A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Meenakshi, V. S.
- An Analysis of Packet Hiding Methods
Authors
1 Bharathiar University, Coimbatore, IN
2 Dept. of MCA, Dr. Mahalingam College of Engineering & Technology, Pollachi, IN
Source
Programmable Device Circuits and Systems, Vol 5, No 12 (2013), Pagination: 479-483Abstract
The nature of the network medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference of transmissions can be used as a launch pad for mounting Denial-of-Service attacks on networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. Here illustrate the advantages of selective jamming in terms of network performance degradation. To mitigate these attacks, these works simulate two schemes that prevent real-time packet classification by combining cryptographic primitives with mac-layer attributes. Theresults and analyze of this method and evaluate their computational and best hiding method.
Keywords
Selective Jamming, Denial-of-Service, Packet Classification.- Multimodal Biometric Authentication using Palmprint and Fingerprint
Authors
1 Department of Computer Engineering, Suguna Polytechnic College, IN
2 Department of Computer Applications, Dr.Mahalingam College of Engineering and Technology, IN
Source
Biometrics and Bioinformatics, Vol 5, No 12 (2013), Pagination: 403-408Abstract
Biometric based authentication systems are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. Depending upon the implicational usage the biometric features are categorized and taken for authentication. For authentication, Biometric technologies provide best security concern than others, so biometrics is preferred most commonly. But the difficult task is to find the appropriate biometric technique. Unimodal biometric type relies on the evidence of a single source of biometric information for Personal Identification. But it has a lot of limitations in terms of the security and privacy. Multimodal biometric system is an advance level of a multi-biometric system that may use more than one correlated biometric measurement. They address the problem of non-universality, noisy sensor data, and large intra-user variations and also provide anti-spoofing that are commonly found in unimodal biometric systems. In this paper, we propose a bimodal biometric authentication system based on the features of Palmprint and Fingerprint. The extracted features are fused at feature level to obtain the multibiometric template. Final decision is made by multitemplate matching approach.Keywords
Palm Print, Multimodal Biometric Systems.- A Survey on Biometric Template Protection Using Hybrid Approaches
Authors
1 Department of Computer Applications, SNR Sons College, Coimbatore-641006, IN
Source
Biometrics and Bioinformatics, Vol 3, No 3 (2011), Pagination: 125-128Abstract
Biometric authentication due to its merits compared to traditional authentication methods like password finds its application in several crucial applications like border security, military, network security and forensic applications. However, biometric authentication systems are subjected to several attacks. Providing security to biometric template is an important issue in any biometric authentication system. Different biometric template protection mechanisms are in practice. Anyhow, no single method provides all the required properties of a biometric template. Hybrid template protection mechanisms are better compared to single biometric template protection mechanism. This paper presents a survey of different works that provides hybrid biometric template security.Keywords
Biometric Template Security, Biometric Template Protection Schemes, Hybrid Approach, Attacks.- A Survey on Biometric Template Protection Using Fuzzy Vault Scheme
Authors
1 Department of Computer Applications, SNR Sons College, Coimbatore-641006, IN
2 Department of Computer Science, Avinashilingam Deemed University for Women, Coimbatore-641043, IN
Source
Biometrics and Bioinformatics, Vol 3, No 1 (2011), Pagination: 33-36Abstract
Security is an important component in any authentication system. Biometric authentication is gaining much importance in the current linked scenario. Anyhow, biometric based authentication systems are subjected to a variety of attacks. Stored biometric template attack is one of the severe attacks. Biometric template plays a vital role in biometric authentication. Therefore, ensuring security to biometric template is a demanding issue in the present times. Fuzzy vault is a crypto biometric frame work that provides security to biometric templates. This paper presents a survey on the different work done on fuzzy vault scheme to protect biometric templates.Keywords
Biometric Template, Security, Fuzzy Vault, Attacks, Cryptography.- Security Analysis of Multimodal Biometric Fuzzy Vault
Authors
1 SNR Sons College, Coimbatore - 6, IN
2 Avinashilingam University for Women, Coimbatore - 43, IN
Source
Biometrics and Bioinformatics, Vol 2, No 3 (2010), Pagination: 47-52Abstract
Crypto biometric systems are authentication systems where the concept of biometric authentication is blended with cryptography. Crypto-biometric systems utilize the advantages of biometrics over traditional password based authentication. This paper uses the idea of fuzzy vault cryptographic constructs to protect crucial data like secret encryption key. Fuzzy vault is a proven emerging technology for providing biometric template security. This work constructs two independent fingerprint and iris vaults and a combined multimodal biometric vault. The proposed multimodal biometric fuzzy vault uses the features extracted from both finger print and iris for ensuring high security of the critical data and the biometric template. It is comparatively difficult for an attacker to compromise multi modal biometric fuzzy vault system than single biometric fuzzy vault systems. This work measures the security of the constructed fuzzy vault by means of min-entropy.
Keywords
Biometrics, Multi Biometrics, Fuzzy Vault, Multi Biometric Fuzzy Vault, Biometric Template Security, Min-Entropy, Crypto Biometric Systems.- Security Analysis of Multimodal Biometric Fuzzy Vault
Authors
1 SNR Sons College, Coimbatore-6, IN
2 Avinashilingam University for Women, Coimbatore-43, IN
Source
Biometrics and Bioinformatics, Vol 1, No 1 (2009), Pagination: 16-21Abstract
Crypto biometric systems are authentication systems where the concept of biometric authentication is blended with cryptography. Crypto-biometric systems utilize the advantages of biometrics over traditional password based authentication. This paper uses the idea of fuzzy vault cryptographic constructs to protect crucial data like secret encryption key. Fuzzy vault is a proven emerging technology for providing biometric template security. This work constructs two independent fingerprint and iris vaults and a combined multimodal biometric vault. The proposed multimodal biometric fuzzy vault uses the features extracted from both finger print and iris for ensuring high security of the critical data and the biometric template. It is comparatively difficult for an attacker to compromise multi modal biometric fuzzy vault system than single biometric fuzzy vault systems. This work measures the security of the constructed fuzzy vault by means of min-entropy.Keywords
Biometrics, Multi Biometrics, Fuzzy Vault, Multi Biometric Fuzzy Vault, Biometric Template Security, Min-Entropy, Crypto Biometric Systems.- Wireless Sensor Network–A Study
Authors
1 Bharathiar University, Coimbatore, IN
2 Chikkena Government Arts College, Tiruppur, IN
Source
Wireless Communication, Vol 9, No 1 (2017), Pagination: 1-3Abstract
The security of wireless sensor networks is a topic that has been studied extensively in the literature. The intrusion detection system is used to detect various attacks occurring on sensor nodes of Wireless Sensor Networks that are placed in various hostile environments.such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. Wireless Sensor Networks (WSN) consist of tiny devices. These tiny devices have limited energy, computational power, transmission range and memory. The more modern networks are bi-directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. Wireless Sensor Networks (WSNs) are the collection of self – organizing sensor nodes deployed in various physical environments statically or dynamically depend upon the application.WSN has been used in many applications such habitat monitoring, building monitoring, smart grid and pipeline monitoring. Our intrusion detection model takes advantage of cluster-based architecture to reduce energy consumption. The WSN is built of "nodes" – from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a radiotransceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. A sensor node might vary in size from that of a shoebox down to the size of a grain of dust, although functioning "motes" of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is similarly variable, ranging from a few to hundreds of dollars, depending on the complexity of the individual sensor nodes. Size and cost constraints on sensor nodes result in corresponding constraints on resources such as energy, memory, computational speed and communications bandwidth. The topology of the WSNs can vary from a simple star network to an advanced multi-hopwireless mesh network. The propagation technique between the hops of the network can be routing or flooding.
- Hybrid Node Watching Technique based Dos Flooding Attack Detection in Wireless Sensor Network
Authors
1 Department of Computer Applications, PSGR Krishnammal College for Women, IN
2 Department of Computer Science, Chikkaana Government Arts College, IN
Source
ICTACT Journal on Communication Technology, Vol 11, No 4 (2020), Pagination: 2292-2300Abstract
Intrusion detection is the most concentrated research issue in the wireless sensor network where presence of intrusion activities are most difficult to find where there is no centralized architecture to monitor. One of the most frequently found intrusion activities in wireless sensor network are Denial of Service (DoS) Flooding attacks. DoS flood attacks would send large volume of chunk messages to the end node in order to corrupt the functioning of the particular node. Some of the most important DoS flooding attacks that are found in the network are ICMP flood attack, Synchronous Flood attack, UDP Flood attack, and Web attacks. All these networks would send enormous amount of messages such internet control message packets, synchronous messages, UDO messages correspondingly to the web servers to collapse the normal functioning of them by consuming energy resources and so on. In the previous research works, Sybil attacks and DDoS attacks are detected and avoided by introducing the method namely Privacy Concerned Anonymous Authentication Method (PAAM). However these research methods reduced in its attack detection rate with the presence of DoS Flooding attacks. This is focused and resolved in this work by introducing a method namely Hybrid Node Watching Technique (HNWT). This research technique attempt to find the variation in the data’s and control messages transmitted between the end nodes to find the flooding attack presence. This is done through the trust nodes which are selected optimally by using cat swarm algorithm. These optimally selected nodes will monitor data transmission behaviour to predict malicious node presence. The overall implementation of this research work is done in NS2 simulation environment from which it is proved that proposed research technique tends to have increased attack detection rate.Keywords
Intrusion Attacks, DoS Flooding Attacks, Node Monitoring, ICMP Flood Attacks, Syn Flood Attack, UDP Flood Attack, Web Attacks.- A Novel Three Layer Filtering (3L-F) Framework for Prevention of DDoS Attack in Cloud Environment
Authors
1 PG & Research Department of Computer Science, Chikkanna Government Arts College, Tirupur, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 8, No 4 (2021), Pagination: 334-345Abstract
Data security is an integral requirement of any modern information system as attackers are gaining chances due to the prompt improvement in digital technology. However, in the current decade, the use of cloud computing is rising steeply, and so is network traffic. As the cloud computing model is based on the distributed computing, cloud servers are widely distributed and cloud users can access the service from anywhere and at any time. This makes the cloud servers, a target for the adversaries. The most common attack in a cloud environment is the DDoS attack that causes bulky and abnormal traffic to the cloud server. The cloud server is incapable to manage such unusual traffic and stops momentarily by making the server down with excessive traffic. DDoS attacks can be avoided by diligent traffic control prior to the DDoS attack. This paper proposes a novel three-layer filtering mechanism to prevent various forms of DDoS attacks. The first layer of the proposed DDoS attack prevention mechanism uses two-level authentication processes. Second layer filtering verifies whether the user accesses the resources within the pre-defined limits and the third layer filtering sieves out the spoofed packets. The proposed model has been analyzed for evaluating the performance in terms of CPU overhead and load, the throughput of the victim, the reduction in connection delay. The result analysis shows that the proposed model has improved performance with a higher detection rate of 0.92 and a lower dropout rate of 0.10.Keywords
DDoS Attack, Cloud Computing, Cloud Security, Attack Prevention and Cloud Server.References
- K. C. Okafor, J. A. Okoyeand G. Ononiwu, “Vulnerability bandwidth depletion attack on distributed cloud computing network: A QoS perspective”. International Journal of Computer Applications, vol. 138, no. 7, pp.18-30, 2016.
- F. Shaarand A. Efe, “DDoS attacks and impacts on various cloud computing components”, International Journal of Information Security Science, vol.7, no.1, pp.26-48, 2018.
- G. Somani, M. S. Gaur, D. Sanghi and M. Conti, “DDoS attacks in cloud computing: Collateral damage to non-targets”, Computer Networks, vol. 109, pp.157-171, 2016.
- S. Yu, Y. Tian, S. Guo and D. O. Wu, “Can we beat DDoS attacks in clouds?”, IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 9, pp. 2245-2254,2013.
- O. Terzo and L. Mossucca, “Cloud Computing with E-science Applications”, CRC Press, 2017.
- A. M. Lonea, D. E. Popescu andH. Tianfield, “Detecting DDoS attacks in cloud computing environment”, International Journal of Computers Communications & Control, vol. 8, no. 1, pp. 70-78, 2012.
- A. Bremler-Barr, E. Brosh and M. Sides, DDoS attack on cloud auto-scaling mechanisms”, In IEEE INFOCOM Conference on Computer Communications, IEEE, pp. 1-9, 2017.
- P. Shamsolmoali and M. Zareapoor,“Statistical-based filtering system against DDOS attacks in cloud computing”. In International Conference on Advances in Computing, Communications and Informatics, IEEE, pp. 1234-1239, 2014.
- J. Latanicki, P. Massonet, S. Naqvi, B. Rochwerger andM. Villari, “Scalable Cloud Defenses for Detection, Analysis and Mitigation of DDoS Attacks”, In Future Internet Assembly, pp. 127-137, 2010.
- G. Somani, M. S. Gaur, D. Sanghi, M. Conti and R. Buyya, “DDoS attacks in cloud computing: Issues, taxonomy, and future directions”. Computer Communications, vol. 107, pp. 30-48, 2017.
- A. R. Wani, Q. P. Rana, U. Saxena andN. Pandey, “Analysis and detection of DDoS attacks on cloud computing environment using machine learning techniques”, In Amity International conference on artificial intelligence, IEEE, pp. 870-875, 2019.
- M. Darwish, A. Ouda L. F. Capretz, “Cloud-based DDoS attacks and defences”, In International Conference on Information Society, IEEE, pp. 67-71, 2013.
- R. Saxena and S. Dey, “DDoS attack prevention using collaborative approach for cloud computing”, Cluster Computing, pp. 1-16, 2019.
- V. Chouhan andS. K. Peddoju, “Packet monitoring approach to prevent DDoS attack in cloud computing”, InternationalJournal of Computer Science and Electronic Engineering, vol. 1, no. 2, pp. 2315-4209, 2013.
- A. N. Jaber, M. F. Zolkipli, H. A. Shakir and M. R. Jassim, “Host based intrusion detection and prevention model against DDoS attack in cloud computing”, In International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Springer, Cham, pp. 241-252, 2017.
- H. Luo, Y. Lin, H. Zhang andM. Zukerman, “Preventing DDoS attacks by identifier/locator separation",IEEE Network, vol. 27, no. 6, pp. 60-65, 2013.
- R. Patgiri, S. Nayak andS. K. Borgohain, “Preventing ddos using bloom filter: A survey”, arXiv preprint arXiv:1810.06689, 2018.
- N. Patani and R. Patel, “A mechanism for prevention of flooding based DDoS attack”, International Journal of Computational Intelligence Research”,vol. 13,no. 1, pp. 101-111, 2013.
- O. Osanaiye, H. Cai, K. K. R. Choo, A. Dehghantanha, Z. Xu and M. Dlodlo, “Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing”, EURASIP Journal on Wireless Communications and Networking, vol. 1, pp. 1-10, 2016.
- A. S. Navaz, V. Sangeetha andC. Prabhadevi, “Entropy based anomaly detection system to prevent DDoS attacks in cloud”, arXiv preprint arXiv:2013,1308.6745, 2013.
- N. Jeyanthi, N. C. S. Iyengar, P. M. Kumar and A. Kannammal, “An enhanced entropy approach to detect and prevent DDoS in cloud environment”, International Journal of Communication Networks and Information Security, vol. 5, no. 2, pp. 110, 2013.
- X. Wang, “Mitigation of DDoS Attacks through Pushback and Resource Regulation”,In International Conference on Multimedia and Information Technology, IEEE,pp. 225-228, 2008.
- S. S. Chapade, K. U. Pandey and D. S. Bhade, “Securing cloud servers against flooding based DDoS attacks”. In International Conference on Communication Systems and Network Technologies (CSNT), IEEE,pp.524-528, 2013.
- P. Shamsolmoali, M. A. Alam and R. Biswas, “C2DF: High rate DDOS filtering method in cloud computing”, International Journal of Computer Network and Information Security, vol. 6, no. 9, p.43, 2014.
- A. Saravanan, S. Sathya Bama, S. Kadry and L. K. Ramasamy, “A new framework to alleviate DDoS vulnerabilities in cloud computing”. International Journal of Electrical & Computer Engineering, vol. 9, no. 5, pp. 2088-8708, 2019.
- K. Shridhar and N. Gautam, “A prevention of DDoS attacks in cloud using honeypot”. International Journalof Science and Research (IJSR), vol. 3, Issue. 11,pp. 2319-7064, 2012.
- K. Kalkan and F. Alagöz, “A distributed filtering mechanism against DDoS attacks: ScoreForCore”, Computer Networks, vol. 108, pp.199-209, 2016.
- K. S. Bhosale, M. Nenova andG. Iliev, “The distributed denial of service attacks (DDoS) prevention mechanisms on application layer”. In International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS), IEEE, pp. 136-139, 2017.
- K. Srinivasan, A. Mubarakali, A. S. Alqahtani and A. D. Kumar, “A Survey on the Impact of DDoS Attacks in Cloud Computing: Prevention, Detection and Mitigation Techniques”, In Intelligent Communication Technologies and Virtual Mobile Networks, Springer, Cham, pp. 252-270, 2019.
- G. Somani, A. Johri, M. Taneja, U. Pyne, M. S. Gaur and Sanghi, “DARAC: DDoS mitigation using DDoS aware resource allocation in the cloud",In International Conference on Information Systems Security, Springer, Cham, pp. 263-282, 2015.
- C. Jin, H. Wang and K. G. Shin, “Hop-count filtering: an effective defense against spoofed DDoS traffic”, In Proceedings of the ACM conference on Computer and communications security,pp. 30-41, 2013.
- S. Lagishetty, P. Sabbu and K. Srinathan, “DMIPS-Defensive Mechanism against IP Spoofing”, In Australasian Conference on Information Security and Privacy, Springer, Berlin, Heidelberg, pp. 276-291, 2011.
- S. S. Kolahi, A. A. Alghalbi, A. F. Alotaibi, S. S. Ahmed and D. Lad, “Performance comparison of defense mechanisms against TCP SYN flood DDoS attack”, In Innovations in Computer Science and Engineering, Springer, Singapore, pp. 1-10, 2014.
- “Netwag Tool,” 2007. Available: http://ntwag.sourceforge.net/.
- G. Dayanandam, T. V. Rao, D. B. Babu andS. N. Durga, “DDoS attacks—analysis and prevention. In Innovations in Computer Science and Engineering”, Springer, Singapore, pp. 1-10, 2019.