignment with the work that had been turned in previously. The team paper for week five included the rationale the team used for choosing the target country. The team also had to determine the marketing mix that was specific to the selected global product and give an explanation why this mix was chosen. A marketing plan was prepared that addressed product modification, pricing, promotional programs, distribution channels, and e-business in the chosen country. The paper will include market indicators and trends for the product. A financial overview for the global venture will be given, which includes a chart for the general budget and an explanation of how the company will deal with the foreign exchange risk. The company will have to identify potential domestic and international sources for funding the venture, and the team will identify two possible financial institutions within the chosen region. In the paper a description of the degree at which the organization will operate as a centralized versus decentralized organization, and a chain of command chart will illustrate how information is passed from the field to senior management...

Words: 8218 - Pages: 33