ACHIEVING ZERO FALSE POSITIVE AND FALSE NEGATIVE RATES IN AN ATTACK-PATH RECONSTRUCTION
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
The security and privacy are two essential components for the system security of the Computer Networks. Data security means the data is securely stored , transferred and traced IP.Data privacy means the data can only be accessed by the community who have authorization to vision and apply it. Proposing a new version of hybrid IP traceback scheme with efficient packet marking and packet logging aiming to have a fixed storage requirement for each router in packet logging without the need to refresh the logged tracking information and to achieve zero false positive and false negative rates in attack-path reconstruction. It uses a 16-bit marking field to avoid the problem caused by packet fragmentation.
Authors and Affiliations
S. Sai Ganesh, K. Devi Priya
Dynamic Approach for Secure Data Publishing in Mining
More than a few anonymization techniques, such as simplification and bucketization, have been deliberate for privacy protecting micro data publishing. Current work has shown that generalization loses substantial quant...
Comparison and performance analysis of VLSI adders using 22nm Technology
Speed, power and chip area are the most important goal of the current nano meter technology, so it is very important to design and implement new VLSI circuits. Here we design and compare the various CMOS adders with...
A Reliable implementation of Security-Enabled Architecture with area optimized symmetric Cryptography
My project specifies a symmetric Cryptography technique which provides same keys to Cipher and Decipher to transfer the information for reducing the design complexity and AES (Advanced Encryption Standard) which prov...
Local Sharing of Multiple Torrents in Peer to Peer System
The rapid growth traffic of Peer-toPeer applications, especially BitTorrent, is putting a lot of pressure to Internet Service Providers. In this paper, we examine the existence of the locality through a large-scale hy...
Performance Comparison on Power Efficient Ad hoc Routing Protocol
Basically ad hoc mobile devices operate on batteries. Hence, power consumption becomes an Important issue for the researcher. To maximize the lifetime of ad hoc mobile networks, the power consumption rate of each node...