Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Durairaj, M.
- ThreV - An Efficacious Algorithm to Thwart MAC Spoof DoS Attack in Wireless Local Area Infrastructure Network
Abstract Views :245 |
PDF Views:0
Authors
M. Durairaj
1,
A. Persia
1
Affiliations
1 School of Computer Science, Engineering & Applications, Bharathidasan University, Tamilnadu, IN
1 School of Computer Science, Engineering & Applications, Bharathidasan University, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 7, No 5 (2014), Pagination: 581-588Abstract
The major cause of threat circling around the wireless local area infrastructure network is Denial of Service (DoS) attack. The anticipated users will be denied from availing the resources by spoofing the Medium Access Control (MAC) address of the legitimate client/AP. Less protection in MAC address led to get easy spoofing. Since, the management frame has been unencrypted; adversary sends the management frame to the victim using the spoofed MAC address. This prerequisite goaded to offer an effective prevention mechanism for a DoS attack. Many security mechanisms are obtainable which have their own drawback in providing complete prevention of DoS attack. This paper proposes ThreV mechanism which detects and prevents the intruder in an efficient manner. The solutions are simulated using NS2, to analyze how far it prevents the DoS attacks. The simulation result of the proposed algorithm measures the packet delivery ratio, control overhead, normalized routing overhead, throughput, delay and packet loss. The experimental result proved the effectiveness of proposed ThreV algorithm in detecting and preventing MAC spoof DoS attacks.Keywords
ANM, DoS Attack, MAC Spoof, ThreV, TpatLetEn, WLANn- A Study on Security Issues in Cloud Based E-Learning
Abstract Views :241 |
PDF Views:0
Authors
M. Durairaj
1,
A. Manimaran
1
Affiliations
1 School of Computer Science Engineering & Applications, Bharathidasan University, Trichy-620023, IN
1 School of Computer Science Engineering & Applications, Bharathidasan University, Trichy-620023, IN
Source
Indian Journal of Science and Technology, Vol 8, No 8 (2015), Pagination: 757-765Abstract
Cloud based E-Learning is the method to reduce cost and complexity of data accessing, which are controlled by third party services. Traditional E-Learning methods are incorporated with cloud computing technology to provide massive advantages to the academic users but it compromises in security aspects. Proposed methodology ensures data availability and provides solution to protect indispensable data from the attackers. This study identifies different security issues in cloud service delivery model with an aim to suggest a solution in the form of security measures related to the cloud based e-learning. Different types of attacks in service delivery models of e-learning proposed by different researchers are discussed. Threats, security requirements, and challenges involved are also taken into consideration. This study of e-Learning models advocates users to access their data in the cloud through a secured layer using the internet.Keywords
Cloud Security, Cloud Service Delivery Models, Cloud Security Attacks, E-Learning, Data Availability, Cloud Security Challenges and Threats.- An Intelligent Hybrid Mechanism to Predict the Risk of Cardio Vascular Disease
Abstract Views :175 |
PDF Views:0
Authors
Affiliations
1 School of Computer Science, Engineering and Applications, Bharathidasan University, Trichy – 620024, Tamil Nadu, IN
1 School of Computer Science, Engineering and Applications, Bharathidasan University, Trichy – 620024, Tamil Nadu, IN