The biggest threat to the Internet is the fact that it was never really designed. For e.g., the
BGP protocol is used by Internet routers to exchange information about changes to the Internet's
network topologies. However, it also is among the most fundamentally broken; as Internet routing
information can be poisoned with bogus routing information. Instead, it evolved in fits and start,
thanks to various protocols that have been cobbled together to fulfill the needs of the moment. Few
of protocols from them were designed with security in mind. or if they were sported no more than
was needed to keep out a nosy neighbor, not a malicious attacker. The result is a welter of aging
protocols susceptible to exploit on an Internet scale. Here are six Internet protocols that could stand
to be replaced sooner rather than later or are (mercifully) on the way out.
IPv6: Threats Posed By Multicast Packets, Extension Headers and Their Counter...IOSR Journals
ABSTRACT: Security issues concerning the spreading Internet Protocol version 6 (IPv6) is one of the major
issues in the world of networking today. Since it is not the default network protocol deployed nowadays (but
systems are migrating slowly from ipv4 to ipv6) there are no best practices from the point of network
administrators, nor are any guarantees that implemented IPv6 protocol stacks and security techniques without
any bugs. This paper addresses some security concerns like extensive use of multicast packets and extension
headers and its countermeasures.
Keywords: multicast, extension headers, reconnaissance, rogue dhcpv6 server spoofing, dual-stack,
tunnels, Nat, ping of death
A 1-day short course developed for visiting guests from Tecsup on network forensics, prepared in a day : ]
The requirements/constraints were 5-7 hours of content and that the target audience had very little forensic or networking knowledge. [For that reason, flow analysis was not included as an exercise, discussion of network monitoring solutions was limited, and the focus was on end-node forensics, not networking devices/appliances themselves]
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...journalBEEI
With the rapid depletion of IPv4 protocol in these recent years, the IETF introduced IPv6 as a solution to address the exhaustion, however, as a new protocol exists, new characteristics have been introduced and new threats have been discovered. Extension Headers are the new characteristics of IPv6 that have an emerging and re-emerging security threats that is needed to be taken into consideration during the full migration to the IPv6 network. This study revealed that up to this moment, the popular vendors are still vulnerable and doesn’t have any default protection to deal with extension headers’ Denial of Service Attack (DoS). Also, this study leads to the development of new security model which creates a new solution to address the emerging threats of IPv6 extension headers’ Denial of Service Attack. Moreover, the results of this study show that our proposed security model is more effective in terms of neutralizing the unwanted traffic causing evasion attack by filtering, rate-limiting and discarding the malformed packets of prohibited extension headers’ payload versus the traditional router protection.
A banner is simply the text that is embedded with a message that is received from a host.
Usually this text includes signatures of applications that issue the message. So, they reveal themselves to us.
For more information about ethical hacking log on to http://www.arizonainfotech.com/
Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backs...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
A SECURE EPIDEMIC BASED UPDATE PROTOCOL FOR P2P SYSTEMSijp2p
Epidemic Based Update Protocols Are Designed To Address The Consistency Issues For Data Replication
In P2p Systems. However, Update Protocols Also Raise Security Issues. An Epidemic Based Update
Protocol May Be Exposed To Security Threats When It Is Operated In An Untrustworthy P2p Environment. To Address This Issue, Security Prevention And Detection Protocols Are Designed In The Epidemic Based Update Protocol To Protect Update And Their Timestamps From Being Tampered By Compromised Malicious Peers. Theoretic Analysis Shows That The Secured Update Protocol Can Detect All Manipulations On The Timestamps Of Updates And Can Eventually Identify The Compromised Peers In The System.
An improved ip traceback mechanism for network securityeSAT Journals
Abstract IP traceback is amongst the main challenges that face the security of today’s Internet. Many techniques were proposed, including in-band packhranits alert and outband packets each of them has advantages and disadvantages. Source IP spoofing attacks are critical issues to the Internet. These attacks are considered to be sent from bot infected hosts. There has been active research on IP traceback technologies. However, the traceback from an end victim host to an end spoofing host has never yet been achieved, because of the insufficient traceback probes installed on each routing path. There exists a will need to replace alternative probes in an effort to lessen the installation cost. Recently a great number of technologies of a given detection and prevention have developed, but it is difficult the fact that the IDS distinguishes normal traffic that are caused by the DDoS traffic due to many changes in network features. In existing work a whole new hybrid IP traceback scheme with efficient packet logging reaching to tend to have a fixed storage requirement for each router ( CAIDA’s data set) in packet logging without the need to refresh the logged tracking information and then to achieve zero false positive and false negative rates in attack-path reconstruction. Existing hybrid traceback approach applied on offline CAIDA dataset which isn't suitable to realtime tracing. With this proposed work efficient hybrid approach for single-packet traceback to our best knowledge, our approach will reduces 2/3 of a given overhead in each of storage and how about recording packet paths, and to discover the time overhead for recovering packet paths is also reduced by a calculatable amount. Keywords –Attack, Trace back, LAN
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKSEditor IJMTER
The ultimate aim of a wireless sensor network is to provide accurate and reliable
information regarding the environment in which the sensors are deployed. Among the various
applications of a sensor network, target tracking is the one of the key application of WSNs. In
existing system To design a Face Track for detecting the movement of a target in polygon. Develop a
brink detection algorithm used to reconstruct another conceptual polygon. Optimal node selection
algorithm to select which sensor of spatial region to track data. All wireless sensors are activated and
idle listening is a major source of energy waste. Once an active sensor runs out of energy, that
sensors are not present in the network. So communication is not fully completed. We enhance the
proposed algorithm Probability-Based Prediction and Sleep Scheduling (PPSS) to overcome this
problem also it improve the power efficiency and increase the network life time.
IPv6: Threats Posed By Multicast Packets, Extension Headers and Their Counter...IOSR Journals
ABSTRACT: Security issues concerning the spreading Internet Protocol version 6 (IPv6) is one of the major
issues in the world of networking today. Since it is not the default network protocol deployed nowadays (but
systems are migrating slowly from ipv4 to ipv6) there are no best practices from the point of network
administrators, nor are any guarantees that implemented IPv6 protocol stacks and security techniques without
any bugs. This paper addresses some security concerns like extensive use of multicast packets and extension
headers and its countermeasures.
Keywords: multicast, extension headers, reconnaissance, rogue dhcpv6 server spoofing, dual-stack,
tunnels, Nat, ping of death
A 1-day short course developed for visiting guests from Tecsup on network forensics, prepared in a day : ]
The requirements/constraints were 5-7 hours of content and that the target audience had very little forensic or networking knowledge. [For that reason, flow analysis was not included as an exercise, discussion of network monitoring solutions was limited, and the focus was on end-node forensics, not networking devices/appliances themselves]
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...journalBEEI
With the rapid depletion of IPv4 protocol in these recent years, the IETF introduced IPv6 as a solution to address the exhaustion, however, as a new protocol exists, new characteristics have been introduced and new threats have been discovered. Extension Headers are the new characteristics of IPv6 that have an emerging and re-emerging security threats that is needed to be taken into consideration during the full migration to the IPv6 network. This study revealed that up to this moment, the popular vendors are still vulnerable and doesn’t have any default protection to deal with extension headers’ Denial of Service Attack (DoS). Also, this study leads to the development of new security model which creates a new solution to address the emerging threats of IPv6 extension headers’ Denial of Service Attack. Moreover, the results of this study show that our proposed security model is more effective in terms of neutralizing the unwanted traffic causing evasion attack by filtering, rate-limiting and discarding the malformed packets of prohibited extension headers’ payload versus the traditional router protection.
A banner is simply the text that is embedded with a message that is received from a host.
Usually this text includes signatures of applications that issue the message. So, they reveal themselves to us.
For more information about ethical hacking log on to http://www.arizonainfotech.com/
Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backs...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
A SECURE EPIDEMIC BASED UPDATE PROTOCOL FOR P2P SYSTEMSijp2p
Epidemic Based Update Protocols Are Designed To Address The Consistency Issues For Data Replication
In P2p Systems. However, Update Protocols Also Raise Security Issues. An Epidemic Based Update
Protocol May Be Exposed To Security Threats When It Is Operated In An Untrustworthy P2p Environment. To Address This Issue, Security Prevention And Detection Protocols Are Designed In The Epidemic Based Update Protocol To Protect Update And Their Timestamps From Being Tampered By Compromised Malicious Peers. Theoretic Analysis Shows That The Secured Update Protocol Can Detect All Manipulations On The Timestamps Of Updates And Can Eventually Identify The Compromised Peers In The System.
An improved ip traceback mechanism for network securityeSAT Journals
Abstract IP traceback is amongst the main challenges that face the security of today’s Internet. Many techniques were proposed, including in-band packhranits alert and outband packets each of them has advantages and disadvantages. Source IP spoofing attacks are critical issues to the Internet. These attacks are considered to be sent from bot infected hosts. There has been active research on IP traceback technologies. However, the traceback from an end victim host to an end spoofing host has never yet been achieved, because of the insufficient traceback probes installed on each routing path. There exists a will need to replace alternative probes in an effort to lessen the installation cost. Recently a great number of technologies of a given detection and prevention have developed, but it is difficult the fact that the IDS distinguishes normal traffic that are caused by the DDoS traffic due to many changes in network features. In existing work a whole new hybrid IP traceback scheme with efficient packet logging reaching to tend to have a fixed storage requirement for each router ( CAIDA’s data set) in packet logging without the need to refresh the logged tracking information and then to achieve zero false positive and false negative rates in attack-path reconstruction. Existing hybrid traceback approach applied on offline CAIDA dataset which isn't suitable to realtime tracing. With this proposed work efficient hybrid approach for single-packet traceback to our best knowledge, our approach will reduces 2/3 of a given overhead in each of storage and how about recording packet paths, and to discover the time overhead for recovering packet paths is also reduced by a calculatable amount. Keywords –Attack, Trace back, LAN
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKSEditor IJMTER
The ultimate aim of a wireless sensor network is to provide accurate and reliable
information regarding the environment in which the sensors are deployed. Among the various
applications of a sensor network, target tracking is the one of the key application of WSNs. In
existing system To design a Face Track for detecting the movement of a target in polygon. Develop a
brink detection algorithm used to reconstruct another conceptual polygon. Optimal node selection
algorithm to select which sensor of spatial region to track data. All wireless sensors are activated and
idle listening is a major source of energy waste. Once an active sensor runs out of energy, that
sensors are not present in the network. So communication is not fully completed. We enhance the
proposed algorithm Probability-Based Prediction and Sleep Scheduling (PPSS) to overcome this
problem also it improve the power efficiency and increase the network life time.
Refining Underwater Target Localization and Tracking EstimatesCSCJournals
Improving the accuracy and reliability of the localization estimates and tracking of underwater targets is a constant quest in ocean surveillance operations. The localization estimates may vary owing to various noises and interferences such as sensor errors and environmental noises. Even though adaptive filters like the Kalman filter subdue these problems and yield dependable results, targets that undergo maneuvering can cause incomprehensible errors, unless suitable corrective measures are implemented. Simulation studies on improving the localization and tracking estimates for a stationary target as well as a moving target including the maneuvering situations are presented in this paper
Complete description of piezoelectric sensors along with diagrams for better understanding. It is beneficial for any college student who is making a project or presentation on piezoelectric sensors. For presentation on this topic please drop by my uploaded presentations.
ΙΙ Ο ΚΟΣΜΟΣ ΤΟΥ ΙΣΛΑΜ ΚΑΤΑ ΤΗΝ ΠΕΡΙΟΔΟ ΤΟΥ ΜΕΣΑΙΩΝΑ 1. Η εξάπλωση των Αράβων ...Nasia Fatsi
Παρουσίαση της 1ης και 2ης ενότητας ιστορίας β' γυμνασίου της ενότητας ΙΙ του 2ου κεφαλαίου σχετικά με την εξάπλωση, το εμπόριο και τον πολιτισμό των Αράβων
A hybrid cloud approach for secure authorized deduplicationLeMeniz Infotech
A hybrid cloud approach for secure authorized deduplication
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsEditor IJCATR
Due to extensive growth of the Internet and increasing availability of tools and methods for intruding and attacking
networks, intrusion detection has become a critical component of network security parameters. TCP/IP protocol suite is the defacto
standard for communication on the Internet. The underlying vulnerabilities in the protocols is the root cause of intrusions. Therefor
Intrusion detection system becomes an important element in network security that controls real time data and leads to huge
dimensional problem. Processing large number of packets and data in real time is very difficult and costly. Therefor data preprocessing
is necessary to remove redundant and unwanted information from packets and clean network data. Here, we are focusing on
two important aspects of intrusion detection; one is accuracy and other is performance. The layered approach of TCP/IP model can be
applied to packet pre-processing to achieve early and faster intrusion detection. Motivation for the paper comes from the large impact
data preprocessing has on the accuracy and capability of anomaly-based NIPS. In this paper it is demonstrated that high attack
detection accuracy can be achieved by using layered approach for data preprocessing in Internet. To reduce false positive rate and to
increase efficiency of detection, the paper proposed framework for preprocessing in intrusion prevention system. We experimented
with real time network traffic as well as he KDDcup99 dataset for our research.
It is for the new users those don't have much knowledge regarding IT Security. Here i focus on Windows In built firewall, Comodo, Zone Alarm and Out Post pro configuration basics.
Peer-to-Peer Communication Service and Messaging SystemEditor IJMTER
The peer-to-peer communication services[1] has entered into the public limelight over the last few
years. Several researches are underway on peer-to-peer communication technologies, but no definitive conclusion
is currently available. Comparing to traditional server client technology on the Internet, the peer-to-peer
technology has capabilities to realize highly scalable, extensible and efficient distributed applications. Our work
presents an anonymous peer-to-peer (P2P) messaging system. A P2P network consists of a large number of peers
interconnected together to share all kinds of digital content. A key weakness of most existing P2P systems is the
lack of anonymity. Without anonymity, it is possible for third parties to identify the participants involved. First,
anonymous P2P system should make it impossible for third parties to identify the participants involved. Second,
anonymous P2P system should guarantee that only the content receiver knows the content. Third, anonymous P2P
system should allow the content publisher to plausibly deny that the content originated from him or her.
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGYcscpconf
Internet middleboxes such as VPNs, firewalls, and proxies can significantly change handling of traffic streams. They play an increasingly important role in various types of IP networks. If end hosts can detect them, these hosts can make beneficial, and in some cases, crucial improvements in security and performance But because middle boxes have widely varying behavior and effects on the traffic they handle, no single technique has been discovered that can detect all of them.
Devising a detection mechanism to detect any particular type of middle box interference involves many design decisions and has numerous dimensions. One approach to assist with the
complexity of this process is to provide a set of systematic guidelines. This paper is the first attempt to introduce a set of general guidelines (as well as the rationale behind them) to assist researchers with devising methodologies for end-hosts to detect middle boxes by the end-hosts. The guidelines presented here take some inspiration from the previous work of other
researchers using various and often ad hoc approaches. These guidelines, however, are mainly based on our own experience with research on the detection of middle boxes. To assist
researchers in using these guidelines, we also provide an example of how to bring them into play for detection of network compression.
How to detect middleboxes guidelines on a methodologycsandit
Internet middleboxes such as VPNs, firewalls, and proxies can significantly change handling of
traffic streams. They play an increasingly important role in various types of IP networks. If end
hosts can detect them, these hosts can make beneficial, and in some cases, crucial improvements
in security and performance But because middleboxes have widely varying behavior and effects
on the traffic they handle, no single technique has been discovered that can detect all of them.
Devising a detection mechanism to detect any particular type of middlebox interference involves
many design decisions and has numerous dimensions. One approach to assist with the
complexity of this process is to provide a set of systematic guidelines. This paper is the first
attempt to introduce a set of general guidelines (as well as the rationale behind them) to assist
researchers with devising methodologies for end-hosts to detect middleboxes by the end-hosts.
The guidelines presented here take some inspiration from the previous work of other
researchers using various and often ad hoc approaches. These guidelines, however, are mainly
based on our own experience with research on the detection of middleboxes. To assist
researchers in using these guidelines, we also provide an example of how to bring them into
play for detection of network compression
Individual CommentsYour answers missed there below topics, sp.docxdirkrplav
Individual Comments:
Your answers missed there below topics, spend a little more time on the format of your answers
question 1 - backward compatibility?, scalability?
question 2 - success rate?, reliability?
question 3 - QoS?, Security?
question 4 - foreign agent?
1. Why did Ethernet become an acceptable LAN standard?
Be specific in your explanation.
Many factors funded to Ethernet by becoming a LAN standard, the first factor is that Ethernet is reliable by using CSMA/CD to sense before sending any data to the network to avoid crash, and in this case the crash detection method stop all transmission and assigns a random retransmission delay time to all nodes. The second factor is the management tools that are available to manage the Ethernet using SNMP from a central location. The third factor is Ethernet trouble shooting is easy by using easy ways for example the light indicator or a more sophisticated way like using a network analyzer. The fourth reason is that Ethernet has a low cost comparing it to other technologies that the user doesn't need to buy extra hardware and can connect it directly depending on his computer network. On the other hand, it doesn’t have a security issue such as wireless networks which has risk through the airwaves, but, users should have good security desktop application to prevent unapproved accesses.
2.From the users point of view how does one measure network performance?
The network performance is identified commonly in bites per seconds. It can be measured by multiple factors which are bandwidth, throughput, latency and error rate and from those factors the bandwidth is the maximum rate that data can be transferred with, Latency is the delay between the sending and receiving. Error rate is the percentage of corrupted data that is being sent. There are three main possible ways to measure: the first one is the total of bytes transferred (from server to the user and opposite) in one session which can be used to measure the overhead of protocol (bandwidth). Second ways, number of round trips in one operation (transaction). Third point, time taken to pull or push from network bandwidth and ping time. Moreover, the user could measure network performance in normal way by trying to copy a file over the network depending on the file transferring time; furthermore, he could gauge the speed by the time it takes for a file to copy from or to the network.
3.Why did IPv4 prevail for such a long time and why the change to IPv6?
Shifting for IPv4 to IPv6 requires a huge investment of human and capital resources. While, it doesn’t provide a clear picture of the short-term return which resulted the enterprises to frequently postpone this investment. However the time came to change from IPv4 to IPv6. IPv4 provide maximum of about 4 billion addresses whereas IPv6 has an unthinkable theoretical maximum: about 340 trillion, trillion, trillion addresses. Previously (with IPv4) home user got a single user, while the IPv4 pro.
[cb22] Tales of 5G hacking by Karsten NohlCODE BLUE
Most 5G networks are built in fundamentally new ways, opening new hacking avenues.
Mobile networks have so far been monolithic systems from big vendors; now they become open vendor-mixed ecosystems. Networks are rapidly adopting cloud technologies including dockerization and orchestration. Cloud hacking techniques become highly relevant to mobile networks.
The talk dives into the hacking potential of the technologies needed for these open networks. We illustrate the security challenges with vulnerabilities we found in real-world networks.
Prevention based mechanism for attacks in Network SecurityEditor IJMTER
Network Security has become vital in today’s information technology era, as a result
of that numerous techniques are a unit adopted to bypass it. Network administrator has to be
compelled to manage with the recent advancements in each the hardware and software system fields
for their betterment of the user’s knowledge. This paper outlines the varied attack strategies in the
field of Networking and numerous prevention mechanisms against them.
Similar to Aging protocols that could incapacitate the Internet (20)
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
System-on-chip (soc) based system has so many disadvantages in power-dissipation as
well as clock rate while the data transfer from one system to another system in on-chip. At the same
time, a higher operated system does not support the lower operated bus network for data transfer.
However an alternative scheme is proposed for high speed data transfer. But this scheme is limited to
SOCs. Unlike soc, network-on-chip (NOC) has so many advantages for data transfer. It has a special
feature to transfer the data in on-chip named as transitional encoder. Its operation is based on input
transitions. At the same time it supports systems which are higher operated frequencies. In this
project, a low-power encoding scheme is proposed. The proposed system yields lower dynamic
power dissipation due to the reduction of switching activity and coupling switching activity when
compared to existing system. Even-though many factors which is based on power dissipation, the
dynamic power dissipation is only considerable for reasonable advantage. The proposed system is
synthesized using quartus II 9.1 software. Besides, the proposed system will be extended up to
interlink PE communication with help of routers and PE’s which are performed by various
operations. To implement this system in real NOC’s contains the proposed encoders and decoders for
data transfer with regular traffic scenarios should be considered.
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
Coins are important part of our life. We use coins in a places like stores, banks, buses, trains
etc. So it becomes a basic need that coins can be sorted, counted automatically. For this, there is
necessary that the coins can be recognized automatically. Automated Coin Recognition System for the
Indian Coins of Rs. 1, 2, 5 and 10 with the rotation invariance. We have taken images from the both
sides of coin. So this system is capable to recognizing coins from both sides. Features are taken from the
images using techniques as a Hough Transformation, Pattern Averaging etc.
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
Worldwide Interoperability for Microwave Access (WiMAX) is currently one of the
hottest technologies in wireless communication. It is a standard based on the IEEE 802.16 wireless
technology that provides a very high throughput broadband connections over long distances. In
parallel, Voice Over Internet Protocol (VoIP) is a new technology which provides access to voice
communication over internet protocol and hence it is becomes an alternative to public switched
telephone networks (PSTN) due to its capability of transmission of voice as packets over IP
networks. A lot of research has been done in analyzing the performances of VoIP traffic over
WiMAX network. In this paper we review the analysis carried out by several authors for the most
common VoIP codec’s which are G.711, G.723.1 and G.729 over a WiMAX network using various
service classes. The objective is to compare the results for different types of service classes with
respect to the QoS parameters such as throughput, average delay and average jitter.
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
The cloud backup is used for the personal storage of the people in terms of reducing the
mainlining process and managing the structure and storage space managing process. The challenging
process is the deduplication process in both the local and global backup de-duplications. In the prior
work they only provide the local storage de-duplication or vice versa global storage de-duplication in
terms of improving the storage capacity and the processing time. In this paper, the proposed system
is called as the ALG- Dedupe. It means the Application aware Local-Global Source De-duplication
proposed system to provide the efficient de-duplication process. It can provide the efficient deduplication process with the low system load, shortened backup window, and increased power
efficiency in the user’s personal storage. In the proposed system the large data is partitioned into
smaller part which is called as chunks of data. Here the data may contain the redundancy it will be
avoided before storing into the storage area.
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...Editor IJMTER
The emergence of exactitude agriculture has been promoted by the numerous developments within
the field of wireless sensing element actor networks (WSAN). These WSANs offer important data
for gathering, work management, development of crops, and limitation of crop diseases. Goals of
this paper to introducing cloud computing as a brand new way (technique) to be utilized in addition
to WSANs to any enhance their application and benefits to the area of agriculture.
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESEditor IJMTER
Carpooling (also car-sharing, ride-sharing, lift-sharing), is the sharing of car journeys so
that more than one person travels in a car. It helps to resolve a variety of problems that continue to
plague urban areas, ranging from energy demands and traffic congestion to environmental pollution.
Most of the existing method used stochastic disturbances arising from variations in vehicle travel
times for carpooling. However it doesn’t deal with the unmet demand with uncertain demand of the
vehicle for car pooling. To deal with this the proposed system uses Chance constrained
formulation/Programming (CCP) approach of the problem with stochastic demand and travel time
parameters, under mild assumptions on the distribution of stochastic parameters; and relates it with a
robust optimization approach. Since real problem sizes can be large, it could be difficult to find
optimal solutions within a reasonable period of time. Therefore solution algorithm using tabu
heuristic solution approach is developed to solve the model. Therefore, we constructed a stochastic
carpooling model that considers the in- fluence of stochastic travel times. The model is formulated as
an integer multiple commodity network flow problem. Since real problem sizes can be large, it could
be difficult to find optimal solutions within a reasonable period of time.
Sustainable Construction With Foam Concrete As A Green Green Building MaterialEditor IJMTER
A green building is an environmentally sustainable building, designed, constructed and
operated to minimise the total environmental impacts. Carbon dioxide (CO2) is the primary
greenhouse gas emitted through human activities. It is claimed that 5% of the world’s carbon dioxide
emission is attributed to cement industry, which is the vital constituent of concrete. Due to the
significant contribution to the environmental pollution, there is a need for finding an optimal solution
along with satisfying the civil construction needs. Apart from normal concrete bricks, a clay brick,
Foam concrete is a new innovative technology for sustainable building and civil construction which
fulfills the criteria of being a Green Material. This paper concludes that Foam Concrete can be an
effective sustainable material for construction and also focuses on the cost effectiveness in using
Foam Concrete as a building material in replacement with Clay Brick or other bricks.
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTEditor IJMTER
A good education system is required for overall prosperity of a nation. A tremendous
growth in the education sector had made the administration of education institutions complex. Any
researches reveal that the integration of ICT helps to reduce the complexity and enhance the overall
administration of education. This study has been undertaken to identify the various functional areas
to which ICT is deployed for information administration in education institutions and to find the
current extent of usage of ICT in all these functional areas pertaining to information administration.
The various factors that contribute to these functional areas were identified. A theoretical model was
derived and validated.
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
Data partitioning methods are used to partition the data values with similarity. Similarity
measures are used to estimate transaction relationships. Hierarchical clustering model produces tree
structured results. Partitioned clustering produces results in grid format. Text documents are
unstructured data values with high dimensional attributes. Document clustering group ups unlabeled text
documents into meaningful clusters. Traditional clustering methods require cluster count (K) for the
document grouping process. Clustering accuracy degrades drastically with reference to the unsuitable
cluster count.
Textual data elements are divided into two types’ discriminative words and nondiscriminative
words. Only discriminative words are useful for grouping documents. The involvement of
nondiscriminative words confuses the clustering process and leads to poor clustering solution in return.
A variation inference algorithm is used to infer the document collection structure and partition of
document words at the same time. Dirichlet Process Mixture (DPM) model is used to partition
documents. DPM clustering model uses both the data likelihood and the clustering property of the
Dirichlet Process (DP). Dirichlet Process Mixture Model for Feature Partition (DPMFP) is used to
discover the latent cluster structure based on the DPM model. DPMFP clustering is performed without
requiring the number of clusters as input.
Document labels are used to estimate the discriminative word identification process. Concept
relationships are analyzed with Ontology support. Semantic weight model is used for the document
similarity analysis. The system improves the scalability with the support of labels and concept relations
for dimensionality reduction process.
Testing of Matrices Multiplication Methods on Different ProcessorsEditor IJMTER
There are many algorithms we found for matrices multiplication. Until now it has been
found that complexity of matrix multiplication is O(n3). Though Further research found that this
complexity can be decreased. This paper focus on the algorithm and its complexity of matrices
multiplication methods.
Malware is a worldwide pandemic. It is designed to damage computer systems without
the knowledge of the owner using the system. Software‟s from reputable vendors also contain
malicious code that affects the system or leaks information‟s to remote servers. Malware‟s includes
computer viruses, spyware, dishonest ad-ware, rootkits, Trojans, dialers etc. Malware detectors are
the primary tools in defense against malware. The quality of such a detector is determined by the
techniques it uses. It is therefore imperative that we study malware detection techniques and
understand their strengths and limitations. This survey examines different types of Malware and
malware detection methods.
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
Practical requirements for securely demonstrating identities between two handheld
devices are an important concern. The adversary can inject a Man-In- The-Middle (MITM) attack to
intrude the protocol. Protocols that employ secret keys require the devices to share private
information in advance, in which it is not feasible in the above scenario. Apart from insecurely
typing passwords into handheld devices or comparing long hexadecimal keys displayed on the
devices’ screen, many other human-verifiable protocols have been proposed in the literature to solve
the problem. Unfortunately, most of these schemes are unsalable to more users. Even when there are
only three entities attempt to agree a session key, these protocols need to be rerun for three times.
So, in the existing method a bipartite and a tripartite authentication protocol is presented using a
temporary confidential channel. Besides, further extend the system into a transitive authentication
protocol that allows multiple handheld devices to establish a conference key securely and efficiently.
But this method detects only the outsider attacks. Method does not consider the insider attacks. So,
in the proposed method trust score based method is introduced which computes the trust values for
the nodes and provide the security. The trust score is computed has a positive influence on the
confidence with which an entity conducts transactions with that node. Network the behavior of the
node will be monitored periodically and its trust value is also updated .So depending on the behavior
of the node in the network trust relation will be established between two nodes.
GLAUCOMA is a chronic eye disease that can damage optic nerve. According to WHO It
is the second leading cause of blindness, and is predicted to affect around 80 million people by 2020.
Development of the disease leads to loss of vision, which occurs increasingly over a long period of
time. As the symptoms only occur when the disease is quite advanced so that glaucoma is called the
silent thief of sight. Glaucoma cannot be cured, but its development can be slowed down by
treatment. Therefore, detecting glaucoma in time is critical. However, many glaucoma patients are
unaware of the disease until it has reached its advanced stage. In this paper, some manual and
automatic methods are discussed to detect glaucoma. Manual analysis of the eye is time consuming
and the accuracy of the parameter measurements also varies with different clinicians. To overcome
these problems with manual analysis, the objective of this survey is to introduce a method to
automatically analyze the ultrasound images of the eye. Automatic analysis of this disease is much
more effective than manual analysis.
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
Reliability is playing very vital role in some application of Wireless Sensor Networks
and multipath routing is one of the ways to increase the probability of reliability. More over energy
consumption is constraint. In this paper, we provide a survey of the state-of-the-art of proposed
multipath routing algorithm for Wireless Sensor Networks. We study the design, analyze the tradeoff
of each design, and overview several presenting algorithms.
Step up DC-DC Impedance source network based PMDC Motor DriveEditor IJMTER
This paper is devoted to the Quasi Z source network based DC Drive. The cascaded
(two-stage) Quasi Z Source network could be derived by the adding of one diode, one inductor,
and two capacitors to the traditional quasi-Z-source inverter The proposed cascaded qZSI inherits all
the advantages of the traditional solution (voltage boost and buck functions in a single stage,
continuous input current, and improved reliability). Moreover, as compared to the conventional qZSI,
the proposed solution reduces the shoot-through duty cycle by over 30% at the same voltage boost
factor. Theoretical analysis of the two-stage qZSI in the shoot-through and non-shoot-through
operating modes is described. The proposed and traditional qZSI-networks are compared. A
prototype of a Quasi Z Source network based DC Drive was built to verify the theoretical
assumptions. The experimental results are presented and analyzed.
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONEditor IJMTER
The paper reflects the spiritual philosophy of Aurobindo Ghosh which is helpful in today’s
education. In 19th century he wrote about spirituality, in accordance with that it is a core and vital part
of today’s education. It is very much essential for today’s kid. Here I propose the overview of that
philosophy.At the utmost regeneration of those values in today’s generation is the great deal with
education system. To develop the values and spiritual education in the youngers is the great moto of
mine. It is the materialistic world and without value redefinition among them is the harder task but not
difficult.
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
The software test coverage is used measure the safety measures. The safety critical analysis is
carried out for the source code designed in Java language. Testing provides a primary means for
assuring software in safety-critical systems. To demonstrate, particularly to a certification authority, that
sufficient testing has been performed, it is necessary to achieve the test coverage levels recommended or
mandated by safety standards and industry guidelines. Mutation testing provides an alternative or
complementary method of measuring test sufficiency, but has not been widely adopted in the safetycritical industry. The system provides an empirical evaluation of the application of mutation testing to
airborne software systems which have already satisfied the coverage requirements for certification.
The system mutation testing to safety-critical software developed using high-integrity subsets of
C and Ada, identify the most effective mutant types and analyze the root causes of failures in test cases.
Mutation testing could be effective where traditional structural coverage analysis and manual peer
review have failed. They also show that several testing issues have origins beyond the test activity and
this suggests improvements to the requirements definition and coding process. The system also
examines the relationship between program characteristics and mutation survival and considers how
program size can provide a means for targeting test areas most likely to have dormant faults. Industry
feedback is also provided, particularly on how mutation testing can be integrated into a typical
verification life cycle of airborne software. The system also covers the safety and criticality levels of
Java source code.
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
The software defect factors are used to measure the quality of the software. The software
effort estimation is used to measure the effort required for the software development process. The defect
factor makes an impact on the software development effort. Software development and cost factors are
also decided with reference to the defect and effort factors. The software defects are predicted with
reference to the module information. Module link information are used in the effort estimation process.
Data mining techniques are used in the software analysis process. Clustering techniques are used
in the property grouping process. Rule mining methods are used to learn rules from clustered data
values. The “WHERE” clustering scheme and “WHICH” rule mining scheme are used in the defect
prediction and effort estimation process. The system uses the module information for the defect
prediction and effort estimation process.
The proposed system is designed to improve the defect prediction and effort estimation process.
The Single Objective Genetic Algorithm (SOGA) is used in the clustering process. The rule learning
operations are carried out sing the Apriori algorithm. The system improves the cluster accuracy levels.
The defect prediction and effort estimation accuracy is also improved by the system. The system is
developed using the Java language and Oracle relation database environment.
Software Cost Estimation Using Clustering and Ranking SchemeEditor IJMTER
Software cost estimation is an important task in the software design and development process.
Planning and budgeting tasks are carried out with reference to the software cost values. A variety of
software properties are used in the cost estimation process. Hardware, products, technology and
methodology factors are used in the cost estimation process. The software cost estimation quality is
measured with reference to the accuracy levels.
Software cost estimation is carried out using three types of techniques. They are regression based
model, anology based model and machine learning model. Each model has a set of technique for the
software cost estimation process. 11 cost estimation techniques fewer than 3 different categories are
used in the system. The Attribute Relational File Format (ARFF) is used maintain the software product
property values. The ARFF file is used as the main input for the system.
The proposed system is designed to perform the clustering and ranking of software cost
estimation methods. Non overlapped clustering technique is enhanced with optimal centroid estimation
mechanism. The system improves the clustering and ranking process accuracy. The system produces
efficient ranking results on software cost estimation methods.
Single Phase Thirteen-Level Inverter using Seven Switches for Photovoltaic sy...Editor IJMTER
This paper proposes a single-phase thirteen-level inverter using seven switches, with a
novel pulse width-modulated (PWM) control scheme. The Proposed multilevel inverter output
voltage level increasing by using less number of switches driven by the multicarrier modulation
techniques. The inverter is capable of producing thirteen levels of output-voltage (Vdc, 5/6Vdc,
4/6Vdc, 3/6Vdc, 2/6Vdc, 1/6Vdc, 0, -5/6Vdc, -4/6Vdc, -3/6Vdc, -2/6Vdc, -1/6Vdc,-Vdc) from the
dc supply voltage. A digital multi carrier PWM algorithm was implemented in a Spartan 3E FPGA.
The proposed system was verified through simulation and implemented in a prototype.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Aging protocols that could incapacitate the Internet
1. ` Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 556
e-ISSN: 2349-9745
p-ISSN: 2393-8161
Aging protocols that could incapacitate the Internet
Prof. Bharate L.M.1
, Prof. Patil P.S.2
, Prof. Joshi A.S.3
Prof. Mane S.M.4
1,3,4
Assistant Professor, Department of CSE, VVPIET, Solapur
2
Assistant Professor, Department of CSE, BIT, Barshi.
Abstract--The biggest threat to the Internet is the fact that it was never really designed. For e.g., the
BGP protocol is used by Internet routers to exchange information about changes to the Internet's
network topologies. However, it also is among the most fundamentally broken; as Internet routing
information can be poisoned with bogus routing information. Instead, it evolved in fits and start,
thanks to various protocols that have been cobbled together to fulfill the needs of the moment. Few
of protocols from them were designed with security in mind. or if they were sported no more than
was needed to keep out a nosy neighbor, not a malicious attacker. The result is a welter of aging
protocols susceptible to exploit on an Internet scale. Here are six Internet protocols that could stand
to be replaced sooner rather than later or are (mercifully) on the way out.
Keywords-- Aging protocols, Secure Sockets Layer, Internet Protocol, domain name system, SMTP.
I. INTRODUCTION
The biggest threat to the Internet is that it evolved over time with various protocols, there are very
few of which are designed with security in mind. For example, the BGP protocol is used by Internet
routers to exchange information about changes to the Internet's network topology. However, it is also
among the most fundamentally broken, as Internet routing information could be poisoned with bogus
routing information. One of email's underlying protocols is SMTP, which has no inherent protection
due to its origins in a time when cyber attacks were not common. Meanwhile, a warning for domain
name system (DNS) security was sounded in 2008 when a massive flaw in the protocol's design was
discovered. That spurred work on DNSSEC, a protection extension for DNS, as a way to keep fake
data from being inserted into DNS servers. though, DNSSEC needs to be implemented to work in the
first place.
NTP keeps the clocks of computers around the world in sync, but it is a product of an age in which
safety measures was not a top precedence, making it possible to use the mechanics of the protocol, in
grouping with a fleet of compromised computers, to launch denial-of-service attacks. Meanwhile,
Internet Protocol (IP) version 4 is fast running out of Web address space, and the only key is a
migration to IPv6.
Secure Sockets Layer (SSL) has had a replacement for years, but only now are Internet organizations
replacing it.
II. BGP: BORDER GATEWAY PROTOCOL
BGP is used by Internet routers to exchange information about changes to the Internet‘s network
topology, making it one of the oldest and most vital Internet protocols. It‘s also among the most
2. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 02, [February - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 557
basically broken down, built at a time when Internet peering was based on little more than mutual
faith. With a little work, Internet routing information can be poisoned with bogus routing
information, also called as BGP spoofing.
Such spoofing has happened before, many times. The resulting failure is usually obvious enough that
it's detected and corrected in small measure, but it offers enough of a window for an attacker to do
horrible damage. Worst of all, the problem is essentially unfixable as it presently stands. As Dave
Rand of Trend Micro explained to Larry Seltzer, no central authority can be used to verify whether a
particular address belongs to a particular network. And because BGP is such a preliminary protocol,
there‘s no replacing it in the small term. At least the Core Infrastructure plan has put ―fixing BGP‖
on its to-do list. BGP is also used by Internet Service Providers (ISPs) to direct traffic between
services around the world. BGP, simply put, is the backbone of the Internet. The crisis, however, is
that it‘s easy to trick this routing protocol into sending information where it should not go. For
security-sensitive information, that is terrible.
And, because BGP is the almost literal backbone of the Internet, it‘s very hard to replace or even fix.
It‘s akin to ―Highway Star‖ Gillian rear-ending people on the road—simple to do, damaging and
complex to prove malicious intent. It‘s also quite familiar.
Fig. 1 Prefixes announced on the Internet.
III. SMTP: SIMPLE MAIL TRANSFER PROTOCOL
Our second aging standard is the Simple Mail Transfer Protocol (SMTP). SMTP is used to send and
receive email. actually, that‘s all it does. It was first established in 1982, when the Internet was in its
early life and the idea of bad actors seemed far-fetched by its creators (the first iteration of SMTP
lacked any type of security). present iterations of SMTP do have security fundamentals, like domain
verification to make sure the mail is sent to the intended server and vice versa, but these aren‘t
mandatory for the protocol. That makes it unimportant for hackers to send a malicious email or
make their spamming operations unknown. It‘s as if our Gillian character could speed by people so
rapidly, or kick up so much dirt, that no one would be able to identify him.
Despite myriad initiatives launched over the years to destroy it off, email remains in wide use, along
with one of its fundamental protocols, SMTP. SMTP‘s biggest problem, as put in an email by Steve
Hultquist; chief evangelist at network analytics firm Red Seal, is that it has no inherent security due
to its origins in more innocent days: ―SMTP was conceived as a simple way to transfer email
3. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 02, [February - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 558
between users on the Internet when it was young and before the protocol architects had recognized
the threat of terrible actors.‖Over time, various bolt-ons for SMTP have been developed to tighten its
security. head among them is reverse DNS checking to ensure the sender is in fact who they claim to
be. But the protocols themselves don‘t mandate that kind of security; it‘s a matter of who bothers to
apply them. All it takes is one mail gateway that doesn‘t perform due diligence with incoming email
to blow the game for everybody. Maybe Inbox will be able to show a way out of the email muddle,
but don‘t hold your breath.
Fig. 2 simple mail transfer on internet.
IV. DNS: DOMAIN NAME SYSTEM
This protocol, like BGP and others, has protection issues. With DNS, it‘s pretty serious: hackers, for
a time could easily insert fake data into DNS servers, allow them to interrupt user and application
requests. moreover, DNS names can be used to implement a phishing attack—a type of attack
hackers use to trick you into giving up responsive information. A phishing attack through the DNS
allows a hacker‘s website to pose as a legal site, like UPS.com, through similar domain names, like
USP.com.So how can you protect yourself from these clear, aging vulnerabilities? Sadly, there is
little you can really do. setting up each of these issues is tricky because so many legacy systems-—
older systems built with these protocols in mind—would break if any were to go offline. While you
only cannot fix these problems.
Because the Internet protocol that translates IP addresses into domain names is so foundational to the
way the Internet works, it is a ordinary attack, due to flaw in the protocol and security weaknesses in
the software that discover it. The Iranian Cyber Army outright took over the DNS servers for
Twitter‘s domain, and the Syrian Electronic Army hijack the New York Times‘ domain registration
account. A wake-up call for DNS security was sounded in 2008 when security researcher Dan
Kaminsky unearthed a massive flaw in the protocol‘s design. That spur work on DNSSEC, a security
addition for DNS, as a way to keep fake data from being inserted into DNS servers. But DNSSEC
wants to be implemented to work in the first place. poorer, it can impact the performance of a DNS
server under heavy load and could even be used to launch denial-of-service indication attacks. The
cure may not be as bad as the bug, but it‘s clearly a work in progress.
4. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 02, [February - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 559
Fig. 3 Domain name space.
V. NTP: NETWORK TIME PROTOCOL
NTP‘s noble purpose is to keep the clocks of computers around the world in sync, from whole server
farms to simple desktops.
Fig.4 Network Time Protocol.
But it, too, is a product of an age in which security wasn‘t a top precedence. That made it feasible to
use the mechanics of the protocol, in combination with a fleet of compromised computers, to launch
denial-of-service attacks. Fortunately, good work is being done to ensure that NTP servers are
patched against such exploits and have been set up properly from the beginning to keep the attacks
from occurrence. But nothing says future exploit of NTP are not feasible, especially given the lack of
scrutiny over the protocol and its implementations in the past.
VI. IPV4: INTERNET PROTOCOL
Despite all the clever dodges to work around the depletion of the IPv4 address space, no one denies
the days of IPv4 allocations -- even for big names like Microsoft -- are fast upcoming to an end. The
5. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 02, [February - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 560
only workable long-term solution has been known for years: Migrate to IPv6.IPv6 is making good
headway in new technology markets such as the mobile globe, where IPv6 is broadly used for 4G
networks. For everybody else, the obstacles in the way of moving to IPv6 are seemingly nonstop.
Simple inertia is a big one: Many won‘t upgrade unless they are compulsory to Qualified IPv6
expertise remains insufficient, according to California IPv6 Task Force co chair Ed Horley, and the
NIST is troubled that attackers are poised to pounce the minute the switches are thrown. Then over
again, no one said altering the fundamental infrastructure of the Internet would be easy
Fig. 4 Internet Protocol.
VII. SSL: SECURE SOCKETS LAYER
As a rule of thumb, the elder a protocol, the more likely it is to be broken in some way -- and the
more urgently it needs to be replaced with a descendant. Secure Sockets Layer has had a substitution
for years, but only now are we getting around to ditching SSL, mainly because disaster struck.SSL
was designed to provide cryptographic protection for application-layer connections like HTTP, but
its last open revision was in 1996. A alternate protocol, Transport Layer Security appeared three
years afterward, and its widely used 1.2 version landed in 2008. But SSL itself remains in use, in big
part as a backward-compatibility evaluated. Consequently, all major browsers have continued to
support SSL even if it‘s used in only 0.3 percent of the communication conducted today (according
to Mozilla).
Now we have as good an incentive to ditch SSL altogether as there could be: The infamous
POODLE attack, for which the best improvement measure is to get rid of SSL -- period. Mozilla and
Google are now doing that, meaning any enterprise that used SSL internally for whatever reason also
require to ditch it, stat. Maybe backward compatibility isn‘t all it‘s cracked up to be.
Fig.4 Network Time Protocol.
6. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 02, [February - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 561
VIII. CONCLUSION
In sum, network security is always a big issue. Network attacks just reflect various problems in the
existing network architecture and protocol organization. We just categorize them and list some
possible ways to deal with them. From Border Gateway Protocol to Secure Sockets Layer, several
Internet protocols are no match for today‘s malicious hackers and should be replaced.
REFERENCES
[1] Caicedo, C. E. , J. B. Joshi, and D. Tuladhar, 2009. IPv6 Security Challenges, IEEE Computers, 42(2):36-42.
[2] Atul Kant Kaushik, and R C Joshi, 2010. ―Network Forensic System for ICMP Attacks‖ International Journal of
Computer Applications;2(3):14–21.
[3] Daniel L. lough, David, C. lee., Scott F. Midkiff, Nathaniel J. Davis IV, and Phillip E. Benchoff,1998.The Next
Generation of the Internet: ―Aspects of the IPv6‖, IEEE Network, 12(1):28-33.
[4] Saleh, A. M. , and J. M. Simmons, 2011. Technology & architecture to enable the explosive growth of the internet-
IEEE Communications Magazine.
[5] Ugo Fiore & Francesco Palmieri. Enhanced security strategies for MPLS signaling; -Journal of Networks;2[5], 2007
[6] Douligeris C, D. Serpanos, Serpanos, D. 2007.IP Security (IPSec) . IEEE Book: Network Security: Current Status
and Future directions;65 – 82.
[7] Behrouz A. Forouzan. ―TCP/IP Protocol Suite‖; third edition. :- Publication-Tata McGraw Hill[2003]
[8] Hiromi, R.; Yoshifuji, H., ―Problems on IPv4-IPv6 n/w transition‖,- Proceeding of the International Symposium on
Applications and the Internet Workshop;Saint 2005.
[9] S. Kent. 1989. Comments on security problems in the TCP/IP suite. ACM SIGCOMM Computer Communication
Review;19[3] 10-19
[10] Goth, G. 2012. The End of IPv4 is Nearly Here in 2014, IEEE Internet Computing; 16(2) 7-11.
[11] W. R. Stevens, TCP/IP Illustrated Volume-1 –The Protocols; Addison-Wesley-1994
[12] S. M. Bellovin, ―Security Problems in the TCP/IP Protocols‖; Computer Communications analysis, Volume-19, No.
2, pp. 32-48, April 1989.
[13] Krsul, C. L. Schuba, I.V. Kuhn, Makus G. E.H. Spafford, D. Zamboni, A. Sundaram, Analysis of a Denial of Service
Attack on TCP.
[14] CERT, ‗TCP SYN Flooding and IP Spoofing Attack‘;- Carnegie Mellon University.
[15] D. E. Comer, Internetworking with TCP/IP: Volume- I Principles, Protocols & Architecture, Prentice Hall.
[16] S. Cheung, K. N. Levitt, C. Ko, ―Intrusion Detection for Network Infrastructures‖; IEEE Symposium on Security &
Privacy, Oakland, CA[ May 1995]
BIOGRAPHIES
Prof. Bharate L.M. is Asst. Professor at VVPIET, Solapur. His qualifications include B.E.(CSE), M.Tech(SE).He have a
rich industrial as well as teaching experience in the areas of Data Communication and Computer Networks, Information
Security; Web Technology. His research interests include Computer Networks and Network Security..
Prof. Patil P.S. is Asst. Professor at BIT, Barshi. Her qualifications include B.E.(CSE), M.Tech(SE). She have a rich
industrial as well as teaching experience in the areas of s/w Engineering, Data Communication and Computer n/w &
Security. Her research interests include Computer Networks and Network Security.
Prof. Joshi A.S. is Asst. Professor at VVPIET, Solapur. His qualifications include B.E.(CSE), M.E(CN). He has a rich
industrial as well as teaching experience in the areas of Data Structure, Data Communication and Computer Networks &
Security. His research interests include Computer Networks and Network Security.
Prof. Mane S.M. is Asst. Professor at VVPIET, Solapur. His qualifications include B.E.(CSE), M.E(CSE). He has a rich
teaching experience in the areas of Data Communication and Computer Networks & Security. His research interests
include Computer Networks.