As the enormous use of internet increases day by day so as security concern is also raise day by day over
the internet. In this paper we discuss the network security and its related threats and also study the types of
protocols and few issues related to protocols in computer networks. We also simulate the design of 5 node
wired network scenario, its packet drop rate analysis through TCP protocol using NS2 as a simulator.
Analyzed the performance of 5-node network when the packet is drop down by graphical method also
called as Xgraph when rate parameter is in mb and also analyzed the performance of same network by
changing the value of rate parameter at same time so no packets would drop down at same time and also
analyzed the performance by Xgraph method.
Anew approach to broadcast in wormhole routed three-dimensional networks is proposed. One of the most
important process in communication and parallel computer is broadcast approach.. The approach of this
case of Broadcasting is to send the message from one source to all destinations in the network which
corresponds to one-to-all communication. Wormhole routing is a fundamental routing mechanism in
modern parallel computers which is characterized with low communication latency. We show how to apply
this approach to 3-D meshes. Wormhole routing is divided the packets into set of FLITS (flow control
digits). The first Flit of the packet (Header Flit) is containing the destination address and all subsets flits
will follow the routing way of the header Flit. In this paper, we consider an efficient algorithm for
broadcasting on an all-port wormhole-routed 3D mesh with arbitrary size. We introduce an efficient
algorithm, Y-Hamiltonian Layers Broadcast(Y-HLB). In this paper the behaviors of this algorithm were
compared to the previous results, our paradigm reduces broadcast latency and is simpler. In this paper our
simulation results show the average of our proposed algorithm over the other algorithms that presented.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
The focus of this Paper is the actual implementation of Network Router and verifies the functionality of the
three port router for network on chip using the latest verification methodologies, Hardware Verification
Languages and EDA tools and qualify the IP for Synthesis an implementation. This Router design contains three
output ports and three input ports, it is packet based Protocol. This Design consists Registers and FIFO. For
larger networks, where a direct-mapped approach is not feasible due to FPGA resource limitations, a virtualized
time-multiplexed approach was used. Compared to the provided software reference implementation, our directmapped
approach achieves three orders of magnitude speedup, while our virtualized time multiplexed approach
achieves one to two orders of magnitude speedup, depending on the network and router configuration.
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-lineof-sight (NLOS) condition, they are limited to reception distances up to 55 meters.
Anew approach to broadcast in wormhole routed three-dimensional networks is proposed. One of the most
important process in communication and parallel computer is broadcast approach.. The approach of this
case of Broadcasting is to send the message from one source to all destinations in the network which
corresponds to one-to-all communication. Wormhole routing is a fundamental routing mechanism in
modern parallel computers which is characterized with low communication latency. We show how to apply
this approach to 3-D meshes. Wormhole routing is divided the packets into set of FLITS (flow control
digits). The first Flit of the packet (Header Flit) is containing the destination address and all subsets flits
will follow the routing way of the header Flit. In this paper, we consider an efficient algorithm for
broadcasting on an all-port wormhole-routed 3D mesh with arbitrary size. We introduce an efficient
algorithm, Y-Hamiltonian Layers Broadcast(Y-HLB). In this paper the behaviors of this algorithm were
compared to the previous results, our paradigm reduces broadcast latency and is simpler. In this paper our
simulation results show the average of our proposed algorithm over the other algorithms that presented.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
The focus of this Paper is the actual implementation of Network Router and verifies the functionality of the
three port router for network on chip using the latest verification methodologies, Hardware Verification
Languages and EDA tools and qualify the IP for Synthesis an implementation. This Router design contains three
output ports and three input ports, it is packet based Protocol. This Design consists Registers and FIFO. For
larger networks, where a direct-mapped approach is not feasible due to FPGA resource limitations, a virtualized
time-multiplexed approach was used. Compared to the provided software reference implementation, our directmapped
approach achieves three orders of magnitude speedup, while our virtualized time multiplexed approach
achieves one to two orders of magnitude speedup, depending on the network and router configuration.
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-lineof-sight (NLOS) condition, they are limited to reception distances up to 55 meters.
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYijcisjournal
This paper evaluates the security of wireless communication network based on the fuzzy logic in Mat lab. A new algorithm is proposed and evaluated which is the hybrid algorithm. We highlight the valuable assets in designing of wireless network communication system based on network simulator (NS2), which is crucial to protect security of the systems. Block cipher algorithms are evaluated by using fuzzy logics and a hybrid
algorithm is proposed. Both algorithms are evaluated in term of the security level. Logic (AND) is used in the rules of modelling and Mamdani Style is used for the evaluations
Multiple intrusion detection in RPL based networks IJECEIAES
Routing Protocol for Low Power and Lossy Networks based networks consists of large number of tiny sensor nodes with limited resources. These nodes are directly connected to the Internet through the border router. Hence these nodes are susceptible to different types of attacks. The possible attacks are rank attack, selective forwarding, worm hole and Denial of service attack. These attacks can be effectively identified by intrusion detection system model. The paper focuses on identification of multiple intrusions by considering the network size as 10, 40 and 100 nodes and adding 10%, 20% and 30% of malicious nodes to the considered network. Experiments are simulated using Cooja simulator on Contiki operating system. Behavior of the network is observed based on the percentage of inconsistency achieved, energy consumption, accuracy and false positive rate. Experimental results show that multiple intrusions can be detected effectively by machine learning techniques.
Secure Routing for MANET in Adversarial EnvironmentIJCERT
Collection of mobile nodes is known as ad-hoc network in which wireless communication is used to connect these mobile nodes. A major requirement on the MANET is to provide unidentifiability and unlinkability for mobile nodes. There are various secure routing protocols have been proposed, but the requirement is not satisfied. The existing protocols are unguarded to the attacks of fake routing packets or denial-of-service broadcasting, even the node identities are protected by pseudonyms. We propose a new secure routing protocol which provides anonymity named as authenticated anonymous secure routing (AASR), to satisfy the requirement of mobile networks and defend the attacks. The route request packets are authenticated by a group signature and public key infrastructure, to defend the potential attacks without exposing the node identities. The cocept of key-encrypted onion routing which provides a route secret verification message, to prevent intermediate nodes from inferring a real destination. Simulation results have demonstrated the effectiveness of the proposed AASR protocol with improved performance as compared to the existing protocols.
Multi port network ethernet performance improvement techniquesIJARIIT
An Ethernet has its own importance and space in network subsystem. In today’s resource-intensive engineering the
applications need to deal with the real-time data processing, server virtualization, and high-volume data transactions. The realtime
technologies such as video on demand and Voice over IP operations demand the network devices with efficient network
data processing as well as better networking bandwidth. The performance is the major issues with the multi-port network
devices. It requires the sufficient network bandwidth and CPU processing speed to process the real-time data at the context.
And this demand is goes on increasing. The new multi-port hardware technologies can help to improvements in the
performance of the virtualized server environments. But, these hardware technologies having their own limitations in terms of
CPU utilization levels and power consumption. It also impacts on latency and the overall system cost. This thesis will provide
the insights to some of the key configuration decisions at hardware as well as software designs in order to facilitate multi-port
network devices performance improvement over the existing infrastructure. This thesis will also discuss the solutions such as
Virtual LAN and balanced or symmetric network to reduce the cost and hardware dependency to improve the multi-port
network system performance significantly over the currently existing infrastructure. This performance improvement includes
CPU utilization and bandwidth in the heavy network loads.
Analysis of threats and security issues evaluation in mobile P2P networks IJECEIAES
Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we propose different approaches and we analysis and evaluation of these mobile P2P network security issues and submit some proposal solutions to resolve the related problems with threats and other different attacks since these threats and attacks will be serious issue as networks are growing up especially with mobility attribute in current P2P networks.
KEY GENERATION FRAMEWORK FOR MULTIPLE WIRELESS DEVICES USING MULTIPATH ROUTINGecij
The secret key generation for wireless devices, use for observing with every devices such as signal strength and range of their distance achieved by lower bit matching via RSS. In previous system they are defined secret key for multiple devices from one centralised device. Signal strength will be varied for each devices and connection of that devices also will be lose when the devices goes out of the range. In recent years network security become important issue. Data can be shared with other devices using secret key. We have designed and implement multiple key generation for multiple devices. Each time generated a new secret key for making communication with other devices. Overcome the range of signal strength and centralised networks, able to communicate with any devices with help of AES. Expand the key strength and create a
different secret key upto 256 bit.
KANSA: high interoperability e-KTP decentralised database network using distr...TELKOMNIKA JOURNAL
e-KTP is an Indonesian Identity Card based on Near Field Communicator technology. This technology was embedded in every e-KTP card for every Indonesian citizen. Until this research, e-KTP technology never to be utilized by any stack-holder neither government agencies nor nongovernment organization or company. e-KTP Technology inside the card never been used and go with conventional with manual copy it with photocopy machine or take a photograph with it. This research was proposing an open standard to utilized e-KTP Technology. The open standard will bring e-KTP technology used as is and used broadly in many government agencies or much commercial company. This research was proposing decentralized network model especially for storing e-KTP data without breaking privacy law. Besides providing high specs of the server, a decentralized model can reduce the cost of server infrastructure. The model was proposing using Distributed Hast Table which was used for peer-to-peer networks. The decentralized model promised high availability and the more secure way to save and access the data. The result of this model can be implemented in many network topology or infrastructure also applicable to implement on Small Medium Enterprise Company.
Many people mistaken that Internet 2.0 is Web 2.0 which is a mis-concept. Internet means internetworking which works at the transmission media layer and current Internet is based on IP protocol therefore is subject to many security vulnerabilities. Internet 2.0 is based on new patented protocol which utilize native telephony network to establish secure point to point connection and able to prevents a lot of current Internet vulnerabilities.
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
Reliability in data collection for wireless sensor networks is one of the major problems in IoT applications. Sensor nodes are usually placed in harsh conditions where data communication is at risk of losing packets. Retransmissions are considered costly in terms of delay and power consumptions, especially that wireless sensor nodes are battery operated. In this context we introduce SR-Code, a novel network coding algorithm that achieves reliability in harsh conditions. SR-Code utilizes the XOR operator to code overheard packets. The targeted network topology is a 2-tier network where data loss can occur in all tiers. SR-Code utilizes bit addresses where each node is identified by a single bit in an address bit vector. Identifying packets and computing the cardinality of coded messages can be easily done using address bit vectors. SR-Code realizes redundancy as a function of overheard packet. SR-Code achieved a reliability factor of 75% when the number of packets lost was 100% of the original (un-coded) packet sent.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Deep packet inspection has been subject to controversial debates about network neutral- ity and online privacy for the last few years. In this white paper we will argue that DPI as such is a neutral, neither good nor bad technology, and that it depends on the applica- tion that utilizes DPI if and how it will affect the Internet and our society.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY IJNSA Journal
Network steganography has been a well-known covert data channeling method for over three decades. The
basic set of techniques and implementation tools have not changed significantly since their introduction in
the early 1980’s. In this paper, we review the predominant methods of classical network steganography,
describing the detailed operations and resultant challenges involved in embedding data in the network
transport domain. We also consider the various cyber threat vectors of network steganography and point
out the major differences between classical network steganographyand the widely known end-point
multimedia embedding techniques, which focus exclusively on static data modification for data hiding. We
then challenge the security community by introducing an entirely new network data hiding methodology,
whichwe refer to as real-time network data steganography. Finally, we provide the groundwork for this
fundamental change of covert network data embedding by introducing a system-level implementation for
real-time network data operations that will open the path for even further advances in computer network
security.
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...ijsrd.com
AES is considered a good encryption algorithm in terms of providing security to a network in passing information (data) in form of audio, string, and video and in any other form. However it yields a low throughput resulting in slowness and increasing energy dispensation of server or an application. The Enhanced AES algorithm is proposed in this paper which works by using sequence counters and provides improved throughput as compare to conventional AES algorithm. The J-Bit Encoding is being a compression algorithm in lossless category which doesn't decrease the quality but reduce the size of data to some extent. It has been observed that the proposed encryption algorithm integrated to J-Bit Encoding algorithm will provide the effective security measures as well as increased throughput as a parameter and less bandwidth usage as the actual size of data shall not be sent along the network.
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYijcisjournal
This paper evaluates the security of wireless communication network based on the fuzzy logic in Mat lab. A new algorithm is proposed and evaluated which is the hybrid algorithm. We highlight the valuable assets in designing of wireless network communication system based on network simulator (NS2), which is crucial to protect security of the systems. Block cipher algorithms are evaluated by using fuzzy logics and a hybrid
algorithm is proposed. Both algorithms are evaluated in term of the security level. Logic (AND) is used in the rules of modelling and Mamdani Style is used for the evaluations
Multiple intrusion detection in RPL based networks IJECEIAES
Routing Protocol for Low Power and Lossy Networks based networks consists of large number of tiny sensor nodes with limited resources. These nodes are directly connected to the Internet through the border router. Hence these nodes are susceptible to different types of attacks. The possible attacks are rank attack, selective forwarding, worm hole and Denial of service attack. These attacks can be effectively identified by intrusion detection system model. The paper focuses on identification of multiple intrusions by considering the network size as 10, 40 and 100 nodes and adding 10%, 20% and 30% of malicious nodes to the considered network. Experiments are simulated using Cooja simulator on Contiki operating system. Behavior of the network is observed based on the percentage of inconsistency achieved, energy consumption, accuracy and false positive rate. Experimental results show that multiple intrusions can be detected effectively by machine learning techniques.
Secure Routing for MANET in Adversarial EnvironmentIJCERT
Collection of mobile nodes is known as ad-hoc network in which wireless communication is used to connect these mobile nodes. A major requirement on the MANET is to provide unidentifiability and unlinkability for mobile nodes. There are various secure routing protocols have been proposed, but the requirement is not satisfied. The existing protocols are unguarded to the attacks of fake routing packets or denial-of-service broadcasting, even the node identities are protected by pseudonyms. We propose a new secure routing protocol which provides anonymity named as authenticated anonymous secure routing (AASR), to satisfy the requirement of mobile networks and defend the attacks. The route request packets are authenticated by a group signature and public key infrastructure, to defend the potential attacks without exposing the node identities. The cocept of key-encrypted onion routing which provides a route secret verification message, to prevent intermediate nodes from inferring a real destination. Simulation results have demonstrated the effectiveness of the proposed AASR protocol with improved performance as compared to the existing protocols.
Multi port network ethernet performance improvement techniquesIJARIIT
An Ethernet has its own importance and space in network subsystem. In today’s resource-intensive engineering the
applications need to deal with the real-time data processing, server virtualization, and high-volume data transactions. The realtime
technologies such as video on demand and Voice over IP operations demand the network devices with efficient network
data processing as well as better networking bandwidth. The performance is the major issues with the multi-port network
devices. It requires the sufficient network bandwidth and CPU processing speed to process the real-time data at the context.
And this demand is goes on increasing. The new multi-port hardware technologies can help to improvements in the
performance of the virtualized server environments. But, these hardware technologies having their own limitations in terms of
CPU utilization levels and power consumption. It also impacts on latency and the overall system cost. This thesis will provide
the insights to some of the key configuration decisions at hardware as well as software designs in order to facilitate multi-port
network devices performance improvement over the existing infrastructure. This thesis will also discuss the solutions such as
Virtual LAN and balanced or symmetric network to reduce the cost and hardware dependency to improve the multi-port
network system performance significantly over the currently existing infrastructure. This performance improvement includes
CPU utilization and bandwidth in the heavy network loads.
Analysis of threats and security issues evaluation in mobile P2P networks IJECEIAES
Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we propose different approaches and we analysis and evaluation of these mobile P2P network security issues and submit some proposal solutions to resolve the related problems with threats and other different attacks since these threats and attacks will be serious issue as networks are growing up especially with mobility attribute in current P2P networks.
KEY GENERATION FRAMEWORK FOR MULTIPLE WIRELESS DEVICES USING MULTIPATH ROUTINGecij
The secret key generation for wireless devices, use for observing with every devices such as signal strength and range of their distance achieved by lower bit matching via RSS. In previous system they are defined secret key for multiple devices from one centralised device. Signal strength will be varied for each devices and connection of that devices also will be lose when the devices goes out of the range. In recent years network security become important issue. Data can be shared with other devices using secret key. We have designed and implement multiple key generation for multiple devices. Each time generated a new secret key for making communication with other devices. Overcome the range of signal strength and centralised networks, able to communicate with any devices with help of AES. Expand the key strength and create a
different secret key upto 256 bit.
KANSA: high interoperability e-KTP decentralised database network using distr...TELKOMNIKA JOURNAL
e-KTP is an Indonesian Identity Card based on Near Field Communicator technology. This technology was embedded in every e-KTP card for every Indonesian citizen. Until this research, e-KTP technology never to be utilized by any stack-holder neither government agencies nor nongovernment organization or company. e-KTP Technology inside the card never been used and go with conventional with manual copy it with photocopy machine or take a photograph with it. This research was proposing an open standard to utilized e-KTP Technology. The open standard will bring e-KTP technology used as is and used broadly in many government agencies or much commercial company. This research was proposing decentralized network model especially for storing e-KTP data without breaking privacy law. Besides providing high specs of the server, a decentralized model can reduce the cost of server infrastructure. The model was proposing using Distributed Hast Table which was used for peer-to-peer networks. The decentralized model promised high availability and the more secure way to save and access the data. The result of this model can be implemented in many network topology or infrastructure also applicable to implement on Small Medium Enterprise Company.
Many people mistaken that Internet 2.0 is Web 2.0 which is a mis-concept. Internet means internetworking which works at the transmission media layer and current Internet is based on IP protocol therefore is subject to many security vulnerabilities. Internet 2.0 is based on new patented protocol which utilize native telephony network to establish secure point to point connection and able to prevents a lot of current Internet vulnerabilities.
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
Reliability in data collection for wireless sensor networks is one of the major problems in IoT applications. Sensor nodes are usually placed in harsh conditions where data communication is at risk of losing packets. Retransmissions are considered costly in terms of delay and power consumptions, especially that wireless sensor nodes are battery operated. In this context we introduce SR-Code, a novel network coding algorithm that achieves reliability in harsh conditions. SR-Code utilizes the XOR operator to code overheard packets. The targeted network topology is a 2-tier network where data loss can occur in all tiers. SR-Code utilizes bit addresses where each node is identified by a single bit in an address bit vector. Identifying packets and computing the cardinality of coded messages can be easily done using address bit vectors. SR-Code realizes redundancy as a function of overheard packet. SR-Code achieved a reliability factor of 75% when the number of packets lost was 100% of the original (un-coded) packet sent.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Deep packet inspection has been subject to controversial debates about network neutral- ity and online privacy for the last few years. In this white paper we will argue that DPI as such is a neutral, neither good nor bad technology, and that it depends on the applica- tion that utilizes DPI if and how it will affect the Internet and our society.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY IJNSA Journal
Network steganography has been a well-known covert data channeling method for over three decades. The
basic set of techniques and implementation tools have not changed significantly since their introduction in
the early 1980’s. In this paper, we review the predominant methods of classical network steganography,
describing the detailed operations and resultant challenges involved in embedding data in the network
transport domain. We also consider the various cyber threat vectors of network steganography and point
out the major differences between classical network steganographyand the widely known end-point
multimedia embedding techniques, which focus exclusively on static data modification for data hiding. We
then challenge the security community by introducing an entirely new network data hiding methodology,
whichwe refer to as real-time network data steganography. Finally, we provide the groundwork for this
fundamental change of covert network data embedding by introducing a system-level implementation for
real-time network data operations that will open the path for even further advances in computer network
security.
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...ijsrd.com
AES is considered a good encryption algorithm in terms of providing security to a network in passing information (data) in form of audio, string, and video and in any other form. However it yields a low throughput resulting in slowness and increasing energy dispensation of server or an application. The Enhanced AES algorithm is proposed in this paper which works by using sequence counters and provides improved throughput as compare to conventional AES algorithm. The J-Bit Encoding is being a compression algorithm in lossless category which doesn't decrease the quality but reduce the size of data to some extent. It has been observed that the proposed encryption algorithm integrated to J-Bit Encoding algorithm will provide the effective security measures as well as increased throughput as a parameter and less bandwidth usage as the actual size of data shall not be sent along the network.
It a a complete ppt explaining the basics of computer networking. It Includes topics like :
1. Types of Network
2. Protocols
3. Threats to network
4. Security of Network
etc
A computer network is defined as the interconnection of two or more computers. It is done to enable the computers to communicate and share available resources.
Components of computer network
Network benefits
Disadvantages of computer network
Classification by their geographical area
Network classification by their component role
Types of servers
ANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARKIJNSA Journal
Network performance can be a prime concern for network administrators. The performance of the network depends on many factors. Some of the issues faced in the network performance are - Slow Internet, Bottlenecks, Loss of packets and/or retransmissions, and Excessive bandwidth consumption. For troubleshooting a network, an in-depth understanding of network protocols is required. The main objective of this research is to analyze the performance and various other parameters related to the integrity of a network in a home-based network environment using Wireshark. Network traffic is captured for different devices. The captured traffic is then analysed using Wireshark’s basic statistical tools and advanced tools for various performance parameters.
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
Privacy preserving routing is crucial for some Ad hoc networks that require
stronger privacy protection. A number of schemes have been proposed to protect privacy in
Ad hoc networks. However, none of these schemes offer unobservability property since data
packets and control packets are still linkable and distinguishable in these schemes. In this
paper, we define stronger privacy requirements regarding privacy preserving routing in
mobile ad hoc networks. Then we propose an Unobservable Secure Routing scheme (USOR)
to offer complete unlinkability and content unobservability for all types of packets. USOR is
efficient as it uses a novel combination of group signature and ID-based encryption for route
discovery. Security analysis demonstrates that USOR can well protect user privacy against
both inside and outside attackers. We implement USOR on Network Security (NS2), and
evaluate its performance by comparing with Ad Hoc On demand Distance Vector Routing
(AODV) and MASK. The simulation results show that USOR not only has satisfactory
performance compared to AODV, but also achieves stronger privacy protection than existing
schemes like Mask.
The Impact on Security due to the Vulnerabilities Existing in the network a S...IJAEMSJORNAL
Software Defined Networking, the emerging technology is taking the network sector to a new variant. Networking sector completely focused on hardware infrastructure is now moving towards software programming. Due to an exponential growth in the number of user and the amount of information over wires, there arises a great risk with the existing IP Network architecture. Software Defined Networking paves a platform identifying a feasible solution to the problem by virtualization. Software Defined Networking provides a viable path in virtualization and managing the network resources in an “On Demand Manner”. This study is focused on the drawbacks of the existing technology and a fine grained introduction to Software Defined Networking. Further adding to the above topic, this study also passes over the current steps taken in the industrial sector in implementing Software Defined Networking. This study makes a walkthrough about the security features of Software Defined Networking, its advantages, limitations and further scope in identifying the loopholes in the security.
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
With the go on the evolution of both computer and internet technology, videos, sounds, and scripts are used more and more often. It can be used in sundry techniques in ciphering and data concealing. The objective of this paper is leading to the suggestion of a new method of the combination between encryption and concealment of information so as to make it difficult to identify the transmitted datavia networks. This study has used two force secure (2FS) to encrypt the images, in other words, the SF is frequent twice on the image, to obtain powerful encryption then the concealing of the secret message is done inside the cryptography of the image has been performed using a secret key (cosine curve), and this stego-encryption image has been transformed forthe Internet of things storage in the database in IoT (data flow), when the user needs any information can be access inviaof internet of things (IoTs). The outcome of the proposed system is obtained tobe evaluated through different measures, such aspeak signal noise ratio (PSNR), mean square error (MSE), entropy,correlation coefficient, and histogram. The proposed system is good, efficient, fast, has high security, robustness, and transparency.
Peer-to-Peer Communication Service and Messaging SystemEditor IJMTER
The peer-to-peer communication services[1] has entered into the public limelight over the last few
years. Several researches are underway on peer-to-peer communication technologies, but no definitive conclusion
is currently available. Comparing to traditional server client technology on the Internet, the peer-to-peer
technology has capabilities to realize highly scalable, extensible and efficient distributed applications. Our work
presents an anonymous peer-to-peer (P2P) messaging system. A P2P network consists of a large number of peers
interconnected together to share all kinds of digital content. A key weakness of most existing P2P systems is the
lack of anonymity. Without anonymity, it is possible for third parties to identify the participants involved. First,
anonymous P2P system should make it impossible for third parties to identify the participants involved. Second,
anonymous P2P system should guarantee that only the content receiver knows the content. Third, anonymous P2P
system should allow the content publisher to plausibly deny that the content originated from him or her.
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKijmnct
Nowadays security is an evident matter in designing networks and much research has been done in this
field. The main purpose of the research is to provide an appropriate instruction for data transmission in a
reliable platform. One of the instructions of transferring information is to use public networks like internet.
The main purpose of the present paper is to introduce that enables the users to enter to a new security level.
In this paper, VPN as one of the different instructions for establishing the security proposed to be
examined. In this type, tunneling method of internet protocol security (IPsec) is used. Furthermore, the
advanced method of scanning fingerprint is applied to establish authentication and Diffie-Hellman
algorithm for coding and decoding data, of course with conversion in this algorithm.
Delay Tolerant Networks (DTNs) have high end-to-end latency, which is often faces disconnection, and unreliable wireless connections. It does not mean a delay service instead DTNs provides a service where network imposes disruption or delay. It operates in challenged networks with extremely limited resources such as memory size, CPU processing power etc. This paper presents an efficient trust managing mechanism for providing secure environment. The proposed dynamic trust management protocol uses a dynamic threshold updating which overcomes the problems with time changing dynamic characteristics by dynamically updating the criteria in response to changing network conditions. This reduces overheads and increases the efficient use of routing network even in conditions change. Also the dynamic threshold update reduces the false detection probability of the malicious nodes. To show the effectiveness of the proposed system, a detailed simulation in the presence of selfish and malicious nodes is performed with ONE simulator. Finally a comparative analysis of our proposed routing with previous routing protocols is also performed. The results demonstrate that presented algorithm deals effectively with selfish behavior with providing significant gain on effective delivery ratio in trade off with message overhead and delay
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
With the growing deployment of host-based and network-based intrusion detection systems in increasingly large and complex communication networks, managing low-level alerts from these systems becomes critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or intrusion prevention systems (IPSs) are collected throughout a monitored network such that large series of alerts (alert streams) need to be fused. An alert indicates an abnormal behavior, which could potentially be a sign for an ongoing cyber attack. Unfortunately, in a real data communication network, administrators cannot manage the large number of alerts occurring per second, in particular since most alerts are false positives. Hence, an emerging track of security research has focused on alert correlation to better identify true positive and false positive. To achieve this goal we introduce Mission Oriented Network Analysis (MONA). This method builds on data correlation to derive network dependencies and manage security events by linking incoming alerts to network dependencies.
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
As per the recent studies, the volatile growth has been seen in the use of mobile devices as
the supporting technology for accessing Internet based services, as well as for personal
communication needs in networking. Various studies indicate that it is impossible to utilize strong
cryptographic functions for implementing security protocols on mobile devices. Our research negates
this. Explicitly, a performance analysis focused on the most commonly used cryptographic protocols
based on the location address (latitude & longitude) of the user for mobile applications and projected
provably secure authentication protocol that is more efficient than any of the prevailing
authentication protocol is being used by the network security methods. Understanding the use of
public key cryptography which makes potential use of discrete logarithms problem. The security of
ECC depends on the difficulty of Elliptic Curve Discrete Logarithm. To provide secure
communication for mobile devices, authenticated protocol is an important primitive for establishing
trusted connection. In this paper, it has been shown that the location based system using improved
Rabin Algorithm provides a better security and acquires much less energy consumption than the
existing authentication protocols.
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ijfcstjournal
This investigation delves into incorporating a hybridized memetic strategy within the framework of English
composition pedagogy, leveraging Internet Plus resources. The study aims to provide an in-depth analysis
of how this method influences students’ writing competence, their perceptions of writing, and their
enthusiasm for English acquisition. Employing an explanatory research design that combines qualitative
and quantitative methods, the study collects data through surveys, interviews, and observations of students’
writing performance before and after the intervention. Findings demonstrate a beneficial impact of
integrating the memetic approach alongside Internet Plus tools on the writing aptitude of English as a
Foreign Language (EFL) learners. Students reported increased engagement with writing, attributing it to
the use of Internet plus tools. They also expressed that the memetic approach facilitated a deeper
understanding of cultural and social contexts in writing. Furthermore, the findings highlight a significant
improvement in students’ writing skills following the intervention. This study provides significant insights
into the practical implementation of the memetic approach within English writing education, highlighting
the beneficial contribution of Internet Plus tools in enriching students' learning journeys.
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGijfcstjournal
Messages routing over a network is one of the most fundamental concept in communication which requires
simultaneous transmission of messages from a source to a destination. In terms of Real-Time Routing, it
refers to the addition of a timing constraint in which messages should be received within a specified time
delay. This study involves Scheduling, Algorithm Design and Graph Theory which are essential parts of
the Computer Science (CS) discipline. Our goal is to investigate an innovative and efficient way to present
these concepts in the context of CS Education. In this paper, we will explore the fundamental modelling of
routing real-time messages on networks. We study whether it is possible to have an optimal on-line
algorithm for the Arbitrary Directed Graph network topology. In addition, we will examine the message
routing’s algorithmic complexity by breaking down the complex mathematical proofs into concrete, visual
examples. Next, we explore the Unidirectional Ring topology in finding the transmission’s
“makespan”.Lastly, we propose the same network modelling through the technique of Kinesthetic Learning
Activity (KLA). We will analyse the data collected and present the results in a case study to evaluate the
effectiveness of the KLA approach compared to the traditional teaching method.
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESijfcstjournal
Software architecture is the structural solution that achieves the overall technical and operational
requirements for software developments. Software engineers applied software architectures for their
software system developments; however, they worry the basic benchmarks in order to select software
architecture styles, possible components, integration methods (connectors) and the exact application of
each style.
The objective of this research work was a comparative analysis of software architecture styles by its
weakness and benefits in order to select by the programmer during their design time. Finally, in this study,
the researcher has been identified architectural styles, weakness, and Strength and application areas with
its component, connector and Interface for the selected architectural styles.
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...ijfcstjournal
A design of a sales system for professional services requires a comprehensive understanding of the
dynamics of sale cycles and how key knowledge for completing sales is managed. This research describes
a design model of a business development (sales) system for professional service firms based on the Saudi
Arabian commercial market, which takes into account the new advances in technology while preserving
unique or cultural practices that are an important part of the Saudi Arabian commercial market. The
design model has combined a number of key technologies, such as cloud computing and mobility, as an
integral part of the proposed system. An adaptive development process has also been used in implementing
the proposed design model.
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...ijfcstjournal
Frank t-norms are parametric family of continuous Archimedean t-norms whose members are also strict
functions. Very often, this family of t-norms is also called the family of fundamental t-norms because of the
role it plays in several applications. In this paper, optimization of a linear objective function with fuzzy
relational inequality constraints is investigated. The feasible region is formed as the intersection of two
inequality fuzzy systems defined by frank family of t-norms is considered as fuzzy composition. First, the
resolution of the feasible solutions set is studied where the two fuzzy inequality systems are defined with
max-Frank composition. Second, some related basic and theoretical properties are derived. Then, a
necessary and sufficient condition and three other necessary conditions are presented to conceptualize the
feasibility of the problem. Subsequently, it is shown that a lower bound is always attainable for the optimal
objective value. Also, it is proved that the optimal solution of the problem is always resulted from the
unique maximum solution and a minimal solution of the feasible region. Finally, an algorithm is presented
to solve the problem and an example is described to illustrate the algorithm. Additionally, a method is
proposed to generate random feasible max-Frank fuzzy relational inequalities. By this method, we can
easily generate a feasible test problem and employ our algorithm to it.
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...ijfcstjournal
Underwater detector network is one amongst the foremost difficult and fascinating analysis arenas that
open the door of pleasing plenty of researchers during this field of study. In several under water based
sensor applications, nodes are square measured and through this the energy is affected. Thus, the mobility
of each sensor nodes are measured through the water atmosphere from the water flow for sensor based
protocol formations. Researchers have developed many routing protocols. However, those lost their charm
with the time. This can be the demand of the age to supply associate degree upon energy-efficient and
ascendable strong routing protocol for under water actuator networks. During this work, the authors tend
to propose a customary routing protocol named level primarily based routing protocol (LBRP), reaching to
offer strong, ascendable and energy economical routing. LBRP conjointly guarantees the most effective use
of total energy consumption and ensures packet transmission which redirects as an additional reliability in
compare to different routing protocols. In this work, the authors have used the level of forwarding node,
residual energy and distance from the forwarding node to the causing node as a proof in multicasting
technique comparisons. Throughout this work, the authors have got a recognition result concerning about
86.35% on the average in node multicasting performances. Simulation has been experienced each in a
wheezy and quiet atmosphere which represents the endorsement of higher performance for the planned
protocol.
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...ijfcstjournal
This research paper examined and re-evaluates the technological innovation, theory, structural dynamics
and evolution of Pill Camera(Capsule Endoscopy) technology in redirecting the response manner of small
bowel (intestine) examination in human. The Pill Camera (Endoscopy Capsule) is made up of sealed
biocompatible material to withstand acid, enzymes and other antibody chemicals in the stomach is a
technology that helps the medical practitioners especially the general physicians and the
gastroenterologists to examine and re-examine the intestine for possible bleeding or infection. Before the
advent of the Pill camera (Endoscopy Capsule) the colonoscopy was the local method used but research
showed that some parts (bowel) of the intestine can’t be reach by mere traditional method hence the need
for Pill Camera. Countless number of deaths from stomach disease such as polyps, inflammatory bowel
(Crohn”s diseases), Cancers, Ulcer, anaemia and tumours of small intestines which ordinary would have
been detected by sophisticated technology like Pill Camera has become norm in the developing nations.
Nevertheless, not only will this paper examine and re-evaluate the Pill Camera Innovation, theory,
Structural dynamics and evolution it unravelled and aimed to create awareness for both medical
practitioners and the public.
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGijfcstjournal
Path finding algorithm addresses problem of finding shortest path from source to destination avoiding
obstacles. There exist various search algorithms namely A*, Dijkstra's and ant colony optimization. Unlike
most path finding algorithms which require destination co-ordinates to compute path, the proposed
algorithm comprises of a new method which finds path using backtracking without requiring destination
co-ordinates. Moreover, in existing path finding algorithm, the number of iterations required to find path is
large. Hence, to overcome this, an algorithm is proposed which reduces number of iterations required to
traverse the path. The proposed algorithm is hybrid of backtracking and a new technique(modified 8-
neighbor approach). The proposed algorithm can become essential part in location based, network, gaming
applications. grid traversal, navigation, gaming applications, mobile robot and Artificial Intelligence.
EAGRO CROP MARKETING FOR FARMING COMMUNITYijfcstjournal
The Major Occupation in India is the Agriculture; the people involved in the Agriculture belong to the poor
class and category. The people of the farming community are unaware of the new techniques and Agromachines, which would direct the world to greater heights in the field of agriculture. Though the farmers
work hard, they are cheated by agents in today’s market. This serves as a opportunity to solve
all the problems that farmers face in the current world. The eAgro crop marketing will serve as a better
way for the farmers to sell their products within the country with some mediocre knowledge about using
the website. This would provide information to the farmers about current market rate of agro-products,
their sale history and profits earned in a sale. This site will also help the farmers to know about the market
information and to view agricultural schemes of the Government provided to farmers.
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSijfcstjournal
It is well known that the tenacity is a proper measure for studying vulnerability and reliability in graphs.
Here, a modified edge-tenacity of a graph is introduced based on the classical definition of tenacity.
Properties and bounds for this measure are introduced; meanwhile edge-tenacity is calculated for cycle
graphs and also for complete graphs.
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMijfcstjournal
This Paper provides a brief description of the Genetic Algorithm (GA), the Simulated Annealing (SA)
Algorithm, the Backtracking (BT) Algorithm and the Brute Force (BF) Search Algorithm and attempts to
explain the way as how the Proposed Genetic Algorithm (GA), the Proposed Simulated Annealing (SA)
Algorithm using GA, the Backtracking (BT) Algorithm and the Brute Force (BF) Search Algorithm can be
employed in finding the best solution of N Queens Problem and also, makes a comparison between these
four algorithms. It is entirely a review based work. The four algorithms were written as well as
implemented. From the Results, it was found that, the Proposed Genetic Algorithm (GA) performed better
than the Proposed Simulated Annealing (SA) Algorithm using GA, the Backtracking (BT) Algorithm and
the Brute Force (BF) Search Algorithm and it also provided better fitness value (solution) than the
Proposed Simulated Annealing Algorithm (SA) using GA, the Backtracking (BT) Algorithm and the Brute
Force (BF) Search Algorithm, for different N values. Also, it was noticed that, the Proposed GA took more
time to provide result than the Proposed SA using GA.
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSijfcstjournal
In recent years, the complex event processing technology has been used to process the VANET’s temporal
and spatial event streams. However, we usually cannot get the accurate data because the device sensing
accuracy limitations of the system. We only can get the uncertain data from the complex and limited
environment of the VANET. Because the VANET’s event streams are consist of the uncertain data, so they
are also uncertain. How effective to express and process these uncertain event streams has become the core
issue for the VANET system. To solve this problem, we propose a novel complex event query language
PSTeCEQL (probabilistic spatio-temporal constraint event query language). Firstly, we give the definition
of the possible world model of VANET’s uncertain event streams. Secondly, we propose an event query
language PSTeCEQL and give the syntax and the operational semantics of the language. Finally, we
illustrate the validity of the PSTeCEQL by an example.
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...ijfcstjournal
Now a day enormous amount of data is getting explored through Internet of Things (IoT) as technologies
are advancing and people uses these technologies in day to day activities, this data is termed as Big Data
having its characteristics and challenges. Frequent Itemset Mining algorithms are aimed to disclose
frequent itemsets from transactional database but as the dataset size increases, it cannot be handled by
traditional frequent itemset mining. MapReduce programming model solves the problem of large datasets
but it has large communication cost which reduces execution efficiency. This proposed new pre-processed
k-means technique applied on BigFIM algorithm. ClustBigFIM uses hybrid approach, clustering using kmeans algorithm to generate Clusters from huge datasets and Apriori and Eclat to mine frequent itemsets
from generated clusters using MapReduce programming model. Results shown that execution efficiency of
ClustBigFIM algorithm is increased by applying k-means clustering algorithm before BigFIM algorithm as
one of the pre-processing technique.
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGijfcstjournal
Software testing is a testing which conducted a test to provide information to client about the quality of the
product under test. Software testing can also provide an objective, independent view of the software to
allow the business to appreciate and understand the risks of software implementation. In this paper we
focused on two main software testing –mutation testing and mutation testing. Mutation testing is a
procedural testing method, i.e. we use the structure of the code to guide the test program, A mutation is a
little change in a program. Such changes are applied to model low level defects that obtain in the process
of coding systems. Ideally mutations should model low-level defect creation. Mutation testing is a process
of testing in which code is modified then mutated code is tested against test suites. The mutations used in
source code are planned to include in common programming errors. A good unit test typically detects the
program mutations and fails automatically. Mutation testing is used on many different platforms, including
Java, C++, C# and Ruby. Regression testing is a type of software testing that seeks to uncover
new software bugs, or regressions, in existing functional and non-functional areas of a system after
changes such as enhancements, patches or configuration changes, have been made to them. When defects
are found during testing, the defect got fixed and that part of the software started working as needed. But
there may be a case that the defects that fixed have introduced or uncovered a different defect in the
software. The way to detect these unexpected bugs and to fix them used regression testing. The main focus
of regression testing is to verify that changes in the software or program have not made any adverse side
effects and that the software still meets its need. Regression tests are done when there are any changes
made on software, because of modified functions.
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...ijfcstjournal
Advances in micro fabrication and communication techniques have led to unimaginable proliferation of
WSN applications. Research is focussed on reduction of setup operational energy costs. Bulk of operational
energy costs are linked to communication activities of WSN. Any progress towards energy efficiency has a
potential of huge savings globally. Therefore, every energy efficient step is an endeavour to cut costs and
‘Go Green’. In this paper, we have proposed a framework to reduce communication workload through: Innetwork compression and multiple query synthesis at the base-station and modification of query syntax
through introduction of Static Variables. These approaches are general approaches which can be used in
any WSN irrespective of application.
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHijfcstjournal
Accurate and realistic estimation is always considered to be a great challenge in software industry.
Software Cost Estimation (SCE) is the standard application used to manage software projects. Determining
the amount of estimation in the initial stages of the project depends on planning other activities of the
project. In fact, the estimation is confronted with a number of uncertainties and barriers’, yet assessing the
previous projects is essential to solve this problem. Several models have been developed for the analysis of
software projects. But the classical reference method is the COCOMO model, there are other methods
which are also applied such as Function Point (FP), Line of Code(LOC); meanwhile, the expert`s opinions
matter in this regard. In recent years, the growth and the combination of meta-heuristic algorithms with
high accuracy have brought about a great achievement in software engineering. Meta-heuristic algorithms
which can analyze data from multiple dimensions and identify the optimum solution between them are
analytical tools for the analysis of data. In this paper, we have used the Harmony Search (HS)algorithm for
SCE. The proposed model which is a collection of 60 standard projects from Dataset NASA60 has been
assessed.The experimental results show that HS algorithm is a good way for determining the weight
similarity measures factors of software effort, and reducing the error of MRE.
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSijfcstjournal
Mining biological data is an emergent area at the intersection between bioinformatics and data mining
(DM). The intelligent agent based model is a popular approach in constructing Distributed Data Mining
(DDM) systems to address scalable mining over large scale distributed data. The nature of associations
between different amino acids in proteins has also been a subject of great anxiety. There is a strong need to
develop new models and exploit and analyze the available distributed biological data sources. In this study,
we have designed and implemented a multi-agent system (MAS) called Agent enriched Quantitative
Association Rules Mining for Amino Acids in distributed Protein Data Banks (AeQARM-AAPDB). Such
globally strong association rules enhance understanding of protein composition and are desirable for
synthesis of artificial proteins. A real protein data bank is used to validate the system.
International Journal on Foundations of Computer Science & Technology (IJFCST)ijfcstjournal
International Journal on Foundations of Computer Science & Technology (IJFCST) is a Bi-monthly peer-reviewed and refereed open access journal that publishes articles which contribute new results in all areas of the Foundations of Computer Science & Technology. Over the last decade, there has been an explosion in the field of computer science to solve various problems from mathematics to engineering. This journal aims to provide a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals. Topics of interest include, but are not limited to the following:
Because the technology is used largely in the last decades; cybercrimes have become a significant
international issue as a result of the huge damage that it causes to the business and even to the ordinary
users of technology. The main aims of this paper is to shed light on digital crimes and gives overview about
what a person who is related to computer science has to know about this new type of crimes. The paper has
three sections: Introduction to Digital Crime which gives fundamental information about digital crimes,
Digital Crime Investigation which presents different investigation models and the third section is about
Cybercrime Law.
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...ijfcstjournal
In this paper, we analyze the evolution of a small-world network and its subsequent transformation to a
random network using the idea of link rewiring under the well-known Watts-Strogatz model for complex
networks. Every link u-v in the regular network is considered for rewiring with a certain probability and if
chosen for rewiring, the link u-v is removed from the network and the node u is connected to a randomly
chosen node w (other than nodes u and v). Our objective in this paper is to analyze the distribution of the
maximal clique size per node by varying the probability of link rewiring and the degree per node (number
of links incident on a node) in the initial regular network. For a given probability of rewiring and initial
number of links per node, we observe the distribution of the maximal clique per node to follow a Poisson
distribution. We also observe the maximal clique size per node in the small-world network to be very close
to that of the average value and close to that of the maximal clique size in a regular network. There is no
appreciable decrease in the maximal clique size per node when the network transforms from a regular
network to a small-world network. On the other hand, when the network transforms from a small-world
network to a random network, the average maximal clique size value decreases significantly
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Climate Impact of Software Testing at Nordic Testing Days
Study of computer network issues and
1. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.4, July 2014
DOI:10.5121/ijfcst.2014.4407 85
STUDY OF COMPUTER NETWORK ISSUES AND
IMPROVISING DROP RATE OF TCP PACKETS USING
NS2
Shweta Gambhir1
and Kuldeep Tomar2
1
Department of Computer Engineering, NGF Engineering College & Technology, Palwal,
Haryana
2
Department of Computer Engineering, MRIU, Faridabad, Haryana
ABSTRACT
As the enormous use of internet increases day by day so as security concern is also raise day by day over
the internet. In this paper we discuss the network security and its related threats and also study the types of
protocols and few issues related to protocols in computer networks. We also simulate the design of 5 node
wired network scenario, its packet drop rate analysis through TCP protocol using NS2 as a simulator.
Analyzed the performance of 5-node network when the packet is drop down by graphical method also
called as Xgraph when rate parameter is in mb and also analyzed the performance of same network by
changing the value of rate parameter at same time so no packets would drop down at same time and also
analyzed the performance by Xgraph method.
KEYWORDS
Network Security, Protocols, NS2, Packet flow, TCP
1. INTRODUCTION
In Today’s world the use of Internet is growing considerably day by day in the scope and there
are so many results revealed for the functional requirement of the internet which is in the form of
number of new protocols and so many designed algorithms. These functional requirements
include security, QOS (quality-of-service), policies, mobile networking etc. these algorithms and
protocols growth gives the solution of so many problems for today’s world of internet. Several
protocols like SIP, HTTP, UDP, ICMP, TCP, RIP etc. expansion gives us privacy and also secure
our data on the internet. In real world till now there are number of algorithms and protocols
developed and designed (also by simulator) to cover the operational needs of internet but they
certain have some shortcomings. There are so many simulator tools developed and evolved to test
the work of real environment but they still have certain limitations because by using the different
approaches such as the use of several topologies and another one is lot of traffic generation on the
network make simulator task difficult. In about 1991 internet gains popularity and now become a
part of our real world.
As we know that there are number of application users who used internet or they have number of
so many task. Different internet user use the range of internet as for watching movie and
Television, serials, news etc. by the help of many internet service provider(ISP) who offers the
large range of IP addresses to their users by two mediums as telephone lines or by wireless
network as USB. There are so many companies that provide these kinds of services and through
these services user share their data and files over the internet, however for using these kinds of
2. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.4, July 2014
86
applications user needs range of high bits for transmitting large file, which consume network
bandwidth. Although the ISP (internet service provider) has some limited range of IP address due
to this reason some users share common or same bandwidth range on the Internet so this is the
network where the demand is higher than the capacity. This causes network congestion or
negative impact, on the data transmission rate and quality from the user perspective. The major
part of the Internet is designed to forward data with equal priority, independent on the data source
and destination.
2. LITERATURE REVIEW
As in [1] the study of TCP in NS-2 in which they worked on different formulae to calculate the
performance of TCP in NS-2 and also gave installation steps for NS-2.we study about the 4 types
of traffic and two protocols (TCP,UDP) how to create the topologies and network components.
With NS-2 they design the wired network, wireless network and their performance analysis by
graphical method [2]. As we know that the NS-2 is open source tool and widely used for network
simulation area and there are different kind of traffic is generated for the different type of packets
so this traffic and its parameters calculate the overall TCP/UDP packet drop rate by different
methods such as by calculating the throughput by running AWK, perl script etc. in NS-2 as Dr.
Neeraj Bhargava and Dr. Ritu Bhargava, Anchal kumawat, Bharat Kumar calculate the
performance of TCP throughput by different parameters of simulation they use VBR traffic which
is generate the video traffic at source to destination in form of packet as in [3]. They analyse the
performance using both the tools Xgraph and Gnuplot. These both are the tools of NS-2 which
shows the performance of network project graphically. We analysed the performance by Xgraph
method in this paper. Up to this study of NS-2 and how well it works on the wired network and
calculates its performance or throughput using different simulation tools and traffic generators.
Now we will study about the integrating the agents and its combined security and integrity work
on the wired, wireless and on sensor network using NS-2 as a network simulator they work well
in the area of security how to encrypt and decrypt the data so it provide the security to data or
information in the network [4].As so ever there are so many projects and research work is done
under the area of wired and wireless network by using simulator NS-2.As NS-2 is also used as the
REAL simulator in between year 1988-1990. NS-2 is widely used for security purpose and for
doing simulation before using it as real world. We work in area of TCP packet when it will drop
and when it will not drop in this paper using NS-2.
2.1. Comparative Analysis
Mr. Ajay Singh and Dr. Pankaj Dashore did well in their paper as in [5]. But they only analyze
the packet flow, how packets come from source to destination through the router node and
analyze its drop rate using Xgraph tool in NS-2 but we analyzed packet flow and drop rate as well
as we improvise the packet drop rate we also explain how the packet drop rate is improvised and
no packet would drop down at same time by altering the rate parameter of Exponential traffic.
3. TYPES OF NETWORK
3.1. Wired Network
Generally, physical connection between the two or more networks is a wired network. In wired
network the data sent from one computer to another or one network to other networks through
physical link or medium as ETHERNET cables etc. It is one way or two way interactions between
two users and this is broadcast by wired method such as Ethernet cables or by optical cables etc.
we can transfer the information from one computer to other via cables means data transmit by
physical medium only. Security is key concerning issue over the internet, internet addicted world
3. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.4, July 2014
87
or in almost all organizations. There are so many methods introduced through which we will
secure our network. What are the threats and how to overcome threats by given methods are
discussed in section 4,5,7 and 8 how to secure the network through unintended user who access the
authorized and authenticated information by different routing protocols mechanism or by other
protocol blocking mechanism as from concern issue. We consider any of method which provides
security to wired scenario and in Network Simulator NS2, with that methods information will be
secured for wired and wireless network by generating different-2 types of traffic and their
parameters.
3.2. Wireless Network
Internet is described as network of networks and Network defined as a network of devices
through which two or more network interacts by using wireless technologies usually as mobiles,
USB, Broadcasting medium. These are the some methods to provide interaction between two or
more medium as Television, radio, cell phones. As cell phones called as wireless phones is a two-
way interaction method for transmitting the data. Telecommunication is also the type to interact
in the network. Wireless communication is the mean of transmitting the information and without
the use of wires .Wireless Network communication refers to any type of computer or devices (for
examples Access point, wireless Router) that is commonly associated for communications over
wireless network to its interconnected nodes. This is also the Network security concerning issue
all most all organizations which refers the wireless communication. Ad-Hoc network and
Bluetooth are small type wireless devices through which data is transmit to one-to-many and it is
also the security issue when someone hack the data via Bluetooth on the wireless network. The
extensive fear over network is that when security is breaches due to the connectivity of one
device to many on the network. Information security means that protecting information and
information systems from any misuse, disruption, inspecting, eavesdropping, unauthorized
access, perusal, recording or destruction disclosure, modification, Authenticating by unauthorized
user. All these aspects are interrelating to each other and each of them has common goals and
understanding of how to protect the integrity, confidentiality, availability etc. and however they
have some differences in their work. Wireless Networks can be classified into some categories
depending on different criteria (e.g. size of the physical area that they are capable of covering and
domain of their use).The Wireless network work with almost many kind of network area as we
know about them as DAN, WAN, PAN, MAN etc. The term computer security, network security,
information/data security are used interchangeably in the computer world. The main focus is on
the security of the data and provides privacy and confidentiality service to their end users. And
NS2 is a best tool which provides security mechanism to wireless network and there are so many
way through which network is secured on network.
4. SECURITY
All security system must provide a pack of security functions that offers the secrecy to the system
on the network. The secrecy of data on the computer network is generally referred as security
system. These goals can be listed in the following main categories: Integrity, Authentication,
Confidentiality, Access control and Availability etc.
The main method is used to give security from Eavesdropping of data is Encryption which uses
the cryptography algorithms [6] which is divided in two parts symmetric and second is
asymmetric. There are so many methods or algorithms used today for encrypting or decrypting
the data through which data/information is arranged systematically, and even through which data
is encrypted one by one at sender side and same process of decryption of the data is also revised
by same public key and different private key at receiver side. By using the different numbers of
methods of cryptography we can secure our data. One is Symmetric which include DES [7],
4. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.4, July 2014
88
(RC5) [8] and AES [9] methods to encrypt data and to send that encrypted data securely on
network and asymmetric techniques that are used to encrypt and decrypt the data by algorithm
RSA[10], Diffie-Hellman [11]. Now a day’s big data is also arranged on the internet and sharing
of data is needed due to so many users or communication mechanism, privacy of data is also
needed due to cyber attacks [12]. Cyber security, big data and its privacy are the major concern in
the security region and there are so many researchers doing work on how to secure this big data
and from cyber attacks.
5. ISSUES IN COMPUTER NETWORK
Recently in our world the environment of dynamic computing significantly increases very much
in the scope. There are so many major attacks or issues of security are here in computer networks
which would generally affect the security. As few of them would explain in this section:
1. Denial-of-service is a common type of attack which harms the security of network and
decrease the performance of the router which involves the same IP address at source and
destination port. So these types of attack lose the security and secrete information of user.
2. Another issue concerned with computer network is configuration if the configuration is poor or
of low quality it will degrade the security.
3. Using many security policies at a time also affect the network and slower down the processing
speed which also creates the problem in security.
4. Some malicious program can be the reason through which user can access information by
creating a network access such as website.
There are few issues in network access through which information can be spoofed by
unauthorized user.
6. STUDY OF PROTOCOLS
Different protocols used on the each layer of TCP/IP model which helps in communication from
one network to more networks and also helpful to communicating with other layer protocols. As
we know that first layer is physical and data link layer and many protocols are also used in this
layer.
1. Physical/ Data link layer: In this layer data is transmit by wire or cables called as
ETHERNET or as well as concerned with addressing the data from one network node to other, for
this linking ETHERNET Cables are used. There are so many type of ETHERNET cables are For
example: 10BASE5, co-axial, Twisted cable etc.
2. Network layer: Network layer tells how to route the packet on network for this purpose IP
protocol used to route the packet from source node to destination node. The protocols are IP.IPX
used at this layer.
3. Transport layer: To transport the routed packet that comes from the Network layer by means
of protocols as TCP, UDP.
4. Application layer: Application layer used to display the data to the end user. There are so
many protocols used at this layer for the end user through whom they can understand the data in
user readable form so the protocols used at this layer are HTTP, SMTP, DNS etc.
7. ATTACKS ON NETWORK SECURITY
There are so many threats on network which will harm the security of user on the network we
discuss few of them below in this:
5. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.4, July 2014
89
1. Intrusion Attack: There are so many users on the network who use the internet and want
security on their network but when any illegal person or unauthorized user attain access on the
network to use the data of that user.
2. Spoofing Attack: When the illegal user access authorized information at transport layer by
changing the source IP packet. These unauthorized users change the private information of the
authorized user due to this the authorized user will receive altered information.
3. Protocol based Attacks: Communication protocols are the medium with the help of which
data or information is transferred or retrieve on the computer network. There are so many attacks
as discussed in next section come under this attack.
4. Denial-of-service Attack: DOS is a type of attack through which the network become weak
and DDOS is distributed in the whole network and the appearance of the DDOS is present in the
core architecture of internet [13] It is of two type[14]:
a. Ping of death
b. SYN attack
5. Application level Attack: Application level is called as user level where user get so many
protocols which help them to retrieve the information from sender but attack is also generated at
this level in form of malicious node Trojan on the HTTP etc.
6. Logon Attack: Due to security and privacy purpose logon policy is develop on the network but
there are so many hackers who hack the password and username of the authorized user.
7. Attack on address: Address are of two types MAC address and physical address when some
unauthorized user stole the information by accessing the address of source and destination.
There are so many researchers who researched the so many methods to detect the attacks or
threats. As DDOS is a severe attack in network security there are few methods discussed in [15]
[16] to detect the DDOS attack on the network.
8. PROTOCOL BASED SECURITY ISSUES
Protocol as we discussed above are the standard set of rules which is a mode of communication
on the network. Each layer of TCP/IP model has some standard set of rules known as protocols,
but sometimes what happen if some unauthorized or illegal user may be at anytime change the
rules at any layer of TCP/IP model. Protocols mainly used to send their information in their
communication mode to other next layer. As there are so many unauthorized or unauthenticated
user who will alter the rules to steal the privacy and security of data. so as the matter there are few
issues which will harm the security of protocols:
1. Attack on ARP: There are so many unauthenticated users who will attack on the physical
address of destination so the source data will be send to wrong destination address.
2. Attack on HTTP: Trojan is malicious software on network which generated at application
level on HTTP and IRC protocol to unsecure the data at user end [17].
3. Attack on routing information protocol: Routing the information means provide route to the
data at IP layer. In this layer routing information is manually or dynamically handled by some
protocols but some illegal user will change the information so the data is spoofed on the network
[18].
4. Attack on TCP: Sometime any unauthorized user can predict the sequence number of the TCP
protocol so that they can change the transferred information to other destination [18].
5. Attack on SIP: Session initiation protocol also used at application layer to provide the session
limit facility to users on the network but when the messages or information is flooded or
spammed so it can harm the security [19][20] so availability of data and its integrity may lost.
6. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.4, July 2014
90
9. SIMULATION
Simulation is one of the important technology in this modern time. There are so many objects in
real or hypothetical life. The network can also be simulated on the computer. A network simulator
is a technique of implementing the network on the computer. Most of the simulators are graphical
user interface driven, there are so many simulators which require commands or scripts as we talk
about the NS2 which gives input in form of TCL scripts or in AWK scripts etc. The network
parameters describe the state of the network (node placement, existing links) and the events. An
important output of simulations is the trace file. Examples of network simulation software are
ns2/ns3, OPNET, NetSim. Network simulators are particularly used to simulate, design and
analyze the various kinds of networks, also analyze the performance by the effect of various
network parameters.
9.1. Introduction to NS-2
For implementing the routing protocols, physical layer protocols (MAC, ETHERNET etc.),
network protocols, transport layer protocols as being a simulator NS-2 play a fundamental role for
work as a simulation tool for the different type network. NS-2 is a simulator that analyzes the
performance of protocols and has number of protocols for implementing the network. NS-2 which
describes the complete design of wired and wireless network, many security issues algorithms, for
the queuing and routing queue mechanism of network. NS2 is very helpful because it is open
source to design the new wired and wireless network for number of nodes and check the
variability of that new designed networked algorithms and architectures and their network
topologies. As we designed a 5 wired node scenario over UDP and TCP protocols and check their
topologies, support many popular network protocols and also offer simulation results for wireless
networks. As we know it support both wired and wireless network and suitable for the networking
based projects and work on packets scenario how packet is transmit or receive from source to
destination it also offer packet level inspection, how it is dropped and why it is dropped by using
different traffic generators which generate traffic by using parameters. The Experimental traffic
generator issued in this paper in which we setup a 5-node of wired network named tcp1, tcp2,
tcp3 over source node 1, source node 2, source node 3 respectively in which the TCP agent
connect to each source node as we know the we create a TCP agent before the packet/data sent
from source to transmit the data. Because agent is needed through which the generated traffic will
be transmitted the packet. So we generate the traffic at source with the help of agent TCP. There
are different types of traffic generator which generate the traffic from source node they are CBR,
Exponential, ftp, VBR etc. There are some steps which we discussed in section 10.1 for
implementing the design of TCP protocol and analyze its performance when the packet will drop
and when it will not drop.NS-2 Called as discrete event network simulator for simulating the IP.
NAM is called as a Visualization Tool in NS-2 which gives the Window screen as an output [21]
which shows the network scenario as in fig.3 called as NAM window which is resultant window
screenshot for NS-2.
9.2. Architecture of NS-2
As we know NS-2 is a combination of C++ language and OTCL scripts i.e. object oriented tool
command line interpreter which interpret the scripts line by line the code written in note pad or in
ms-word etc. and save it by .tcl extension. There is a class hierarchy structure of NS-2 and
extended class hierarchy which shows how to add components in NS-2 or to how to add new
class because the NS-2 is a combination of TCL script and C++ language so we also write code in
C++ language to run script in NS-2 [22].
7. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.4, July 2014
91
Design and run simulation by the Tcl interpreter using the simulator object in the OTcl library.
The at most of the network components and the data path in event scheduler are implemented in
the C++ and available to OTcl through an OTcl linkage library that is implemented using Tclcl, as
there are two classes in Tclcl file one is class agent and second is class application.
Class agents: Each node in network that has to receive or sends the packets or in the terms called
as traffic have an agent attach to the node so they will send or receive the data i.e. agent is
needed, in this we create a TCP agents in our work.
Figure 1: OTCL Script is a combination of tcl and C++
10. EXPERIMENTAL SETUP OF TCP
Figure 2: Experimental daigram of 5- node wired TCP network
The figure mentioned above is a experimental setup of 5 nodes in which n0,n1,n2 are the source
node which generate packets by the agent TCP and exponential packet is attached to the three
source nodes. The exponential traffic has 4 parameters :
1. Packet size
2. Rate
3. Burst time
4. Ideal time
8. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.4, July 2014
92
These are the four parameters of the exponential traffic through which traffic is generated on
source nodes and this traffic in form of packets send to router node r1 at that time due to
congestion window or the packet rate the ssome data is fall down through the router node r1 and
packets which are not fallen dowm are send to destination node n4.
10.1. How setup is done so that packets will send from source to destiantion(script)
Following are steps/script steps of how experimental setup of TCP is established and how packets
are send from source to destination are given below:
1.Create the object of simulator first as set tc[new simulator].
2.Set the nodes and established a link between the nodes for this purpos we use routing queue to
manitain the packet flow in queue as set node_name[$ ns node] and link may be simplex or
duplex as $ns simplex_link $sourcenode $routernode mb ms RED/DropTail. And fb is a instance
of simulator. mb is bandwidth is also the main cause to drop the packets & ms is delay between
the packets.
3.Create a TCP agent at source because the TCP agent is created before packets sent from source
as set tcp0 [new Agent/TCP] $tcp0 set class_ 2 $tc attach-agent $source node $tcp agent set sink0
[new Agent/TCPSink] $ns attach-agent $destination node $sink0 $ns connect $tcpagent $sink0.
4.Now attach the traffic given in this paper i.e. exponential traffic which is on/off distribution
traffic.attach to the TCP agent, this traffic with their parameters attached. As set exp0 [new
Application/Traffic/ Exponential].
$exp0 attach-agent $tcpagent $expotraffic set packet_size_ 210 $expotraffic set burst_time_ 2ms
$expotraffic set idle_time_ 1ms $expotraffic set rate_ 100k.
5.Now attach the source traffic to sink, sink is a previous traffic which means sink has agent/loss
monitor at the destination and monitor the amount of data byte sent or received so, amount of
data lost which will calculate the bandwidth of nodes as $ set bandwidth number[$ sink set byte]
code write on the script.
6. Out.tr.w is an output file which shows the output bandwidth of source node in form of graph
called as Xgraph.
7. Run the script by saving extension .tcl and run the script. When script runs it shows the
out.nam file which is called as network animator screen.
8. Now call the finish procedure in which close the o/p files as close $fo.
And then execute the Xgraph in geometry of window size it may be of 600 * 400. Now how to
calculate the bandwidth for the network, for this firstly set time as set time=0.1, 0.2, 0.3 etc.
Recall the procedure record at after the set time and also set now time to call the procedure again
and again. Now record the time and also set the start time of each simulated source then set the
end time of each source through which simulation can start and stop. Following mentioned above
are some steps for how to write a script for analyzing the packet flow of network, how to
recognized and also analyze its performance by graph which is shown in next section of this
paper. In next section we analyzed some results for packet flow of TCP, in section 10.2 we
analyzed that at any time the packet will drop through router when rate is in mb and analyzed its
performance using Xgraph but we also discuss in section 10.3 results which analyzed that at same
time instant not even a single packet is drop by router by altering the value of rate parameter in K
unit.
10.2. Result Analysis When Packets Are Drop Down Through Router
In fig.3 to fig.6 shows that packets comes from three sources n0, n1, n2 that are transmitted to the
destination n4 which is in hexagonal shape (in fig. 3) and packets are drop down at the router
node called n3 which is in square shape (in fig. 3) . TCP agent is created at three sources and
9. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.4, July 2014
93
exponential traffic is attached to the agent but at that time rate parameter value is in mb so that
packets would drop down at router node as shown in below figure.
Figure 3: when packets send from source n0 to destination n4 through n3 (router node)
Figure 4: when packets send from source n1 to destination n4 through n3 (router node)
Figure 5: some packets of source n1 drop down at n3
10. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.4, July 2014
94
Figure 6: when packets send from source n2 to destination n4 through n3 (router node)
Figure 7: at time 3.14 packets would drop down when rate is in mb at n3
Figure 8: Xgraph shows the performance by X-axis which represents rate and Y-axis shows the time so the
peak burst rate is in mb/sec. graph shows when packets drop at router node. At 3.14 time packet would drop
down so at that time peak is at low.
11. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.4, July 2014
95
10.3. Result analysis when packets are not drop down through router (improvisation)
In this section there is no packet would drop down at router node due to rate parameter is in K of
exponential traffic as shown below:
Figure 9: when packets send from source n0 to destination n4 through n3 (router node)
Figure 10: when packets send from source n1 to destination n4 through n3 (router node)
Figure 11: when packets send from source n2 to destination n4 through n3 (router node)
12. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.4, July 2014
96
Figure 12: at time 3.14 packets would not drop down when rate is in K at n3
Figure 13: Xgraph shows the performance by X-axis which represents rate and Y-axis shows the time so
the peak burst rate is in K/sec. graph shows when packets drop at router node. At 3.14 time packet would
not drop down in this graphical result so at that time peak is at high at that time.
As the following results shown in the figure 7 the packet is drop at time instant 3.14 when
parameter of exponential traffic rate is in mb and figure 12 shows the result of same time when
the rate is in K so that time packet would not drop down and also analyzed graphical results
which represents at 3.14 time packet would drop down so at that time peak is at low in figure 8
and result analyzed for in fig. 13 at 3.14 time packet would not drop down in this graphical result
so at that time peak is at high at that time. So we analyzed the packet flow of TCP using the
simulator NS-2. And above sections we study the computer networks its protocols and threats in
network and in the protocols.
11. CONCLUSIONS
In this paper we discuss the network, its scenario and also its concerning issues. We also discuss
the types of attack which affects the network so that results will the unintended user access the
authorized data by different methods as discussed in section 7. We also study the types of
protocols used on each layer of TCP/IP model and its related issues by means of which data is
13. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.4, July 2014
97
hacked or alter by unauthorized user by illegal way from sender side, at the router side or even at
destination by attacking on the number of protocols used at each layer. We also analyzed the
packet flow scenario i.e. how packet is flow from source to destination and how much packets are
dropped at router node by rate parameter of exponential traffic. As exponential is on/off traffic at
on time packets are dropped and at off time packets would not drop, each parameter has different
effect so on changing the rate parameter of exponential traffic would affect on the packet drop
rate and bandwidth is also affecting the packet drop rate of the network. We create only TCP
agent because as we know that TCP is connection oriented protocol and connection is established
before packets flow from source to destination and acknowledgement is also send by receiver. So
as less packet drop rate count as comparison to UDP protocol. But some packets at TCP would
loss because of the rate parameter is in discussed in section 10.2 but when we alter the value of
rate parameter as in section 10.3 no packet would drop by router, all the packets are sent to the
destination n4 form the source n0, n1, n2.
REFERENCES
[1] Johanna Antila, “TCP Performance Simulations Using Ns2”, 51189d TLT
[2] Sirwan A.Mohammed, Prof. Dr. Sattar B.Sadkhan, “Design of wireless network based on NS-2”,
Journal of Global Research in Computer Science, Volume 3, No. 12, December 2012
[3] Dr. Neeraj Bhargava, Dr. Ritu Bhargava, Anchal Kumawat, Bharat Kumar, “ Performance of TCP-
Throughput on NS2 by Using Different Simulation Parameters”, International Journal of Advanced
Computer Research (ISSN (print): 2249-7277 ISSN (online): 2277-7970) Volume-2 Number-4 Issue-6
December-2012.
[4] C.Manikandan, R.Parameshwaran, K.Hariharan, N.Kalaimani, K.P. Sridhar, “Combined Security and
Integrity Agent Integration into NS-2 for Wired, Wireless and Sensor Networks”, Australian Journal
of Basic and Applied Sciences, 7(7): 376-382, ISSN 1991-8178, 2013.
[5] Mr. Ajay Singh and Dr. Pankaj Dashore, “ Comparative Analysis of TCP and UDP by using NS-2”,
International Journal of Computer Science and Information Security (IJCSIS) Volume (1) : Issue (1)
IROCS Published Online June 2013
[6] Yun Zhou and Yuguang Fang, “Network security and attack Defense”, Institue of electrical and
Electronics Engineers, 2009.
[7] FIPS PUB 46-2, “Data Encryption Standard (DES)”, Dec.1993
[8] IETF RFC 2040, “The rc5,rc5-cbc, rc-5-cbc-pad, abd rc-5-cts algorithms”, Oct.1996
[9] FIPS PUB 197, “Advanced Encryption Standards (AES)”, Nov.2001
[10] W.Diffie and M.E. Hellman, “New directions in Cryptography”, IEEE Transaction on Information
Theory, Vol. IT-22, no.6, Nov 1976, pp-644-654
[11] R.L. Rivest, A. Shamir, and L.Adleman, “ A method for obtaining digital signatures and public-key
cryptosystems”, Communications of the ACM, vol. 21, no. 2, Feb. 1978, pp-120-126
[12] “FACT SHEET: Big data and Privacy Working Group Review,” The White House, May 5, 2104
[13] Hamza Rahmani, Nabil Sahli, Farouk Kamoun, “DDoS flooding attack detection scheme based on F-
divergence”, Computer Communications 35 (2012) 1380–1391, Elsevier
[14] Panayiotis kotzanikolaou, Christos douligeris “computer network security: basic background and
current issues”, institute of electrical and electronics engineers, Inc. 2007.
[15] Y. Xiang, Y. Lin, W.L. Lei ,S.J. Huang, “Detecting DDOS Attack on network Similarity”, IEEE
Proc.-Commun., Vol. 151, No. 3, June 2004
[16] Y. Xie, S. Tang, X. Huang, C. Tang, X. Liu, “Detecting latent attack behavior from aggregated Web
traffic”, Computer Communications 36 (2013) 895–907, Elsevier
[17] Silvia Farraposo, Laurent Gallon, Philippe Owezarski “Network security and DOS attack”,
Documtery history.
[18] S.M. bellovin “Security problem in TCP/IP protocol suite”, Computer Communication Review, Vol.
19, No. 2, pp. 32-48, April 1989.
[19] Gaston Ormazabal, Sarvesh Nagpal, Eilon Yardeni, and Henning Schulzrinn “Secure SIP: A Scalable
Prevention Mechanism for DoS Attacks on SIP Based VoIP Systems”, Springer-Verlag Berlin
Heidelberg 2008
14. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.4, July 2014
98
[20] Aws Naser Jaber, Chen-Wei Tan, Selvakumar Manickam and Ali Abdulrazzaq Khudher “Session
Initiation Protocol Security: A Brief Review”, Journal of Computer Science 8 (3): 348-357, 2012.
[21] http://wing.nitk.ac.in/resources/Comparison.pdf
[22] http://www.cs.binghamton.edu/~kliu/cs580t/ns2pre.pdf
Authors
Ms. Shweta Gambhir is a M.Tech Scholar in the department of CSE at NGF
College of engineering & Technology, Palwal, Haryana, India. She did her B.Tech
in CSE in 2011 from WIT College affiliated to MDU Rohtak. She also has
published papers in national and International conferences/ journals.
Kuldeep Tomar is a Research Scholar in the Department of CSE, MRIU,
Faridabad, 121001, India. Ccurrently working as Head of the Department of CSE
in NGFCET, Palwal, Faridabad, Haryana. He was born in Sonepat, Haryana on 2nd
Oct, 1978. He has done M.E/M.Tech in Computer Science and Engineering from
C.I.T.M., Faridabad, India.He has a total experience of 12 years in different
organizations. He is currently working as Associate Professor in NGF College of
Engineering & Technology, Palwal, Faridabad, Haryana. He also has worked as
Assistant. Professor in Skyline Institute of Engineering & Technology, Gr. Noida;
as Senior Lecturer in B.S.A.I.T.M., Faridabad; as Technical Head/Manager at SSI
(Software Solutions Integrated Ltd. and as Sr. Faculty at Hartron Workstation
(Haryana Govt. Undertaking).He has published more than 12 papers in International/National Journals and
conferences etc. Has is also written a book. He also is a member of Computer Society of India,
Membership No:N1039627.