Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection against DDOS.
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Multiple-path routing protocols allow data source node to distribute the total traffic among available paths. We consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate this traffic allocation as a lossy network flow optimization problem using portfolio selection theory. This centralized optimization problem can be solved using a distributed algorithm based on decomposition in NUM. Along with this Network based attacks have become a serious threat to the critical information infrastructure. There are many security attacks in MANET e.g. DDOS. The effect of DDOS leads to routing load, packet drop rate, end to end delay in network. So considering these parameters we build secure IDS to detect such attack and block it. Identifying the source of the attackers is necessary to correlate the incoming and outgoing flows or connections. To resist attempts at correlation, the attacker may encrypt or otherwise manipulate the connection traffic. Timing based correlation approaches are subject to timing perturbations that may be deliberately introduced by the attacker at stepping stones. So watermark-based correlation scheme is proposed which is designed specifically to be robust against timing perturbations. Unlike most previous timing based correlation approaches, our watermark-.based approach is “active” in that it embeds a unique watermark into the encrypted flows by slightly adjusting the timing of selected packets.
Authors and Affiliations
Yogesh R. Surve , Nilashree N. Shirodkar , Ved B. Pansare , Sourabh V. Kolekar
Survey on adverse influencing factors in the way of successfulrequirement engineering
Abstract: Requirement engineering is the first phase for the development of any software. Software have beendiscarded due to poor and ambiguous requirements. This study based on the results of surveys conducted to...
Detecting Vulnerable User in Twitter Using Tweet Description Logic Rule Generation
In today’s modern era, Social media have become a mandatory, exciting and mundane apparatus in our lives and diverse informal organizations have distinctive focused set of people. Among these networks, twitter standout i...
Enhancement in Decision Making with Improved Performance by Multiagent Learning Algorithms
Abstract:The output of the system is a sequence of actions in some applications. There is no such measure as the best action in any in-between state; an action is excellent if it is part of a good policy. A single action...
Enhanced Noise Type Recognition Using Statistical Measures
Noises are the unwanted information in an image, so they should be removed before further processing. Existing methods consider histogram based analysis which is globally varied one. A modified statistical measur...
Critical Path Method in the Network Analysis with Parametric Fuzzy Activity
In this paper, a method is presented to find fuzzy critical path using parametric interval valued function. Here network model has been developed in fuzzy environment. All activities are considered as a Trapezoidal fuzzy...