75 research outputs found

    Packet Resonance Strategy: A Spoof Attack Detection and Prevention Mechanism in Cloud Computing Environment

    Get PDF
    Distributed Denial of Service (DDoS) is a major threat to server availability. The attackers hide from view by impersonating their IP addresses as the legitimate users. This Spoofed IP helps the attacker to pass through the authentication phase and to launch the attack. Surviving spoof detection techniques could not resolve different styles of attacks. Packet Resonance Strategy (PRS) armed to detect various types of spoof attacks that destruct the server resources or data theft at Datacenter. PRS ensembles to any Cloud Service Provider (CSP) as they are exclusively responsible for any data leakage and sensitive information hack. PRS uses two-level detection scheme, allows the clients to access Datacenter only when they surpass initial authentication at both levels. PRS provides faster data transmission and time sensitiveness of cloud computing tasks to the authenticated clients. Experimental results proved that the proposed methodology is a better light-weight solution and deployable at server-end

    An Enhanced Entropy Approach to Detect and Prevent DDoS in Cloud Environment

    Get PDF
    Distributed Denial of Service (DDoS) attack launched in Cloud computing environment resulted in loss of sensitive information, Data corruption and even rarely lead to service shutdown. Entropy based DDoS mitigation approach analyzes the heuristic data and acts dynamically according to the traffic behavior to effectively segregate the characteristics of incoming traffic. Heuristic data helps in detecting the traffic condition to mitigate the flooding attack. Then, the traffic data is analyzed to distinguish legitimate and attack characteristics. An additional Trust mechanism has been deployed to differentiate legitimate and aggressive legitimate users. Hence, Goodput of Datacenter has been improved by detecting and mitigating the incoming traffic threats at each stage. Simulation results proved that the Enhanced Entropy approach behaves better at DDoS attack prone zones. Profit analysis also proved that the proposed mechanism is deployable at Datacenter for attack mitigation and resource protection which eventually results in beneficial service at slenderized revenu

    Lattice structural analysis on sniffing to denial of service attacks

    Get PDF
    Sniffing is one of the most prominent causes for most of the attacks in the digitized computing environment. Through various packet analyzers or sniffers available free of cost, the network packets can be captured and analyzed. The sensitive information of the victim like user credentials, passwords, a PIN which is of more considerable interest to the assailants’ can be stolen through sniffers. This is the primary reason for most of the variations of DDoS attacks in the network from a variety of its catalog of attacks. An effective and trusted framework for detecting and preventing these sniffing has greater significance in today’s computing. A counter hack method to avoid data theft is to encrypt sensitive information. This paper provides an analysis of the most prominent sniffing attacks. Moreover, this is one of the most important strides to guarantee system security. Also, a Lattice structure has been derived to prove that sniffing is the prominent activity for DoS or DDoS attacks

    Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks

    Full text link
    [EN] Intrusion detection system (IDS) is regarded as the second line of defense against network anomalies and threats. IDS plays an important role in network security. There are many techniques which are used to design IDSs for specific scenario and applications. Artificial intelligence techniques are widely used for threats detection. This paper presents a critical study on genetic algorithm, artificial immune, and artificial neural network (ANN) based IDSs techniques used in wireless sensor network (WSN)The authors extend their appreciation to the Distinguished Scientist Fellowship Program(DSFP) at King Saud University for funding this research.Alrajeh, NA.; Lloret, J. (2013). Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks. International Journal of Distributed Sensor Networks. 2013(351047):1-6. https://doi.org/10.1155/2013/351047S16201335104

    Transmission and immunopathology of the avian influenza virus A/Anhui/1/2013 (H7N9) human isolate in three commonly commercialized avian species

    Get PDF
    H7N9 virus infection is a global concern, given that it can cause severe infection and mortality in humans. However, the understanding of H7N9 epidemiology, animal reservoir species and zoonotic risk remains limited. This work evaluates the pathogenicity, transmissibility and local innate immune response of three avian species harbouring different respiratory distribution of α2,6 and α2,3 SA receptors. Muscovy ducks, European quails and SPF chickens were intranasally inoculated with 105 embryo infectious dose (EID)50 of the human H7N9 (A/Anhui/1/2013) influenza isolate. None of the avian species showed clinical signs or macroscopic lesions, and only mild microscopic lesions were observed in the upper respiratory tract of quail and chickens. Quail presented more severe histopathologic lesions and avian influenza virus (AIV) positivity by immunohistochemistry (IHC), which correlated with higher IL‐6 responses. In contrast, Muscovy ducks were resistant to disease and presented higher IFNα and TLR7 response. In all species, viral shedding was higher in the respiratory than in the digestive tract. Higher viral shedding was observed in quail, followed by chicken and ducks, which presented similar viral titres. Efficient transmission was observed in all contact quail and half of the Muscovy ducks, while no transmission was observed between chicken. All avian species showed viral shedding in drinking water throughout infection.info:eu-repo/semantics/acceptedVersio

    Totally vertex-magic cordial labeling

    No full text

    A totally magic cordial labeling of one-point union of n copies of a graph

    Get PDF
    A graph G is said to have a totally magic cordial (TMC) labeling with constant C if there exists a mapping ƒ : V (G) ∪ E(G) → {0, 1} such that ƒ(a)+ ƒ (b)+ ƒ(ab) ≡ C(mod 2) for all ab ∈ E(G) and [formula], where nƒ(i) (i = 0, 1) is the sum of the number of vertices and edges with label i. In this paper, we establish the totally magic cordial labeling of one-point union of n-copies of cycles, complete graphs and wheels

    Ubiquitous computing and computing security of IoT

    No full text
    corecore