Você está na página 1de 7

Journal of Information Engineering and Applications ISSN 2224-5782 print! ISSN 2225-"5"# online! $ol.%& No.

'2& 2"'%

www.iiste.org

A Review-Botnet Detection and Suppression in Clouds


Namrata A. sa(le ).E. *SE! +. ,. -aisoni *ollege of Engineering . )anagement& Amra/ati S+0A1& Amra/ati 1ni/ersit2 Amra/ati )S!& India E-mail3 namratasa(le'"4gmail.com 5rof. 6. S. 6atar +. ,. -aisoni *ollege of Engineering . )anagement& Amra/ati S+0A1& Amra/ati 1ni/ersit2 Amra/ati )S!& India E-mail3 dines7datar4raisoni.net Abstract Internet securit2 pro(lems remain a ma8or c7allenge wit7 man2 securit2 concerns suc7 as Internet worms& spam& and p7is7ing attac9s. 0otnets is well-organi:ed distri(uted networ9 attac9s& consist of a large num(er of (ots t7at generate 7uge /olumes of spam or launc7 6istri(uted 6enial of Ser/ice 66oS! attac9s on /ictim 7osts. 0otnet attac9s degrade t7e status of Internet securit2. *louds pro/ide (otmaster wit7 an ideal en/ironment of ric7 computing resources w7ere it can easil2 deplo2 or remo/e *.* ser/er and perform attac9s. It is of /ital importance for cloud ser/ice pro/iders to detect (otnet& pre/ent attac9& and trace (ac9 to t7e (otmaster. It also (ecomes necessar2 to detect and suppress t7ese (ots to protect t7e clouds. ;7is paper pro/ides t7e /arious (otnet detection tec7ni<ues and t7e comparison of /arious (otnet detection tec7ni<ues. It also pro/ides t7e (otnet suppression tec7ni<ue in cloud. Keywords: *loud computing& networ9 securit2& (otnet& (otmmaster& (otnet detection& (otnet suppression 1. Introduction Internet is pla2ing a /er2 important role as our information infrastructure& t7e e- (usiness and e-pa2 sector is (ooming due to its con/enience and (enefits for users. ,owe/er& Internet securit2 remains a (ig c7allenge as t7ere are man2 securit2 t7reats. Attac9ers increasingl2 initiate e-crime attac9s and a(uses& suc7 as spam& p7is7ing attac9s& and Internet worms. 0otnet is a collection of internet-connected computers w7ose securit2 defences 7a/e (een (reac7ed. Also (otnet are t7e group of compromised computers controlled (2 one or group of attac9er 9nown as =0otmaster=. ;7e most of (otmasters usuall2 don>t use t7eir 5* to control (otnet& instead t7e2 use pu(lic ser/er to transfer command and control to e/er2 (ot. t7is ser/er is called command and control ser/er *.*!. ;7e arc7itecture of (otnets is eit7er centrali:ed or distri(uted. ;7e centrali:ed (otnets 7a/e one or more command and control *.*! ser/ers& and t7e distri(uted include all t7e (otnets t7at do not operate in a centrali:ed manner& w7ic7 can 7ide (otmaster /er2 well. 5eer-to-5eer (otnet is a well-9nown e?ample of t7e distri(uted t2pe. *entrali:ed arc7itecture increases t7e efficienc2 o/er t7e traditional *.* (otnets& (ut at t7e same time& t7e2 are largel2 limited (2 t7e total num(er of (ots t7e2 could control at one time& 0ecause of t7e lac9 of t7e central ser/er& t7e 0otmaster cannot directl2 control all t7e (ots. ;7e communication protocols of (otnets are Internet -ela2 *7at I-*! and ,2perte?t ;ransport 5rotocol ,;;5!. I-* is a wide-used (otnets protocol& (ecause I-* ser/ers are e?tremel2 popular so t7at (otmaster can easil2 find a pu(lic I-* ser/er for use . ,owe/er& t7e disad/antage of I-* is also o(/ious& once t7e (otnet is detected& t7e I-* ser/er can (e easil2 found and ta9en down& in addition. A (etter option for t7e (otmaster is use ,;;5& (ecause t7e port of ,;;5 is almost alwa2s permitted (2 firewalls. @7ate/er for t7e *.* ser/er or normall2 (ot& t7ere alwa2s 7as 7uge ,;;5 traffic& it>s /er2 7ard to find somet7ing in t7is lager data. 0otnet operators can use t7e aggregated power of man2 (ots to e?ponentiall2 raise t7e impact of t7ose dangerous acti/ities. ;7e ma8or attac9s under (otnet are& 66os& Scanning& 57is7ing& *lic9 fraud& spamming. In t7is paper& section ' gi/es introduction to (otnet. Section gi/es t7e literature re/iew and related wor9 on (otnet detection and suppression. Section % introduces /arious (otnet detection tec7ni<ues and comparison. Section 4 introduces (otnet suppression tec7ni<ue in cloud. In section 5 proposed wor9 and o(8ecti/es are gi/en. 2. iterature Review and Related !or" E?tensi/e researc7 7as (een done in (otnet detection and suppression .In t7is section we mainl2 focuses on t7e different (otnet detection tec7ni<ue and (otnet suppression tec7ni<ue. ;7e mec7anism of /arious (otnet detection tec7ni<ues are gi/en (2 Jignes7 $ania& Ar/ind )eni2a& ,. 0. Jet7/a A'B ,arit7a S. Nair& $inod7 Ewards A2B. Inspection of t7e networ9 traffic respecti/e to anomalies or specific singularities of t7e I-* protocol w7ic7 can (e a 7int for a (otnet called t7e networ9 (ased (otnet '

Journal of Information Engineering and Applications ISSN 2224-5782 print! ISSN 2225-"5"# online! $ol.%& No.'2& 2"'%

www.iiste.org

detection tec7ni<ues are gi/en (2 @. ;. Stra2er& -. @als7& *. Ci/adas& 6. Capsle2 A%B& J. +oe(el& ;. ,ol:. -is7i A4B& A. Darasaridis& 0. -e?road& 6. ,oeflin. @idescale A5B. 0ot,unter a met7od for (otnet detection w7ic7 entails correlating alarms from different networ9 intrusion detection s2stem NI6S! elements w7ic7 reside at t7e egress (oundar2 and 0ot)iner a (otnet detection met7od w7ic7 clusters3 communications traffic *-5lane!& w7ic7 identifies w7ic7 7osts are tal9ing to w7ic7 ot7er 7osts& and acti/it2 traffic is gi/en (2 +u& -. 5erdisci& J. E7ang& and @. Cee A#B. ;7e (inder& 7ost-(ased procedures (otnet detection tec7ni<ue includes detection of possi(le anomalies or modification of t7e file s2stem is proposed (2 @. *ui& -. ,. Dat:& @. ;an A7B. ;7e (otSwat is a tec7mi<ue t7at c7aracteri:es t7e remote control (e7a/ior of (ots /ia identif2ing w7en selected s2stem call arguments contain data recei/ed o/er t7e networ9& is gi/en (2 E. Stinson& J. *. )itc7ell A8B. ;7e +arlic arc7itecture w7ic7 is distri(uted (otnet suppression s2stem w7ic7 suppresses t7e (otnets in clouds is proposed (2 F. ,an& E. *7en& ,. Gu& and H. Ciang AIB. 0ased on an o/erla2 networ9& *olla(orati/e Networ9 Securit2 S2stem w7ic7 automaticall2 collects networ9 traffic from e/er2 colla(orati/e 1;) in a distri(uted mode and t7en processing t7ese collected data in t7e securit2 center is proposed (2 F. ,an& E. *7en& ,. Gu& and H. Ciang AIB. #. Botnet Detection and Co$parison %.' *lassification (ased on (e7a/ior %.'.' Acti/e anal2sis Acti/e approac7es in (otnet anal2sis co/er all 9inds of anal2sis tec7ni<ues w7ic7 ma9es (ot master& directl2 or indirectl2 informed a(out (otnet detection acti/it2. *apturing (ot malware and deacti/ating its malicious parts is a well-9nown acti/e anal2sis t2pe. ,one2pots and 7one2nets are ot7er acti/e anal2sis met7ods performed in (otnet detection and pre/ention. i! ,one2pots and 7one2nets3 A 7one2pot defined in en/ironment w7ere /ulnera(ilities 7a/e (een deli(eratel2 introduced to o(ser/e attac9s and intrusions. ;7e2 7a/e a strong a(ilit2 to detect securit2 t7reats& to collect malware signatures and to understand t7e moti/ation and tec7ni<ue (e7ind t7e t7reat used (2 perpetrator. In a wide-scale networ9& different si:e of 7one2pots form 7one2net. ,one2pots are classified as 7ig7-interaction and low-interaction according to t7eir emulation capacit2. A 7ig7-interaction 7one2pot can simulate almost all aspects of a real operating s2stem. It gi/es responses for 9nown ports and protocols as in a real :om(ie computer. Jn t7e ot7er 7and& low-interaction 7one2pots simulate onl2 important features of a real operating s2stem. ,ig7interaction 7one2pots allow intruders to gain full control to t7e operating s2stemK 7owe/er low-interaction 7one2pots do not. ,one2pots are also classified according to t7eir p72sical state. 572sical 7one2pot is a real mac7ine running a real operating s2stem. $irtual 7one2pot is an emulation of a real mac7ine on a /irtuali:ation 7ost. ;7e /alue of a 7one2pot is determined (2 t7e information o(tained from it. )onitoring t7e networ9 traffic on a 7one2pot lets us gat7er information t7at is not a/aila(le to networ9 intrusion detection s2stems NI6S!. 3.1.2 Passive analysis 5assi/e approac7es anal2:e traffic w7ic7 t7e (otnet generates wit7out corrupting or modif2ing it. ;7e anal2sis mainl2 focuses on secondar2 effects of (otnet traffic suc7 as (ro9en pac9ets resulting from a distant 66oS attac9. 5assi/e s2stems are more comple? to implement (ut in t7e ot7er 7and t7e2 7a/e t7e (ig ad/antage t7at t7e2 cannot (e detected (2 intruderK (ecause if perpetrator sends a message to a dar9net& 7e will not get a SHN response. So a dar9net is a(solutel2 gi/es t7e same sense as an unused I5 address to an intruder. %.2 Classification based on used data 3.2.1 Analysis Based on IDS Data Intrusion detection A''B is Lt7e process of identif2ing and responding to malicious acti/ities targeted at computing and networ9 resourcesM. An intrusion attempt& also named as attac9& denotes t7e se<uence of actions to gain control of t7e s2stem. Intrusion 6etection S2stem I6S! discriminates intrusion attempts from normal s2stem usage. Intrusion detection s2stems are (asicall2 classified into two categories3 i! )isuse-(ased I6S and Anomal2-(ased I6S A''B. A misuse-(ased I6S& also 9nown as signature-(ased or 9nowledge-(ased I6S& detects malicious traffic (2 comparing new data wit7 a 9nowledge (ase or signatures of 9nown attac9s. ;7e s2stem deli/ers an alarm if a pre/iousl2 9nown intrusion pattern is detected. )isuse-(ase s2stems li9e Snort use pattern matc7ing algorit7ms in pac9et pa2load anal2sis. It is o(/ious t7at misuse-(ased s2stems anal2:e not onl2 t7e traffic flow of t7e networ9K t7e2 also anal2:e pa2load data of t7e flow. )isuse (ased intrusion detection s2stems are 7ig7l2 accurate s2stems. 0ut t7e2 need to pa2 attention on up to date t7e signature (ase of t7e s2stem. ;7e2 are also ineffecti/e for detecting new intrusion t2pes and :ero da2 t7reats. -ule (ased intrusion detection s2stems li9e Snort are running (2 using 9nown malware signatures. ;7e2 monitor t7e networ9 traffic and detect sign of intrusions. It is o(/ious t7at pa2load information of networ9 traffic is transformed and em(edded into t7e signature or rule. ;7e I6S detects malicious traffic fitting t7e communication parameters defined (2 t7e rule.

Journal of Information Engineering and Applications ISSN 2224-5782 print! ISSN 2225-"5"# online! $ol.%& No.'2& 2"'%

www.iiste.org

ii! Anomal2 0ased 0otnet 6etection also 9nown as (e7a/ior-(ased I6S& compare input data wit7 t7e e?pected (e7a/ior of t7e s2stem. ,owe/er (e7a/ior (ased s2stems can detect un9nown attac9s (ecause of t7eir anomal2 (ased natureK t7e2 ma2 gi/e false positi/e alarms. ;7is approac7 tries to detect 0otnet (ased on num(er of networ9 traffic anomalies suc7 as 7ig7 networ9 latenc2& 7ig7 /olumes of traffic& traffic on unusual ports& and unusual s2stem (e7a/ior t7at could s7ow e?istence of (ots in t7e networ9. ;7is approac7 can detect un9nown 0otnets. It can (e categori:ed as ,ost (ased and Networ9 0ased 6etection. In 7ost (ased detection tec7ni<ue& a detection strateg2 w7ic7 monitors and anal2:es t7e internals of a computer s2stem instead of networ9 traffics on its e?ternal interfaces. iii! A networ9-(ased tec7ni<ue3 It is a detection strateg2 w7ic7 tries to detect 0otnets (2 monitoring networ9 traffics. @e can classif2 Networ9-(ased tec7ni<ues into two categories3 Acti/e monitoring and 5assi/e monitoring. In Acti/e monitoring& it in8ects test pac9ets in networ9 to measure t7e reaction of networ9 suc7 t7at gaining e?tra traffic on networ9. 3.2.2 DNS Based detection technique In order to access t7e *.* ser/er (ots carr2 out 6NS <ueries to locate t7e particular *.* ser/er t7at is t2picall2 7osted (2 a 66NS 62namic 6NS! pro/ider. So 6NS monitoring will (e eas2 approac7 to detect (otnet 6NS traffic and detect 6NS traffic anomalies. ;7is is most famous and eas2 tec7ni<ue to (otnet detection (ut it will (e toug7 to detect recent ad/anced (otnet t7roug7 t7is tec7ni<ue. %.% Data Minin Based Detection !echnique 6ata mining aims to recogni:e useful patterns to disco/er regularities and irregularities in large data sets. 5ac9et flow pro/ides full information of flow data (ut in large file t2pe. Anomal2 (ased tec7ni<ues are mostl2 (ased on networ9 (e7a/ior anomalies suc7 as 7ig7 networ9 latenc2& acti/ities on unused ports A''B. 6ata mining tec7ni<ue can (e applied for optimi:ation purpose. It ena(les to e?tract sufficient data for anal2sis from networ9 log file. )ost useful data mining tec7ni<ues includes correlation& classification& clustering& statistical anal2sis& and aggregation for efficientl2 9nowledge disco/er2 a(out networ9 flows A'2B. Flow correlation algorit7ms are useful to compare flow o(8ects (ased on some c7aracteristic ot7er t7an pac9et content. ;7is tec7ni<ue is /er2 effecti/e w7en content of pac9et is not a/aila(le of encr2pted& e.g. mig7t compare arri/al time. ;7ese 9inds of algorit7ms utili:e t7e c7aracteristic /alues as inputs into one or more functions to create a metric used to decide if t7e flows are correlated A'2B. *lassification algorit7ms assume t7at incoming pac9et will matc7 one of t7e pre/ious patterns. ;7erefore& it is not an appropriate approac7 to detect new attac9s A'2B. *lustering is a well9nown data mining tec7ni<ue w7ere data points are clustered toget7er (ased on t7eir feature /alues and a similarit2 metric. *lustering differs from classification& in t7at t7ere is no target /aria(le for clustering. *lustering algorit7ms di/ide t7e entire data set into su(groups or clusters containing relati/el2 identical features. ;7us& clustering pro/ides some significant ad/antages o/er t7e classification tec7ni<ues& since it does not re<uire a la(eled data set for training. ;o find particular pattern from large dataset is 9nown as aggregation met7od& collecting and anal2:ing se/eral t2pes of records from different c7annels simultaneousl2. Association rule is to find t7e correlation of different items appeared in t7e same e/ent. Association rule mining is to deri/e t7e implication relations7ips (etween data items under t7e conditions of a set of gi/en pro8ect t2pes and a num(er of records and t7roug7 anal2:ing t7e records& t7e commonl2 used algorit7m is A priori algorit7m. As s7own in ta(le 6ata )ining approac7 is almost t7e (est one among ot7er tec7ni<ue. At t7is point of /iew pattern recognition and mac7ine learning (ased data mining tec7ni<ues are /er2 useful to e?tract une?pected networ9 patterns. Firstl2 it can (e useful to introduce a researc7 of preprocessing tas9s of anomal2 and data mining (ased (otnet detection s2stems. Fig. ' s7ows t7e classification of (otnet detection tec7ni<ues.

Journal of Information Engineering and Applications ISSN 2224-5782 print! ISSN 2225-"5"# online! $ol.%& No.'2& 2"'%

www.iiste.org

Fig. ' 0otnet 6etection ;ec7ni<ues. %. Botnet Supression In Clouds 4.1 "a#lic a#chitectu#e ;7e structure is important sign of garlic s2stem A'%B& as its name& it is distri(uted and consists of terminal node and control node. ;7e s2stem ma2 7a/e multiple terminal nodes and one control node& e/er2 node can (e colla(orated wit7 eac7 ot7er A'%B& as illustrated in Fig. 2

Fig. 2 S2stem Arc7itecture In Fig. 2& we can see t7e garlic s2stem 7as a central control node& w7ic7 7as t7ree modules. ;7e control node connects wit7 four terminal nodes. ;7e terminal node is (ased on t7e 1nified ;7reat )anagement 1;)! s2stem A'4B& w7ic7 7as four functional modules3 t7e firewall module& t7e protocol filter module& t7e recording module and t7e communication module. ;7e firewall module can pass or (loc9 networ9 traffic according to firewall rules. Similarl2& t7e protocol filter module filters networ9 traffic (ased on regular e?pressions of rules.

Journal of Information Engineering and Applications ISSN 2224-5782 print! ISSN 2225-"5"# online! $ol.%& No.'2& 2"'%

www.iiste.org

;7e recording module can (e set to record all of t7e traffic or 8ust partial traffic of eac7 connection& t7is module use tec7nolog2 of ;IFA A'5B. *ommunication module e?c7anges information wit7 t7e control node. *entral control node is a ser/er t7at 7as t7ree functional modules& feed(ac9 module& detection module and communication module. ;7e central control node collects traffic from all t7e terminal nodes controlled (2 itself& process t7e traffic using detection module& w7ic7 is (ased on cloud computing tec7nolog2& generall2& w7en (otnets are detected& t7e detection module will report I5 address and port& according to t7ese information& rules can (e generated. ;7en central control node distri(utes rules to all t7e terminals. After distri(ution& +arlic c7ec9s w7et7er t7e rules 7a/e feed(ac9 indicating t7e rules are effecti/e or not. +arlic s2stem will continuousl2 collect feed(ac9 for eac7 rule& according to t7ese& it can regenerate rules and distri(ute t7em& and t7ese secondgeneration rules can also produce feed(ac9s& forming a recursi/e process.

Fig. % ;7e wor9flow of +arlic. Fig. % is t7e wor9flow of +arlic. Step ' indicates terminal node transfers traffic data to central control node& traffic data is recorded at t7e terminal node. @7en t7e traffic load is low& t7e recording module can (e set to record all t7e trafficK w7en t7e networ9 is o/erloaded& it can (e set to 8ust record t7e first '"-2" D0 of eac7 connection. ,owe/er& t7is 7eader s7ould contain t7e essential information. In step 2& t7e control node processes 7uge traffic w7ic7 is collected in Step '. 6ue to t7e (urst nature of networ9 traffic and t7e fact t7at most networ9s can produce t7ousands and e/en millions of pac9ets per second& in addition& t7e traffic of (otnet must (e 7uge& it is /er2 c7allenging to process t7e data in real time& w7ic7 is sol/ed (2 CA-G. CA-G is a cloud computing platform t7at can process multiple tas9s in parallel. addreses& t7e source port and destination port. ;7e final field is used to mar9 t7e rules& facilitate feed(ac9 for /iewing. ;7en t7e t7ird step is to load t7e rules to eac7 terminal node& so t7e ad/antage of t7is approac7 is com(ining pre/ention& control and s7aring rules toget7er. &. 'roposed !or" @e can appl2 t7e data mining (otnet detection ;ec7ni<ue in colla(orati/e networ9 securit2 management s2stem *NS)S!. In *NS)S using cloud storage to 9eep collected traffic data and t7en processing it wit7 cloud computing platforms to find t7e malicious attac9s and to secure t7e cloud from (otnet. Re(erences Jignes7 $ania& Ar/ind )eni2a& ,. 0. Jet7/a& A -e/iew on 0otnet and 6etection ;ec7ni<ue& in Inte#national Journal of *omputer ;rends and ;ec7nolog2- /olume4Issue'- 2"'%&5age 2%. ,arit7a S. Nair& $inod7 Ewards S E A Study on Botnet Detection !echniques& International Journal of Scientific and -esearc7 5u(lications- $olume 2& Issue 4& April 2"'2.

Journal of Information Engineering and Applications ISSN 2224-5782 print! ISSN 2225-"5"# online! $ol.%& No.'2& 2"'%

www.iiste.org

@. ;. Stra2er& -. @als7& *. Ci/adas& 6. Capsle2. 6etecting 0otnets wit7 ;ig7t *ommand and *ontrol. In IEEE *onference on Cocal *omputer Networ9s& No/. 2""#. J. +oe(el& ;. ,ol:. -is7i3 Identif2 0ot *ontaminated ,osts (2 I-* Nic9name E/aluation. In @or9s7op on ,ot ;opics in 1nderstanding 0otnets& April 2""7. A. Darasaridis& 0. -e?road& 6. ,oeflin. @idescale 0otnet 6etection and *7aracteri:ation. In @or9s7op on ,ot ;opics in 1nderstanding 0otnets& April 2""7. +. +u& -. 5erdisci& J. E7ang& and @. Cee. 0ot- )iner3 *lustering Anal2sis of Networ9 ;raffic for 5rotocol- and Structure-Independent 0otnet 6etection. In 1SENIG Securit2 S2mposium& Jul2 2""8. @. *ui& -. ,. Dat:& @. ;an. 6esign and Implementation of an E?trusion-(ased 0rea9-In 6etector for 5ersonal *omputers. In Annual *omputer Securit2 Applications *onf.& 6ec. 2""5. E. Stinson& J. *. )itc7ell. *7aracteri:ing 0ots> -emote *ontrol 0e7a/ior. In 6etection of Intrusions . )alware& and $ulnera(ilit2 Assessment& Jul2 2""7. F. ,an& E. *7en& ,. Gu& and H. Ciang& +arlic3 A distri(uted (otnets suppression s2stem& in 5roc. IEEE I*6*S wor9s7op on t7e First International @or9s7op on Networ9 Forensics& Securit2 and 5ri/ac2 NFS5!& )acau& *7ina& 2"'2& pp. #%4-#%I. F. ,an& E. *7en& ,. Gu& and H. Ciang& A colla(orati/e (otnets suppression s2stem (ased on o/erla2 networ9& International Journal of Securit2 and Networ9s& /ol. 7& no. 4& 2"'2. Erdem Alparslan& Adem Dara7oca and 6ile9 Dara7oca. BotNet Detection$ %nhancin Anal2sis (2 1sing 6ata )ining ;ec7ni<ues& 6ownloaded from 7ttp3NNd?.doi.orgN'".5772N488"4 0JJD!. Alire:a S7a7restani& )ar2am Feil2& -odina A7mad& Sureswaran -amadass. Arc7itecture for appl2ing data mining and $isuali:ation on networ9 flow for (otnet traffic 6etection& International *onference on *omputer ;ec7nolog2 and 6e/elopment&IEEE& 5ages %%-%7 2""I. 0eipeng )u& Ginming *7en and E7en *7en. A *olla(orati/e Networ9 Securit2 )anagement S2stem in )etropolitan Area Networ9. In3*)* 2"''. Hing E7ang& Fac7ao 6eng& E7en *7en& Hi(o Gue and *7uang Cin. 1;)-*)3 A 5ractical *ontrol )ec7anism Solution for 1;) S2stem. In3*)* 2"'". Jun Ci& S7uai 6ing& )ing Gu& Fu2e ,an and E7en *7en. ;IFA3 Ena(ling -eal-;ime Ouer2ing and Storage of )assi/e Stream 6ata. In3I*N6* 2"''.

This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTEs homepage: http://www.iiste.org CALL FOR JOURNAL PAPERS The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. Theres no deadline for submission. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. MORE RESOURCES Book publication information: http://www.iiste.org/book/ Recent conferences: http://www.iiste.org/conference/ IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar

Você também pode gostar