Department Of Computer Science And Technology

Permanent URI for this communityhttps://kr.cup.edu.in/handle/32116/79

Browse

Search Results

Now showing 1 - 7 of 7
  • Item
    Prevention of black hole attack over AODV and DSR MANET routing protocol
    (WARSE, 2015) Sharma, Shabnam; Mittal, Meenakshi
    Wireless technology is one of the biggest contributions to mankind. In wireless system, transmission of information can be done without the need of wires and cables. Mobile Adhoc Networks (MANETs) do not have any centralized administration. They are infrastructure-less networks. They do not contain any networking device like routers or access points. MANETs are self-starting and dynamicnetwork comprising of mobile nodes. Mobile Ad-hoc networks require routing protocols for communication among nodes. Due to the lack of centralized management, various attacks are possible in MANETs such as passive or active attacks. Blackhole attack is an active kind of attack in which a malicious node pretendsto have a shortest and fresh path to the destination. Blackhole attack affects the performance by disrupting the normal communication in the network. Therefore, there is need to prevent the network from attack. In this paper, prevention of blackhole attack is done over AODV and DSR routing protocol with Random Waypoint Model. Malicious nodes in the network are known and if malicious nodes encounter in between the route from source to destination, then intermediate node have to simply discard that path and have to find an alternate path.The simulation results show that AODV routing protocol performs best and is suitable for highly dynamic networks.
  • Item
    Prevention of Denial of Service Attack on Dynamic Source Routing VANET Protocol.
    (IJRET, 2015) Rani, Komal; Mittal, Meenakshi
    Vehicular Ad Hoc Network (VANET) is a kind of Wireless Ad hoc Network in which node has high mobility, and thus the topology of the network is highly dynamic. VANET has thepotential to increase road safety, improve traffic efficiency as well as comfort to both drivers and passengers. There are different types of attacks possible on VANET. In this paper, implementation and prevention of DOS attack is done on topology based protocol- Dynamic Source Routing (DSR). The performance of DSR protocol is evaluated under different scenarios using Network Simulator (NS2), Simulation of Urban Mobility (SUMO) simulator and Mobility model generator for Vehicular networks(MOVE). The prevention scheme Queue Limiting Algorithm (QLA) proposed by Sinha & Mishra is implemented to prevent Denial of Service attack. The results show that DSR has high throughput and packet delivery ratio at low density of nodes and the value of these parameters become low at high density of nodes. The prevention scheme is capable to prevent DOS attack.
  • Item
    Code clone detection and analysis using software metrics and neural network: A Literature Review
    (Eighth Sense Research Group, 2015) Kumar, Balwinder; Singh, Satwinder
    Code clones are the duplicated code which degrade the software quality and hence increase the maintenance cost. Detection of clones in a large software system is very tedious tasks but it is necessary to improve the design, structure and quality of the software products. Object oriented metrics like DIT, NOC, WMC, LCOM, Cyclomatic complexity and various types of methods and variables are the good indicator of code clone. Artificial neural network has immense detection and prediction capability. In this paper, various types of metric based clone detection approach and techniques are discussed. From the discussion it is concluded that clone detection using software metrics and artificial neural network is the best technique of code clone detection, analysis and clone prediction
  • Item
    Defence Mechanism of Distributed Reflective Denial of Service (DRDOS) Attack by using Hybrid (CPU-GPU) Computing System
    (IJCTT, 2015) Gagandeep; Mittal, Meenakshi
    Distributed Reflection Denial of Service (DRDOS) attack has become the daunting problem for businesses, system administrators, and computer system users. Distributed Reflective Denial of Service (DRDOS) attack typically exhausts bandwidth, processing capacity, or memory of a targeted machine, service or network. DRDOS attack reflects the traffic through reflector that becomes difficult to trace back the real attacker. Prevention and detection of a DRDOS attack is an important research topic for researchers throughout the world. Despite enormous efforts in combating DRDOS attacks in the past decade, DRDOS attacks are still a serious threat to the security of cyberspace. So a defence mechanism is used to combat the Distributed Reflected Denial of Service Attack by using additional hardware called Graphical Processing Unit (GPU) with victim�s machine called hybrid computing system. The results show that the hybrid (CPU-GPU) computing machine can handle the amplified response (i.e. 33 times more than the request packet) more efficiently than the normalmachine (with only CPU).
  • Item
    A Comprehensive Review on Performance of AODV Protocol for Wormhole Attack
    (IJRET, 2014) Kaur, Gurmeet; Kaur, Amanpreet
    Wireless Networking is becoming very popular and interesting technology especially in these days as everyone wants wireless connectivity at anywhere anytime. It contains numerous wireless network technologies such as WiFi, WiMax, HSDPA and WiBro etc. Based on structural arrangement, wireless networks are categorized into two main categories: fixed infrastructure wireless networks and infrastructure less wireless networks. Mobile Ad-Hoc Networks (MANETs) come under the category of infrastructure less wireless networks, which is an autonomous system of mobile hosts connected by wireless links. Nodes are free to move and can join or leave the network at any time whenever required. Wireless ad hoc networks eradicate various problems which may come out while setting up the infrastructure. Communication among nodes in these networks is accomplished via different routing protocols. But these protocols have different security flaws and using these flaws, an attacker can launch many kinds of attacks. Wormhole attack is one of the serious attack in the context of mobile ad-hoc network, which can disrupt any routing channel completely. In this work, an attempt has been made to compare the performance of on-demand reactive routing protocol: Ad hoc On Demand Distance Vector (AODV) with two approaches: normal and attack. The performance metrics evaluated for the two examined approaches are Throughput, Packet Delivery Ratio, Delay and Jitter.
  • Item
    DWT-SVD Based robust digital image watermarking using adaptive median filter
    (Central University of Punjab, 2013) Kumar, Ashok; Brar, Sukhreet Singh
    Feature Matching is one of the central issues of model-based recognition and an important component of most object recognition systems. The feature matching technique can be applied in image alignment, 3D secure reconstruction, motion tracking, object recognition and in pharmacophore based molecular alignment. Even though numerous algorithms exist for feature recognition and search yet the efficiency of these have considerable room for improvement. This has necessitated a continuous search for better performing algorithms. The combination of geometric hashing technique and tolerance limits for a given set of known interactions can be used for the pharmacophore modelling based search. The algorithm proposed is precise as compared with the previous existing algorithms. This algorithm is better in its runtime complexity.
  • Item
    Wireless sensor network: Routing protocols and attacks - A survey
    (Institute of Electrical and Electronics Engineers Inc., 2015) Purohit, R.; Sidhu, N.
    Based on end user application a network of hundreds or even thousands of sensor nodes, also known as wireless sensor network, can collect valuable data from an unassisted environment and transmit the information to the user. This transmission can be routed from one node to another using numerous routing protocols for wireless sensor network. Though purposive, there are some constraints of the sensor nodes due to computing power, storage capacity and limited power. In this review article, we will discuss wireless sensor network's architecture. Further, we will discuss classification of routing protocols according to some factors and summaries on their mode of operation. Lastly, we put up a comparative study on these protocols. ? 2015 IEEE.