Detection of Spoofing Using Packet Marking Algorithm
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 5
Abstract
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. However the localization infrastructure can be subjected to non cryptographic attacks, such as signal attenuation and amplification that cannot be addressed by traditional security services. An interruption in an authorized users access to a computer network, typically one caused with malicious intent (DDOS). Although the means to carry out motives for and targets of a DOS attack may vary, it generally consists of efforts to indefinitely interrupt services of a host connected to the Internet (DDOS). EPPM significantly reduces the number of IP (Internet protocol) or IP packets required to convey the relevant information, when compared to the prior best known scheme. Compared with the hash-based approach, our approach incurs less storage overhead and less access time overhead at routers. Specifically, the storage overhead is reduced to roughly one half, and the access time requirement is decreased by a factor of the number of neighbour routers.
Authors and Affiliations
B. Balasankari , M. G. MathanKumar
Adaptive Mobile Video Streaming and Efficient Social Video Sharing in Cloud
The mobile phones grow to be an essential part of our everyday life, with smart phone sales at present greater than before very much and also user demands to run lots of applications have enhanced. The victory of next in...
Image Search Reranking
The existing methods for image search re ranking suffer from the unfaithfulness of the as sumptions under which the text-based images search result. The resulting images contain more irrelevant images. Hence the re ranki...
Improving Service Credibility Using Password Authenticated Peer Services
Password-Authenticated Key Exchange (PAKE) is where a client and a server, who share a password, authenticate each other and meanwhile establish a cryptographic key by exchange of messages. In a scenario where two server...
Cloud Computing: A Strategy to Improve the Economy of Islamic Societies
Cloud computing is the new technology that significantly change the landscape of businesses as it enables users, companies, and governments to store information in multiple servers and allows on-demand access. The cloud...
Deriving the Probability with Machine Learning and Efficient Duplicate Detection in Hierarchical Objects
Duplicate detection is the major important task in the data mining, in order to find duplicate in the original data as well as data object. It exactly identifies whether the given data is duplicates or not. Real world du...