Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection against DDOS.
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Multiple-path routing protocols allow data source node to distribute the total traffic among available paths. We consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate this traffic allocation as a lossy network flow optimization problem using portfolio selection theory. This centralized optimization problem can be solved using a distributed algorithm based on decomposition in NUM. Along with this Network based attacks have become a serious threat to the critical information infrastructure. There are many security attacks in MANET e.g. DDOS. The effect of DDOS leads to routing load, packet drop rate, end to end delay in network. So considering these parameters we build secure IDS to detect such attack and block it. Identifying the source of the attackers is necessary to correlate the incoming and outgoing flows or connections. To resist attempts at correlation, the attacker may encrypt or otherwise manipulate the connection traffic. Timing based correlation approaches are subject to timing perturbations that may be deliberately introduced by the attacker at stepping stones. So watermark-based correlation scheme is proposed which is designed specifically to be robust against timing perturbations. Unlike most previous timing based correlation approaches, our watermark-.based approach is “active” in that it embeds a unique watermark into the encrypted flows by slightly adjusting the timing of selected packets.
Authors and Affiliations
Yogesh R. Surve , Nilashree N. Shirodkar , Ved B. Pansare , Sourabh V. Kolekar
Detection of Sub-Lines of Various Orientations Using Back Propagation Networks
Various approaches can be taken to achieve vision for robot navigation using back-propagation artificial neural networks. An approach is presented in this paper which attempts to detect straight sub-lines from 8x8...
Speech Recognition System – A Review
Abstract:Language is the most important means of communication and speech is its main medium. In human to machine interface, speech signal is transformed into analog and digital wave form which can be understood by machi...
Efficient Network Design Parameters for Packet Switching Using Poisson distribution Methode
Abstract: Wireless sensor network is a group of sensor nodes with inadequate processor and partial memory unit embedded with other equipment for communication through the networking banding system. Sensor networks is one...
ID3 Derived Fuzzy Rules for Predicting the Students AcedemicPerformance
Abstract: This paper presents a technique to use ID3 decision rules to produce fuzzy rules to get the optimizeprediction of the students academic performance. In this paper, a the student administrative data for a...
Computerized Power Montoring System for EEDC Umuahia
Abstract: The computerized process in any facet of human existence or any sector of any economy promotesefficiency accuracy, effectiveness, improved service delivery and many more. This is also applies to thecomput...