Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection against DDOS.
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Multiple-path routing protocols allow data source node to distribute the total traffic among available paths. We consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate this traffic allocation as a lossy network flow optimization problem using portfolio selection theory. This centralized optimization problem can be solved using a distributed algorithm based on decomposition in NUM. Along with this Network based attacks have become a serious threat to the critical information infrastructure. There are many security attacks in MANET e.g. DDOS. The effect of DDOS leads to routing load, packet drop rate, end to end delay in network. So considering these parameters we build secure IDS to detect such attack and block it. Identifying the source of the attackers is necessary to correlate the incoming and outgoing flows or connections. To resist attempts at correlation, the attacker may encrypt or otherwise manipulate the connection traffic. Timing based correlation approaches are subject to timing perturbations that may be deliberately introduced by the attacker at stepping stones. So watermark-based correlation scheme is proposed which is designed specifically to be robust against timing perturbations. Unlike most previous timing based correlation approaches, our watermark-.based approach is “active” in that it embeds a unique watermark into the encrypted flows by slightly adjusting the timing of selected packets.
Authors and Affiliations
Yogesh R. Surve , Nilashree N. Shirodkar , Ved B. Pansare , Sourabh V. Kolekar
An Analysis of VANET Topology Based Routing Approach on Various Parameters
Abstract: Vehicular ad hoc network (VANET) is a peculiar subclass of mobile ad-hoc network (MANET) that has the potential in improving road safety and in providing travellers comfort. Currently it has gained an imp...
1 Level DWT Image Watermarking Algorithm for RGB Cover Images and Watermarks
Abstract: This paper proposes a new 1 level DWT (Discrete wavelet transform) robust image watermarking algorithm for RGB cover images and watermarks. In the proposed algorithm 1 level DWT is applied on RGB cover image. T...
Face Recognition Techniques - A Review
Abstract: Human faces are major identity mark. Face recognition is the active research area in real time applications. Face detection has many applications in biometrics, video surveillance , robotics, control of...
Effects of Occupational Stress on Work Performance of Police Officers in Nakuru Police Division, Kenya
Abstract: A fully functioning police service is vital for maintenance of peace, provision of security, and enforcement of a country‘s laws. The work performance of police officers in Nakuru and other divisions in Kenya h...
An Overview of the Research on Plant Leaves Disease detection using Image Processing Techniques
Diseases in plants cause major production and economic losses as well as reduction in both quality and quantity of agricultural products. Now a day’s plant diseases detection has received increasing attention in...