ACHIEVING ZERO FALSE POSITIVE AND FALSE NEGATIVE RATES IN AN ATTACK-PATH RECONSTRUCTION

Abstract

The security and privacy are two essential components for the system security of the Computer Networks. Data security means the data is securely stored , transferred and traced IP.Data privacy means the data can only be accessed by the community who have authorization to vision and apply it. Proposing a new version of hybrid IP traceback scheme with efficient packet marking and packet logging aiming to have a fixed storage requirement for each router in packet logging without the need to refresh the logged tracking information and to achieve zero false positive and false negative rates in attack-path reconstruction. It uses a 16-bit marking field to avoid the problem caused by packet fragmentation.

Authors and Affiliations

S. Sai Ganesh, K. Devi Priya

Keywords

Related Articles

Dynamic Approach for Secure Data Publishing in Mining

More than a few anonymization techniques, such as simplification and bucketization, have been deliberate for privacy protecting micro data publishing. Current work has shown that generalization loses substantial quant...

Comparison and performance analysis of VLSI adders using 22nm Technology

Speed, power and chip area are the most important goal of the current nano meter technology, so it is very important to design and implement new VLSI circuits. Here we design and compare the various CMOS adders with...

A Reliable implementation of Security-Enabled Architecture with area optimized symmetric Cryptography

My project specifies a symmetric Cryptography technique which provides same keys to Cipher and Decipher to transfer the information for reducing the design complexity and AES (Advanced Encryption Standard) which prov...

Local Sharing of Multiple Torrents in Peer to Peer System

The rapid growth traffic of Peer-toPeer applications, especially BitTorrent, is putting a lot of pressure to Internet Service Providers. In this paper, we examine the existence of the locality through a large-scale hy...

Performance Comparison on Power Efficient Ad hoc Routing Protocol

Basically ad hoc mobile devices operate on batteries. Hence, power consumption becomes an Important issue for the researcher. To maximize the lifetime of ad hoc mobile networks, the power consumption rate of each node...

Download PDF file
  • EP ID EP27678
  • DOI -
  • Views 266
  • Downloads 4

How To Cite

S. Sai Ganesh, K. Devi Priya (2013). ACHIEVING ZERO FALSE POSITIVE AND FALSE NEGATIVE RATES IN AN ATTACK-PATH RECONSTRUCTION. International Journal of Research in Computer and Communication Technology, 2(10), -. https://www.europub.co.uk/articles/-A-27678