6 research outputs found

    Packet Resonance Strategy: A Spoof Attack Detection and Prevention Mechanism in Cloud Computing Environment

    Get PDF
    Distributed Denial of Service (DDoS) is a major threat to server availability. The attackers hide from view by impersonating their IP addresses as the legitimate users. This Spoofed IP helps the attacker to pass through the authentication phase and to launch the attack. Surviving spoof detection techniques could not resolve different styles of attacks. Packet Resonance Strategy (PRS) armed to detect various types of spoof attacks that destruct the server resources or data theft at Datacenter. PRS ensembles to any Cloud Service Provider (CSP) as they are exclusively responsible for any data leakage and sensitive information hack. PRS uses two-level detection scheme, allows the clients to access Datacenter only when they surpass initial authentication at both levels. PRS provides faster data transmission and time sensitiveness of cloud computing tasks to the authenticated clients. Experimental results proved that the proposed methodology is a better light-weight solution and deployable at server-end

    An Efficient Interference Aware Partially Overlapping Channel Assignment and Routing in Wireless Mesh Networks

    Get PDF
    In recent years, multi-channel multi-radio wireless mesh networks are considered a reliable and cost effective way for internet access in wide area. A major research challenge in this network is, selecting a least interference channel from the available channels, efficiently assigning a radio to the selected channel, and routing packets through the least interference path. Many algorithms and methods have been developed for channel assignment to maximize the network throughput using orthogonal channels. Recent research and test-bed experiments have proved that POC (Partially Overlapped Channels) based channel assignment allows significantly more flexibility in wireless spectrum sharing. In this paper, first we represent the channel assignment as a graph edge coloring problem using POC. The signal-to-noise plus interference ratio is measured to avoid interference from neighbouring transmissions, when a channel is assigned to the link. Second we propose a new routing metric called signal-to-noise plus interference ratio (SINR) value which measures interference in each link and routing algorithm works based on the interference information. The simulation results show that the channel assignment and interference aware routing algorithm, proposed in this paper, improves the network throughput and performance

    Coefficient of Restitution based Cross Layer Interference Aware Routing Protocol in Wireless Mesh Networks

    Get PDF
    In Multi-Radio Multi-Channel (MRMC) Wireless Mesh Networks (WMN), Partially Overlapped Channels (POC) has been used to increase the parallel transmission. But adjacent channel interference is very severe in MRMC environment; it decreases the network throughput very badly. In this paper, we propose a Coefficient of Restitution based cross layer interference aware routing protocol (CoRCiaR) to improve TCP performance in Wireless Mesh Networks. This approach comprises of two-steps: Initially, the interference detection algorithm is developed at MAC layer by enhancing the RTS/CTS method. Based on the channel interference, congestion is identified by Round Trip Time (RTT) measurements, and subsequently the route discovery module selects the alternative path to send the data packet. The packets are transmitted to the congestion free path seamlessly by the source. The performance of the proposed CoRCiaR protocol is measured by Coefficient of Restitution (COR) parameter. The impact of the rerouting is experienced on the network throughput performance. The simulation results show that the proposed cross layer interference aware dynamic routing enhances the TCP performance on WMN

    An Enhanced Entropy Approach to Detect and Prevent DDoS in Cloud Environment

    Get PDF
    Distributed Denial of Service (DDoS) attack launched in Cloud computing environment resulted in loss of sensitive information, Data corruption and even rarely lead to service shutdown. Entropy based DDoS mitigation approach analyzes the heuristic data and acts dynamically according to the traffic behavior to effectively segregate the characteristics of incoming traffic. Heuristic data helps in detecting the traffic condition to mitigate the flooding attack. Then, the traffic data is analyzed to distinguish legitimate and attack characteristics. An additional Trust mechanism has been deployed to differentiate legitimate and aggressive legitimate users. Hence, Goodput of Datacenter has been improved by detecting and mitigating the incoming traffic threats at each stage. Simulation results proved that the Enhanced Entropy approach behaves better at DDoS attack prone zones. Profit analysis also proved that the proposed mechanism is deployable at Datacenter for attack mitigation and resource protection which eventually results in beneficial service at slenderized revenu

    A mathematical model with flexible negotiation strategies for agent based negotiations in dynamic e-commerce environments

    No full text
    In this paper, a mathematical model with flexible negotiation strategies for agent based negotiations is developed which can be applied suitably in bilateral/multilateral multi-issue negotiation environments. Unlike the existing approaches for offer value computation for the negotiation issues, this model considers not only the reservation values but also the offer values proposed in the preceding negotiation round. This approach for offer value computation enables the traders to reach consensus much quicker than the existing approaches. This model considers the compelling urge of the trader in buying/selling a product based on which the reservation values are adjusted automatically at the end of the negotiation process in order to reach consensus in a deal which is otherwise not possible. The formula devised in this model to determine the concession speed of each negotiation issue handles the dynamicity of the negotiation environment and reflects the importance of each negotiation issue from the traders’ perspective. The effectiveness of the proposed strategies is evaluated using various hypothetical cases representing the real-world negotiation scenarios in an e-commerce environment. The test results show that the proposed negotiation strategies are able to optimize the utility process and also improve the rate of reaching consensus in the negotiation process. Keywords: Software agent, e-Commerce negotiation, Bi-lateral, Multi-lateral, Multi-issu
    corecore