Refine your search
Collections
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Hanumantha Rao, K.
- Data Model Framework for Intruder Information Sharing in Sensor Networks
Abstract Views :150 |
PDF Views:4
Authors
Affiliations
1 Sri Indu College of Engineering and Technology, IN
1 Sri Indu College of Engineering and Technology, IN
Source
Networking and Communication Engineering, Vol 2, No 9 (2010), Pagination: 291-300Abstract
In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, detection and isolation of the same intruder or its clones may have to be conducted repeatedly, wasting scarce network resources. Therefore, once an intruder is identified, it should be known to all innocent nodes such that the intruder or its clones can be recognized when appearing elsewhere. However, secure, efficient and scalable sharing of intruder information remains a challenging and unsolved problem. To address this problem, we propose a three-tier framework, consisting of a verifiable intruder reporting (VIR) scheme, a quorum based caching (QBC) scheme for efficiently propagating intruder reports to the whole network, and a collaborative Bloom Filter (CBF) scheme for handling intruder information locally. Extensive analysis and evaluations are also conducted to verify the efficiency and scalability of the proposed framework.Keywords
Network Security, Routing Alogrithms Intruder Information Caches, Dedicated Membership Servers, IP Spoofing.- Importance of IDPF to Avoid DDoS Attacks
Abstract Views :132 |
PDF Views:4
Authors
Affiliations
1 Sri Indu College of Engineering & Technology, JNTU Hyderabad, IN
2 JNTU Hyderabad, IN
3 CSE Dept. at Sri Indu College of Engineering & Technology, IN
1 Sri Indu College of Engineering & Technology, JNTU Hyderabad, IN
2 JNTU Hyderabad, IN
3 CSE Dept. at Sri Indu College of Engineering & Technology, IN
Source
Networking and Communication Engineering, Vol 2, No 9 (2010), Pagination: 308-318Abstract
The Distributed Denial-of-Service (DDoS) attack is a serious threat to the legitimate use of the Internet. Prevention mechanisms are thwarted by the ability of attackers to forge or spoof the source addresses in IP packets. By employing IP spoofing, attackers can evade detection and put a substantial burden on the destination network for policing attack packets. In this paper, we propose an interdomain packet filter (IDPF) architecture that can mitigate the level of IP spoofing on the Internet. A key feature of our scheme is that it does not require global routing information. IDPFs are constructed from the information implicit in Border Gateway Protocol (BGP) route updates and are deployed in network border routers. We establish the conditions under which the IDPF framework correctly works in that it does not discard packets with valid source addresses. Based on extensive simulation studies, we show that, even with partial deployment on the Internet, IDPFs can proactively limit the spoofing capability of attackers. In addition, they can help localize the origin of an attack packet to a small number of candidate networks.Keywords
IP Spoofing, DDoS, BGP, Network-Level Security and Protection, Routing Protocols.- Dynamic Routing with Security Considerations
Abstract Views :161 |
PDF Views:3
Authors
Affiliations
1 CSE Dept. at Sri Indu College of Engineering & Technology, IN
2 Nagarjuna University, Guntur, IN
3 Sri Indu College of Engineering & Technology, JNTU Hyderabad, IN
1 CSE Dept. at Sri Indu College of Engineering & Technology, IN
2 Nagarjuna University, Guntur, IN
3 Sri Indu College of Engineering & Technology, JNTU Hyderabad, IN
Source
Networking and Communication Engineering, Vol 2, No 9 (2010), Pagination: 328-337Abstract
Security has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of cryptography algorithms and system infrastructures, we will propose a dynamic routing algorithm that could randomize delivery paths for data transmission. The algorithm is easy to implement and compatible with popular routing protocols, such as the Routing Information Protocol in wired networks and Destination-Sequenced Distance Vector protocol in wireless networks ,without introducing extra control messages. An analytic study on the proposed algorithm is presented, and a series of simulation experiments are conducted to verify the analytic results and to show the capability of the proposed algorithm.Keywords
Security-Enhanced Data Transmission, Dynamic Routing, RIP, DSDV.- Mitigating Denial-Of-Service Attacks on the Chord Overlay Network:A Location Hiding Approach
Abstract Views :148 |
PDF Views:3
Authors
Affiliations
1 CSE Dept. at Sri Indu College of Engineering & Technology, IN
2 Nagarjuna University,Guntur, IN
3 Sri Indu College of Engineering & Technology, JNTU Hyderabad, IN
1 CSE Dept. at Sri Indu College of Engineering & Technology, IN
2 Nagarjuna University,Guntur, IN
3 Sri Indu College of Engineering & Technology, JNTU Hyderabad, IN