Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

An Analysis of Packet Hiding Methods


Affiliations
1 Bharathiar University, Coimbatore, India
2 Dept. of MCA, Dr. Mahalingam College of Engineering & Technology, Pollachi, India
     

   Subscribe/Renew Journal


The nature of the network medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming.  This intentional interference of transmissions can be used as a launch pad for mounting Denial-of-Service attacks on networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. Here illustrate the advantages of selective jamming in terms of network performance degradation. To mitigate these attacks, these works simulate two schemes that prevent real-time packet classification by combining cryptographic primitives with mac-layer attributes. Theresults and analyze of this method and evaluate their computational and best hiding method.


Keywords

Selective Jamming, Denial-of-Service, Packet Classification.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 180

PDF Views: 2




  • An Analysis of Packet Hiding Methods

Abstract Views: 180  |  PDF Views: 2

Authors

L. Sheeba
Bharathiar University, Coimbatore, India
V. S. Meenakshi
Dept. of MCA, Dr. Mahalingam College of Engineering & Technology, Pollachi, India

Abstract


The nature of the network medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming.  This intentional interference of transmissions can be used as a launch pad for mounting Denial-of-Service attacks on networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. Here illustrate the advantages of selective jamming in terms of network performance degradation. To mitigate these attacks, these works simulate two schemes that prevent real-time packet classification by combining cryptographic primitives with mac-layer attributes. Theresults and analyze of this method and evaluate their computational and best hiding method.


Keywords


Selective Jamming, Denial-of-Service, Packet Classification.