Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Ravi, R.
- Provisioning Restorable Virtual Private Networks Using Barabasi and Waxman Topology Generation Model
Abstract Views :166 |
PDF Views:0
Authors
R. Ravi
1
Affiliations
1 Department of Computer Science and Engineering, Francis Xavier Engineering College, Tamil Nadu, IN
1 Department of Computer Science and Engineering, Francis Xavier Engineering College, Tamil Nadu, IN
Source
ICTACT Journal on Communication Technology, Vol 1, No 4 (2010), Pagination: 191-201Abstract
As internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks. They are firewall, virtual private networks and encryption algorithms. Out of these, the virtual private network plays a vital role in preventing hackers from accessing the networks. A Virtual Private Network (VPN) provides end users with a way to privately access information on their network over a public network infrastructure such as the internet. Using a technique called "Tunneling", data packets are transmitted across a public routed network, such as the internet that simulates a point-to-point connection. Virtual private networks provide customers with a secure and low-cost communication environment. The basic structure of the virtual circuit is to create a logical path from the source port to the destination port. This path may incorporate many hops between routers for the formation of the circuit. The final, logical path or virtual circuit acts in the same way as a direct connection between the two ports. Our proposed Provisioning Restorable Virtual Private Networks Algorithm (PRA) is used to combine the provisioning and restoration algorithms to achieve better results than the ones obtained by independent restoration and provisioning. In order to ensure service quality and availability in Virtual Private Networks, seamless recovery from failures is essential. The quality of service of the Virtual Private Networks is also improved due to the combination of provisioning and restoration. The bandwidth sharing concept is also applied in link to improve the quality of service in the Virtual Private Network. The performance analysis of the proposed algorithm is carried out in terms of cost, the number of nodes, the number of VPN nodes, delay, asymmetric ratio and delay with constraints with Disjoint Path Algorithm and Approximation Restoration Virtual Private Networks Algorithm. The Provisioning Restorable Virtual Private Networks Algorithm performs better than the Disjoint Path Algorithm.Keywords
Virtual Private Network, Restoration, Provisioning.- Enhanced Provisioning Algorithm for Virtual Private Network in Hose Model with Quality of Service Support Using Waxman Model
Abstract Views :173 |
PDF Views:0
Authors
R. Ravi
1
Affiliations
1 Department of Computer Science & Engineering, Francis Xavier Engineering College, Tamil Nadu, IN
1 Department of Computer Science & Engineering, Francis Xavier Engineering College, Tamil Nadu, IN
Source
ICTACT Journal on Communication Technology, Vol 2, No 1 (2011), Pagination: 265-269Abstract
As Internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks. They are firewall, virtual private networks and encryption algorithms. Out of these, the virtual private network plays a vital role in preventing hackers from accessing the networks. A Virtual Private Network (VPN) provides end users with a way to privately access information on their network over a public network infrastructure such as the internet. Using a technique called "Tunneling", data packets are transmitted across a public routed network, such as the internet that simulates a point-to-point connection. Virtual private networks provide customers with a secure and low-cost communication environment. The basic structure of the virtual circuit is to create a logical path from the source port to the destination port. This path may incorporate many hops between routers for the formation of the circuit. The final, logical path or virtual circuit acts in the same way as a direct connection between the two ports. The K-Cost Optimized Delay Satisfied Virtual Private Networks Tree Provisioning Algorithm connects VPN nodes using a tree structure and attempts to optimize the total bandwidth reserved on the edges of the VPN tree that satisfies the delay requirement. It also allows sharing the bandwidth on the links to improve the performance. The proposed KCDVT algorithm computes the optimal VPN Tree. The performance analysis of the proposed algorithm is carried out in terms of cost, the number of nodes, and the number of VPN nodes, delay, asymmetric ratio and delay with constraints with Breadth First Search Algorithm. The KCDVT performs better than the Breadth First Search Algorithm.Keywords
Provisioning, VPN and Waxman.- Prevention of Zero Day Vulnerability in Network Using Ensemble Fuzzy Association and Cuttle Fish Detection
Abstract Views :221 |
PDF Views:3
Authors
M. Masthan
1,
R. Ravi
2
Affiliations
1 Department of Computer Science and Engineering, Manonmaniam Sundaranar University, IN
2 Department of Computer Science and Engineering, Francis Xavier Engineering College, IN
1 Department of Computer Science and Engineering, Manonmaniam Sundaranar University, IN
2 Department of Computer Science and Engineering, Francis Xavier Engineering College, IN
Source
ICTACT Journal on Communication Technology, Vol 8, No 2 (2017), Pagination: 1518-1523Abstract
The data communication between different parts of the universe is managed by the computer networks and the Enterprise Information System (EIS) which rely on them. The privacy and security are the most important factor to be maintained in any network systems. This paper deals about the detection of intrusion attack in the eclipse database using Ensemble fuzzy association (EFA) and Cuttle Fish Algorithm (CFA. The proposed methodology creates a rule-based ensemble model for network diversity metric modeling for the efficient detection of zeroday attacks and to reduce the time consumption. The simulation result shows that the EFA and CFA having efficient detection rates as compared to the existing systems.Keywords
Enterprise Information System (EIS), Ensemble Fuzzy Association (EFA), Cuttle Fish Algorithm (CFA).References
- Nicolas Falliere, Liam O Murchu and Eric Chien, “W32.Stuxnet Dossier”, Available at: https://scadahacker.com/library/Documents/Cyber_Events/Symantec%20-%20Stuxnet%20Dossier%20v1.4.pdf.
- Bev Littlewood and Lorenzo Strigini, “Redundancy and Diversity in Security”, Proceedings of European Symposium on Research in Computer Security, pp. 423-438, 2004.
- Benjamin Cox, David Evans, Adrian Filipi, Jonathan Rowanhill, Wei Hu, Jack Davidson, John Knight, Anh Nguyen-Tuong and Jason Hiser, “N-Variant Systems: A Secretless Framework for Security through Diversity”, Proceedings of 15th USENIX Security Symposium, pp. 105-120, 2006.
- Debin Gao, Michael K. Reiter and Dawn Song, “Behavioral Distance Measurement using Hidden Markov Models”, Proceedings of International Workshop on Recent Advances in Intrusion Detection, pp. 19-40, 2006.
- Byung-Gon Chun, Petros Maniatis and Scott Shenker, “Diverse Replication for Single Machine Byzantine-Fault Tolerance”, Proceedings of USENIX Annual Technical Conference, pp. 287-292, 2008.
- M. Garcia, A. Bessani, I. Gashi, N. Neves and R. Obelheiro, “OS Diversity for Intrusion Tolerance: Myth or Reality?”, Proceedings of IEEE/IFIP 41st International Conference on Dependable Systems and Networks, pp. 383-394, 2011.
- Sandeep Bhatkar, Daniel C. DuVarney and R. Sekar, “Address Obfuscation: An Efficient Approach to Combat A Broad Range of Memory Error Exploits”, Proceedings of 12th USENIX Annual Technical Conference, pp. 105-120, 2003.
- An Investigation of Security Techniques for Concealed DDOS Exposure Attacks
Abstract Views :219 |
PDF Views:1
Authors
Affiliations
1 Department of Information and Communication Engineering, Anna University, Chennai, IN
2 Department of Computer Science and Engineering, Manonmaniam Sundaranar University, IN
3 Department of Computer Science and Engineering, Francis Xavier Engineering College, IN
1 Department of Information and Communication Engineering, Anna University, Chennai, IN
2 Department of Computer Science and Engineering, Manonmaniam Sundaranar University, IN
3 Department of Computer Science and Engineering, Francis Xavier Engineering College, IN
Source
ICTACT Journal on Communication Technology, Vol 9, No 1 (2018), Pagination: 1681-1685Abstract
Due to the influence of the multi-level system, the DDoS became a significant investigation in modern days. This encourages us to reduce the data loss and service overheads. In order to investigate these issues, an investigation of the DDoS attack and their related security techniques were analyzed in this paper. So, in this investigation, various data about the intruders will be collected by employing a secured multi-layered design with nomadic honeypots. Our proposed Subterranean Optimization procedure is utilized to distinguish the gatecrashers in view of the pheromone store on that considered zone. A multi-degree IP log table is utilized to distinguish the gatecrashers at diverse ranges of the device. Once the prompted range is found, the information is sent to multi-degree engineering to restrain the spreading of the stimulated region within the honeypot. This statistics will be dispatched to the honeypot to make a guard framework towards the attackers. The advantage of this proposed strategy is that it gives a complete barrier against DDoS at multilevel without making any overhead.Keywords
DDoS Attack, Subterranean Optimization Procedure, Service Denial Attacks.References
- A. Masood and J. Jim, “Static Analysis for Web Service Security-Tools and Techniques for a Secure Development Lifecycle”, Proceedings of IEEE International Symposium on Technologies for Homeland Security, pp. 121-124, 2015.
- Jawad Hussain Awan et.al., “Security Strategies to Overcome Cyber Measures, Factors and Barriers”, Engineering Science And Technology International Research Journal, Vol. 1, No. 1, pp. 51-58, 2017.
- M. Dabbagh et al., “Software-Defined Networking Security: Pros and Cons”, IEEE Communications Magazine, Vol. 53, No. 6, pp. 73-79, 2015.
- Kianoosh G. Boroojeni, M. Hadi Amini and S.S. Iyengar, “Overview of the Security and Privacy Issues in Smart Grids”, Proceedings of Smart Grids: Security and Privacy Issues, pp. 1-16, 2017.
- M. Wang and Zheng Yan, “Security in D2D Communications: A Review”, Proceedings of IEEE Trustcom/BigDataSE/ISPA, pp. 63-69, 2015.
- M. Aamir and M.A. Zaidi, “A Survey on DDoS Attack and Defense Strategies: from Traditional Schemes to Current Techniques”, Interdisciplinary Information Sciences, Vol. 19, No. 2, pp. 173-200, 2013.
- Chelsea Montgomery, “New Security for a New Era: An Investigation into Law Enforcement Cybersecurity Threats, Obstacles, and Community Applications”, Master Thesis, Department of Science of Cybersecurity, Utica College, 2017
- A.B. Fernandes, et al., “Security Issues in Cloud Environments: A Survey”, International Journal of Information Security, Vol. 13, No. 2, pp.113-120, 2014.
- W. Ding, Z. Yan, and R.H. Deng. “A Survey on Future Internet Security Architectures”, IEEE Access, Vol. 4, pp. 4374-4393, pp. 4374-4393, 2016.
- Claude Fachkha, “Security Monitoring of the Cyber Space”, Available at: https://arxiv.org/ftp/arxiv/papers/1608/1608.01468.pdf
- P. Ravi Kumar, P. Herbert Raj and P. Jelciana, “Exploring Security Issues and Solutions in Cloud Computing ServicesA Survey”, Cybernetics and Information Technologies, Vol. 17, No. 4, pp. 23-31, 2017.
- Parnian Najafi Borazjani, “Security Issues in Cloud Computing”, Proceedings of International Conference on Green, Pervasive, and Cloud Computing, pp. 32-36, 2017.
- Mohammad Masdari and Marzie Jalali, “A Survey and Taxonomy of DoS Attacks in Cloud Computing”, Security and Communication Networks, Vol. 9, No. 16, pp. 37243751, 2016.
- R. Kavitha and G. Padmavathi, “Advanced Random Time Queue Blocking with Traffic Prediction for Defense of LowRate DoS Attacks against Application Servers”, International Journal of Communication Networks and Information Security, Vol. 9, No. 1, pp. 127-132, 2017.
- Ji Min Park, “Finding Effective Responses against CyberAttacks for Divided Nations”, Master Thesis, Naval Postgraduate School, 2015.
- Quan Jia, Kun Sun and Angelos Stavrou, “Motag: Moving Target Defense against Internet Denial of Service Attacks”, Proceedings of 22nd International Conference on Computer Communications and Networks, pp. 227-231, 2013.
- Sunil Chaudhary, et al., “Applying Finite State Process Algebra to Formally Specify a Computational Model of Security Requirements in the Key2phone-Mobile Access Solution”, Proceedings of International Workshop on Formal Methods for Industrial Critical Systems, pp. 23-27, 2015.
- Karanpreet Singh, Paramvir Singh and Krishan Kumar, “Application Layer HTTP-GET Flood DDoS Attacks: Research Landscape and Challenges”, Computers and Security, Vol. 65, pp. 344-372, 2017.
- Huangxin Wang et al., “A Moving Target DDoS Defense Mechanism”, Computer Communications, Vol. 46, pp. 1021, 2014.