ACHIEVING ZERO FALSE POSITIVE AND FALSE NEGATIVE RATES IN AN ATTACK-PATH RECONSTRUCTION
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
The security and privacy are two essential components for the system security of the Computer Networks. Data security means the data is securely stored , transferred and traced IP.Data privacy means the data can only be accessed by the community who have authorization to vision and apply it. Proposing a new version of hybrid IP traceback scheme with efficient packet marking and packet logging aiming to have a fixed storage requirement for each router in packet logging without the need to refresh the logged tracking information and to achieve zero false positive and false negative rates in attack-path reconstruction. It uses a 16-bit marking field to avoid the problem caused by packet fragmentation.
Authors and Affiliations
S. Sai Ganesh, K. Devi Priya
Scale Down Speculation and Exalt Network Performance
In mobile Ad hoc Networks are having dynamic nature of its network infrastructure and it is vulnerable to all types of attacks. Among these attacks the routing attacks getting more attention because its changing the...
Efficient Approximate Algorithms To Estimate The Sr Score For Queries Over Databases
One necessitates province information about the data sets to enlarge idea of clearness score for queries over databases. Each subject in a database encloses the units that are about a similar subject. It is in genera...
Optimal Gabor Filter for Multi Scale Texture Segmentation with Color Indication
Image segmentation is the procedure of the subdivision of a picture into its constituent districts or items. The aftereffect of Image segmentation is an arrangement of sections that all in all cover the whole picture...
Amalgamation Of Captcha And Click Based Graphical Password For User Authentication
Many security primitives are based on hard mathematical problems. Using hard AI problems for security is emerging as an exciting new paradigm, but has been under-explored. Usable security has unique usability challen...
Performance Analysis Of Vedic Multiplier Using Reversible Logic In Spartan 6
A system's performance is generally determined by the performance of the multiplier, because the multiplier is generally the slowest element in the system. Multipliers are key components of many high performance syst...