Optical Internet Security: A new Time based threat identification and its prevention
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 2
Abstract
Optical Internet (OI), which are driving the demand for increased transmission rates and bandwidth – hungry applications and its services using dedicated optical routers. To cater this huge bandwidth demand, Transmission Control Protocol (TCP) is the prevailing mechanism and OBS (Optical Burst Switching) is the rapid technology for support this Optical Internet traffic. Due to the sensitivity of relying role in Optical Internet, security becomes a major concern in optical networks. In this paper, describes that the Optical Internet suffers from the newfangled denial of service vulnerability and it is named as time out attack in Optical Internet and the prevention mechanism for the same is also provided. The ns2 simulator with modified nOBS patch is used to simulate and verify the security parameters.
Authors and Affiliations
Muthuraj K, N Sreenath
PIXEL WISE CLASSIFICATION MODELLINGTO DETECT AND TRACK MOVING VEHICLES
This paper presents an automatic vehicle detection system for aerial surveillance. In this system, we escape from the stereotype and existing frameworks of vehicle detection in aerial surveillance, which are either re...
A Novel Approach for Text Dependent Speaker Recognition
In recent times, person authentication in security systems using biometric technologies has grown rapidly. The voice is a signal of infinite information. Digital signal processes such as Feature Extraction and Feature...
A Comparative Study for Slot-Loaded Compact Microstrip Antennas by Using Methods Based on FDTD, FEM and MoM
A comparativestudy on the performance of the computational electromagnetic methods (CEMs) namely finite difference time domain (FDTD), finite element method (FEM) and moment method (MoM) via their corresponding elect...
Reducing Latency Among Client-Server for Distributed Interactive Applications
The interactivity of DIAs is significant for members to have pleasant communication experiences. As a rule, interactivity is considered by the duration from the time when a participant issues an operation to the time...
Transmission Power Control in Wireless ad hoc Networks
In ad hoc wireless networks packets are relayed over multiple hops to reach their destination. In order to operate ad hoc networks several protocols, for media access control, power control, routing, and transport ar...