Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection against DDOS.
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Multiple-path routing protocols allow data source node to distribute the total traffic among available paths. We consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate this traffic allocation as a lossy network flow optimization problem using portfolio selection theory. This centralized optimization problem can be solved using a distributed algorithm based on decomposition in NUM. Along with this Network based attacks have become a serious threat to the critical information infrastructure. There are many security attacks in MANET e.g. DDOS. The effect of DDOS leads to routing load, packet drop rate, end to end delay in network. So considering these parameters we build secure IDS to detect such attack and block it. Identifying the source of the attackers is necessary to correlate the incoming and outgoing flows or connections. To resist attempts at correlation, the attacker may encrypt or otherwise manipulate the connection traffic. Timing based correlation approaches are subject to timing perturbations that may be deliberately introduced by the attacker at stepping stones. So watermark-based correlation scheme is proposed which is designed specifically to be robust against timing perturbations. Unlike most previous timing based correlation approaches, our watermark-.based approach is “active” in that it embeds a unique watermark into the encrypted flows by slightly adjusting the timing of selected packets.
Authors and Affiliations
Yogesh R. Surve , Nilashree N. Shirodkar , Ved B. Pansare , Sourabh V. Kolekar
A Novel Approach for Workload Optimization and ImprovingSecurity in Cloud Computing Environments
Abstract: This paper discusses a propose cloud infrastructure that combines On-Demand allocation ofresources with improved utilization, opportunistic provisioning of cycles from idle cloud nodes to otherprocesses.B...
Payment of Bus Fare Using Handy Card
Abstract: There are abundant people in day to day life travelling in either government bus or private bus. The foremost delinquent that the user faces is that they don’t get the remaining amount from the conductor that t...
Ant Colony Optimization for Wireless Sensor Network: A Review
Abstract: A wireless sensor network is a gathering of specific transducers with a correspondences foundationfor observing and recording conditions at diverse areas. Ant colony optimization algorithm (ACO) is aproba...
Detecting and tracking the hand to create an augmented reality system
To facilitate the access to computer systems, computer scientists choose to design interactive mechanisms which are more adapted than traditionally used devices such as keyboard or mouse. The use of gestures mo...
A Self-Organizing Cooperation for Autonomous Agents Based onImmune Network
Abstract: In order to solve the cooperation of autonomous agent systems,an artificial immune networkcooperation algorithm is proposed,which is based on Jerne’s idiotypic immune network hypothesis. A sheepdogherdi...