Detection of Spoofing Using Packet Marking Algorithm

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 5

Abstract

Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. However the localization infrastructure can be subjected to non cryptographic attacks, such as signal attenuation and amplification that cannot be addressed by traditional security services. An interruption in an authorized users access to a computer network, typically one caused with malicious intent (DDOS). Although the means to carry out motives for and targets of a DOS attack may vary, it generally consists of efforts to indefinitely interrupt services of a host connected to the Internet (DDOS). EPPM significantly reduces the number of IP (Internet protocol) or IP packets required to convey the relevant information, when compared to the prior best known scheme. Compared with the hash-based approach, our approach incurs less storage overhead and less access time overhead at routers. Specifically, the storage overhead is reduced to roughly one half, and the access time requirement is decreased by a factor of the number of neighbour routers.

Authors and Affiliations

B. Balasankari , M. G. MathanKumar

Keywords

Related Articles

Performance Analysis of SEP and LEACH for Heterogeneous Wireless Sensor Networks

While wireless sensor networks are increasingly equipped to handle more complicated functions, these battery powered sensors which used in network processing, use their constrained energy to enhance the lifetime of the n...

Dynamic Grouping of Semantically Similar User Search Histories

Users over Internet make queries continuously for various kinds of information. Such information might be about various tasks and that is done through existing search engines. When queries are made by users continuously,...

Change Management for Human in Enterprise Resource Planning System

In recent years, there are more enterprises that use Enterprise Resource Planning (ERP) to gain significant advantages through allowing for An organization to control its business processes and gaining benefits of enhan...

A Novel Approach to Detect Spam Worms Propagation with Monitoring the Footprinting

One of the key security threats on the Internet are the compromised machines that can be used to launch various security attacks such as spamming and spreading malware, accessing useful information and DDoS. Attackers fo...

Reducing Binding update in NEMO Supported PMIPV6

Proxy Mobile IPV6 (PMIPV6) is a network-based mobility management protocol,designed to keep track of individual mobile node’s mobility. Numerous research works are in progress to enhance functionality of PMIPV6 to suppor...

Download PDF file
  • EP ID EP94235
  • DOI -
  • Views 143
  • Downloads 0

How To Cite

B. Balasankari, M. G. MathanKumar (2014). Detection of Spoofing Using Packet Marking Algorithm. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 10(5), 253-256. https://europub.co.uk./articles/-A-94235