Department Of Computer Science And Technology
Permanent URI for this communityhttps://kr.cup.edu.in/handle/32116/79
Browse
51 results
Search Results
Item Prevention of black hole attack over AODV and DSR MANET routing protocol(WARSE, 2015) Sharma, Shabnam; Mittal, MeenakshiWireless technology is one of the biggest contributions to mankind. In wireless system, transmission of information can be done without the need of wires and cables. Mobile Adhoc Networks (MANETs) do not have any centralized administration. They are infrastructure-less networks. They do not contain any networking device like routers or access points. MANETs are self-starting and dynamicnetwork comprising of mobile nodes. Mobile Ad-hoc networks require routing protocols for communication among nodes. Due to the lack of centralized management, various attacks are possible in MANETs such as passive or active attacks. Blackhole attack is an active kind of attack in which a malicious node pretendsto have a shortest and fresh path to the destination. Blackhole attack affects the performance by disrupting the normal communication in the network. Therefore, there is need to prevent the network from attack. In this paper, prevention of blackhole attack is done over AODV and DSR routing protocol with Random Waypoint Model. Malicious nodes in the network are known and if malicious nodes encounter in between the route from source to destination, then intermediate node have to simply discard that path and have to find an alternate path.The simulation results show that AODV routing protocol performs best and is suitable for highly dynamic networks.Item Prevention of Denial of Service Attack on Dynamic Source Routing VANET Protocol.(IJRET, 2015) Rani, Komal; Mittal, MeenakshiVehicular Ad Hoc Network (VANET) is a kind of Wireless Ad hoc Network in which node has high mobility, and thus the topology of the network is highly dynamic. VANET has thepotential to increase road safety, improve traffic efficiency as well as comfort to both drivers and passengers. There are different types of attacks possible on VANET. In this paper, implementation and prevention of DOS attack is done on topology based protocol- Dynamic Source Routing (DSR). The performance of DSR protocol is evaluated under different scenarios using Network Simulator (NS2), Simulation of Urban Mobility (SUMO) simulator and Mobility model generator for Vehicular networks(MOVE). The prevention scheme Queue Limiting Algorithm (QLA) proposed by Sinha & Mishra is implemented to prevent Denial of Service attack. The results show that DSR has high throughput and packet delivery ratio at low density of nodes and the value of these parameters become low at high density of nodes. The prevention scheme is capable to prevent DOS attack.Item Code clone detection and analysis using software metrics and neural network: A Literature Review(Eighth Sense Research Group, 2015) Kumar, Balwinder; Singh, SatwinderCode clones are the duplicated code which degrade the software quality and hence increase the maintenance cost. Detection of clones in a large software system is very tedious tasks but it is necessary to improve the design, structure and quality of the software products. Object oriented metrics like DIT, NOC, WMC, LCOM, Cyclomatic complexity and various types of methods and variables are the good indicator of code clone. Artificial neural network has immense detection and prediction capability. In this paper, various types of metric based clone detection approach and techniques are discussed. From the discussion it is concluded that clone detection using software metrics and artificial neural network is the best technique of code clone detection, analysis and clone predictionItem Defence Mechanism of Distributed Reflective Denial of Service (DRDOS) Attack by using Hybrid (CPU-GPU) Computing System(IJCTT, 2015) Gagandeep; Mittal, MeenakshiDistributed Reflection Denial of Service (DRDOS) attack has become the daunting problem for businesses, system administrators, and computer system users. Distributed Reflective Denial of Service (DRDOS) attack typically exhausts bandwidth, processing capacity, or memory of a targeted machine, service or network. DRDOS attack reflects the traffic through reflector that becomes difficult to trace back the real attacker. Prevention and detection of a DRDOS attack is an important research topic for researchers throughout the world. Despite enormous efforts in combating DRDOS attacks in the past decade, DRDOS attacks are still a serious threat to the security of cyberspace. So a defence mechanism is used to combat the Distributed Reflected Denial of Service Attack by using additional hardware called Graphical Processing Unit (GPU) with victim�s machine called hybrid computing system. The results show that the hybrid (CPU-GPU) computing machine can handle the amplified response (i.e. 33 times more than the request packet) more efficiently than the normalmachine (with only CPU).Item Analysis of Virtualization: Vulnerabilities and attacks over virtualized cloud computing(IASIR, 2014) Kanika; Sidhu, NavjotCloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the internet. The means of cloud computing is obtained by the virtualization of the resources such as hardware, platform, operating system and storages devices. Virtualization permits multiple operating systems to run on the same physical machine. Multiple tenants are unaware of the presence of the other tenant with whom they are sharing the resources. The co-existence of multiple virtual machines can be exploited to gain the access over other tenant's data or attack to deny of services. The significant concern is insuring the security and providing isolation between multiple operating systems. The paper explores various kinds of vulnerabilities and attacks associated with the virtualization.Item Performance Analysis of AODV for Wormhole Attack using Different Mobility Models(Excel India Publishers, 2014) Kaur, Gurmeet; Kaur, AmanpreetMobile Ad-Hoc Network (MANET) is a type of temporary wireless network, in which the nodes are mobile and have dynamic network topology. Communication among nodes in these networks is accomplished via different routing protocols. But these protocols have different security flaws and using these flaws, an attacker can launch many attacks. Wormhole attack is one of the serious attacks in the context of mobile ad-hoc networks that can disrupt any routing channel completely. In this work, an attempt has been made to analyze and compare the performance of on-demand reactive routing protocol: Ad hoc On Demand Distance Vector (AODV) with two approaches: AODV without attack and AODV under wormhole attack using two mobility models viz. Random Way Point Model and Reference Point Group Mobility Model. The performance metrics evaluated for the two examined approaches are Average Throughput, Packet Delivery Ratio, Average End to End Delay and Jitter. Along with this, an approach has also been used to analyze participated malicious nodes.Item A Comprehensive Review on Performance of AODV and DSDV Protocol Using Manhattan Grid Mobility Model(IJRET, 2014) Kaur, Amandeep; Mittal, MeenakshiWireless networks have become an epitome of revolution in the communication industry as these have enabled the devices to communicate and access information independent of their location. These networks can be classified into two categories: Infrastructure based and Infrastructure less. Mobile ad hoc networks (MANET) fall under infrastructureless category in which nodes are able to move thereby making the topology of the network highly dynamic. Due to the dynamically changing topology, efficient routing mechanisms needed to be developed, which led to the foundations of various mobile ad hoc routing protocols. There are a number of mobile ad hoc routing protocols proposed to serve different purposes like security and transmission efficiency. These protocols are divided into two categories: Table based and Demand based. Through this work, table based traditional routing protocol DSDV and demand based routing protocol AODV have been assessed through simulation using Manhattan Grid mobility model. Comprehensive analysis was carried out to analyze which protocol performs better in the assumed scenarios. The performance metrics evaluated for the two protocols are Throughput, Average End to End delay, Routing Overhead and Packet Delivery RatioItem AODV Based Congestion Control Protocols: Review(IJCSIT, 2014) Bhatia, Bandana; Sood, NehaAd- hoc network is defined as the network in which the users communicate with each other by forming a temporary network without any centralized administration. Here each node acts both as a host as well as a router. They have highly deployable, dynamic and self-configurable topologies. Various routing protocols are defined for MANETs. These protocols may follow proactive, reactive or hybrid approach. Due to many number of nodes transmitting packets over the network, the chances of losing the packets over the network increases to a great extent. Also, with the increase in size of data packets, the congestion over the network increases which may lead to packet loses. The existing routing protocols for MANETs do not support congestion control as they are not congestion adaptive. There are many proposed protocols that are congestion adaptive and deals with the congestion over the network. This paper discusses congestion control protocols in MANETs. Also, three congestion control protocols, EDAODV, AODV-I and CRP, are discussed. Simulation results are gathered for AODV by varying the number of nodes and size of the data packets for four performance metrics, namely, throughput, routing overhead, packet delivery ratio and end-to-end delay.Item Third Party Auditor: An integrity checking Technique for Client Data Security in Cloud Computing(IJCSIT, 2014) Goyal, Renuka| Sidhu, NavjotNow-a-days the concept of Cloud Computing is one of the major theories in the world of IT. Its services are now being applied to several IT scenarios. Cloud Computing is the internet based computing which provides users with a number of services. Users store their data in the cloud without the burden of local data storage. As the user no longer have physical possession of data so the integrity and security of data become the major concern in the cloud computing. Data stored on the cloud server may be get corrupted and sometimes even the cloud service provider for his own benefit like for more space on data centre can discard the user data which is not used for a longer time. In order to maintain the integrity of data, the user takes the assistance of a Third Party Auditor (TPA). The TPA checks the integrity of data on user demand and the released audit reports help the user to evaluate the risk of their services. TPA have an experience that user does not have and have capability to check integrity of data which is not easy for the user to check. This paper highlighted the basics of cloud computing, general model and different approaches used for TPA.Item Advance Stable Election Protocol in Wireless Sensor Network(Excel India Publishers, 2014) Singh, Mandeep; Sidhu, NavjotWireless sensor network (WSN) is an emerging research field. There are large numbers of sensors that collect and send data to base station. Saving energy by using various routing techniques is a challenge. Clustering is main technique used for this. Various protocols like SEP (Stable Election Protocol) and ESEP (Extended Stable Election Protocol) are clustering based heterogeneous aware protocols. In this paper, a new protocol ASEP (Advance Stable Election Protocol) has been proposed based on SEP. This is based on changing more efficiently and dynamically the cluster head election probability. Performance of this protocol has been evaluated in MATLAB and graphical results have been shown. The performance of ASEP is better than SEP in form of first node dies and total number of packets delivered.