Anomaly Detection through Firewall Policies and Vampire Attacks
|
|
|
- Hester Jones
- 10 years ago
- Views:
Transcription
1 Anomaly Detection through Firewall Policies and Vampire Attacks BharathyVijayan Mtech Computer Science And Engineering LourdeMatha College Of Science And Technology Trivandrum,India Abstract- Network survivability is the ability of a network keeping connected under failures and attacks, which is the most important issue in the design and performance of wireless ad hoc sensor networks. This paper explores resource consumption attacks called Vampire attacks which permanently disables the whole network by quickly draining nodes battery. Detecting vampire attacks in the network is not an easy task. A simple vampire present in the network can increase the network wide energy usage. These vampire attacks are not protocol specific, but rather rely on the properties of many popular classes of routing protocols. The paper projects its focus on the way in which the attack can be overcome in the best possible way. On the basis of a rule based classification, detection of anomalies is done in a better manner. The proposed system describes the detection of anomalies through firewall policies and vampire attacks and thus make the network live. This enhanced workincreases the quality of service in the network and it will regulates all the nodes activity in the network. Key words : Denial of service, security, routing, ad-hoc networks,sensor networks, wireless networks,etc... 1.INTRODUCTION A wireless ad hoc sensor network consists of a number of sensors spread across a geographical area. Each sensor has wireless communication capability and some level of intelligence for signal processing and networking of the data. Sensors are spread in an environment without any predetermined infrastructure and cooperate to execute common monitoring tasks which usually consist in sensing environmental data from the surrounding environment. Ad-hoc Wireless Sensor Networks consist of sensors which are distributed in an ad hoc manner. The sensor nodesperforms the sensing tasks. These are interconnected with the wireless links. Every sensor is operational with some sensing, processing and communication components. Thus, when some event occurs (to be captured by sensor) it generates a report. This report is then forwarded to the sink; by some routing path over the network. Nowadays, Wireless sensor network is part of our day to day life.adhoc mode is a method for wireless devices to directly communicate with each other. Operating in adhoc mode allows all wireless devices within the range of each other to discover and communicate in peer to peer fashion without involving central access points. An adhoc wireless sensor network is a decentralized type of wireless network. The network is adhoc because it does not rely on any pre-existing infrastructure,suchas router in wired networks or access points in managed (infrastructure) wireless networks. Instead, each node participates in routing by forwarding data to other nodes, so the determination of which nodes forward data is made dynamically on the basis of network connectivity. An adhoc network tends to feature a small group of devices all in very close proximity to each other. An adhoc network can also be defined as any set of networks where all devices have equal status on a network and are free to associate with any other adhoc network device in link range. Ad hoc network typically refers to a mode of operation of IEEE wireless networks. Wireless networks are vulnerable to security attacks. This is due to the broadcast nature of the transmission medium.wireless sensor networks are susceptible to attacks and threats such as eavesdropping or passive information gathering,node malfunctioning, denial of service(dos),malicious discovery attack and many more. WSNs are highly vulnerable to the DoS attacks because of their Ad-Hoc nature. A great deal of research has been done to increase the survivability of these networks.the longest DoS attack will drain the batteries of all nodes. In this type of resource depletion attack, the focus of attack is on the battery power. As battery is one of the main resource of any sensor node,such battery depletion attack is always dangerous as it drain all the power of the network.so preventing such attacks is very necessary. During attacks by malicious nodes, the node s energy expenditure increases drastically thereby leading to its energy depletion making the node incapable of transmission in future. Energy is one of the most precious 2015, IRJET - All Rights Reserved ISO 9001 : 2008 Certified Journal Page 1693
2 resource for sensor networks. Communication is especially expensive in terms of power. The battery power consumption attacks at routing layer protocol will completely disable networks by depleting node s battery power and is defined as vampire attacks. These attacks never flood the network with large amount of data, instead it drains node s life by delaying the packets. Vampire attack means creating and sending messages by malicious node which causes more energy utilization by the network leading to slow reduction of node s battery life.this attack is not particular to any protocol. These attacks also do not rely on flooding the network with large amounts of data, but rather try to transmit as little data as possible to achieve the largest energy drain, preventing a rate limiting solution.since vampires use protocol compliant messages, these attacks are very difficult to detect and prevent. 1.1 PROBLEM OBJECTIVE The objective of this paper is to formulate an anomaly detection method through vampire attacks and firewall policies that helps to deplete the energy consumption of adhoc wireless network and increases the network lifetime. 1.2 PROBLEM MOTIVATION The life of the wireless adhocsensor network depends on nodes battery power.but batteryrecharging or replacing is impossible in most of the application.as a result power drainage will leads to the failure of the node and it will also affect the network.sometimes data loss may also occur. Therefore an efficient energy utilization scheme is required.it means that data packets should be transmitted by using minimum units of energy.but some malicious packets called vampire packets may consume more energy for packet forwarding than that of honest packet forwarding.this will lead to power drainage of node and network failure. If it is possible to find and avoid these type of malicious packets, then we can increase the life of the node and thereby the network.this inturn will be very crucial in many of the situations and will increase the wide acceptability of adhoc wireless networks in many important applications. 2.RELATED WORK Michael Brownfield [1] discussed the energy resource vulnerabilities at MAC level. Denying sleep effectively attacks each sensor node's critical energy resources and rapidly drains the network's lifetime.so a new GMAC protocol is proposed to control the sleep awake pattern of sensor nodes. G-MAC has several energy saving features which not only show promise in extending the network lifetime, but the centralized architecture makes the network more resistant to denial of sleep attacks. This scheme performs well in all traffic situations but deals only with MAC layer depletion attack. FatmaBouabdullah, NizarBouabdullah, RaoufBouabdullah [2] proposed a cross layer strategy that considers routing and MAC layers jointly. A network lifetime is time for the first node in wireless sensor network to fail. An efficient routing protocol would drain energy slowly and uniformly among nodes leading to the death of all nodes nearly at same time. At routing level they proposed that sending data through multiple paths instead of using a single path so can balancing energy consumption. At MAC level limits the retransmission over each wireless links according to its property and the required packet delivery probability, but this scheme does not considers any attack. XufeiMao,ShaojieTang,XiahuaXu,HuadongMa[3] focused on opportunistic method to minimize energy consumption by all nodes but this method does not consider any attack at routing level. Opportunistic routing is based on the use of broadcast transmission to expand the potential forwarders that can assist in the retransmission of data packets. By this method nodes in the forwarder list are prioritized and the lower priority forwarder will discard the packet if the packet has been forwarded by a higher priority forwarder. Adversaries who use a small number of packets i.e. protocol compliant in which intelligent packetdropping strategies can degrade performance of TCP streams traversing those nodes. Adversaries are also protocolcompliant in the sense that they use well-formed routing protocol messages. They either produce messages when honest nodes would not used, or send packets with protocol headers different from what an honest node would produce in the same situation. GergelyAcs, LeventeButtyan and IstvanVajda[4]proposed a Provably Secure On-Demand Source Routing In Mobile Ad Hoc Networks. Routing is one of the most basic networking functions in mobile ad hoc networks. Hence, an adversary can easily paralyze the operation of the network by attacking the routing protocol. These attacks clearly demonstrate that flaws can be very subtle, and therefore, hard to discover by informal reasoning. It proposes a mathematical framework in which security can be 2015, IRJET - All Rights Reserved ISO 9001 : 2008 Certified Journal Page 1694
3 precisely defined, and routing protocols for mobile ad hoc networks can be analyzed rigorously.regarding the capabilities of the adversary, it can mount active attacks i.e., it can eavesdrop, modify, delete, insert, and replay messages from corrupted nodes that have the same communication capabilities as the nodes of the honest participants in the network.a problem with the protocol, and often, one can construct an attack by looking at where the proof failed. Many researchers, and several secure routing protocols have been proposed for ad hoc networks. However, the securities of those protocols have been analyzed either by informal means only, or with formal methods that have never been intended for the analysis of this kind of protocols. These attacks clearly demonstrate that flaws can be very subtle, and therefore, hard to discover by informal reasoning. Consequently, it is also difficult to gain sufficient assurances that a protocol is free of flaws. The approach of verifying the protocol for a few numbers of specific configurations can never be exhaustive, and thus, it is far from being satisfactory as a method for security analysis. Tuomas Aura, PekkaNikander, JussipekkaLeiwo[5] proposed dos-resistant Authentication With Client Puzzles.Public-key authentication does not completely protect against the attacks because the authentication protocols often leave ways for an unauthenticated client to consume a servers memory space and computational resources by initiating a large number of protocol runs and inducing the server to perform expensive cryptographic computations. A solution to such threats is to authenticate the client before the server commits any resources to it. The authentication, however, creates new opportunities for DOS attacks because authentication protocols usually require the server to store session-specific state data, such as nonce, and to compute expensive public-key operations. It shows how stateless authentication protocols and the client puzzles of Juels and Brainard can be used to prevent such attacks. The protocol is that the route maintenance mechanism does not locally repair a broken link. Stale route cache information could also result in inconsistencies during the route reconstruction phase. The connection setup delay is higher than in table-driven protocols. Even though the protocol performs well in static and low-mobility environments, the performance degrades rapidly with increasing mobility. Also, considerable routing overhead is involved due to the source-routing mechanism employed in DSR. This routing overhead is directly proportional to the path length. 3.PROBLEM DEFINITION Wireless ad-hoc networks are particularly vulnerable to denial of service (DoS) attacks due to their ad-hoc organization, and a great deal of research has been done to enhance survivability. Energy is the most precious resource for sensor networks The vampire attack is a genuine issue in remote sensor systems.vampire attack can be defined as the composition and transmission of a message that causes more energy to be consumed by the network than if an honest node transmitted a message of identical size to the same destination, although using different packet headers. Vampire attack happens in the network in the sense, any of the nodes in the network which is affected or infected and this nodes behavior is abruptly changing for the network behavior, this kind of nodes are called malicious nodes. If any malicious nodes are present in the network then the energy that have been used by each and every nodes will increases drastically. Energy usage is measured for the minimum number of packets required to deliver a single message. Here two variations of vampire attacks are described.in the first type of attack, an adversary or malicious node composes packets with purposely introduced routing loops.it is called the routing loop attack and it targets source routing protocols by exploiting the limited verification of message headers forwarding nodes, allowing a single packet to repeatedly traverse the same set of nodes. Fig -3.1: Routing Loop Attack Figure3.1 shows routing loop attack in which normal path is source->a->b->c->d->e->sink. After attack introduces loops in a route,then route becomes source->a->b>c->d- >E->F->A->B->C->D->E->F->A->B->C->D->E->sink.Energy required by the node A, B,C, D, E is doublethe normal energy. 2015, IRJET - All Rights Reserved ISO 9001 : 2008 Certified Journal Page 1695
4 In the second type of attack, also targeting source routing, an adversary or a malicious node constructs artificially long routes while traversing every node in the network.it is called the stretch attack, since it increases packet path lengths, causing packets to be processed by a number of nodes that is independent of hop count along the shortest path between the adversary and packet destination. This is one of the major problem of the network where energy consumption of each and every nodes in the network will be increasing. Fig -3.2: Stretch Attack Figure 3.2shows normal route and alsoroute caused by attack. Dotted lines shows normal route path (source->f- >E->sink) and other line shows infected route path (source->a->b->c->d->e->sink). The impact of these attacks can be further increased by combining them, increasing the number of adversarial nodes in the network, or simply sending more packets. The main characteristics of this type of attackers are its not easily identified if it attacked or affected the network, it will take some long time to identify and make ensure that it presented in the network. 4.EXISTING SYSTEM In the existing system a methodology is proposed to increase the energy efficiency of the network and protection from vampire attack. For increasing energy efficiency of the network, an FDPM(Flexible Deterministic Packet Marking) algorithm is used. The FDPM algorithm is proposed to address the vampireattack.fdpm algorithm reduces the energy usage of the networks by avoiding vampire attacks and thus increases the network life time.the algorithm is used for secure and reliable data transfer.it does secure forwarding of packet to destination posture of the node. 4.1 METHODOLOGY In this work,a layered approach is used to solve the problem with the vampire attacks.malicious packets (vampire packets) are monitored both in network layer and in the application layer. The checking performed in network layer helps to point out the vampire packets from the network and the checking done in the application layer helps to find out the vampires inside the running processes (ie, inside the node). Whenever an incoming packet is detected as a vampire then the packet will not be forwarded and it will be discarded. Whenever a vampire is detected inside the node thenwe can simply eliminate it.the system concentrates on a secure data transmission from the adversary nodes in the sensor network. In order to build a secure network, the network should be an extinct to adversary nodes.therefore an energy constraint anomaly detection method is used to detect the malicious nodes from the network. During the deployment of the network almost all nodes have the same energy. The energy or power of nodes is used for transmission or forwarding of data packets. Thus there will be a small variation in energy level of nodes. In the presence of vampire attack, it causes more energy to be consumed than a network with normal node does for the same processing and forwarding. Thus it makes the energy of whole network very much low.energy constrained anomaly detection is based on the concept of energy level. It works on the fact that the malicious nodes will have abnormally high energy than legitimate nodes.a technique called Entropy Estimation is proposed to provide a flexible and fast approach to estimate the baseline distribution. Entropy estimation is a framework for obtaining a parametric probability distribution model from the training data and a set of constraints on the model. Entropy estimation produces a model with the most uniform distribution among all the distributions satisfying the given constraints. A mathematical metric of the uniformity of a distribution P is its entropy: 2015, IRJET - All Rights Reserved ISO 9001 : 2008 Certified Journal Page 1696
5 Let be the set of packet classes and given a sequence of packets S = (x 1,x 2 x n) as the training data, the empirical distribution over in this training data is where 1(X) is an indicator function that takes value 1 if X is true and 0 otherwise.the nodes whose energy level has exceeded threshold value other than normal nodes is considered to be malicious nodes and will undergoes a vampire attack. Thus the energy of all the nodes are calculated and the node with abnormally high energy is detected as malicious node. Maximum nodes have an average energy level in certain range,and due to the nature of vampire nodes they have an abnormal energy level.by the proposed anomaly detection method we can calculate the threshold value and energy level of all nodes after every data iteration process. The proposed energy level constraint anomaly detection method efficiently detects the malicious nodes from the network, and by detecting those affected nodes we can form the secure network with authenticated data transmission. After the malicious nodes are detected,it will be represented graphically. Malicious nodes will be represented in green color and normal nodes will be represented in blue color. It will also give options to display the port scanning details. Algorithm If(load of router R>threshold Lmax) do not mark any packets turn on congestion control mechanisms else if(load of router R>threshold Lmin) turn on flow based marking at R,edge interface A, in network N for each incoming packet p check npkts with same destination address of p from T if(npkts==0,means no such flow in T) add a new entry in T,set its npkts=1 else npkts++ insert packet p into Q calculate marking probability Pa with probability Pa mark the packet (encoding procedure) if Q is full dequeue else mark all the packets at R,edge interface A,in network N 4.2ADVANTAGES Protection from vampire attacks Secure level is high Boost up the battery power Save adhoc wireless nodes from power drainage due to vampire attacks Ease of use 4.3DISADVANTAGES The method does not provide a control on the respective IPs. 5.PROPOSED SYSTEM In the proposed system,arule based classification is proposed to identify policy anomalies.it generates a new ruleset and on the basis of a new ruleset, it does rule based classification so that we can have a control on the respective IPs and thus make the network live.the proposed method aims in anomaly detection through firewall policies.here we decide which packets to allow to go through or to drop based on a set of rules defined by the administrator.it comprisesa list of ordered filtering rules that define the actions performed on matching packets. A rule comprises of network field such as protocol type, source IP address,destination IP address, source port and destination port, and an action field.actions are either to accept, which passes the packet into or from the secure network, or to deny, which causes the packet to be discarded. If the packet header information matches all the network fields of this rule,then the corresponding packets are retrieved and if there occurs any redundancy in the packet or if a particular node is considered as malicious then immediately a warning message appears. 2015, IRJET - All Rights Reserved ISO 9001 : 2008 Certified Journal Page 1697
6 scanning module identifies open ports and services available on a network host. Port scan details can be retrieved by continuously monitoring all open ports in the node Packet monitoring System Fig -5.1: Proposed System Architecture In the packet monitoring module, in order to detect vampires from the network, an ad-hoc sensor network is needed to create. The vampire detection system can be installed in a node as an administrative tool. The IP addresses of all the nodes in the network are needed to retrieve.analysis of TCP,UDP,DNS and ICMP headers will be done for packet monitoring. After monitoring all the incoming packets,the packets will pass through the anomaly detection system. On the basis of anomaly behavior, if an anomaly is present, an attack will be detected and the corresponding IP address of the malicious packet can be retrieved. File monitoring system Algorithm 1: Input: 2: U:the universal character set; 3: M:the number of independent character sets; 4: W(c):the weight of character c; 5: Output: 6: independent character sets U 1,,U M; 7: residual character set U M+1; 8: U k:= 9: W(U k) :=0(k=1,.M);initialize the weight of set U k 10: Sort U in decreasing order of the character weight. 11: If U is empty,return (U k)(k=1,..m+1)); 12: From U select the character c with the largest weight 13: Select the set U with the smallest weight among sets U 1, U M whose characters are all independent of c.if there is more than one such set,select the first one. If no such set is found,put c into set U M+1, remove c from set U and go to step : c into set U ;remove c from set U;W(U )+=W(c); Go to step MODULE DESCRIPTION Port Scanning system In the port scanning module, the main aim is to check the status of the ports. After scanning the IP address and port number, system process details can be retrieved. The port All the activities such as creation, editing and deletion of the files are monitored to find application layer vampires. Normally if an anomaly is present, then the normal rate of these processes will be altered. The file editing and deleting rate will increase drastically and file creation rate will decrease.consumption of memory will also increase in an abnormal fashion.here a File SystemWatchercomponent is used to monitor a file system and react when changes to the directories or files it contains occur. This makes it possible for us to quickly and easily launch business processes when certain files or directories are created, modified, or deleted. For example, suppose you and a group of coworkers are collaborating on a document that is stored on a shared directory on your server. Using an instance of the FileSystemWatcher component, you can program your application to watch for changes to the contents of that shared directory. We can configure the component to watch either an entire directory and its contents or a specific file or set of files within a given directory. The FileSystemWatcher component raises an event whenever a file or subdirectory within the specified root directory is created, deleted, renamed, or changed in some other way. The types of changes that the component monitors include changes in the file's or subdirectory's attributes, size, last write time, last access time, and security settings. Graphical analysis of energy consumption 2015, IRJET - All Rights Reserved ISO 9001 : 2008 Certified Journal Page 1698
7 In this module,nodes consuming more energy will be shown in green color and the normal nodes will be shown in blue color.nodes consuming more energy will be blacklisted and its IP address will be made off, so that others will gain more energy. Ruleset Generation According to a specific protocol,we will be creating our own set of rules so that we can have a control on the respective IPs.It focusses on creating our own set of rules to identify policy anomalies.a rule can be defined as a set of criteria and an action to perform when a packet matches the criteria.the criteria of a rule consist of rule number,sourceipaddress,destinationipaddress,action,prot ocol,source Port,Destination Port. Therefore a complete rule may be defined by the ordered tuple <Rule Number, Protocol, Source IP, Source port, Destination IP, Destination port, Action>.The rules are in the form of a criteria and an action to take place if any packet matches the criteria.actions are usually allow and deny.when a specific rule is to be created,an add rule button is to be clicked.similarly when a specific rule is to be deleted,the delete rule button is to be clicked. Table -6.1: Comparison of existing and proposed method Existing Method Proposed method (Rule Based) Trace Length (seconds) Number of packets Avg packet rate(per second) TCP Packets UDP Packets Anomaly Detection rate When number of packet increases the rate of anomaly detection also increases. Table : Ruleset Generation ebased Classification Rul We implement the Security policy of the network by deciding which packets to let through based on a specific set of rules. A policy consist of a sequence of rules that defines the actions performed on packets that satisfy certain conditions.the rules are specified in the form of a <condition,action>.a condition in a rule is composed of a set of fields to identify certain type of packets matched by this rule.if any duplication in the packet arrives or if a particular IP is considered as malicious,immediately a warning message will occur. 6.COMPARISON AND ANALYSIS Chart -1: Analysis Of Existing And Proposed System 7.CONCLUSION In this paper a detection and control method is introduced for the vampire attacks.the proposed methodology can be implemented as four phases, network layer vampire detection, Applicationlayer vampire detection, Vampire handling and entropy and port scan details. By using all these concepts the system is made more secure against the vampire attacks. Methods are there to detect the 2015, IRJET - All Rights Reserved ISO 9001 : 2008 Certified Journal Page 1699
8 vampires from the network and inside the node. By using FDPMAlgorithm the packets can be safely forwarded in a network. This scheme provides high level of security against the vampire attacks.also by rule based classification detection of anomalies is done in a better manner. REFERENCES [1] David R. Raymond, Randy C. Marchany, Michael I. Brownfield, and Scott F. Midkiff, Effects of denial-of-sleep attacks on wireless sensor network MAC protocols (2009). [2]FatmaBouabdullah, NizarBouabdullah,RaoufBouabdullah Cross-layer Design for Energy Conservation in Wireless Sensor Networks, IEEE GLOBECOM 2008,New Orleans,USA,December [3] XufeiMao,Shaojie Tang, XiahuaXu, Energy efficient Oppurtunistic Routing in Wireless Sensor Networks, IEEE transactions on parallel and distributed systems, VOL. 12, NO. 2, February 2011 [4] GergelyAcs, LeventeButtyan, and IstvanVajda, Provably secure ondemand source routing in mobile ad hoc networks, IEEE Transactionson Mobile Computing 05 (2006), no. 11 [5] NTuomas Aura, Dos-resistant authentication with client puzzles, International workshop on security protocols, [6] ImadAad, Jean-Pierre Hubaux, and Edward W. Knightly, Denial of service resilience in ad hoc networks, MobiCom, BIOGRAPHIES BharathyVijayan received B.Tech degree from M.G College Of Engineering,Kerala and currently pursuing M.Tech in Computer Science & Engineering at LourdeMatha College of Science &Technology,Kerala.Her areas of interest include Mobile Computing & Data mining. 2015, IRJET - All Rights Reserved ISO 9001 : 2008 Certified Journal Page 1700
Vampire Attack Detecting and Preventing in Wireless Sensor Network
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 4, July 2014, PP 306-310 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Vampire Attack Detecting and Preventing in
Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network
Review of Prevention techniques for Denial of Service s in Wireless Sensor Network Manojkumar L Mahajan MTech. student, Acropolis Technical Campus, Indore (MP), India Dushyant Verma Assistant Professor,
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
SECURE ROUTING PROTOCOL IN SENSOR NETWORK FOR VAMPIRE ATTACK
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 45-50 Impact Journals SECURE ROUTING PROTOCOL IN
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
How To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Denial of Service in Sensor Networks
Denial of Service in Sensor Networks Authors : From: Anthony D. Wood John A. Stankovic University of Virginia Presented by: Luba Sakharuk Agenda for the DOS in Sensor Networks Abstract Theory and Application
SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)
SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) Neha Maurya, ASM S IBMR ABSTRACT: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
ΕΠΛ 674: Εργαστήριο 5 Firewalls
ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare ([email protected]) Suvesh Pratapa ([email protected]) Modified by
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
Scaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation 1 Doddapaneni.krishna Chaitanya, 2 Ghosh.Arindam Middlesex University Abstract Evaluation of Wireless Sensor Networks
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized Internet users
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
10CS64: COMPUTER NETWORKS - II
QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
Introduction to Wireless Sensor Network Security
Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
Safeguards Against Denial of Service Attacks for IP Phones
W H I T E P A P E R Denial of Service (DoS) attacks on computers and infrastructure communications systems have been reported for a number of years, but the accelerated deployment of Voice over IP (VoIP)
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management
Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S [email protected], k [email protected],[email protected] Department of Computer Science,
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology [email protected] Abstract intrusion detection
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks
Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks Authors: Yih-Chun Hu, Adrian Perrig, David B Johnson Presenter: Sameer Korrapati Date: 4/21/2003 Overview of presentation Introduction :
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
An Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK
DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK M.Yasodha 1, S.Umarani 2, D.Sharmila 3 1 PG Scholar, Maharaja Engineering College, Avinashi, India. 2 Assistant Professor,
Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015
Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan April 23, 2015 1 / 24 Secure networks Before the advent of modern telecommunication network,
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
FIREWALLS IN NETWORK SECURITY
FIREWALLS IN NETWORK SECURITY A firewall in an information security program is similar to a building s firewall in that it prevents specific types of information from moving between the outside world,
What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services
Firewalls What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services only authorized traffic is allowed Auditing and
DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK
DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK ABSTRACT Dr. Sanjeev Dhull Associate Professor, RPIIT Karnal, Dept of Computer Science The DoS attack is the most
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks
Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks B. MALARKODI, B. VENKATARAMANI AND X.T. PRADEEP Department of Electronics and Communication Engineering National
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
Survey on DDoS Attack Detection and Prevention in Cloud
Survey on DDoS Detection and Prevention in Cloud Patel Ankita Fenil Khatiwala Computer Department, Uka Tarsadia University, Bardoli, Surat, Gujrat Abstract: Cloud is becoming a dominant computing platform
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Secure SCTP against DoS Attacks in Wireless Internet
Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea [email protected] Abstract. The Stream Control Transport Protocol
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)
ISCA Journal of Engineering Sciences ISCA J. Engineering Sci. Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS) Abstract Tiwari Nitin, Solanki Rajdeep
ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
Keywords Attack model, DDoS, Host Scan, Port Scan
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com DDOS Detection
