9 research outputs found

    Interest Flooding Attack in Named Data Networking: A Survey

    Get PDF
    Named Data Networking (NDN) is based on the principle of Content-Centric Networking (CCN) that aims to overcome the weaknesses of the current host-based Internet architecture. Like traditional networks, it is identified that NDN is also vulnerable to many security threats including denial-of-service (DoS) or distributed DoS (DDoS) and might offer avenues for new DoS/DDoS attacks. DDoS attacks can be triggered in NDN to exhaust resources within an NDN router or the content producer(s). This survey paper focuses on different types of possible distributed denial-ofservice (DDoS) attacks; in particular, we address Interest flooding, where an adversary with limited resources can implement this attack and significantly impact thenetwork performance and their proposed countermeasures.Keywords:Named Data Networking, Interest flooding, denial-of-service

    A Study Of Bio-inspired Self Organizing Networks

    Get PDF
    In today’s perplexed world of wireless networking, there are many rapid changes and challenges that could lead to an excessive quantity of users flocking to one or only a few networks, thereby leaving some potentially subsidiary accommodation providers out of the picture. Self-Organizing Networks (SON) is a term for mobile network automation, cost efficient, easy operation and maintenance of mobile networks .This article provides an overview of SON features and challenges. Since self-organization is expected to bring us remarkable benefits in terms of costs reduction in network configuration, management, operation and optimization, etc, enormous research has been carried out to address the challenges brought by the ever increasing complexity anddynamics in complex communications systems.Keywords:SON; Self organizing network

    Network Modeling and Emulation: A New Architecture of Next Generation WANem

    Get PDF
    Typically application developers develop and testing team tests an web based application in a local area network (LAN). And, once everything is completed deployment of the application is done in a wide area network (WAN). This process carries lots of WAN related bugs to the application. This is due to LAN having higher bandwidth (for example, 100 Mbps), lesser delay (~1 ms), almost zero loss, corruption and reordering of packets as compared to WAN. WANem[8] is used to provide real experience of a WAN during application development or testing over LAN environment. Thus, WANem helps both application developers and testers by emulating WAN in a LAN. Next Generation WANem (NxGen WANem) is developed based on existing WANem with enhanced features. With more interactive GUI and modifications on some preexisting commands, the NxGen WANem provides user with facility to model and design a network by dragging the network components available in the interface designed and thereafter emulate the network characteristics. In this paper, we propose an architecture of NxGen WANem.Keywords: Emulation, LAN, WAN, WANem, SWT, GWT, JSP, AJA

    A New Algorithm of Self Organization in Wireless Sensor Network

    No full text

    Different firewall techniques: A survey

    No full text
    Firewalls today are an integrated part of security mechanism of any organization or institution. Firewalls throughout the years have evolved merely from static rule mapping to understanding the dynamic behavior of traffic and react accordingly. Different firewall techniques operating in several layers of the TCP/IP model have been proposed by different authors in different times. In this paper an insight into some of the firewall techniques are discussed and also an attempt has been made to portray different challenges that exist in the application traffic

    Plant based Biologically Inspired Intrusion Response Mechanism : An insight into the proposed model PIRIDS

    No full text
    Intrusion Detection Systems (IDS) are one of the primary components in keeping a network secure. They are classified into different forms based on the nature of their functionality such as Host based IDS, Network based IDS and Anomaly based IDS. However, Literature survey portrays different evasion techniques of IDS. Thus it is always important to study the responsive behavior of IDS after such failures. The state of the art shows that much work have been done on IDS on contrary to little on Intrusion Response System (IRS). In this paper we propose a model of IRS based on the inspiration derived from the functioning of defense and response mechanism in plants. The proposed model is the first attempt of its kind with the objective to develop an efficient response mechanism in a network subsequent to the failure of IDS, adopting plants as a source of inspiration
    corecore