ACHIEVING ZERO FALSE POSITIVE AND FALSE NEGATIVE RATES IN AN ATTACK-PATH RECONSTRUCTION

Abstract

The security and privacy are two essential components for the system security of the Computer Networks. Data security means the data is securely stored , transferred and traced IP.Data privacy means the data can only be accessed by the community who have authorization to vision and apply it. Proposing a new version of hybrid IP traceback scheme with efficient packet marking and packet logging aiming to have a fixed storage requirement for each router in packet logging without the need to refresh the logged tracking information and to achieve zero false positive and false negative rates in attack-path reconstruction. It uses a 16-bit marking field to avoid the problem caused by packet fragmentation.

Authors and Affiliations

S. Sai Ganesh, K. Devi Priya

Keywords

Related Articles

Modeling of Single-Phase Semi-Z-source Inverter

This paper presents several single-phase non-isolated semi-Z-source inverters for small distributed power generator in grid-connected applications with low cost and doubly grounded features. These semi-Z-source invert...

Effective Utilization of ERDI Algorithm Based on Software Prototyping

Rapid prototyping is a broad field encompassing many domains and varied approaches. This article presents our experiences using user-centered rapid prototyping approaches for developing display-based ubiquitous syste...

A Novel Way To Automatically Mine Comparable Entities From Comparative Questions

A comparison activity usually contains search for applicable web pages containing information about the targeted products, find competing products, read reviews and identify pros and cons. In this paper we focus on f...

A Novel Approach for Reducing Routing Overhead In Mobile Ad hoc Network

The Mobile Adhoc Networks(MANET) are the examples of infrastructure less networks and are having frequent occurrence of route discoveries. In MANET, the routing has been performed with the help of neighbouring infor...

Usage of Ring Signatures To Develop Homomorphic Authenticators In Oruta To Confirm The Uprightness Of Shared Information

It is rehearsed for clients to impact distributed storage administrations to add to information with others in a gathering as information sharing form into a standard element in most distributed storage offerings inc...

Download PDF file
  • EP ID EP27678
  • DOI -
  • Views 228
  • Downloads 4

How To Cite

S. Sai Ganesh, K. Devi Priya (2013). ACHIEVING ZERO FALSE POSITIVE AND FALSE NEGATIVE RATES IN AN ATTACK-PATH RECONSTRUCTION. International Journal of Research in Computer and Communication Technology, 2(10), -. https://europub.co.uk/articles/-A-27678