SlideShare a Scribd company logo
1 of 74
Download to read offline
An Efficient Blackhole Attack Securing
Mechanism in Ad hoc On-demand Distance
Vector (AODV) Routing Protocol
Guide - Prasanta Baruah
(Asst. Professor)
Department of CSE, CIT Kokrajhar
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Prepared by - Ninmoy Debnath (Gau-c-13/044)
Mintukan Rabha (Gau-c-13/l-195)
Ajoy Swargiary (Gau-c-13/051)
Outline
 Objective
 Introduction
 AODV Routing Protocol
 Blackhole Attack
 Solution to Blackhole Attack
 Result
 Conclusion
 References
Objective
 To prevent Ad Hoc On-Demand Distance Vector
Routing Protocol from Blackhole attack.
Outline
 Objective
 Introduction
 AODV Routing Protocol
 Blackhole Attack
 Solution to Blackhole Attack
 Result
 Conclusion
 References
Mobile Ad-Hoc Network(MANET)
 Collection of mobile nodes forming ad-hoc network.
 Self-configuring network.
 Each node participates in routing.
 Topology changes frequently.
Applications of MANET
 Personal area networking
 cell phone, laptop, ear phone
 Military environments
 soldiers, tanks, planes
Challenges and Issues in MANET
 Limited wireless range.
 Packet losses.
 Routes changes.
 Devices heterogeneity.
 Battery power constraints.
 Security threats .
Outline
 Objective
 Introduction
 AODV Routing Protocol
 Blackhole Attack
 Solution to Blackhole Attack
 Result
 Conclusion
 References
AODV Routing Protocol
 Reactive Routing Protocol.
 AODV maintains all the route informations in the form of
tables.
 AODV has three control packets
 RREQ(Route Request Packet) broadcasting to find a
route.
 RREP(Route Reply Packet) is to set up forward path.
 RERR(Route Error Packet) to find any broken links.
[5]
AODV Routing Protocol Cont...
• Every node maintain two counters
 Sequence number
 Broadcast_id: it increments whenever the source
issues a new RREQ
• Packet format for RREQ
<source_addr, source_seq#, broadcast_id, dest_addr, dest_seq#, hop_count>
• Packet format for RREP
<source_addr, dest_addr, dest_seq#, hop_count, lifetime>
How AODV Works?
A
F
E
D
C
B
G
Objective: Node A wants to send data to F
How AODV Works?
A
F
E
D
C
B
G
<A, 2, 1, F, , 0>
RREQ
How AODV Works?
A
F
E
D
C
B
G
<A, 2, 1, F, , 0>
RREQ
How AODV Works?
A
F
E
D
C
B
G
<A, 2, 1, F, , 0>
<A, 2, 1, F, , 0>
RREQ
RREQ
How AODV Works?
A
F
E
D
C
B
G
<A, 2, 1, F, , 1>
<A, 2, 1, F, , 1>
Dest Next Hop Seq
A A 1 2
Dest Next Hop Seq
A A 1 2
RREQ
RREQ
How AODV Works?
A
F
E
D
C
B
G
<A, 2, 1, F, , 1>
<A, 2, 1, F, , 1>
Dest Next Hop Seq
A A 1 2
Dest Next Hop Seq
A A 1 2
RREQ
RREQ
How AODV Works?
A
F
E
D
C
B
G
<A, 2, 1, F, , 2>
<A, 2, 1, F, , 2>
Dest Next Hop Seq
A B 2 2
Dest Next Hop Seq
A C 2 2
RREQ
RREQ
How AODV Works?
A
F
E
D
C
B
G
<A, 2, 1, F, , 2>
<A, 2, 1, F, , 2>
Dest Next Hop Seq
A B 2 2
Dest Next Hop Seq
A A 2 2
RREQ
RREQ
How AODV Works?
A
F
E
D
C
B
G
<A, 2, 1, F, , 3>
<A, 2, 1, F, , 3>
Dest Next Hop Seq
A D 3 2
Dest Next Hop Seq
A E 3 2
RREQ
RREQ
How AODV Works?
A
F
E
D
C
B
G
<F, A, 4, 0>
Now F will prepare a Route Reply (RREP) packet
How AODV Works?
A
F
E
D
C
B
G
<F, A, 4, 1>
Dest Next Hop Seq
A D 3 2
F F 1 4
RREP
How AODV Works?
A
F
E
D
C
B
G
<F, A, 4, 2>
Dest Next Hop Seq
A D 3 2
F D 2 4
RREP
How AODV Works?
A
F
E
D
C
B
G
<F, A, 4, 3>
Dest Next Hop Seq
A D 3 2
F B 3 4
RREP
How AODV Works?
A
F
E
D
C
B
G
DATA
DATA
DATA
Simulation
Outline
 Objective
 Introduction
 AODV Routing Protocol
 Blackhole Attack
 Solution to Blackhole Attack
 Result
 Conclusion
 References
What is Blackhole Attack?
● Malicious node utilizes the routing protocol to attack.
● Claim itself having shortest path to the destination node.
● Does not forward packets to its neighbors.
[4]
Type of Blackhole Attack
● Ordinary( single ) Blackhole Attack
– One Malicious node utilizes the routing protocol to
claim itself of being the shortest path to the destination
node.
– After receiving the packet malicious node simply drop
the packet.
● Collaborative Blackhole Attack
– More than one Malicious node collaborate together to
attack.
Blackhole Attack
A
E
C D
MB
Objective: Node A wants to send data to E
Source Destination
Blackhole Attack
A
E
C D
MB
<A, 2, 1, E, , 0>
RREQ
Blackhole Attack
A
E
C D
MB
<A, 2, 1, E, , 0>
RREQ
Blackhole Attack
A
E
C D
MB
<A, 2, 1, E, , 1>
<A, 2, 1, E, , 1>
RREQ
RREQ
Dest Next Hop Seq
A A 1 2
Dest Next Hop Seq
A A 1 2
Blackhole Attack
A
E
C D
MB
<A, 2, 1, E, , 2>
<A, 2, 1, E, , 2>
RREQ
RREQ Dest Next Hop Seq
A B 2 2
Dest Next Hop Seq
A C 2 2
Blackhole Attack
A
E
C D
MB
<A, 2, 1, E, , 3>
<E, A, 9999, 1>
RREQ
RREP Dest Next Hop Seq
E M 1 9999
Dest Next Hop Seq
A D 3 2
Blackhole Attack
A
E
C D
MB
<E, A, 9999, 2>
RREPDest Next Hop Seq
E M 2 9999
Dest Next Hop Seq
E E 1 4
<E, A, 4, 1>
RREP
Blackhole Attack
A
E
C D
MB
<E, A, 9999, 3>
RREP
Dest Next Hop Seq
E B 3 9999
Dest Next Hop Seq
E D 2 4
<E, A, 4, 2>
RREP
Blackhole Attack
A
E
C D
MB
DATA
DATA
Case 2: Blackhole Attack
A
G
M
D
E
C
B
F
Objective: Node A wants to send data to F
Blackhole Attack
A
D
E
C
B
F
<A, 2, 1, F, , 0>
RREQ
G
M
Blackhole Attack
A
D
E
C
B
F
<A, 2, 1, F, , 0>
RREQ
G
M
Blackhole Attack
A
D
E
C
B
F
<A, 2, 1, F, , 1>
RREQ
RREQ
<A, 2, 1, F, , 1>
Dest Next Hop Seq
A A 1 2
Dest Next Hop Seq
A A 1 2
G
M
Blackhole Attack
A
D
E
C
B
F
<A, 2, 1, F, , 2>
RREQ
RREQ
<A, 2, 1, F, , 2>
Dest Next Hop Seq
A B 2 2
Dest Next Hop Seq
A C 2 2
G
M
Blackhole Attack
A
D
E
C
B
F
<A, 2, 1, F, , 3>
RREQ
Dest Next Hop Seq
A E 3 2
G
RREQ
<A, 2, 1, F, , 3>
Dest Next Hop Seq
A D 3 2
M
Blackhole Attack
A
D
E
C
B
F <F, A, 4, 0>
RREP
G
M
RREQ
<A, 2, 1, F, , 4>
Dest Nex
t
Hop Seq
A G 4 2
Blackhole Attack
A
D
E
C
B
F
<F, A, 4, 1>
RREP
G
M
RREP
<F, A, 9999, 0>
Dest Next Hop Seq
A E 3 2
F F 1 4
Blackhole Attack
A
D
E
C
B
F
<F, A, 4, 2>
RREP
G
M
RREP
<F, A, 9999, 1>
Dest Next Hop Seq
A E 3 2
F B 2 4
Dest Next Hop Seq
A G 4 2
F M 1 9999
Blackhole Attack
A
D
E
C
B
F
<F, A, 4, 2>
RREP
G
M
RREP
<F, A, 9999, 2>
Dest Next Hop Seq
A E 3 2
F E 2 4
Dest Next Hop Seq
A G 4 2
F G 2 9999
Blackhole Attack
A
D
E
C
B
F
G
M
RREP
<F, A, 9999, 3>
Dest Next Hop Seq
A G 4 2
F D 3 9999
DATA
DATA
DATA
Blackhole Attack
A
D
E
C
B
F
G
MRREP
<F, A, 9999, 4>
Dest Next Hop Seq
A G 4 2
F C 4 9999
DATA
DATA
DATA
Blackhole Attack
A
D
E
C
B
F
G
M
DATA
DATA
DATA
DATA
Simulation
Outline
 Objective
 Introduction
 AODV Routing Protocol
 Blackhole Attack
 Solution to Blackhole Attack
 Result
 Conclusion
 References
Algorithm
 Define table for storing the Route Replies.
 Save all the Route Replies in the table for at least two Route
Replies.
 Take the average of sequence number of Route Replies store
in the table
 Select the Route Reply whose sequence number is smaller or
equal to average of sequence number.
 Send the packet through whose sequence number is smaller
or equal to average of sequence number.
 Delete the entries in the table.
Modified AODV Under Blackhole
Attack
S
3
4
M
1
2
5
D
S
3
4
M
1
2
5
D
2 <Seq. No>
2 <Seq. No>
2 <Seq. No>
S
3
4
M
1
2
5
D
2 <Seq. No>
2 <Seq. No>
2 <Seq. No>
S
3
4
M
1
2
5
D
9999<dest_seq>
2 <Seq. No>
2 <Seq. No>
S
3
4
M
1
2
5
D
Seq.No
9999
9999<dest_seq>
2 <Seq. No>
4 <Seq. No>
Node
1
S
3
4
M
1
2
5
D
Seq.No
9999
Node
1
4<dest_seq>
S
3
4
M
1
2
5
D
Average of 9999 and 4 is 5001
Seq.No
9999
Node
1
4<dest_seq>
4 2
S
3
4
M
1
2
5
D
Seq_no.<=5001
i.e., 4
Send the packet via. node 2
S
3
4
M
1
2
5
D
Data
S
3
4
M
1
2
5
D
Data
S
3
4
M
1
2
5
D
Data
Simulation
Outline
 Objective
 Introduction
 AODV Routing Protocol
 Blackhole Attack
 Solution to Blackhole Attack
 Result
 Conclusion
 References
End to End Delay
End to End delay=packet_receive_time – packet_sent_time
Packet Drop
Packet Drop occurs when one or more packets of data
travelling across a computer network fail to reach their
destination.
Packet Delivery Ratio(PDR)
PDR = (Packet_Receive/Packet_Sent) *100 %
Throughput
Throughput=total_packet_recvdSize/unitTime
where unitTime=(packet_sending_stop_time –
packet_sending_ start_time)
Conclusion
 Justified the algorithm of securing the blackhole attack in the
AODV routing protocols in MANET.
 The proposed solution achieves a very good rise in Packet Delivery
Ratio with acceptable rise in End-to-End Delay and Throughput.
 The algorithm does not have any hidden overhead on either the
intermediate nodes or the destination nodes.
 Algorithm is simple and efficient in implementation.
References
1. Latha Tamilselvan, V Sankaranarayanan. “Prevention of Blackhole Attacks in
MANET.” In Proceedings of the 2nd International Conference on Wireless
Broadband and Ultra Wideban Communications (AusWireless 2007), pp. 21-
21, Aug. 2007.
2. Payal N. Raj, Prashant B. Swadas. “DPRAODV: A Dyanamic Learning System
Against Blackhole Attack In Aodv Based Manet.” In: International Journal of
Computer Science Issues, Vol.2, pp 54-59, 2009.
3. Hongmei Deng, Wei Li, Dharma P. Agrawal,“Routing security in wireless ad
hoc networks” IEEE Communications Magazine (Volume: 40, Issue: 10, Oct
2002 ).
4. Al-Shurman M, Yoo S-M, Park S, “Blackhole Attack in Mobile Ad Hoc
Networks” ACM-SE 42 Proceedings of the 42nd annual Southeast regional
conference (Pages:96-97, date:2004-04-02) .
5. C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-demand distance vector
(AODV) routing” RFC 3561, Experimental, July 2003.
6. Ns2 Manual , http://www.isi.edu/nsnam/ns/tutorial/.
Thank You

More Related Content

What's hot

PPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & CharacteristicsPPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & CharacteristicsAnuj Parajuli
 
CTTC presentation WSN in Contiki
CTTC presentation WSN in ContikiCTTC presentation WSN in Contiki
CTTC presentation WSN in ContikiTania Ellinidou
 
MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)Krishan Pareek
 
Ch 03 --- the OpenFlow protocols
Ch 03 --- the OpenFlow protocolsCh 03 --- the OpenFlow protocols
Ch 03 --- the OpenFlow protocolsYoram Orzach
 
Transport protocols
Transport protocolsTransport protocols
Transport protocolsAman Jaiswal
 
PPP (Point to Point Protocol)
PPP (Point to Point Protocol)PPP (Point to Point Protocol)
PPP (Point to Point Protocol)Ali Jafar
 
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP Protocols
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP ProtocolsTCP & UDP Streaming Comparison and a Study on DCCP & SCTP Protocols
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP ProtocolsPeter SHIN
 
Ports & sockets
Ports  & sockets Ports  & sockets
Ports & sockets myrajendra
 

What's hot (19)

CCNA Dec, 2015 Questions
CCNA Dec, 2015 QuestionsCCNA Dec, 2015 Questions
CCNA Dec, 2015 Questions
 
CCNA 200-120 Exam Quick Notes
CCNA 200-120 Exam Quick NotesCCNA 200-120 Exam Quick Notes
CCNA 200-120 Exam Quick Notes
 
PPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & CharacteristicsPPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & Characteristics
 
CTTC presentation WSN in Contiki
CTTC presentation WSN in ContikiCTTC presentation WSN in Contiki
CTTC presentation WSN in Contiki
 
MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)
 
Sctp tutorial
Sctp tutorialSctp tutorial
Sctp tutorial
 
Ch 03 --- the OpenFlow protocols
Ch 03 --- the OpenFlow protocolsCh 03 --- the OpenFlow protocols
Ch 03 --- the OpenFlow protocols
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
SCTP Tutorial
SCTP TutorialSCTP Tutorial
SCTP Tutorial
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Part 12 : Local Area Networks
Part 12 : Local Area Networks Part 12 : Local Area Networks
Part 12 : Local Area Networks
 
PPP (Point to Point Protocol)
PPP (Point to Point Protocol)PPP (Point to Point Protocol)
PPP (Point to Point Protocol)
 
BGP Overview
BGP OverviewBGP Overview
BGP Overview
 
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP Protocols
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP ProtocolsTCP & UDP Streaming Comparison and a Study on DCCP & SCTP Protocols
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP Protocols
 
L2 tp
L2 tpL2 tp
L2 tp
 
Chapter4 Network
Chapter4 NetworkChapter4 Network
Chapter4 Network
 
Rfc1723
Rfc1723Rfc1723
Rfc1723
 
Rfc1058
Rfc1058Rfc1058
Rfc1058
 
Ports & sockets
Ports  & sockets Ports  & sockets
Ports & sockets
 

Similar to An Efficient Black Hole Attack Securing Mechanism in Ad Hoc On Demand Distance Vector Routing Protocol

44CON 2014 - Simple Hardware Sidechannel Attacks for 10 GBP or Less, Joe Fitz...
44CON 2014 - Simple Hardware Sidechannel Attacks for 10 GBP or Less, Joe Fitz...44CON 2014 - Simple Hardware Sidechannel Attacks for 10 GBP or Less, Joe Fitz...
44CON 2014 - Simple Hardware Sidechannel Attacks for 10 GBP or Less, Joe Fitz...44CON
 
Simulation and Performance Analysis of AODV using NS 2.34 by Ashok Panwar
Simulation and Performance Analysis of AODV using NS 2.34 by Ashok PanwarSimulation and Performance Analysis of AODV using NS 2.34 by Ashok Panwar
Simulation and Performance Analysis of AODV using NS 2.34 by Ashok PanwarAshok Panwar
 
Cassandra : to be or not to be @ TechTalk
Cassandra : to be or not to be @ TechTalkCassandra : to be or not to be @ TechTalk
Cassandra : to be or not to be @ TechTalkAndriy Rymar
 
Cisco systems hacking layer 2 ethernet switches
Cisco systems   hacking layer 2 ethernet switchesCisco systems   hacking layer 2 ethernet switches
Cisco systems hacking layer 2 ethernet switchesKJ Savaliya
 
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Sumutiu Marius
 
01 owa200002 wcdma ran fundamental
01 owa200002 wcdma ran fundamental01 owa200002 wcdma ran fundamental
01 owa200002 wcdma ran fundamentalMd.Akm Sahansha
 
01 owa200002 wcdma ran fundamental
01 owa200002 wcdma ran fundamental01 owa200002 wcdma ran fundamental
01 owa200002 wcdma ran fundamentalMd.Akm Sahansha
 
Incremental Graph Queries for Cypher
Incremental Graph Queries for CypherIncremental Graph Queries for Cypher
Incremental Graph Queries for CypheropenCypher
 
PBL1-v1-200e.pptx
PBL1-v1-200e.pptxPBL1-v1-200e.pptx
PBL1-v1-200e.pptxNAIST
 
IAP presentation-1.pptx
IAP presentation-1.pptxIAP presentation-1.pptx
IAP presentation-1.pptxHirazNor
 
4. Pipeline Hazards.pptx
4. Pipeline Hazards.pptx4. Pipeline Hazards.pptx
4. Pipeline Hazards.pptxKarthikeyanC53
 
Gsm 2 g rollout dt
Gsm 2 g rollout dtGsm 2 g rollout dt
Gsm 2 g rollout dtINAYAT ULHAQ
 
Practical webRTC - from API to Solution - webRTC Summit 2014 @ NYC
Practical webRTC - from API to Solution - webRTC Summit 2014 @ NYCPractical webRTC - from API to Solution - webRTC Summit 2014 @ NYC
Practical webRTC - from API to Solution - webRTC Summit 2014 @ NYCAlexandre Gouaillard
 
Mitigating Layer2 Attacks
Mitigating Layer2 AttacksMitigating Layer2 Attacks
Mitigating Layer2 Attacksdkaya
 
PLNOG 4: Marcin Kuczera - Jak wyrzuciliśmy wszystkie Linuxy, czyli centralny ...
PLNOG 4: Marcin Kuczera - Jak wyrzuciliśmy wszystkie Linuxy, czyli centralny ...PLNOG 4: Marcin Kuczera - Jak wyrzuciliśmy wszystkie Linuxy, czyli centralny ...
PLNOG 4: Marcin Kuczera - Jak wyrzuciliśmy wszystkie Linuxy, czyli centralny ...PROIDEA
 
Understanding and Preventing Layer 2 Attacks
Understanding and Preventing Layer 2 AttacksUnderstanding and Preventing Layer 2 Attacks
Understanding and Preventing Layer 2 AttacksTien Dung
 
SAS (Secure Active Switch)
SAS (Secure Active Switch)SAS (Secure Active Switch)
SAS (Secure Active Switch)Security Date
 
شرح مبسط جدا لمنهج سيسكو CCNA
شرح مبسط جدا لمنهج سيسكو CCNAشرح مبسط جدا لمنهج سيسكو CCNA
شرح مبسط جدا لمنهج سيسكو CCNADawood Aqlan
 

Similar to An Efficient Black Hole Attack Securing Mechanism in Ad Hoc On Demand Distance Vector Routing Protocol (20)

44CON 2014 - Simple Hardware Sidechannel Attacks for 10 GBP or Less, Joe Fitz...
44CON 2014 - Simple Hardware Sidechannel Attacks for 10 GBP or Less, Joe Fitz...44CON 2014 - Simple Hardware Sidechannel Attacks for 10 GBP or Less, Joe Fitz...
44CON 2014 - Simple Hardware Sidechannel Attacks for 10 GBP or Less, Joe Fitz...
 
Simulation and Performance Analysis of AODV using NS 2.34 by Ashok Panwar
Simulation and Performance Analysis of AODV using NS 2.34 by Ashok PanwarSimulation and Performance Analysis of AODV using NS 2.34 by Ashok Panwar
Simulation and Performance Analysis of AODV using NS 2.34 by Ashok Panwar
 
Cassandra : to be or not to be @ TechTalk
Cassandra : to be or not to be @ TechTalkCassandra : to be or not to be @ TechTalk
Cassandra : to be or not to be @ TechTalk
 
Cisco systems hacking layer 2 ethernet switches
Cisco systems   hacking layer 2 ethernet switchesCisco systems   hacking layer 2 ethernet switches
Cisco systems hacking layer 2 ethernet switches
 
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
 
01 owa200002 wcdma ran fundamental
01 owa200002 wcdma ran fundamental01 owa200002 wcdma ran fundamental
01 owa200002 wcdma ran fundamental
 
01 owa200002 wcdma ran fundamental
01 owa200002 wcdma ran fundamental01 owa200002 wcdma ran fundamental
01 owa200002 wcdma ran fundamental
 
Incremental Graph Queries for Cypher
Incremental Graph Queries for CypherIncremental Graph Queries for Cypher
Incremental Graph Queries for Cypher
 
PBL1-v1-200e.pptx
PBL1-v1-200e.pptxPBL1-v1-200e.pptx
PBL1-v1-200e.pptx
 
1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618) 1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618)
 
IAP presentation-1.pptx
IAP presentation-1.pptxIAP presentation-1.pptx
IAP presentation-1.pptx
 
4. Pipeline Hazards.pptx
4. Pipeline Hazards.pptx4. Pipeline Hazards.pptx
4. Pipeline Hazards.pptx
 
Gsm 2 g rollout dt
Gsm 2 g rollout dtGsm 2 g rollout dt
Gsm 2 g rollout dt
 
Practical webRTC - from API to Solution - webRTC Summit 2014 @ NYC
Practical webRTC - from API to Solution - webRTC Summit 2014 @ NYCPractical webRTC - from API to Solution - webRTC Summit 2014 @ NYC
Practical webRTC - from API to Solution - webRTC Summit 2014 @ NYC
 
Mitigating Layer2 Attacks
Mitigating Layer2 AttacksMitigating Layer2 Attacks
Mitigating Layer2 Attacks
 
PLNOG 4: Marcin Kuczera - Jak wyrzuciliśmy wszystkie Linuxy, czyli centralny ...
PLNOG 4: Marcin Kuczera - Jak wyrzuciliśmy wszystkie Linuxy, czyli centralny ...PLNOG 4: Marcin Kuczera - Jak wyrzuciliśmy wszystkie Linuxy, czyli centralny ...
PLNOG 4: Marcin Kuczera - Jak wyrzuciliśmy wszystkie Linuxy, czyli centralny ...
 
NAT Traversal
NAT TraversalNAT Traversal
NAT Traversal
 
Understanding and Preventing Layer 2 Attacks
Understanding and Preventing Layer 2 AttacksUnderstanding and Preventing Layer 2 Attacks
Understanding and Preventing Layer 2 Attacks
 
SAS (Secure Active Switch)
SAS (Secure Active Switch)SAS (Secure Active Switch)
SAS (Secure Active Switch)
 
شرح مبسط جدا لمنهج سيسكو CCNA
شرح مبسط جدا لمنهج سيسكو CCNAشرح مبسط جدا لمنهج سيسكو CCNA
شرح مبسط جدا لمنهج سيسكو CCNA
 

Recently uploaded

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...jabtakhaidam7
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 

Recently uploaded (20)

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 

An Efficient Black Hole Attack Securing Mechanism in Ad Hoc On Demand Distance Vector Routing Protocol