Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Nagamuthu Krishnan, S. S.
- A Novel Approach for Mitigating Distributed Denial of Service Attacks Drawn on Bit-torrent Protocol in Computer Networks
Abstract Views :482 |
PDF Views:104
Authors
Affiliations
1 Thiagarajar School of Management, Madurai, Tamilnadu, Bhartathiar University, Coimbatore – 641 046
2 Department of Computer Applications, Sri Venkateswara College of Computer Applications and Management, Coimbatore-641105, IN
1 Thiagarajar School of Management, Madurai, Tamilnadu, Bhartathiar University, Coimbatore – 641 046
2 Department of Computer Applications, Sri Venkateswara College of Computer Applications and Management, Coimbatore-641105, IN
Source
Indian Journal of Science and Technology, Vol 5, No 7 (2012), Pagination: 3005-3009Abstract
The objective of the paper is to propose and describe a possible defense mechanism that can be taken up to prevent exploitation of Bit torrent in a peer-to-peer network.Keywords
Bit Torrent, Torrent, Lechers, Seeds, TrackerReferences
- Castro M, Druschel P, Ganesh A, Rowstron A and Wallach DS (2002) Security for structured peer-topeer overlay networks. In OSDI.
- Daswani N and Garcia-MolinaH (2002) Query-flood DoS attacks in Gnutella. CCS 2002.
- Naoum Naoumov and Keith Ross (2006) Exploiting P2P systems for DDoS Attacks. INFOSCALE '06. Proce. First Intl. Conf. Scalable Info. Sys., May 29- June 1, Hong Kong © .
- Giuli TJ, Maniatis, Roussopoulos M, Baker M, Rosenthal DS and Roussopoulos M (2005) Attrition defenses for a peer-to-peer digital preservation system. Proc. USENIX Technical Conf.
- A QOS Parameter based Solution for Black hole Denial of Service Attack in Wireless Sensor Networks
Abstract Views :162 |
PDF Views:0
Authors
Affiliations
1 Department of MCA, RV College of Engineering, Bangalore – 560059, Karnataka, IN
2 VIT University, Vellore – 632014, Tamil Nadu, IN
1 Department of MCA, RV College of Engineering, Bangalore – 560059, Karnataka, IN
2 VIT University, Vellore – 632014, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 38 (2016), Pagination:Abstract
Background/Objectives: A typical Wireless Sensor Network (WSN) is a collection of Sensor nodes with limited charge that get deployed in a range enabling different applications. Enormous potential is there for deployment of WSN in consumer centric applications, industry sector and defence. Method: WSNs are vulnerable to various types of attack, upon which black-hole, a type of Denial of Service (DoS) pose enormous challenge in detection and defence. The primary characteristic of the attack is that reprogramming done by attackers in the captured nodes block the packets received than forwarding to the base station. This results in information entering the black hole area not getting routed to the destination and degradation of QoS factors of delay and final throughput. In this study a comparative performance weighing of Star and tree topology setup of WSN nodes is carried out under the black hole scenario. In case, the parameter of delay is vital Mesh setup is chosen and in the requirement of throughput efficiency and fault tolerance Star topology is chosen. A methodology for choosing the topology depending on the required service parameter under black hole scenario is also devised. Findings: The vital parameters considered for the simulation study are delay in transmission of packets and throughput efficiency among the sensor nodes. The results prove a considerable reduction of the parameter of delay in transmission of packets if hybrid topology is followed and a reasonable increase in the QoS parameter of throughput as mesh topology is adopted during transmission in a black hole vulnerable network. Improvements: The vital parameters of negligible delay and throughput efficiency that contribute effective cooperation among the sensor nodes are taken into account while choosing the appropriate topology, and the results show the distribution of the parameter values for the particular topology chosen.Keywords
Black Hole Attacks, Delay, Denial of Service, Throughput, Topology.- Defending Denial of Service:State Overload Attacks
Abstract Views :121 |
PDF Views:0
Authors
Affiliations
1 Thiagarajar School of Management, Madurai-625 005, IN
2 Department of Computer Applications, Dr. NGP Institute of Technology, Coimbatore, IN
1 Thiagarajar School of Management, Madurai-625 005, IN
2 Department of Computer Applications, Dr. NGP Institute of Technology, Coimbatore, IN