Detection of Spoofing Using Packet Marking Algorithm

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 5

Abstract

Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. However the localization infrastructure can be subjected to non cryptographic attacks, such as signal attenuation and amplification that cannot be addressed by traditional security services. An interruption in an authorized users access to a computer network, typically one caused with malicious intent (DDOS). Although the means to carry out motives for and targets of a DOS attack may vary, it generally consists of efforts to indefinitely interrupt services of a host connected to the Internet (DDOS). EPPM significantly reduces the number of IP (Internet protocol) or IP packets required to convey the relevant information, when compared to the prior best known scheme. Compared with the hash-based approach, our approach incurs less storage overhead and less access time overhead at routers. Specifically, the storage overhead is reduced to roughly one half, and the access time requirement is decreased by a factor of the number of neighbour routers.

Authors and Affiliations

B. Balasankari , M. G. MathanKumar

Keywords

Related Articles

M-Privacy Preserving Synergetic for Data Publishing

In this paper, our focus is on the study of Data mining is the extraction of interesting patterns or knowledge from huge amount of data. In recent years, with the explosivedevelopment in Internet, data storage and data...

Proactive Web Server Protocol for Complaint Assessment

Vulnerability Discovery with attack Injection security threats are increasing for the server software, when software is developed, the software tested for the functionality. Due to un-awareness of software vulnerabilitie...

Integrating Security and Usability at Requirement Specification Process

To construct any software, Requirement process is the common knowledge in most development organization. For any development of process security requirement is rarely supported. Over the years, researcher and developers...

A New Web Based Student Annual Review Information System (SARIS) With Student Success Prediction

In this paper, we are proposing new web based Student Annual Review Information System (SARIS) and prediction method for the success of scholar students to China Scholarship Council(CSC). The main objective of developing...

FPGA Implementation of Lifting DWT based LSB Steganography using Micro Blaze Processor

We present an information hiding technique that utilizes lifting schemes to effectively hide information in images. A successful information hiding should result in the extraction of the hidden data from the image with h...

Download PDF file
  • EP ID EP94235
  • DOI -
  • Views 137
  • Downloads 0

How To Cite

B. Balasankari, M. G. MathanKumar (2014). Detection of Spoofing Using Packet Marking Algorithm. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 10(5), 253-256. https://europub.co.uk/articles/-A-94235