Detection of Spoofing Using Packet Marking Algorithm
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 5
Abstract
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. However the localization infrastructure can be subjected to non cryptographic attacks, such as signal attenuation and amplification that cannot be addressed by traditional security services. An interruption in an authorized users access to a computer network, typically one caused with malicious intent (DDOS). Although the means to carry out motives for and targets of a DOS attack may vary, it generally consists of efforts to indefinitely interrupt services of a host connected to the Internet (DDOS). EPPM significantly reduces the number of IP (Internet protocol) or IP packets required to convey the relevant information, when compared to the prior best known scheme. Compared with the hash-based approach, our approach incurs less storage overhead and less access time overhead at routers. Specifically, the storage overhead is reduced to roughly one half, and the access time requirement is decreased by a factor of the number of neighbour routers.
Authors and Affiliations
B. Balasankari , M. G. MathanKumar
M-Privacy Preserving Synergetic for Data Publishing
In this paper, our focus is on the study of Data mining is the extraction of interesting patterns or knowledge from huge amount of data. In recent years, with the explosivedevelopment in Internet, data storage and data...
Proactive Web Server Protocol for Complaint Assessment
Vulnerability Discovery with attack Injection security threats are increasing for the server software, when software is developed, the software tested for the functionality. Due to un-awareness of software vulnerabilitie...
Integrating Security and Usability at Requirement Specification Process
To construct any software, Requirement process is the common knowledge in most development organization. For any development of process security requirement is rarely supported. Over the years, researcher and developers...
A New Web Based Student Annual Review Information System (SARIS) With Student Success Prediction
In this paper, we are proposing new web based Student Annual Review Information System (SARIS) and prediction method for the success of scholar students to China Scholarship Council(CSC). The main objective of developing...
FPGA Implementation of Lifting DWT based LSB Steganography using Micro Blaze Processor
We present an information hiding technique that utilizes lifting schemes to effectively hide information in images. A successful information hiding should result in the extraction of the hidden data from the image with h...