Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Bhavani, Y.
- Survey on Packet Marking Algorithms for IP Traceback
Abstract Views :150 |
PDF Views:7
Authors
Affiliations
1 Dept of Information Technology, Kakatiya Institute of Technology and Science, Warangal, Telangana, IN
2 Dept of Computer Science, Vaagdevi College of Engineering, Warangal, Telangana, IN
3 Dept of Computer Science, Jawaharlal Nehru Technological University, Hyderabad, Telangana, IN
1 Dept of Information Technology, Kakatiya Institute of Technology and Science, Warangal, Telangana, IN
2 Dept of Computer Science, Vaagdevi College of Engineering, Warangal, Telangana, IN
3 Dept of Computer Science, Jawaharlal Nehru Technological University, Hyderabad, Telangana, IN
Source
Oriental Journal of Computer Science and Technology, Vol 10, No 2 (2017), Pagination: 507-512Abstract
Distributed Denial of Service (DDoS) attack is an unavoidable attack. Among various attacks on the network, DDoS attacks are difficult to detect because of IP spoofing. The IP traceback is the only technique to identify DDoS attacks. The path affected by DDoS attack is identified by IP traceback approaches like Probabilistic Packet marking algorithm (PPM) and Deterministic Packet Marking algorithm (DPM). The PPM approach finds the complete attack path from victim to the source where as DPM finds only the source of the attacker. Using DPM algorithm finding the source of the attacker is difficult, if the router get compromised. Using PPM algorithm we construct the complete attack path, so the compromised router can be identified. In this paper, we review PPM and DPM techniques and compare the strengths and weaknesses of each proposal.Keywords
Distributed Denial of Service, Deterministic Packet Marking, IP Traceback, Packet Marking, Probabilistic Packet Marking.References
- Marion Vasseur, Xiuzhen Chen, Rida Khatoun, Ahmed Serhrouchni, Survey on Packet Marking Fields and Information for IP Traceback, In Proc. Int. Conf. on Cyber Security of Smart cities, Industrial Control System and Communications (SSIC), 2015.
- R. Kiremire Ankunda, R. Brust Matthias, V. Phoha Vir, Using network motifs to investigate the influence of network topology on PPM based IP traceback schemes. Computer Network, 2014; 14–32.
- Anatolii Balyk, Uliana Latsykovska, Mikolaj Karpinski, Yuliia Khokhlachova, Aigul Shaikhanova, Lesia Korkishko, A Survey of Modern IP Traceback Methodologies. In Proc. 8th IEEE Int. Conf. on Intelligent Data Acquisition and Advanced Computing Systems, 2015: pp. 484-488.
- S. Savage, D. Wetherall, A. Karlin, T. Anderson, Practical network support for IP Traceback. In Proc. ACM SIGCOMM conference, 2000; pp. 295-306.
- DX Song, A. Perrig, Advanced and authenticated marking schemes for IP Traceback. In Proc. IEEE INFOCOM, 2001; pp. 878–86.
- Snoeren AC, Partridge C, Sanchez LA, Jones CE, Tchakountio F, Kent ST, Hash-based IP Traceback. In Proc. ACM SIGCOMM, 2001.
- Wong Tsz-Yeung, Wong Man-Hon, Lui Chi-Shing, A precise termination condition of the probabilistic packet marking algorithm. IEEE Transactions on Dependable Secure Computing, 2008; 5: 6–21.
- Lih-Chyau, Liu Tzong-Jye, Yang Jyun-Yan, IP traceback based on Chinese Remainder Theorem. In Proc. 6th IASTED Int. Conf. on Communications, Internet, and Information Technology, 2007, pp. 214–219.
- Y. Bhavani, V. Janaki, R. Sridevi, IP traceback through modified probabilistic packet marking algorithm using Chinese remainder theorem, Ain Shams Engineering Journal, 2015; 6: 715–722.
- D. Dean, M. Franklin, A. Stubblefield, An algebraic approach to IP Traceback. ACM Transactions on Information and System Security, 2002; 5: 119–137.
- K. Park, H. Lee, On the effectiveness of probabilistic packet marking for IP Traceback under denial-of-service attacks, In Proc. IEEE INFOCOM, 2001.
- Y. Bhavani, V. Janaki, R. Sridevi, IP Traceback through modified probabilistic packet marking algorithm. In Proc. IEEE Region10 conference TENCON, 2013, pp.1565-1569.
- Andrey Belenky and Nirwan Ansari, IP Traceback with Deterministic Packet Marking. IEEE Communications Letters 7, 2003; 162-164.
- Ashwani Parashar, Dr. Ramaswami Radhakrishnan, Improved Deterministic Packet Marking Algorithm. In Proc. of 15th Int. Conf. on Advanced Computing Technologies, 2013.
- Yang Xiang , Wanlei Zhou , Minyi Guo, Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks. IEEE Transactions on Parallel and Distributed Systems, 2009; 20: 567 – 580.
- S. Yu, W. Zhou, S. Guo, M. Guo, A feasible IP traceback framework through dynamic deterministic packet marking. IEEE Transactions on Computers, 2016; 65: 1418–1427.
- Android based Student Reminder System
Abstract Views :218 |
PDF Views:0
Authors
Y. Bhavani
1,
D. Sanjay
1
Affiliations
1 Dept. of Information Technology, Kakatiya Institute of Technology and Science, Warangal, Telangana, IN
1 Dept. of Information Technology, Kakatiya Institute of Technology and Science, Warangal, Telangana, IN
Source
Oriental Journal of Computer Science and Technology, Vol 10, No 4 (2017), Pagination: 760-764Abstract
Now a day’s usage of android applications has become a part of our life. by using these applications our work becomes simple and easier in our day to day activities. this paper suggests an android application which is generally useful for the students and parents. it contains various features like notifying the student about the renewal date of library books, alerting students and their parents about the percentage of attendance and reminds them about number of classes they should present to maintain the specified attendance threshold. this application also alerts the students and parents about various events like examinations, workshops to be held, student activities to be conducted etc. this application is user friendly and can be installed in any android smart phone.Keywords
Android, Smart Phone, Reminder, Attendance Management, Alerts, Library Renewal.References
- Puchong Subpratatsavee, Tanabat Promjun, Wichian Sir iprom, Worasitti Sr iboon, Attendance System using NFC technology and embedded camera device on mobile phone. In: IEEE International Conference on Information Science and Applications, 2014.
- Shailendra, M.Singh, M.A.Khan, V.Singh, A.Palit, S.Wadar, Attendance Management System. In: IEEE International Conference on Electronics and Communication Systems, 2015; pp. 418-422.
- Geetha Baskaran, Ahmad Farhan Aznan, Attendance System Using a Mobile Device: Face Recognition, GPS or Both?. International Journal of Advances in Electronics and Computer Science, 2016; 26—32.
- V. Somasundaram, M. Kannan and V. Sriram, Mobile based Attendance Management System, Indian Journal of Science and Technology. 2016; 9: 1—4.
- Dhiman Sarker., Nafiez Ishtaique Hossian., Insan Arafat Jamil, Design and Implementation of Smart Attendance Management System Using Multiple Step Authentications. International workshop on computational intelligence, 2016; 91-95.
- Jun lio, Attendance Management System using a Mobile Device and a Web Application. International conference on network-based Information Systems, 2016; pp. 510-515.
- R.Dinesh, S.R.Arun Provin, M.Aravindan, D.Rajeshwari. Library Access System Smart Phone Application using Android. International Journal of Computer Science and Mobile Computing. 2015; 4: 142—149.
- YuXiang S, Cha Y.W, and Kim C.H. Comparison and Performance Analysis of App and Webbased One-stop Attendance Management. International Journal of e-Service Science and Technology. 2015; 8: 325—336.
- A.J.Kadam, Aradhana Singh, Komal Jagtap, Srujana Tankala. Mobile Web Based Android Application for College Management System. International Journal of Engineering and Computer Science. 2017; 6: 20206-20209.
- H. K. Nguyen, M. T. Chew. RFID-Based At tendance Management System. In: 2nd Workshop on Recent Trends in Telecommunications Research, 2017; pp. 1—6.