3 research outputs found

    IDHOCNET-A Novel Protocol Stack and Architecture for Ad hoc Networks

    Get PDF
    Presently employed Internet Protocol (IP) stack possesses number of architectural problems. The issues like Dual/Overriding role of IP addresses, mobility, multi-homing etc are the limitations for the infrastructure oriented networks which even have support of Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), Network Address Translation (NAT) servers, etc. Such issues are extremely complex to handle in the case of multi-hop wireless ad hoc networks which lack the support of any infrastructure component. The contemporary research direction for the improvement of present Internet architecture mainly focuses on the use of real identifiers instead of IP addresses for host identification in the network. However, the proposed architectures mostly discuss the infrastructure oriented network models and minimal research has been conducted in the direction of proposals for ad hoc networks.  In this paper we provide a thorough discussion on the practical usage issues of IP based ad hoc network implementation. In order to resolve the present limitations of ad hoc networks, we describe an implementation of a novel identifier based ad hoc network protocol stack and architecture known as IDHOCNET (Identifier based ad hoc network). The architecture proposes a novel paradigm of identifier based applications for multi-hop wireless ad hoc environment. The proposed system further provides backward compatibility to support co-existence with IP based applications. As a proof of concept, the architecture has been implemented on Linux platform with WiFi interfaces. Various practical scenarios with architectural insight are presented to demonstrate the practicability of the proposed approach

    Smart Agent and Modified Master-Backup Algorithm for Auto Switching Dynamic Host Configuration Protocol Relay through Wireless Router

    Get PDF
    Several problems happened in a wireless router which is the number of clients that connected to DHCP (Dynamic Host Configuration Protocol) services and also durability in connectivity. Wireless router which is used in the office nowadays usually has a small memory and also CPU power. Memory or CPU sometimes could be running out when a wireless router does some background services. DHCP is one of the services needed to run in a wireless router. DHCP is interrupted when memory or CPU is full. DHCP relay and modification of the backup algorithm needed to overcome this situation when the memory or CPU in the wireless router is limited. The modification of the backup algorithm is a mechanism to switch the main router with the backup router when the main router memory is busy. DHCP relay could become a DHCP server directly when the main router is busy. Wireless router in another side could be formatted with open-source OS such as OpenWRT to become bridge interface that connected to DHCP relay. The scenario that tested in this research is using Cisco DHCP relay services in combination with OpenWRT wireless router, in variation with Mikrotik original “capsman” protocol with DHCP relay in combination with wireless-enabled Mikrotik and also in combination with OpenWRT wireless router. The result shows that OpenWRT in configuration with DHCP relay and backup algorithm could extend the number of a client connected, and also the durability of the wireless router runs its services as DHCP forwarder to DHCP relay and DHCP server. Theoretically, the number of the client that could connect in class C IPv4 address is 253 clients. Practically, in some wireless router brand, the number of the client is limited to 15 to 30 clients because that number is an optimal client for consuming the bandwidth. DHCP relay scenario could extend that limit to have a larger number of the client, and the new backup algorithm in combination also doesn’t decrease IP release time significantly from usual DHCP using a direct connection

    Early Identification of Abused Domains in TLD through Passive DNS Applying Machine Learning Techniques

    Get PDF
    DNS is vital for the proper functioning of the Internet. However, users use this structure for domain registration and abuse. These domains are used as tools for these users to carry out the most varied attacks. Thus, early detection of abused domains prevents more people from falling into scams. In this work, an approach for identifying abused domains was developed using passive DNS collected from an authoritative DNS server TLD along with the data enriched through geolocation, thus enabling a global view of the domains. Therefore, the system monitors the domain’s first seven days of life after its first DNS query, in which two behavior checks are performed, the first with three days and the second with seven days. The generated models apply the machine learning algorithm LightGBM, and because of the unbalanced data, the combination of Cluster Centroids and K-Means SMOTE techniques were used. As a result, it obtained an average AUC of 0.9673 for the three-day model and an average AUC of 0.9674 for the seven-day model. Finally, the validation of three and seven days in a test environment reached a TPR of 0.8656 and 0.8682, respectively. It was noted that the system has a satisfactory performance for the early identification of abused domains and the importance of a TLD to identify these domains
    corecore