TPDS: A Heuristic Approach for Traffic Pattern Discovery System in Mobile Ad-hoc Network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 5
Abstract
Abstract : There is absence of centralized coordination among nodes in Mobile Ad-hoc Network (MANET). This makes MANET vulnerable to attacks especially passive attacks. Security is one of the major concerns inmilitary application. Anonymity hides the role of a node as source or destination. In order to trace the traffic pattern of adversaries this system is proposed. The objective of proposed system is to identify an approximatesource and destination nodes present in the network. In MANET, identification of these nodes helps to trace the traffic pattern that is followed by an adversary. The pattern is traced by using best-first search (a heuristicapproach) and discovered by statistical traffic analysis. Probability distribution is used to find the source and destination nodes. The implementation and analysis is carried out in Network Simulator 2 (NS2). Since thepurpose of the proposed system is to trace the path of an adversary it is named as Traffic Pattern Discovery System (TPDS).
Authors and Affiliations
Priyanka Sen , Vaishali Sahare
THD Reduction in Multilevel Inverters Using Real-Time Algorithm
Multilevel inverters have been widely applied industries. A family of optimal puisewidth modulation (PWM) methods for multilevel inverters, such as step modulation, can generate output voltage with less harmonic...
Efficient Detection of Internet Worms Using Data Mining Techniques
Internet worms pose a serious threat to computer security.Traditional approaches using signatures to detect worms pose little danger to the zero day attacks. The focus of malware research is shifting from using signature...
Moving ATM Applications to Smartphones with a Secured PinEntryMethods
Abstract: A personal identification number (pin) is a widely used numeric password. The 4-digit pin numericpassword is being used as authentication in many important applications such as, an ATM. An ATM is a placew...
An Optimized Algorithm for Solving Combinatorial Problems using Reference Graph
Abstract: In this paper a novel optimized graph referencing method is proposed to tackle combinatorial problems with greater ease. The proposed algorithm is a modification of the existing backtracking algorithm....
A Short-Normalized Attack Graph Based Approach for Network Attack Analysis
Abstract: Attack graphs are the graphs which describe attack scenarios, play important roles in analyzing network threats. These attack graphs are able to reveal such potential threats by evaluating the all possibl...