The current interdomain routing protocol, Border
Gateway Protocol, is limited in implementations of universal
security. Because of this, it is vulnerable to many attacks at
the AS to AS routing infrastructure. Initially, the major
concern about BGP security is that malicious BGP routers
can arbitrarily falsify BGP routing messages and spread
incorrect routing information. Recently, some authors have
pointed out the impact of a type of attack, namely selective
dropping or malicious dropping attack that has not studied
before. The malicious draping attack can result in data traffic
being blackholed or trapped in a loop. However, the authors
did not elaborate on how one can detect such attacks. In this
paper, we discuss and analyse a method that can be used to
detect malicious dropping attacks in the Internet.
A precise termination condition of the probabilistic packet marking algorithm...Mumbai Academisc
This document summarizes a research project that proposes a precise termination condition for the probabilistic packet marking (PPM) algorithm. The PPM algorithm allows routers to encode path information onto packets during a denial of service (DoS) attack, enabling the victim to reconstruct the attack graph. However, the existing PPM algorithm lacks a well-defined termination condition, and cannot handle multiple attackers. The proposed project aims to define a termination condition to ensure the reconstructed graph accurately represents the actual attack paths. It also extends the algorithm to support tracing packets from multiple attackers.
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
Abstract- MANETs are infrastructure less and can be set up anytime anywhere. Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective data broadcasting mechanism, where a mobile node blindly rebroadcasts the first received route request packets unless it has a route to the destination, and thus it causes the broadcast storm problem and without consider the nodes energy level of route selection it leads to reduce the network lifetime. In this paper proposed to focus is on a two mechanism ESDSR and Neighbor coverage based Probabilistic rebroadcast to overcome those problems. A Energy Saving Dynamic Source Routing in MANETs (ESDSR) which will efficiently utilize the battery power consideration in the route selection time of mobile nodes in such a way that the network will get more life time and Neighbor coverage based Probabilistic rebroadcast mechanism, which can significantly decrease the number of retransmissions so as to reduce the routing overhead, and can also improve the routing performance. The simulation was carried out using the NS-2 network simulator.
Study and analysis vurnerability of aodv protocolMehedi
This document discusses security issues in the Ad Hoc On-Demand Distance Vector (AODV) routing protocol for mobile ad hoc networks. It describes various attacks against AODV like wormhole attacks, colluding misrelay attacks, replay attacks, and false route error messages. It also explains black hole attacks and distributed denial of service (DDoS) attacks. The document analyzes why AODV is vulnerable to such attacks due to its characteristics. It concludes that attacks like black hole attacks highly impact AODV's performance and proposes future work to simulate black hole attacks on AODV using a network simulator.
AN EFFICIENT IP TRACEBACK THROUGH PACKET MARKING ALGORITHMIJNSA Journal
Denial-of-service (DoS) attacks pose an increasing threat to today’s Internet. One major difficulty to defend against Distributed Denial-of-service attack is that attackers often use fake, or spoofed IP addresses as the IP source address. Probabilistic packet marking algorithm (PPM), allows the victim to trace back the appropriate origin of spoofed IP source address to disguise the true origin. In this paper we propose a technique that efficiently encodes the packets than the Savage probabilistic packet marking algorithm and reconstruction of the attack graph. This enhances the reliability of the probabilistic packet marking algorithm.
The document discusses ciphering procedures used in mobile networks. It describes:
1) Ciphering is used to secure signaling and subscriber information exchanged between the mobile station (MS) and base transceiver station (BTS).
2) The ciphering procedure is initiated by the network and performed in the BTS. The ciphering key is generated by the authentication center and sent to the BTS before ciphering begins.
3) The mobile switching center (MSC) sends ciphering commands to the BTS to start or change the ciphering mode via the base station controller (BSC).
Secure routing and data transmission in mobileIJCNCJournal
In this paper, we present an identity (ID) based protocol that secures AODV and TCP so that it can be used
in dynamic and attack prone environments of mobile ad hoc networks. The proposed protocol protects
AODV using Sequential Aggregate Signatures (SAS) based on RSA. It also generates a session key for each
pair of source-destination nodes of a MANET for securing the end-to-end transmitted data. Here each node
has an ID which is evaluated from its public key and the messages that are sent are authenticated with a
signature/ MAC. The proposed scheme does not allow a node to change its ID throughout the network
lifetime. Thus it makes the network secure against attacks that target AODV and TCP in MANET. We
present performance analysis to validate our claim.
DDoS attacks have become one of the most dangerous issues in the Internet today. Because of these attacks, legitimate users can not access the resources they need. In [1] authors proposed a combined method for tracing and blocking the sources of DDoS-attacks. The essence of the method is that each router marks the network packet that passes through it using a random hash function from the set. At the receiving side this information is stored and used to filter unwanted traffic and traceback the source of distributed attack. This article describes the simulation and its results of the combined method.
A precise termination condition of the probabilistic packet marking algorithm...Mumbai Academisc
This document summarizes a research project that proposes a precise termination condition for the probabilistic packet marking (PPM) algorithm. The PPM algorithm allows routers to encode path information onto packets during a denial of service (DoS) attack, enabling the victim to reconstruct the attack graph. However, the existing PPM algorithm lacks a well-defined termination condition, and cannot handle multiple attackers. The proposed project aims to define a termination condition to ensure the reconstructed graph accurately represents the actual attack paths. It also extends the algorithm to support tracing packets from multiple attackers.
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
Abstract- MANETs are infrastructure less and can be set up anytime anywhere. Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective data broadcasting mechanism, where a mobile node blindly rebroadcasts the first received route request packets unless it has a route to the destination, and thus it causes the broadcast storm problem and without consider the nodes energy level of route selection it leads to reduce the network lifetime. In this paper proposed to focus is on a two mechanism ESDSR and Neighbor coverage based Probabilistic rebroadcast to overcome those problems. A Energy Saving Dynamic Source Routing in MANETs (ESDSR) which will efficiently utilize the battery power consideration in the route selection time of mobile nodes in such a way that the network will get more life time and Neighbor coverage based Probabilistic rebroadcast mechanism, which can significantly decrease the number of retransmissions so as to reduce the routing overhead, and can also improve the routing performance. The simulation was carried out using the NS-2 network simulator.
Study and analysis vurnerability of aodv protocolMehedi
This document discusses security issues in the Ad Hoc On-Demand Distance Vector (AODV) routing protocol for mobile ad hoc networks. It describes various attacks against AODV like wormhole attacks, colluding misrelay attacks, replay attacks, and false route error messages. It also explains black hole attacks and distributed denial of service (DDoS) attacks. The document analyzes why AODV is vulnerable to such attacks due to its characteristics. It concludes that attacks like black hole attacks highly impact AODV's performance and proposes future work to simulate black hole attacks on AODV using a network simulator.
AN EFFICIENT IP TRACEBACK THROUGH PACKET MARKING ALGORITHMIJNSA Journal
Denial-of-service (DoS) attacks pose an increasing threat to today’s Internet. One major difficulty to defend against Distributed Denial-of-service attack is that attackers often use fake, or spoofed IP addresses as the IP source address. Probabilistic packet marking algorithm (PPM), allows the victim to trace back the appropriate origin of spoofed IP source address to disguise the true origin. In this paper we propose a technique that efficiently encodes the packets than the Savage probabilistic packet marking algorithm and reconstruction of the attack graph. This enhances the reliability of the probabilistic packet marking algorithm.
The document discusses ciphering procedures used in mobile networks. It describes:
1) Ciphering is used to secure signaling and subscriber information exchanged between the mobile station (MS) and base transceiver station (BTS).
2) The ciphering procedure is initiated by the network and performed in the BTS. The ciphering key is generated by the authentication center and sent to the BTS before ciphering begins.
3) The mobile switching center (MSC) sends ciphering commands to the BTS to start or change the ciphering mode via the base station controller (BSC).
Secure routing and data transmission in mobileIJCNCJournal
In this paper, we present an identity (ID) based protocol that secures AODV and TCP so that it can be used
in dynamic and attack prone environments of mobile ad hoc networks. The proposed protocol protects
AODV using Sequential Aggregate Signatures (SAS) based on RSA. It also generates a session key for each
pair of source-destination nodes of a MANET for securing the end-to-end transmitted data. Here each node
has an ID which is evaluated from its public key and the messages that are sent are authenticated with a
signature/ MAC. The proposed scheme does not allow a node to change its ID throughout the network
lifetime. Thus it makes the network secure against attacks that target AODV and TCP in MANET. We
present performance analysis to validate our claim.
DDoS attacks have become one of the most dangerous issues in the Internet today. Because of these attacks, legitimate users can not access the resources they need. In [1] authors proposed a combined method for tracing and blocking the sources of DDoS-attacks. The essence of the method is that each router marks the network packet that passes through it using a random hash function from the set. At the receiving side this information is stored and used to filter unwanted traffic and traceback the source of distributed attack. This article describes the simulation and its results of the combined method.
A survey on mitigation methods to black hole attack on aodv routing protocolAlexander Decker
This document summarizes research on mitigation methods for black hole attacks on the AODV routing protocol in mobile ad hoc networks. It first provides background on AODV and describes how black hole attacks work by having malicious nodes advertise fake routes. It then surveys two existing mitigation methods: 1) a method that verifies the next hop in route replies is trustworthy, but has limitations against cooperative black hole attacks, and 2) a neighborhood-based detection scheme that recovers reliable routes but could be evaded if attackers selectively forge replies and cannot detect cooperative attacks. The document aims to investigate vulnerabilities in AODV against black hole attacks.
because so many decades World Wide Web has been used broadly in numerous fields, network safety problems include the main matter. IP traceback is just the actual method to understand the actual purpose, it reconstructs IP packets traversed path inside the World Wide Web to determine their own roots. IP Traceback may be an important ability for characteristics sources of attacks and Starting protection measures for the Internet. This paper discovers different IP Traceback approaches. This comparative paper provides as well as extends many technologies to prevent the secured information from the network issues by using different IP traceback techniques.
Performance analysis of aodv protocol on blackhole attackMehedi
This document discusses the AODV routing protocol, black hole attacks against AODV, and analyzing AODV's performance under black hole attacks. It introduces AODV, explains why it is used, and outlines security issues. It then defines distributed denial of service (DDoS) and black hole attacks, describing how black holes work at the routing level to drop packets. The document concludes it will use a network simulator to analyze how black hole attacks affect AODV performance metrics.
The document discusses the gray hole attack in MANETs using the AODV routing protocol. The gray hole attack involves a malicious node selectively dropping packets in a manner that is difficult to detect. The summary proposes a detection method that involves (1) the source node broadcasting a fake RREQ to identify malicious nodes, (2) comparing the destination sequence numbers of replying nodes to a threshold value to identify attackers, and (3) broadcasting identified gray hole nodes to other nodes in the network. The method aims to improve on existing detection techniques by using destination-based routing and sequence number comparisons to more accurately detect gray hole attacks.
This document discusses the black hole attack on the AODV routing protocol in mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and discusses how AODV works and the types of control packets it uses. It then explains how the black hole attack exploits AODV by having a malicious node send fake route reply messages, allowing it to drop packets. Several techniques for detecting and mitigating black hole attacks on AODV are discussed. The document reviews related work on defending against such attacks using approaches like security-aware ad hoc routing protocols.
Abstract:
We set DHT (Distributed Hash Table) centered P2P (Peer to Peer) program - Chord in to MANET (Mobile
Ad-hoc Network) in this paper. Then, we propose a new routing modified scheme Cross Modeled Chord
(CM-Chord) which bases on the unicast scheme with DHT. CM-Chord might be efficiently used to not only
provide conventional direct routing, but additionally indirect, key-based overlay routing. Our simulation
suggests that CM-Chord can markedly outperform conventional reactive Random routing (AODV). For that
reason, MANET nodes can run CM-Chord for software objective, particularly P2P applications.
This document introduces Sigtran, a protocol suite defined by the IETF to transport signaling data like SS7 over IP networks. It describes the key components of Sigtran, including SCTP as the new transport protocol and various User Adaptation layers that allow SS7 and ISDN protocols to run over SCTP and IP. SCTP was created to address limitations of TCP for carrying time-sensitive signaling data and includes features like multi-streaming and structured message transport that make it more suitable than TCP for this purpose. The document outlines the full Sigtran protocol stack and how it maps existing signaling protocols to the new transport layers.
This document proposes and evaluates Inter-Domain Packet Filters (IDPF) to limit IP spoofing by filtering packets based on feasible inter-domain routes inferred from BGP updates. IDPFs were found to effectively limit spoofing capability even with partial deployment, and improve accuracy of tracing spoofed traffic to its origin. The performance of IDPFs was studied through metrics like limiting the number of address prefixes that can be spoofed and localizing the source of attacks. Complications from non-standard routing policies and dynamic routing were also discussed.
The document describes the Point-to-Point Protocol (PPP) and its use in establishing serial connections over WAN links. It discusses PPP concepts like its layered architecture, frame structure, session establishment process, and support for multiple network layer protocols. The document also covers configuring PPP encapsulation on serial interfaces, verifying the PPP connection, troubleshooting encapsulation issues, and configuring PPP authentication using PAP and CHAP protocols.
Mobile Ad-hoc Network is group of wireless mobile device with restricted broadcast range and no use of base Infrastructure. The secure routing model helps for reduced honest elicitation and free riding problem. The term honest elicitation means it forward high recommendation for malicious node in order to avoid itself. It means the high recommendation for colludingmalicious node. When operating in hostile or suspicious setting, MANETs require privacy and ,communication security in routing protocol. In this paper we present the type of attacks and operation on network layer with routing protocol technique i.e. based on an on-demand locationbased anonymous MANET routing protocol called SMRT (secure MANET routing technique ,with trust model) that achieves security and privacy against insider and outsider adversaries.
Abstract Mobile Ad Hoc Network(MANETs) is a wireless communications technology in which devices may move around. There is no fixed structure or network that all the participating nodes form. It is a very flexible network. These characteristicsof MANET make it very unsafe and prone to various attacks.Although many research focus on how to deliver packets fromone node to another, very less importance had been given tothe security. Current techniques of addressing security on thefixed structured wired network are only useful to protect thetransmitted message on the end nodes, the security of routinginformation among the mobile nodes in the hostile environmentwhere mobile Ad Hoc networks are usually used has beeninadequately addressed. Security and routing has been treatedseparately incase of wired network but that cannot be done inwireless network since routing itself can be a major reason fordata loss or theft if done in a casual manner making it prone toattack from malicious node.Hence the routing and security hasto be looked into as one and not separately. Making the routingsecured can make the MANET a more reliable network. We havemade the routing mechanism secured but extending Fuzzy logic toit. Fuzzy logic in deciding the route makes it less prone to attacksand thus ensuring enhanced security. The proposed scheme ofsecure routing will be demonstrated by using simulation on NS2. Keywords AODV, SAODV, Fuzzy Logic, Black holeattack.
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manetidescitation
Mobile adhoc networks are connected by wireless
links which forms a random topology of mobile nodes.Random
topology and self-organising network provides on-demand
networking and dynamic topology.Due to lack of infrastructure
support each node are self-organising and any nodes can join
and leave the network at any time.Providing security to these
network is a challenging issue because these type of networks
suffer for various kinds of malicious attacks.One of the attacks
which are most difficult to detect in Mobile adhoc network is
Gray hole attack.In this paper an analytical Gray Hole attack
model is developed for AODV protocol.Experiments are
simulated for Gray Hole attacks under variety of adhoc
network condition.
Multicasting allows data to be sent from one source to multiple receivers simultaneously. It provides an efficient way to disseminate information to many recipients. The document discusses IP multicast addressing, the IGMP protocol for joining and leaving multicast groups, multicast routing protocols like DVMRP and PIM, and methods for constructing multicast distribution trees like source-based and shared trees. Multicasting is important for applications like streaming media and teleconferencing that require one-to-many or many-to-many communication.
Basics of multicasting and its implementation on ethernet networksReliance Comm
Multicasting allows data to be sent from one source to multiple receivers simultaneously. It provides an efficient way to disseminate information to many recipients. The document discusses IP multicast addressing, the IGMP protocol for joining and leaving multicast groups, multicast routing protocols like DVMRP and PIM, and methods for constructing multicast distribution trees like source-based and shared trees. Multicasting is important for applications like streaming media and teleconferencing that require one-to-many or many-to-many communication.
This document summarizes a research paper that simulates the Ad Hoc On-Demand Distance Vector (AODV) routing protocol under black hole attacks in mobile ad hoc networks (MANETs). The paper analyzes how black hole attacks affect key AODV routing metrics like packet delivery ratio and end-to-end delay. Through simulations with varying numbers of nodes, the paper finds that black hole attacks significantly reduce packet delivery ratios by diverting traffic to malicious nodes. The simulations provide insight into how AODV performance degrades under such attacks.
An Efficient Black Hole Attack Securing Mechanism in Ad Hoc On Demand Distanc...MINTUKAN RABHA
This document discusses securing the AODV routing protocol against blackhole attacks in mobile ad-hoc networks (MANETs). It first introduces MANETs and the AODV protocol. It then explains the blackhole attack where a malicious node claims to have the shortest path to a destination and drops packets. The proposed solution is an algorithm that stores route replies in a table, calculates the average sequence number, and selects the route with a sequence number lower than the average to mitigate blackhole attacks. Simulation results show the algorithm increases packet delivery ratio with acceptable increases in end-to-end delay and throughput.
The document describes IEEE 802.16j multi-hop relay networks. It outlines the benefits of using relay stations such as coverage extension and throughput enhancement. It discusses key concepts like relay links and access links. The document also provides details on relay station network entry procedures including scanning, synchronization, ranging, registration. It explains relay frame structure and functional blocks. Finally, it summarizes procedures like neighbor measurement reporting, access station selection, and operation parameter configuration.
IRJET- Constructing Inter Domain Packet Filter for Controlling IP SpoofingIRJET Journal
This document proposes an Inter Domain Packet Filter (IDPF) architecture to reduce IP spoofing on the internet. The IDPF architecture takes advantage of the limited number of feasible paths between autonomous systems (ASes) implied by their commercial relationships. It constructs packet filters based on routing information exchanged in Border Gateway Protocol (BGP) updates between neighboring ASes, without requiring global routing knowledge. Simulation studies show that even partial deployment of IDPFs can help localize the source of attack packets and limit attackers' ability to spoof IP addresses.
This summary provides the key details about the document in 3 sentences:
The document discusses security issues with the Border Gateway Protocol (BGP) and proposes a method to secure BGP using cyclic shift algorithm and secure hash algorithm-1 (SHA-1) to authenticate BGP peers and establish secure sessions. It analyzes how prefix hijacking can disrupt routing and communication. The proposed approach uses hashing of a dynamically generated key via SHA-1 to authenticate BGP peers during session establishment and secure the exchange of routing updates between trusted peers.
A survey on mitigation methods to black hole attack on aodv routing protocolAlexander Decker
This document summarizes research on mitigation methods for black hole attacks on the AODV routing protocol in mobile ad hoc networks. It first provides background on AODV and describes how black hole attacks work by having malicious nodes advertise fake routes. It then surveys two existing mitigation methods: 1) a method that verifies the next hop in route replies is trustworthy, but has limitations against cooperative black hole attacks, and 2) a neighborhood-based detection scheme that recovers reliable routes but could be evaded if attackers selectively forge replies and cannot detect cooperative attacks. The document aims to investigate vulnerabilities in AODV against black hole attacks.
because so many decades World Wide Web has been used broadly in numerous fields, network safety problems include the main matter. IP traceback is just the actual method to understand the actual purpose, it reconstructs IP packets traversed path inside the World Wide Web to determine their own roots. IP Traceback may be an important ability for characteristics sources of attacks and Starting protection measures for the Internet. This paper discovers different IP Traceback approaches. This comparative paper provides as well as extends many technologies to prevent the secured information from the network issues by using different IP traceback techniques.
Performance analysis of aodv protocol on blackhole attackMehedi
This document discusses the AODV routing protocol, black hole attacks against AODV, and analyzing AODV's performance under black hole attacks. It introduces AODV, explains why it is used, and outlines security issues. It then defines distributed denial of service (DDoS) and black hole attacks, describing how black holes work at the routing level to drop packets. The document concludes it will use a network simulator to analyze how black hole attacks affect AODV performance metrics.
The document discusses the gray hole attack in MANETs using the AODV routing protocol. The gray hole attack involves a malicious node selectively dropping packets in a manner that is difficult to detect. The summary proposes a detection method that involves (1) the source node broadcasting a fake RREQ to identify malicious nodes, (2) comparing the destination sequence numbers of replying nodes to a threshold value to identify attackers, and (3) broadcasting identified gray hole nodes to other nodes in the network. The method aims to improve on existing detection techniques by using destination-based routing and sequence number comparisons to more accurately detect gray hole attacks.
This document discusses the black hole attack on the AODV routing protocol in mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and discusses how AODV works and the types of control packets it uses. It then explains how the black hole attack exploits AODV by having a malicious node send fake route reply messages, allowing it to drop packets. Several techniques for detecting and mitigating black hole attacks on AODV are discussed. The document reviews related work on defending against such attacks using approaches like security-aware ad hoc routing protocols.
Abstract:
We set DHT (Distributed Hash Table) centered P2P (Peer to Peer) program - Chord in to MANET (Mobile
Ad-hoc Network) in this paper. Then, we propose a new routing modified scheme Cross Modeled Chord
(CM-Chord) which bases on the unicast scheme with DHT. CM-Chord might be efficiently used to not only
provide conventional direct routing, but additionally indirect, key-based overlay routing. Our simulation
suggests that CM-Chord can markedly outperform conventional reactive Random routing (AODV). For that
reason, MANET nodes can run CM-Chord for software objective, particularly P2P applications.
This document introduces Sigtran, a protocol suite defined by the IETF to transport signaling data like SS7 over IP networks. It describes the key components of Sigtran, including SCTP as the new transport protocol and various User Adaptation layers that allow SS7 and ISDN protocols to run over SCTP and IP. SCTP was created to address limitations of TCP for carrying time-sensitive signaling data and includes features like multi-streaming and structured message transport that make it more suitable than TCP for this purpose. The document outlines the full Sigtran protocol stack and how it maps existing signaling protocols to the new transport layers.
This document proposes and evaluates Inter-Domain Packet Filters (IDPF) to limit IP spoofing by filtering packets based on feasible inter-domain routes inferred from BGP updates. IDPFs were found to effectively limit spoofing capability even with partial deployment, and improve accuracy of tracing spoofed traffic to its origin. The performance of IDPFs was studied through metrics like limiting the number of address prefixes that can be spoofed and localizing the source of attacks. Complications from non-standard routing policies and dynamic routing were also discussed.
The document describes the Point-to-Point Protocol (PPP) and its use in establishing serial connections over WAN links. It discusses PPP concepts like its layered architecture, frame structure, session establishment process, and support for multiple network layer protocols. The document also covers configuring PPP encapsulation on serial interfaces, verifying the PPP connection, troubleshooting encapsulation issues, and configuring PPP authentication using PAP and CHAP protocols.
Mobile Ad-hoc Network is group of wireless mobile device with restricted broadcast range and no use of base Infrastructure. The secure routing model helps for reduced honest elicitation and free riding problem. The term honest elicitation means it forward high recommendation for malicious node in order to avoid itself. It means the high recommendation for colludingmalicious node. When operating in hostile or suspicious setting, MANETs require privacy and ,communication security in routing protocol. In this paper we present the type of attacks and operation on network layer with routing protocol technique i.e. based on an on-demand locationbased anonymous MANET routing protocol called SMRT (secure MANET routing technique ,with trust model) that achieves security and privacy against insider and outsider adversaries.
Abstract Mobile Ad Hoc Network(MANETs) is a wireless communications technology in which devices may move around. There is no fixed structure or network that all the participating nodes form. It is a very flexible network. These characteristicsof MANET make it very unsafe and prone to various attacks.Although many research focus on how to deliver packets fromone node to another, very less importance had been given tothe security. Current techniques of addressing security on thefixed structured wired network are only useful to protect thetransmitted message on the end nodes, the security of routinginformation among the mobile nodes in the hostile environmentwhere mobile Ad Hoc networks are usually used has beeninadequately addressed. Security and routing has been treatedseparately incase of wired network but that cannot be done inwireless network since routing itself can be a major reason fordata loss or theft if done in a casual manner making it prone toattack from malicious node.Hence the routing and security hasto be looked into as one and not separately. Making the routingsecured can make the MANET a more reliable network. We havemade the routing mechanism secured but extending Fuzzy logic toit. Fuzzy logic in deciding the route makes it less prone to attacksand thus ensuring enhanced security. The proposed scheme ofsecure routing will be demonstrated by using simulation on NS2. Keywords AODV, SAODV, Fuzzy Logic, Black holeattack.
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manetidescitation
Mobile adhoc networks are connected by wireless
links which forms a random topology of mobile nodes.Random
topology and self-organising network provides on-demand
networking and dynamic topology.Due to lack of infrastructure
support each node are self-organising and any nodes can join
and leave the network at any time.Providing security to these
network is a challenging issue because these type of networks
suffer for various kinds of malicious attacks.One of the attacks
which are most difficult to detect in Mobile adhoc network is
Gray hole attack.In this paper an analytical Gray Hole attack
model is developed for AODV protocol.Experiments are
simulated for Gray Hole attacks under variety of adhoc
network condition.
Multicasting allows data to be sent from one source to multiple receivers simultaneously. It provides an efficient way to disseminate information to many recipients. The document discusses IP multicast addressing, the IGMP protocol for joining and leaving multicast groups, multicast routing protocols like DVMRP and PIM, and methods for constructing multicast distribution trees like source-based and shared trees. Multicasting is important for applications like streaming media and teleconferencing that require one-to-many or many-to-many communication.
Basics of multicasting and its implementation on ethernet networksReliance Comm
Multicasting allows data to be sent from one source to multiple receivers simultaneously. It provides an efficient way to disseminate information to many recipients. The document discusses IP multicast addressing, the IGMP protocol for joining and leaving multicast groups, multicast routing protocols like DVMRP and PIM, and methods for constructing multicast distribution trees like source-based and shared trees. Multicasting is important for applications like streaming media and teleconferencing that require one-to-many or many-to-many communication.
This document summarizes a research paper that simulates the Ad Hoc On-Demand Distance Vector (AODV) routing protocol under black hole attacks in mobile ad hoc networks (MANETs). The paper analyzes how black hole attacks affect key AODV routing metrics like packet delivery ratio and end-to-end delay. Through simulations with varying numbers of nodes, the paper finds that black hole attacks significantly reduce packet delivery ratios by diverting traffic to malicious nodes. The simulations provide insight into how AODV performance degrades under such attacks.
An Efficient Black Hole Attack Securing Mechanism in Ad Hoc On Demand Distanc...MINTUKAN RABHA
This document discusses securing the AODV routing protocol against blackhole attacks in mobile ad-hoc networks (MANETs). It first introduces MANETs and the AODV protocol. It then explains the blackhole attack where a malicious node claims to have the shortest path to a destination and drops packets. The proposed solution is an algorithm that stores route replies in a table, calculates the average sequence number, and selects the route with a sequence number lower than the average to mitigate blackhole attacks. Simulation results show the algorithm increases packet delivery ratio with acceptable increases in end-to-end delay and throughput.
The document describes IEEE 802.16j multi-hop relay networks. It outlines the benefits of using relay stations such as coverage extension and throughput enhancement. It discusses key concepts like relay links and access links. The document also provides details on relay station network entry procedures including scanning, synchronization, ranging, registration. It explains relay frame structure and functional blocks. Finally, it summarizes procedures like neighbor measurement reporting, access station selection, and operation parameter configuration.
IRJET- Constructing Inter Domain Packet Filter for Controlling IP SpoofingIRJET Journal
This document proposes an Inter Domain Packet Filter (IDPF) architecture to reduce IP spoofing on the internet. The IDPF architecture takes advantage of the limited number of feasible paths between autonomous systems (ASes) implied by their commercial relationships. It constructs packet filters based on routing information exchanged in Border Gateway Protocol (BGP) updates between neighboring ASes, without requiring global routing knowledge. Simulation studies show that even partial deployment of IDPFs can help localize the source of attack packets and limit attackers' ability to spoof IP addresses.
This summary provides the key details about the document in 3 sentences:
The document discusses security issues with the Border Gateway Protocol (BGP) and proposes a method to secure BGP using cyclic shift algorithm and secure hash algorithm-1 (SHA-1) to authenticate BGP peers and establish secure sessions. It analyzes how prefix hijacking can disrupt routing and communication. The proposed approach uses hashing of a dynamically generated key via SHA-1 to authenticate BGP peers during session establishment and secure the exchange of routing updates between trusted peers.
The document discusses routing security and outlines threats related to dynamic routing protocols like OSPF and BGP. It provides an overview of how OSPF works using link state advertisements and the Dijkstra algorithm to calculate the shortest path. The document outlines various attacks against OSPF, such as resource starvation attacks and forcing topology changes by introducing false LSA information. It emphasizes that having an attacker inside the same L2 segment poses the greatest risk. The document recommends countermeasures like using authentication, firewall rules, and avoiding running routing protocols beyond organizational boundaries.
This document provides a survey of security techniques for the Border Gateway Protocol (BGP). It reviews recent techniques categorized as cryptographic/attestation, database, overlay/group protocols, penalty methods, and data-plane testing. The techniques are reviewed at a high level and their shortcomings summarized to provide readers a quick understanding of the direction of research in BGP security.
Analysis of GPSR and its Relevant Attacks in Wireless Sensor NetworksIDES Editor
Most of the routing protocols proposed for ad-hoc
networks and sensor networks are not designed with security
as a goal. Hence, many routing protocols are vulnerable to an
attack by an adversary who can disrupt the network or harness
valuable information from the network. Routing Protocols
for wireless sensor networks are classified into three types
depending on their network structure as Flat routing protocols,
Hierarchical routing protocol and Geographic routing
protocols. We mainly concentrate on location-based or
geographic routing protocol like Greedy Perimeter Stateless
Routing Protocol (GPSR). Sybil attack and Selective
forwarding attack are the two attacks feasible in GPSR. These
attacks are implemented in GPSR and their losses caused to
the network are analysed
The document discusses routing security and provides an overview of OSPF and BGP routing protocols. It aims to understand threats related to dynamic routing protocols caused by intentional attacks, misconfigurations, and leaked measures. The agenda includes discussing dynamic routing essentials, OSPF overview and threats/countermeasures, BGP overview and threats/countermeasures, and conclusions. It covers topics like OSPF operation and attacks like phantom LSAs, resource starvation, and forcing topology changes. For BGP, it discusses autonomous systems, BGP peering and operation, and attributes for path selection. The goal is to establish best practices to avoid risks from misconfigurations and neighbors.
The Robust system for antivenin DDOS by Rioter Puddle ExpertiseAM Publications
Secure communication has some anticipated security aspects such as confidentiality, authentication, message integrity
and non repudiation. Besides, recently more people are aware that availability and access control are also urgent
requirements of secure communication because of the dishonourable Denial of Service (DoS) attacks that render by the
illegitimate users into a network, host, or other piece of network infrastructure to harm them, particularly it is done
against the frequently visited websites of a number of high-profile companies or government websites. DDoS
(Distributed Denial of Service) attack operates adequate puppet computers to create amount of data packets, the attacks
become coordinated and come from multiple puppets at the same time thus are even devastating .A typical DDoS attack
contains two stages, the first stage is to cooperation susceptible systems that are accessible in the Internet and install
attack tools in these compromised systems. This is known as turning the computers into “zombies.” In the second stage,
the attacker sends an attack command to the “zombies” through a secure channel to launch a bandwidth attack against the
targeted victim(s).
This document summarizes a research article that discusses approaches to prevent inter-domain Border Gateway Protocol (BGP) oscillations between autonomous systems (ASes). It first provides background on BGP and how ASes select routes. It then describes how inconsistent routing policies between ASes can cause oscillations where routes continuously change. The document reviews three categories of solutions: those requiring global coordination; those restricting routing policies; and those detecting conflicts during execution. Specific approaches discussed include collecting all routing policies in a database to check for conflicts, restricting policy types, and detecting conflicts through historic path or metric announcements between ASes.
A new approach to fight against the inter-domain BGP oscillationsIOSR Journals
This document summarizes a research article that discusses approaches to prevent inter-domain Border Gateway Protocol (BGP) route oscillations between autonomous systems (ASes). It first provides background on BGP and how ASes select routes. It then describes how inconsistent routing policies between ASes can cause oscillations where routes continuously change. The document reviews three categories of solutions: those requiring global coordination; those restricting routing policies; and those detecting conflicts during execution. Specific approaches discussed include collecting all routing policies to check for conflicts, restricting policy types, and detecting issues through historic path or metric announcements between ASes.
This document discusses best practices for securing BGP routing in Bangladesh, including prefix filtering, next-hop filtering, BGP TTL security, AS path filtering, route flap dampening, and implementing RPKI and ROA. It provides an overview of these techniques and their importance for network security. Special thanks are given to resources that help support deploying these practices.
This document summarizes key concepts from chapters 4 and 5 of the textbook "Computer Networking: A Top Down Approach".
Chapter 4 discusses routing between autonomous systems on the internet using BGP. BGP allows each AS to learn reachable destinations from neighbors and propagate this reachability throughout the AS. It uses path attributes like AS-PATH to prevent routing loops.
Chapter 5 introduces the link layer and its services. It is implemented in network interface cards and provides functions like framing, link access, reliable delivery between adjacent nodes, and error detection. The link layer encapsulates network layer datagrams into frames for transmission over each link of the path.
Review on Grey- Hole Attack Detection and PreventionIJARIIT
These Grey Hole attacks poses a serious security threat to the routing services by attacking the reactive routing protocols resulting in drastic drop of data packets. AODV (Ad hoc on demand Distance Vector) routing being one of the many protocols often becomes an easy victim to such attacks. The survey also gives up-to-date information of all the works that have been done in this area. Besides the security issues they also described the layered architecture of MANET, their applications and a brief summary of the proposed works that have been done in this area to secure the network from Grey Hole attacks
A NOVEL APPROACH FOR SECURE ROUTING THROUGH BGP USING SYMMETRIC KEYIJNSA Journal
The Border Gateway Protocol (BGP) is the path vector routing protocol that connects different
autonomous systems.. These ASes have unique integer numbers which assign by IANA organization. The
traditional BGP protocol is not sufficient to provide security and authentication for AS path and
verification of AS number ownership as well as network IP prefix. The BGP remains vulnerable to various
types of misconfiguration by users and attacks. Many secure BGP algorithms have been proposed but
complexity of algorithm and attack on that models still remain open problem. In this paper, we propose an
efficient model for SBGP; initially establish trust relationship between BGP peers. In this process BGP use
TCP protocol for reliable communication. The BGP routers will attempt to create secure BGP session by
exchanging BGP Open messages. During this Open messages master BGP router generate private key with
help of cyclic shifting of ASCII of password called cyclic shift algorithm. Then hash of this private key send
towards neighbour. Instead of key exchange, we use hashing algorithm, we generate hash of only key
through SHA-1. This hash code for private key sent with Open messages during session establishment.
When this Open messages receive by neighbor BGP routers, first it generate key using same password with
same algorithm & generate hash code for same and then compare both hash code. If it matches then
establish secure session with master BGP router & accept the Autonomous system number which is sent by
master router during Open Messages. In this manner both BGP speakers make trust relationship between
each other & then exchange route UPDATE within secure channel. If hash code at receiver end does not
match then simply receiving BGP router discard Open messages and does not make connection with
unauthorized AS number. If malicious router wants to inject false route or false ip prefix then it does not
create secure session by lack of secure private key. So malicious router does not participate in above BGP
routing process.
A NOVEL APPROACH FOR SECURE ROUTING THROUGH BGP USING SYMMETRIC KEYIJNSA Journal
The Border Gateway Protocol (BGP) is the path vector routing protocol that connects different autonomous systems.. These ASes have unique integer numbers which assign by IANA organization. The traditional BGP protocol is not sufficient to provide security and authentication for AS path and verification of AS number ownership as well as network IP prefix. The BGP remains vulnerable to various types of misconfiguration by users and attacks. Many secure BGP algorithms have been proposed but complexity of algorithm and attack on that models still remain open problem. In this paper, we propose an efficient model for SBGP; initially establish trust relationship between BGP peers. In this process BGP use TCP protocol for reliable communication. The BGP routers will attempt to create secure BGP session by exchanging BGP Open messages. During this Open messages master BGP router generate private key with help of cyclic shifting of ASCII of password called cyclic shift algorithm. Then hash of this private key send towards neighbour. Instead of key exchange, we use hashing algorithm, we generate hash of only key through SHA-1. This hash code for private key sent with Open messages during session establishment. When this Open messages receive by neighbor BGP routers, first it generate key using same password with same algorithm & generate hash code for same and then compare both hash code. If it matches then establish secure session with master BGP router & accept the Autonomous system number which is sent by master router during Open Messages. In this manner both BGP speakers make trust relationship between each other & then exchange route UPDATE within secure channel. If hash code at receiver end does not match then simply receiving BGP router discard Open messages and does not make connection with unauthorized AS number. If malicious router wants to inject false route or false ip prefix then it does not create secure session by lack of secure private key. So malicious router does not participate in above BGP routing process.
SECURITY ISSUES IN THE OPTIMIZED LINK STATE ROUTING PROTOCOL VERSION 2 (OLSRV2)IJNSA Journal
Mobile Ad hoc NETworks (MANETs) are leaving the confines of research laboratories, to find place in real-world deployments. Outside specialized domains (military, vehicular, etc.), city-wide communitynetworks are emerging, connecting regular Internet users with each other, and with the Internet, via MANETs. Growing to encompass more than a handful of “trusted participants”, the question of preserving the MANET network connectivity, even when faced with careless or malicious participants, arises, and must be addressed. A first step towards protecting a MANET is to analyze the vulnerabilities of the routing protocol, managing the connectivity. By understanding how the algorithms of the routing protocol operate, and how these can be exploited by those with ill intent, countermeasures can be developed, readying MANETs for wider deployment and use. This paper takes an abstract look at the algorithms that constitute the Optimized Link State Routing Protocol version 2 (OLSRv2), and identifies for each protocol element the possible vulnerabilities and attacks – in a certain way, provides a “cookbook” for how to best attack an operational OLSRv2 network, or for how to proceed with developing protective countermeasures against these attacks.
IRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANETIRJET Journal
This document discusses the detection of black hole attacks in the AODV routing protocol in mobile ad hoc networks (MANETs). It begins with an abstract that introduces black hole attacks and their impact on AODV. The body then provides details on MANETs and AODV routing, including how black hole attacks work by modifying routing packets. It evaluates the performance of AODV under black hole attacks based on metrics like throughput, delay, and overhead. Tables and graphs are presented comparing the performance of normal AODV routing to AODV with black hole attacks. The conclusion finds that minimizing packet loss can help reduce the impact of black hole attacks on AODV in certain scenarios.
Vulnerability Exploitation in the Open Shortest Path First ProtocolIRJET Journal
The document discusses vulnerabilities in the Open Shortest Path First (OSPF) routing protocol. It describes how an attacker inside the network can intercept OSPF hello messages and modify them to establish unauthorized neighbor relationships with routers. This allows the attacker to redirect traffic through their machine and perform man-in-the-middle attacks. The document outlines experiments conducted using Cisco routers that demonstrate how an attacker can listen to OSPF messages, send modified messages, and change the direction of network traffic.
This document describes a student project to implement the OSPF routing protocol on routers using the Packet Tracer simulator. It includes an introduction to routing and OSPF, as well as chapters covering the OSPF process, router types, network architecture, results, advantages/disadvantages, and references. The project was completed by three students for their Bachelor of Technology degree and submitted to their department for acceptance.
IRJET- Detecting and Preventing Black Hole Attack in Manet using RSA Algo...IRJET Journal
This document discusses detecting and preventing black hole attacks in mobile ad hoc networks (MANETs) using the RSA algorithm. It begins with an introduction to MANETs and discusses common routing protocols like ZRP, DSR, and AODV. It then describes black hole attacks, where malicious nodes advertise fake routes to attract network traffic and drop packets. The document proposes using RSA to detect multiple black hole attacks and protect the ZRP routing protocol. Simulation results show ZRP has better throughput, delay, and delivery ratio than DSR when protected by RSA from black hole attacks.
Similar to Detecting Malicious Dropping Attack in the Internet (20)
Power System State Estimation - A ReviewIDES Editor
This document provides a review of power system state estimation techniques. It discusses both static and dynamic state estimation algorithms. For static state estimation, it covers weighted least squares, decoupled, and robust estimation methods. Weighted least squares is commonly used but can have numerical instability issues. Decoupled state estimation approximates the gain matrix for faster computation. Robust estimation uses M-estimators and other techniques to handle outliers and bad data. Dynamic state estimation applies Kalman filtering, leapfrog algorithms, and other methods to continuously monitor system states over time.
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
This document summarizes a research paper that proposes using artificial intelligence techniques and FACTS controllers for reactive power planning in real-time power transmission systems. The paper formulates the reactive power planning problem and incorporates flexible AC transmission system (FACTS) devices like static VAR compensators (SVC), thyristor controlled series capacitors (TCSC), and unified power flow controllers (UPFC). Evolutionary algorithms like evolutionary programming (EP) and differential evolution (DE) are applied to find the optimal locations and settings of the FACTS controllers to minimize losses and costs. Simulation results on IEEE 30-bus and 72-bus Indian test systems show that UPFC performs best in reducing losses compared to SVC and TCSC.
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
Damping of power system oscillations with the help
of proposed optimal Proportional Integral Derivative Power
System Stabilizer (PID-PSS) and Static Var Compensator
(SVC)-based controllers are thoroughly investigated in this
paper. This study presents robust tuning of PID-PSS and
SVC-based controllers using Genetic Algorithms (GA) in
multi machine power systems by considering detailed model
of the generators (model 1.1). The effectiveness of FACTSbased
controllers in general and SVC-based controller in
particular depends upon their proper location. Modal
controllability and observability are used to locate SVC–based
controller. The performance of the proposed controllers is
compared with conventional lead-lag power system stabilizer
(CPSS) and demonstrated on 10 machines, 39 bus New England
test system. Simulation studies show that the proposed genetic
based PID-PSS with SVC based controller provides better
performance.
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
This paper presents the need to operate the power
system economically and with optimum levels of voltages has
further led to an increase in interest in Distributed
Generation. In order to reduce the power losses and to improve
the voltage in the distribution system, distributed generators
(DGs) are connected to load bus. To reduce the total power
losses in the system, the most important process is to identify
the proper location for fixing and sizing of DGs. It presents a
new methodology using a new population based meta heuristic
approach namely Artificial Bee Colony algorithm(ABC) for
the placement of Distributed Generators(DG) in the radial
distribution systems to reduce the real power losses and to
improve the voltage profile, voltage sag mitigation. The power
loss reduction is important factor for utility companies because
it is directly proportional to the company benefits in a
competitive electricity market, while reaching the better power
quality standards is too important as it has vital effect on
customer orientation. In this paper an ABC algorithm is
developed to gain these goals all together. In order to evaluate
sag mitigation capability of the proposed algorithm, voltage
in voltage sensitive buses is investigated. An existing 20KV
network has been chosen as test network and results are
compared with the proposed method in the radial distribution
system.
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
Controlling power flow in modern power systems
can be made more flexible by the use of recent developments
in power electronic and computing control technology. The
Unified Power Flow Controller (UPFC) is a Flexible AC
transmission system (FACTS) device that can control all the
three system variables namely line reactance, magnitude and
phase angle difference of voltage across the line. The UPFC
provides a promising means to control power flow in modern
power systems. Essentially the performance depends on proper
control setting achievable through a power flow analysis
program. This paper presents a reliable method to meet the
requirements by developing a Newton-Raphson based load
flow calculation through which control settings of UPFC can
be determined for the pre-specified power flow between the
lines. The proposed method keeps Newton-Raphson Load Flow
(NRLF) algorithm intact and needs (little modification in the
Jacobian matrix). A MATLAB program has been developed to
calculate the control settings of UPFC and the power flow
between the lines after the load flow is converged. Case studies
have been performed on IEEE 5-bus system and 14-bus system
to show that the proposed method is effective. These studies
indicate that the method maintains the basic NRLF properties
such as fast computational speed, high degree of accuracy and
good convergence rate.
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
The size and shape of opening in dam causes the
stress concentration, it also causes the stress variation in the
rest of the dam cross section. The gravity method of the analysis
does not consider the size of opening and the elastic property
of dam material. Thus the objective of study is comprises of
the Finite Element Method which considers the size of
opening, elastic property of material, and stress distribution
because of geometric discontinuity in cross section of dam.
Stress concentration inside the dam increases with the opening
in dam which results in the failure of dam. Hence it is
necessary to analyses large opening inside the dam. By making
the percentage area of opening constant and varying size and
shape of opening the analysis is carried out. For this purpose
a section of Koyna Dam is considered. Dam is defined as a
plane strain element in FEM, based on geometry and loading
condition. Thus this available information specified our path
of approach to carry out 2D plane strain analysis. The results
obtained are then compared mutually to get most efficient
way of providing large opening in the gravity dam.
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
Pushover Analysis a popular tool for seismic
performance evaluation of existing and new structures and is
nonlinear Static procedure where in monotonically increasing
loads are applied to the structure till the structure is unable
to resist the further load .During the analysis, whatever the
strength of concrete and steel is adopted for analysis of
structure may not be the same when real structure is
constructed and the pushover analysis results are very sensitive
to material model adopted, geometric model adopted, location
of plastic hinges and in general to procedure followed by the
analyzer. In this paper attempt has been made to assess
uncertainty in pushover analysis results by considering user
defined hinges and frame modeled as bare frame and frame
with slab modeled as rigid diaphragm and results compared
with experimental observations. Uncertain parameters
considered includes the strength of concrete, strength of steel
and cover to the reinforcement which are randomly generated
and incorporated into the analysis. The results are then
compared with experimental observations.
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This document summarizes and analyzes secure multi-party negotiation protocols for electronic payments in mobile computing. It presents a framework for secure multi-party decision protocols using lightweight implementations. The main focus is on synchronizing security features to avoid agreement manipulation and reduce user traffic. The paper describes negotiation between an auctioneer and bidders, showing multiparty security is better than existing systems. It analyzes the performance of encryption algorithms like ECC, XTR, and RSA for use in the multiparty negotiation protocols.
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
The problems associated with selfish nodes in
MANET are addressed by a collaborative watchdog approach
which reduces the detection time for selfish nodes thereby
improves the performance and accuracy of watchdogs[1]. In
the related works they make use of credit based systems, reputation
based mechanisms, pathrater and watchdog mechanism
to detect such selfish nodes. In this paper we follow an approach
of collaborative watchdog which reduces the detection
time for selfish nodes and also involves the removal of such
selfish nodes based on some progressively assessed thresholds.
The threshold gives the nodes a chance to stop misbehaving
before it is permanently deleted from the network.
The node passes through several isolation processes before it
is permanently removed. Another version of AODV protocol
is used here which allows the simulation of selfish nodes in
NS2 by adding or modifying log files in the protocol.
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
Wireless sensor networks are networks having non
wired infrastructure and dynamic topology. In OSI model each
layer is prone to various attacks, which halts the performance
of a network .In this paper several attacks on four layers of
OSI model are discussed and security mechanism is described
to prevent attack in network layer i.e wormhole attack. In
Wormhole attack two or more malicious nodes makes a covert
channel which attracts the traffic towards itself by depicting a
low latency link and then start dropping and replaying packets
in the multi-path route. This paper proposes promiscuous mode
method to detect and isolate the malicious node during
wormhole attack by using Ad-hoc on demand distance vector
routing protocol (AODV) with omnidirectional antenna. The
methodology implemented notifies that the nodes which are
not participating in multi-path routing generates an alarm
message during delay and then detects and isolate the
malicious node from network. We also notice that not only
the same kind of attacks but also the same kind of
countermeasures can appear in multiple layer. For example,
misbehavior detection techniques can be applied to almost all
the layers we discussed.
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
The recent advancements in the wireless technology
and their wide-spread deployment have made remarkable
enhancements in efficiency in the corporate and industrial
and Military sectors The increasing popularity and usage of
wireless technology is creating a need for more secure wireless
Ad hoc networks. This paper aims researched and developed
a new protocol that prevents wormhole attacks on a ad hoc
network. A few existing protocols detect wormhole attacks but
they require highly specialized equipment not found on most
wireless devices. This paper aims to develop a defense against
wormhole attacks as an Anti-worm protocol which is based on
responsive parameters, that does not require as a significant
amount of specialized equipment, trick clock synchronization,
no GPS dependencies.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
This document summarizes a proposed cloud security and data integrity framework that provides client accountability. The framework aims to address issues like lack of user control over cloud data, need for data transparency and tracking, and ensuring data integrity. It proposes using JAR (Java Archive) files for data sharing due to benefits like portability. The framework incorporates client-side verification using MD5 hashing, digital signature-based authentication of JAR files, and use of HMAC to ensure data integrity. It also uses password-based encryption of log files to keep them tamper-proof. The framework is intended to provide both accountability and security for data sharing in cloud environments.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
This document summarizes a research paper that proposes a method for enhancing data security in cloud computing through steganography. The method hides user data in digital images stored on cloud servers. When data needs to be accessed, it is extracted from the images. The document outlines the cloud architecture and security issues addressed. It then describes the proposed system architecture, security model, and data storage and retrieval process. Data is partitioned and hidden in multiple images to improve security. The goal is to prevent unauthorized access to user data stored on cloud servers.
The main tasks of a Wireless Sensor Network
(WSN) are data collection from its nodes and communication
of this data to the base station (BS). The protocols used for
communication among the WSN nodes and between the WSN
and the BS, must consider the resource constraints of nodes,
battery energy, computational capabilities and memory. The
WSN applications involve unattended operation of the network
over an extended period of time. In order to extend the lifetime
of a WSN, efficient routing protocols need to be adopted. The
proposed low power routing protocol based on tree-based
network structure reliably forwards the measured data towards
the BS using TDMA. An energy consumption analysis of the
WSN making use of this protocol is also carried out. It is
found that the network is energy efficient with an average
duty cycle of 0:7% for the WSN nodes. The OmNET++
simulation platform along with MiXiM framework is made
use of.
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
The security of authentication of internet based
co-banking services should not be susceptible to high risks.
The passwords are highly vulnerable to virus attacks due to
the lack of high end embedding of security methods. In order
for the passwords to be more secure, people are generally
compelled to select jumbled up character based passwords
which are not only less memorable but are also equally prone
to insecurity. Multiple use of distributed shares has been
studied to solve the problem of authentication by algorithms
based on thresholding of pixels in image processing and visual
cryptography concepts where the subset of shares is considered
for the recovery of the original image for authentication using
correlation function[1][2].The main disadvantage in the above
study is the plain storage of shares and also one of the shares
is being supplied to the customer, which will lead to the
possibility of misuse by a third party. This paper proposes a
technique for scrambling of pixels by key based random
permutation (KBRP) within the shares before the
authentication has been attempted. Total number of shares to
be created is dependent on the multiplicity of ownership of
the account. By this method the problem of uncertainty among
the customers with regard to security, storage, retrieval of
holding of half of the shares is minimized.
This paper presents a trifocal Rotman Lens Design
approach. The effects of focal ratio and element spacing on
the performance of Rotman Lens are described. A three beam
prototype feeding 4 element antenna array working in L-band
has been simulated using RLD v1.7 software. Simulated
results show that the simulated lens has a return loss of –
12.4dB at 1.8GHz. Beam to array port phase error variation
with change in the focal ratio and element spacing has also
been investigated.
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
Hyperspectral images can be efficiently compressed
through a linear predictive model, as for example the one
used in the SLSQ algorithm. In this paper we exploit this
predictive model on the AVIRIS images by individuating,
through an off-line approach, a common subset of bands, which
are not spectrally related with any other bands. These bands
are not useful as prediction reference for the SLSQ 3-D
predictive model and we need to encode them via other
prediction strategies which consider only spatial correlation.
We have obtained this subset by clustering the AVIRIS bands
via the clustering by compression approach. The main result
of this paper is the list of the bands, not related with the
others, for AVIRIS images. The clustering trees obtained for
AVIRIS and the relationship among bands they depict is also
an interesting starting point for future research.
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
A microelectronic circuit of block-elements
functionally analogous to two hydrogen bonding networks is
investigated. The hydrogen bonding networks are extracted
from â-lactamase protein and are formed in its active site.
Each hydrogen bond of the network is described in equivalent
electrical circuit by three or four-terminal block-element.
Each block-element is coded in Matlab. Static and dynamic
analyses are performed. The resultant microelectronic circuit
analogous to the hydrogen bonding network operates as
current mirror, sine pulse source, triangular pulse source as
well as signal modulator.
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
In this paper a method is proposed to discriminate
real world scenes in to natural and manmade scenes of similar
depth. Global-roughness of a scene image varies as a function
of image-depth. Increase in image depth leads to increase in
roughness in manmade scenes; on the contrary natural scenes
exhibit smooth behavior at higher image depth. This particular
arrangement of pixels in scene structure can be well explained
by local texture information in a pixel and its neighborhood.
Our proposed method analyses local texture information of a
scene image using texture unit matrix. For final classification
we have used both supervised and unsupervised learning using
K-Nearest Neighbor classifier (KNN) and Self Organizing
Map (SOM) respectively. This technique is useful for online
classification due to very less computational complexity.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.