A Secure Cryptographic Puzzle based Approach Ensuring TotalSecurity for transmitted Information with IP Tracing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Today internet is extremely affected by several attacks such as Denial-of-Service attacks. The source IP address in a packet can be falsified. Thus IP Protocol fails to determine the originator. The attacker performs IP Spoofing and creates attacks. Thus for determining the real source of the attacker several IP Traceback schemes come forward. The available schemes have their own advantages and disadvantages. Computational Complexity is considered as common drawback. With the aim of overcoming the drawback an IP Traceback Digital Signature Algorithm is used for ensuring security for the transmitted data using Socketcommunication As all the available methodologies for IP Traceback, the current approach also focuses only on tracing attacker. With the aim of ensuring a Total security, a Cryptographic puzzle based scheme is also incorporated along with the new approach for preventing Hackers. Here certain puzzles are also used for encrypting the message along with the available methodology. Here the opponent cannot solve the puzzle until the encrypted packet reaches the destination. . The scheme is implemented based on a share market based application. The security of the scheme is also analyzed
Authors and Affiliations
Sruthy R. S.
SGEDSS: Semantic Gene Expression Model for Communication Decision Supportsystem
Abstract: An effective decision support system needs to deal with several heterogeneous data sources. Sometimes, the knowledge was explored without integration data sources are wrong. Also, Decision support system is wea...
Comparative Analysis of Various Grid Based SchedulingAlgorithms
Abstract : Grid computing provides access to heterogeneous resources which are distributed geographicallywhich makes resource scheduling a complex problem. Hence, scheduling algorithms are necessary whichallocate j...
Domain Independent Joint Sentiment And Topic Detection UsingAFINN And Other Lexicons
Abstract: Sentiment analysis and opinion mining field concentrates on automatically classifying sentiments of documents. But detecting mere sentiments does not provide one the sufficient knowledge concealed in the text.I...
Driving Simulator
Abstract: Simulators which are developed by suppliers individually for specific application purpose are known as Driving Simulator. Most of the conventional driving simulators provide some flexibility for construc...
Overview: Importance of Network Security and Future Issues
Abstract: Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a bett...