STUDY OF COMPUTER NETWORK ISSUES AND IMPROVISING DROP RATE OF TCP PACKETS USING NS2
|
|
|
- Simon Owen
- 10 years ago
- Views:
Transcription
1 STUDY OF COMPUTER NETWORK ISSUES AND IMPROVISING DROP RATE OF TCP PACKETS USING NS2 Shweta Gambhir 1 and Kuldeep Tomar 2 1 Department of Computer Engineering, NGF Engineering College & Technology, Palwal, Haryana 2 Department of Computer Engineering, MRIU, Faridabad, Haryana ABSTRACT As the enormous use of internet increases day by day so as security concern is also raise day by day over the internet. In this paper we discuss the network security and its related threats and also study the types of protocols and few issues related to protocols in computer networks. We also simulate the design of 5 node wired network scenario, its packet drop rate analysis through TCP protocol using NS2 as a simulator. Analyzed the performance of 5-node network when the packet is drop down by graphical method also called as Xgraph when rate parameter is in mb and also analyzed the performance of same network by changing the value of rate parameter at same time so no packets would drop down at same time and also analyzed the performance by Xgraph method. KEYWORDS Network Security, Protocols, NS2, Packet flow, TCP 1. INTRODUCTION In Today s world the use of Internet is growing considerably day by day in the scope and there are so many results revealed for the functional requirement of the internet which is in the form of number of new protocols and so many designed algorithms. These functional requirements include security, QOS (quality-of-service), policies, mobile networking etc. these algorithms and protocols growth gives the solution of so many problems for today s world of internet. Several protocols like SIP, HTTP, UDP, ICMP, TCP, RIP etc. expansion gives us privacy and also secure our data on the internet. In real world till now there are number of algorithms and protocols developed and designed (also by simulator) to cover the operational needs of internet but they certain have some shortcomings. There are so many simulator tools developed and evolved to test the work of real environment but they still have certain limitations because by using the different approaches such as the use of several topologies and another one is lot of traffic generation on the network make simulator task difficult. In about 1991 internet gains popularity and now become a part of our real world. As we know that there are number of application users who used internet or they have number of so many task. Different internet user use the range of internet as for watching movie and Television, serials, news etc. by the help of many internet service provider(isp) who offers the large range of IP addresses to their users by two mediums as telephone lines or by wireless network as USB. There are so many companies that provide these kinds of services and through these services user share their data and files over the internet, however for using these kinds of DOI: /ijfcst
2 applications user needs range of high bits for transmitting large file, which consume network bandwidth. Although the ISP (internet service provider) has some limited range of IP address due to this reason some users share common or same bandwidth range on the Internet so this is the network where the demand is higher than the capacity. This causes network congestion or negative impact, on the data transmission rate and quality from the user perspective. The major part of the Internet is designed to forward data with equal priority, independent on the data source and destination. 2. LITERATURE REVIEW As in [1] the study of TCP in NS-2 in which they worked on different formulae to calculate the performance of TCP in NS-2 and also gave installation steps for NS-2.we study about the 4 types of traffic and two protocols (TCP,UDP) how to create the topologies and network components. With NS-2 they design the wired network, wireless network and their performance analysis by graphical method [2]. As we know that the NS-2 is open source tool and widely used for network simulation area and there are different kind of traffic is generated for the different type of packets so this traffic and its parameters calculate the overall TCP/UDP packet drop rate by different methods such as by calculating the throughput by running AWK, perl script etc. in NS-2 as Dr. Neeraj Bhargava and Dr. Ritu Bhargava, Anchal kumawat, Bharat Kumar calculate the performance of TCP throughput by different parameters of simulation they use VBR traffic which is generate the video traffic at source to destination in form of packet as in [3]. They analyse the performance using both the tools Xgraph and Gnuplot. These both are the tools of NS-2 which shows the performance of network project graphically. We analysed the performance by Xgraph method in this paper. Up to this study of NS-2 and how well it works on the wired network and calculates its performance or throughput using different simulation tools and traffic generators. Now we will study about the integrating the agents and its combined security and integrity work on the wired, wireless and on sensor network using NS-2 as a network simulator they work well in the area of security how to encrypt and decrypt the data so it provide the security to data or information in the network [4].As so ever there are so many projects and research work is done under the area of wired and wireless network by using simulator NS-2.As NS-2 is also used as the REAL simulator in between year NS-2 is widely used for security purpose and for doing simulation before using it as real world. We work in area of TCP packet when it will drop and when it will not drop in this paper using NS Comparative Analysis Mr. Ajay Singh and Dr. Pankaj Dashore did well in their paper as in [5]. But they only analyze the packet flow, how packets come from source to destination through the router node and analyze its drop rate using Xgraph tool in NS-2 but we analyzed packet flow and drop rate as well as we improvise the packet drop rate we also explain how the packet drop rate is improvised and no packet would drop down at same time by altering the rate parameter of Exponential traffic. 3. TYPES OF NETWORK 3.1. Wired Network Generally, physical connection between the two or more networks is a wired network. In wired network the data sent from one computer to another or one network to other networks through physical link or medium as ETHERNET cables etc. It is one way or two way interactions between two users and this is broadcast by wired method such as Ethernet cables or by optical cables etc. we can transfer the information from one computer to other via cables means data transmit by physical medium only. Security is key concerning issue over the internet, internet addicted world 86
3 or in almost all organizations. There are so many methods introduced through which we will secure our network. What are the threats and how to overcome threats by given methods are discussed in section 4,5,7 and 8 how to secure the network through unintended user who access the authorized and authenticated information by different routing protocols mechanism or by other protocol blocking mechanism as from concern issue. We consider any of method which provides security to wired scenario and in Network Simulator NS2, with that methods information will be secured for wired and wireless network by generating different-2 types of traffic and their parameters Wireless Network Internet is described as network of networks and Network defined as a network of devices through which two or more network interacts by using wireless technologies usually as mobiles, USB, Broadcasting medium. These are the some methods to provide interaction between two or more medium as Television, radio, cell phones. As cell phones called as wireless phones is a twoway interaction method for transmitting the data. Telecommunication is also the type to interact in the network. Wireless communication is the mean of transmitting the information and without the use of wires.wireless Network communication refers to any type of computer or devices (for examples Access point, wireless Router) that is commonly associated for communications over wireless network to its interconnected nodes. This is also the Network security concerning issue all most all organizations which refers the wireless communication. Ad-Hoc network and Bluetooth are small type wireless devices through which data is transmit to one-to-many and it is also the security issue when someone hack the data via Bluetooth on the wireless network. The extensive fear over network is that when security is breaches due to the connectivity of one device to many on the network. Information security means that protecting information and information systems from any misuse, disruption, inspecting, eavesdropping, unauthorized access, perusal, recording or destruction disclosure, modification, Authenticating by unauthorized user. All these aspects are interrelating to each other and each of them has common goals and understanding of how to protect the integrity, confidentiality, availability etc. and however they have some differences in their work. Wireless Networks can be classified into some categories depending on different criteria (e.g. size of the physical area that they are capable of covering and domain of their use).the Wireless network work with almost many kind of network area as we know about them as DAN, WAN, PAN, MAN etc. The term computer security, network security, information/data security are used interchangeably in the computer world. The main focus is on the security of the data and provides privacy and confidentiality service to their end users. And NS2 is a best tool which provides security mechanism to wireless network and there are so many way through which network is secured on network. 4. SECURITY All security system must provide a pack of security functions that offers the secrecy to the system on the network. The secrecy of data on the computer network is generally referred as security system. These goals can be listed in the following main categories: Integrity, Authentication, Confidentiality, Access control and Availability etc. The main method is used to give security from Eavesdropping of data is Encryption which uses the cryptography algorithms [6] which is divided in two parts symmetric and second is asymmetric. There are so many methods or algorithms used today for encrypting or decrypting the data through which data/information is arranged systematically, and even through which data is encrypted one by one at sender side and same process of decryption of the data is also revised by same public key and different private key at receiver side. By using the different numbers of methods of cryptography we can secure our data. One is Symmetric which include DES [7], 87
4 (RC5) [8] and AES [9] methods to encrypt data and to send that encrypted data securely on network and asymmetric techniques that are used to encrypt and decrypt the data by algorithm RSA[10], Diffie-Hellman [11]. Now a day s big data is also arranged on the internet and sharing of data is needed due to so many users or communication mechanism, privacy of data is also needed due to cyber attacks [12]. Cyber security, big data and its privacy are the major concern in the security region and there are so many researchers doing work on how to secure this big data and from cyber attacks. 5. ISSUES IN COMPUTER NETWORK Recently in our world the environment of dynamic computing significantly increases very much in the scope. There are so many major attacks or issues of security are here in computer networks which would generally affect the security. As few of them would explain in this section: 1. Denial-of-service is a common type of attack which harms the security of network and decrease the performance of the router which involves the same IP address at source and destination port. So these types of attack lose the security and secrete information of user. 2. Another issue concerned with computer network is configuration if the configuration is poor or of low quality it will degrade the security. 3. Using many security policies at a time also affect the network and slower down the processing speed which also creates the problem in security. 4. Some malicious program can be the reason through which user can access information by creating a network access such as website. There are few issues in network access through which information can be spoofed by unauthorized user. 6. STUDY OF PROTOCOLS Different protocols used on the each layer of TCP/IP model which helps in communication from one network to more networks and also helpful to communicating with other layer protocols. As we know that first layer is physical and data link layer and many protocols are also used in this layer. 1. Physical/ Data link layer: In this layer data is transmit by wire or cables called as ETHERNET or as well as concerned with addressing the data from one network node to other, for this linking ETHERNET Cables are used. There are so many type of ETHERNET cables are For example: 10BASE5, co-axial, Twisted cable etc. 2. Network layer: Network layer tells how to route the packet on network for this purpose IP protocol used to route the packet from source node to destination node. The protocols are IP.IPX used at this layer. 3. Transport layer: To transport the routed packet that comes from the Network layer by means of protocols as TCP, UDP. 4. Application layer: Application layer used to display the data to the end user. There are so many protocols used at this layer for the end user through whom they can understand the data in user readable form so the protocols used at this layer are HTTP, SMTP, DNS etc. 7. ATTACKS ON NETWORK SECURITY There are so many threats on network which will harm the security of user on the network we discuss few of them below in this: 88
5 1. Intrusion Attack: There are so many users on the network who use the internet and want security on their network but when any illegal person or unauthorized user attain access on the network to use the data of that user. 2. Spoofing Attack: When the illegal user access authorized information at transport layer by changing the source IP packet. These unauthorized users change the private information of the authorized user due to this the authorized user will receive altered information. 3. Protocol based Attacks: Communication protocols are the medium with the help of which data or information is transferred or retrieve on the computer network. There are so many attacks as discussed in next section come under this attack. 4. Denial-of-service Attack: DOS is a type of attack through which the network become weak and DDOS is distributed in the whole network and the appearance of the DDOS is present in the core architecture of internet [13] It is of two type[14]: a. Ping of death b. SYN attack 5. Application level Attack: Application level is called as user level where user get so many protocols which help them to retrieve the information from sender but attack is also generated at this level in form of malicious node Trojan on the HTTP etc. 6. Logon Attack: Due to security and privacy purpose logon policy is develop on the network but there are so many hackers who hack the password and username of the authorized user. 7. Attack on address: Address are of two types MAC address and physical address when some unauthorized user stole the information by accessing the address of source and destination. There are so many researchers who researched the so many methods to detect the attacks or threats. As DDOS is a severe attack in network security there are few methods discussed in [15] [16] to detect the DDOS attack on the network. 8. PROTOCOL BASED SECURITY ISSUES Protocol as we discussed above are the standard set of rules which is a mode of communication on the network. Each layer of TCP/IP model has some standard set of rules known as protocols, but sometimes what happen if some unauthorized or illegal user may be at anytime change the rules at any layer of TCP/IP model. Protocols mainly used to send their information in their communication mode to other next layer. As there are so many unauthorized or unauthenticated user who will alter the rules to steal the privacy and security of data. so as the matter there are few issues which will harm the security of protocols: 1. Attack on ARP: There are so many unauthenticated users who will attack on the physical address of destination so the source data will be send to wrong destination address. 2. Attack on HTTP: Trojan is malicious software on network which generated at application level on HTTP and IRC protocol to unsecure the data at user end [17]. 3. Attack on routing information protocol: Routing the information means provide route to the data at IP layer. In this layer routing information is manually or dynamically handled by some protocols but some illegal user will change the information so the data is spoofed on the network [18]. 4. Attack on TCP: Sometime any unauthorized user can predict the sequence number of the TCP protocol so that they can change the transferred information to other destination [18]. 5. Attack on SIP: Session initiation protocol also used at application layer to provide the session limit facility to users on the network but when the messages or information is flooded or spammed so it can harm the security [19][20] so availability of data and its integrity may lost. 89
6 9. SIMULATION Simulation is one of the important technology in this modern time. There are so many objects in real or hypothetical life. The network can also be simulated on the computer. A network simulator is a technique of implementing the network on the computer. Most of the simulators are graphical user interface driven, there are so many simulators which require commands or scripts as we talk about the NS2 which gives input in form of TCL scripts or in AWK scripts etc. The network parameters describe the state of the network (node placement, existing links) and the events. An important output of simulations is the trace file. Examples of network simulation software are ns2/ns3, OPNET, NetSim. Network simulators are particularly used to simulate, design and analyze the various kinds of networks, also analyze the performance by the effect of various network parameters Introduction to NS-2 For implementing the routing protocols, physical layer protocols (MAC, ETHERNET etc.), network protocols, transport layer protocols as being a simulator NS-2 play a fundamental role for work as a simulation tool for the different type network. NS-2 is a simulator that analyzes the performance of protocols and has number of protocols for implementing the network. NS-2 which describes the complete design of wired and wireless network, many security issues algorithms, for the queuing and routing queue mechanism of network. NS2 is very helpful because it is open source to design the new wired and wireless network for number of nodes and check the variability of that new designed networked algorithms and architectures and their network topologies. As we designed a 5 wired node scenario over UDP and TCP protocols and check their topologies, support many popular network protocols and also offer simulation results for wireless networks. As we know it support both wired and wireless network and suitable for the networking based projects and work on packets scenario how packet is transmit or receive from source to destination it also offer packet level inspection, how it is dropped and why it is dropped by using different traffic generators which generate traffic by using parameters. The Experimental traffic generator issued in this paper in which we setup a 5-node of wired network named tcp1, tcp2, tcp3 over source node 1, source node 2, source node 3 respectively in which the TCP agent connect to each source node as we know the we create a TCP agent before the packet/data sent from source to transmit the data. Because agent is needed through which the generated traffic will be transmitted the packet. So we generate the traffic at source with the help of agent TCP. There are different types of traffic generator which generate the traffic from source node they are CBR, Exponential, ftp, VBR etc. There are some steps which we discussed in section 10.1 for implementing the design of TCP protocol and analyze its performance when the packet will drop and when it will not drop.ns-2 Called as discrete event network simulator for simulating the IP. NAM is called as a Visualization Tool in NS-2 which gives the Window screen as an output [21] which shows the network scenario as in fig.3 called as NAM window which is resultant window screenshot for NS Architecture of NS-2 As we know NS-2 is a combination of C++ language and OTCL scripts i.e. object oriented tool command line interpreter which interpret the scripts line by line the code written in note pad or in ms-word etc. and save it by.tcl extension. There is a class hierarchy structure of NS-2 and extended class hierarchy which shows how to add components in NS-2 or to how to add new class because the NS-2 is a combination of TCL script and C++ language so we also write code in C++ language to run script in NS-2 [22]. 90
7 Design and run simulation by the Tcl interpreter using the simulator object in the OTcl library. The at most of the network components and the data path in event scheduler are implemented in the C++ and available to OTcl through an OTcl linkage library that is implemented using Tclcl, as there are two classes in Tclcl file one is class agent and second is class application. Class agents: Each node in network that has to receive or sends the packets or in the terms called as traffic have an agent attach to the node so they will send or receive the data i.e. agent is needed, in this we create a TCP agents in our work. 10. EXPERIMENTAL SETUP OF TCP Figure 1: OTCL Script is a combination of tcl and C++ Figure 2: Experimental daigram of 5- node wired TCP network The figure mentioned above is a experimental setup of 5 nodes in which n0,n1,n2 are the source node which generate packets by the agent TCP and exponential packet is attached to the three source nodes. The exponential traffic has 4 parameters : 1. Packet size 2. Rate 3. Burst time 4. Ideal time 91
8 These are the four parameters of the exponential traffic through which traffic is generated on source nodes and this traffic in form of packets send to router node r1 at that time due to congestion window or the packet rate the ssome data is fall down through the router node r1 and packets which are not fallen dowm are send to destination node n How setup is done so that packets will send from source to destiantion(script) Following are steps/script steps of how experimental setup of TCP is established and how packets are send from source to destination are given below: 1.Create the object of simulator first as set tc[new simulator]. 2.Set the nodes and established a link between the nodes for this purpos we use routing queue to manitain the packet flow in queue as set node_name[$ ns node] and link may be simplex or duplex as $ns simplex_link $sourcenode $routernode mb ms RED/DropTail. And fb is a instance of simulator. mb is bandwidth is also the main cause to drop the packets & ms is delay between the packets. 3.Create a TCP agent at source because the TCP agent is created before packets sent from source as set tcp0 [new Agent/TCP] $tcp0 set class_ 2 $tc attach-agent $source node $tcp agent set sink0 [new Agent/TCPSink] $ns attach-agent $destination node $sink0 $ns connect $tcpagent $sink0. 4.Now attach the traffic given in this paper i.e. exponential traffic which is on/off distribution traffic.attach to the TCP agent, this traffic with their parameters attached. As set exp0 [new Application/Traffic/ Exponential]. $exp0 attach-agent $tcpagent $expotraffic set packet_size_ 210 $expotraffic set burst_time_ 2ms $expotraffic set idle_time_ 1ms $expotraffic set rate_ 100k. 5.Now attach the source traffic to sink, sink is a previous traffic which means sink has agent/loss monitor at the destination and monitor the amount of data byte sent or received so, amount of data lost which will calculate the bandwidth of nodes as $ set bandwidth number[$ sink set byte] code write on the script. 6. Out.tr.w is an output file which shows the output bandwidth of source node in form of graph called as Xgraph. 7. Run the script by saving extension.tcl and run the script. When script runs it shows the out.nam file which is called as network animator screen. 8. Now call the finish procedure in which close the o/p files as close $fo. And then execute the Xgraph in geometry of window size it may be of 600 * 400. Now how to calculate the bandwidth for the network, for this firstly set time as set time=0.1, 0.2, 0.3 etc. Recall the procedure record at after the set time and also set now time to call the procedure again and again. Now record the time and also set the start time of each simulated source then set the end time of each source through which simulation can start and stop. Following mentioned above are some steps for how to write a script for analyzing the packet flow of network, how to recognized and also analyze its performance by graph which is shown in next section of this paper. In next section we analyzed some results for packet flow of TCP, in section 10.2 we analyzed that at any time the packet will drop through router when rate is in mb and analyzed its performance using Xgraph but we also discuss in section 10.3 results which analyzed that at same time instant not even a single packet is drop by router by altering the value of rate parameter in K unit Result Analysis When Packets Are Drop Down Through Router In fig.3 to fig.6 shows that packets comes from three sources n0, n1, n2 that are transmitted to the destination n4 which is in hexagonal shape (in fig. 3) and packets are drop down at the router node called n3 which is in square shape (in fig. 3). TCP agent is created at three sources and 92
9 exponential traffic is attached to the agent but at that time rate parameter value is in mb so that packets would drop down at router node as shown in below figure. Figure 3: when packets send from source n0 to destination n4 through n3 (router node) Figure 4: when packets send from source n1 to destination n4 through n3 (router node) Figure 5: some packets of source n1 drop down at n3 93
10 Figure 6: when packets send from source n2 to destination n4 through n3 (router node) Figure 7: at time 3.14 packets would drop down when rate is in mb at n3 Figure 8: Xgraph shows the performance by X-axis which represents rate and Y-axis shows the time so the peak burst rate is in mb/sec. graph shows when packets drop at router node. At 3.14 time packet would drop down so at that time peak is at low. 94
11 10.3. Result analysis when packets are not drop down through router (improvisation) In this section there is no packet would drop down at router node due to rate parameter is in K of exponential traffic as shown below: Figure 9: when packets send from source n0 to destination n4 through n3 (router node) Figure 10: when packets send from source n1 to destination n4 through n3 (router node) Figure 11: when packets send from source n2 to destination n4 through n3 (router node) 95
12 Figure 12: at time 3.14 packets would not drop down when rate is in K at n3 Figure 13: Xgraph shows the performance by X-axis which represents rate and Y-axis shows the time so the peak burst rate is in K/sec. graph shows when packets drop at router node. At 3.14 time packet would not drop down in this graphical result so at that time peak is at high at that time. As the following results shown in the figure 7 the packet is drop at time instant 3.14 when parameter of exponential traffic rate is in mb and figure 12 shows the result of same time when the rate is in K so that time packet would not drop down and also analyzed graphical results which represents at 3.14 time packet would drop down so at that time peak is at low in figure 8 and result analyzed for in fig. 13 at 3.14 time packet would not drop down in this graphical result so at that time peak is at high at that time. So we analyzed the packet flow of TCP using the simulator NS-2. And above sections we study the computer networks its protocols and threats in network and in the protocols. 11. CONCLUSIONS In this paper we discuss the network, its scenario and also its concerning issues. We also discuss the types of attack which affects the network so that results will the unintended user access the authorized data by different methods as discussed in section 7. We also study the types of protocols used on each layer of TCP/IP model and its related issues by means of which data is 96
13 hacked or alter by unauthorized user by illegal way from sender side, at the router side or even at destination by attacking on the number of protocols used at each layer. We also analyzed the packet flow scenario i.e. how packet is flow from source to destination and how much packets are dropped at router node by rate parameter of exponential traffic. As exponential is on/off traffic at on time packets are dropped and at off time packets would not drop, each parameter has different effect so on changing the rate parameter of exponential traffic would affect on the packet drop rate and bandwidth is also affecting the packet drop rate of the network. We create only TCP agent because as we know that TCP is connection oriented protocol and connection is established before packets flow from source to destination and acknowledgement is also send by receiver. So as less packet drop rate count as comparison to UDP protocol. But some packets at TCP would loss because of the rate parameter is in discussed in section 10.2 but when we alter the value of rate parameter as in section 10.3 no packet would drop by router, all the packets are sent to the destination n4 form the source n0, n1, n2. REFERENCES [1] Johanna Antila, TCP Performance Simulations Using Ns2, 51189d TLT [2] Sirwan A.Mohammed, Prof. Dr. Sattar B.Sadkhan, Design of wireless network based on NS-2, Journal of Global Research in Computer Science, Volume 3, No. 12, December 2012 [3] Dr. Neeraj Bhargava, Dr. Ritu Bhargava, Anchal Kumawat, Bharat Kumar, Performance of TCP- Throughput on NS2 by Using Different Simulation Parameters, International Journal of Advanced Computer Research (ISSN (print): ISSN (online): ) Volume-2 Number-4 Issue-6 December [4] C.Manikandan, R.Parameshwaran, K.Hariharan, N.Kalaimani, K.P. Sridhar, Combined Security and Integrity Agent Integration into NS-2 for Wired, Wireless and Sensor Networks, Australian Journal of Basic and Applied Sciences, 7(7): , ISSN , [5] Mr. Ajay Singh and Dr. Pankaj Dashore, Comparative Analysis of TCP and UDP by using NS-2, International Journal of Computer Science and Information Security (IJCSIS) Volume (1) : Issue (1) IROCS Published Online June 2013 [6] Yun Zhou and Yuguang Fang, Network security and attack Defense, Institue of electrical and Electronics Engineers, [7] FIPS PUB 46-2, Data Encryption Standard (DES), Dec.1993 [8] IETF RFC 2040, The rc5,rc5-cbc, rc-5-cbc-pad, abd rc-5-cts algorithms, Oct.1996 [9] FIPS PUB 197, Advanced Encryption Standards (AES), Nov.2001 [10] W.Diffie and M.E. Hellman, New directions in Cryptography, IEEE Transaction on Information Theory, Vol. IT-22, no.6, Nov 1976, pp [11] R.L. Rivest, A. Shamir, and L.Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol. 21, no. 2, Feb. 1978, pp [12] FACT SHEET: Big data and Privacy Working Group Review, The White House, May 5, 2104 [13] Hamza Rahmani, Nabil Sahli, Farouk Kamoun, DDoS flooding attack detection scheme based on F- divergence, Computer Communications 35 (2012) , Elsevier [14] Panayiotis kotzanikolaou, Christos douligeris computer network security: basic background and current issues, institute of electrical and electronics engineers, Inc [15] Y. Xiang, Y. Lin, W.L. Lei,S.J. Huang, Detecting DDOS Attack on network Similarity, IEEE Proc.-Commun., Vol. 151, No. 3, June 2004 [16] Y. Xie, S. Tang, X. Huang, C. Tang, X. Liu, Detecting latent attack behavior from aggregated Web traffic, Computer Communications 36 (2013) , Elsevier [17] Silvia Farraposo, Laurent Gallon, Philippe Owezarski Network security and DOS attack, Documtery history. [18] S.M. bellovin Security problem in TCP/IP protocol suite, Computer Communication Review, Vol. 19, No. 2, pp , April [19] Gaston Ormazabal, Sarvesh Nagpal, Eilon Yardeni, and Henning Schulzrinn Secure SIP: A Scalable Prevention Mechanism for DoS Attacks on SIP Based VoIP Systems, Springer-Verlag Berlin Heidelberg
14 [20] Aws Naser Jaber, Chen-Wei Tan, Selvakumar Manickam and Ali Abdulrazzaq Khudher Session Initiation Protocol Security: A Brief Review, Journal of Computer Science 8 (3): , [21] [22] Authors Ms. Shweta Gambhir is a M.Tech Scholar in the department of CSE at NGF College of engineering & Technology, Palwal, Haryana, India. She did her B.Tech in CSE in 2011 from WIT College affiliated to MDU Rohtak. She also has published papers in national and International conferences/ journals. Kuldeep Tomar is a Research Scholar in the Department of CSE, MRIU, Faridabad, , India. Ccurrently working as Head of the Department of CSE in NGFCET, Palwal, Faridabad, Haryana. He was born in Sonepat, Haryana on 2nd Oct, He has done M.E/M.Tech in Computer Science and Engineering from C.I.T.M., Faridabad, India.He has a total experience of 12 years in different organizations. He is currently working as Associate Professor in NGF College of Engineering & Technology, Palwal, Faridabad, Haryana. He also has worked as Assistant. Professor in Skyline Institute of Engineering & Technology, Gr. Noida; as Senior Lecturer in B.S.A.I.T.M., Faridabad; as Technical Head/Manager at SSI (Software Solutions Integrated Ltd. and as Sr. Faculty at Hartron Workstation (Haryana Govt. Undertaking).He has published more than 12 papers in International/National Journals and conferences etc. Has is also written a book. He also is a member of Computer Society of India, Membership No:N
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Network Simulator: ns-2
Network Simulator: ns-2 Antonio Cianfrani Dipartimento DIET Università Sapienza di Roma E-mail: [email protected] Introduction Network simulator provides a powerful support to research in networking
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
Analysis of Effect of Handoff on Audio Streaming in VOIP Networks
Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* [email protected]
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
ns-2 Tutorial Exercise
ns-2 Tutorial Exercise Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Partly adopted from Nicolas s slides On to the Tutorial Work in group of two. At least one people
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
10CS64: COMPUTER NETWORKS - II
QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Security Type of attacks Firewalls Protocols Packet filter
Overview Security Type of attacks Firewalls Protocols Packet filter Computer Net Lab/Praktikum Datenverarbeitung 2 1 Security Security means, protect information (during and after processing) against impairment
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network Abdalla Gheryani, And Mladen Veinović Abstract This paper studies and measures the outcome of different security
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media
IT 4823 Information Security Concepts and Administration March 17 Network Threats Notice: This session is being recorded. Happy 50 th, Vanguard II March 17, 1958 R.I.P. John Backus March 17, 2007 Copyright
MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 11, No 4 Sofia 2011 MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks N.
TCP/IP Protocol Suite. Marshal Miller Chris Chase
TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets
COMPUTER NETWORK TECHNOLOGY (300)
Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Security issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
Performance Evaluation of DVMRP Multicasting Network over ICMP Ping Flood for DDoS
Performance Evaluation of DVMRP Multicasting Network over ICMP Ping Flood for DDoS Ashish Kumar Dr. B R Ambedkar National Institute of Technology, Jalandhar Ajay K Sharma Dr. B R Ambedkar National Institute
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
CSCI 362 Computer and Network Security
The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
Building Secure Network Infrastructure For LANs
Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives
Overview. Packet filter
Computer Network Lab 2015 Fachgebiet Technische h Informatik, Joachim Zumbrägel Overview Security Type of attacks Firewalls Protocols Packet filter Security Security means, protect information (during
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
Computer Networks CCNA Module 1
Chapter 1: Quiz 1 Q1: Which statement describes a network that supports QoS? The fewest possible devices are affected by a failure. The network should be able to expand to keep up with user demand. The
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015
Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan April 23, 2015 1 / 24 Secure networks Before the advent of modern telecommunication network,
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK
DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK M.Yasodha 1, S.Umarani 2, D.Sharmila 3 1 PG Scholar, Maharaja Engineering College, Avinashi, India. 2 Assistant Professor,
IT4504 - Data Communication and Networks (Optional)
- Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Wireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
Advanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2
Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2 1 Research Scholar, Department of Computer Science, Doaba Group of Colleges, Kharar, Punjab,
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
Gigabit Multi-Homing VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is a ideal to help the SMBs increase the broadband
Effect of Packet-Size over Network Performance
International Journal of Electronics and Computer Science Engineering 762 Available Online at www.ijecse.org ISSN: 2277-1956 Effect of Packet-Size over Network Performance Abhi U. Shah 1, Daivik H. Bhatt
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
Establishing a valuable method of packet capture and packet analyzer tools in firewall
International Journal of Research Studies in Computing 2012 April, Volume 1 Number 1, 11-20 Establishing a valuable method of packet capture and packet analyzer tools in firewall Kumar, P. Senthil Nandha
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
IT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,
Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
Analysis of ACL in ASA Firewall
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 1 (2014), pp. 53-58 International Research Publications House http://www. irphouse.com /ijict.htm Analysis
Layered protocol (service) architecture
Layered protocol (service) architecture The Internet is complex! many pieces : hosts access network routers links of various media applications protocols Question: Is there any hope of organizing a structure
Dynamic Rule Based Traffic Analysis in NIDS
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 14 (2014), pp. 1429-1436 International Research Publications House http://www. irphouse.com Dynamic Rule Based
Queuing Algorithms Performance against Buffer Size and Attack Intensities
Global Journal of Business Management and Information Technology. Volume 1, Number 2 (2011), pp. 141-157 Research India Publications http://www.ripublication.com Queuing Algorithms Performance against
SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS
SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS Ayesha Tabassum 1 1 Assistant Professor, Department of Computer Science and Engineering, DCET, Osmania University, Telangana, India Abstract
Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg
Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona [email protected] Copyright
Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett
Network Security Internet not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent network Security considerations in all layers!
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
Survey on DDoS Attack Detection and Prevention in Cloud
Survey on DDoS Detection and Prevention in Cloud Patel Ankita Fenil Khatiwala Computer Department, Uka Tarsadia University, Bardoli, Surat, Gujrat Abstract: Cloud is becoming a dominant computing platform
The OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied
REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY
REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY Babul K Ladhe 1, Akshay R Jaisingpure 2, Pratik S Godbole 3, Dipti S Khode 4 1 B.E Third Year, Information Technology JDIET, Yavatmal [email protected]
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless
Introduction to computer networks and Cloud Computing
Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication
DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM
DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM Objectives: Base training of an engineer for the installation and maintenance of Digital Telecommunications and Internetworking systems.
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Gigabit Content Security Router
Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
Simulation Based Analysis of VOIP over MANET
Simulation Based Analysis of VOIP over MANET Neeru Mehta 1, leena 2 M-Tech Student 1, Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal, Haryana, India Abstract In the last
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT Merlin Shirly T 1, Margret Johnson 2 1 PG
Networking Basics and Network Security
Why do we need networks? Networking Basics and Network Security Shared Data and Functions Availability Performance, Load Balancing What is needed for a network? ISO 7-Layer Model Physical Connection Wired:
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Overview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
