Detection of Spoofing Using Packet Marking Algorithm

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 5

Abstract

Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. However the localization infrastructure can be subjected to non cryptographic attacks, such as signal attenuation and amplification that cannot be addressed by traditional security services. An interruption in an authorized users access to a computer network, typically one caused with malicious intent (DDOS). Although the means to carry out motives for and targets of a DOS attack may vary, it generally consists of efforts to indefinitely interrupt services of a host connected to the Internet (DDOS). EPPM significantly reduces the number of IP (Internet protocol) or IP packets required to convey the relevant information, when compared to the prior best known scheme. Compared with the hash-based approach, our approach incurs less storage overhead and less access time overhead at routers. Specifically, the storage overhead is reduced to roughly one half, and the access time requirement is decreased by a factor of the number of neighbour routers.

Authors and Affiliations

B. Balasankari , M. G. MathanKumar

Keywords

Related Articles

Meticulous Tasks of Various Cryptographic Techniques in Secure Communications

Our main intention of writing this paper is to provide a understandable knowledge about cryptographic techniques. This paper deals with various Message Authentication Codes, Hash functions and encryption techniques and p...

An Effective Secure Mechanism for Vehicular Content Distribution in VANET

Vehicular Adhoc Networks (VANETs) facilitate vehicles to communicate with each other and with roadside units (RSUs). Content distribution for vehicular users through roadside Access Points (APs) has become an important r...

Survey Paper for Maximization of Profit in Cloud Computing

The cloud is a next generation platform that provides dynamic resource pools, virtualization, and high availability. Today, it have the ability to utilize scalable, distributed computing environments within the confines...

An Adaptive Log Based Realtime Network Scans in LAN

Network scans really are a common initial step within a network intrusion attempt. As a way to gain details about a possible network intrusion, it can be beneficial to analyze these network scans. Scanning activity is na...

Revival of Secure Top-k Multi-Keyword over Encrypted Cloud Data

Cloud computing has recently emerged as a new platform for deploying, managing, and provisioning large-scale services through an Internet-based infrastructure. However, concerns of sensitive information on cloud potentia...

Download PDF file
  • EP ID EP94235
  • DOI -
  • Views 142
  • Downloads 0

How To Cite

B. Balasankari, M. G. MathanKumar (2014). Detection of Spoofing Using Packet Marking Algorithm. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 10(5), 253-256. https://europub.co.uk/articles/-A-94235