IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 3    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 3,March 2012
Recognition of mischievous data packets In the networking
Full Text(PDF, )  PP.463-466  
.Bala Venkata Kishore, B.Purnaiah, B.kishore Babu
Mobile ad hoc network, Security Goals, efficient scheme, security, public-key, cryptography, Traffic validation, responses
The TCP has provided the primary means to transfer data reliably across the Internet however TCP has imposed limitations on several applications. Measurement Modern networks routinely drop packets when the load temporarily exceeds their buffering capacities. Early detection protocols have tried to address this problem with a user-defined threshold the finding of detecting and removing compromised routers can be thought of as an instance of anomalous behavior-based intrusion detection. That can be the compromised router can that identified by correct routers when it deviates from exhibiting expected behavior. This protocol can be evaluated in a small experimental network and demonstrate that it is capable of accurately resolving extremely
[1] R. Thomas, ISP Security BOF, NANOG 28, http://www.nanog org/mtg-0306/pdf/thomas.pdf, June 2003.

[2] K.A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, and R.A. Olsson, “Detecting Disruptive Routers: A Distributed Network Monitoring Approach,” Proc. IEEE Symp. Security and Privacy (S&P ’98), pp. 115- 124, May 1998.

[3] A.T. Mizrak, Y.-C. Cheng, K. Marzullo, and S. Savage, “Detecting and Isolating Malicious Routers,” IEEE Trans. Dependable and Secure Computing, vol. 3, no. 3, pp. 230-244, July-Sept. 2006.

[4] L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz, “Listen and Whisper: Security Mechanisms for BGP,” Proc. First Symp.Networked Systems Design and Implementation (NSDI ’04), Mar. 2004.

[5] S. Kent, C. Lynn, J. Mikkelson, and K. Seo, “Secure Border Gateway Protocol (Secure-BGP),” IEEE J. Selected Areas in Comm.,vol. 18, no. 4, pp. 582-592, Apr. 2000.

[6] Y.-C. Hu, A. Perrig, and D.B. Johnson, “Ariadne: A Secure OnDemand Routing Protocol for Ad Hoc Networks,” Proc. ACM MobiCom ’02, Sept. 2002.

[7] B.R. Smith and J. Garcia-Luna-Aceves, “Securing the BorderGateway Routing Protocol,” Proc. IEEE Global Internet, Nov. 1996.

[8] S. Cheung, “An Efficient Message Authentication Scheme for LinkState Routing,” Proc. 13th Ann. Computer Security Applications Conf.(ACSAC ’97), pp. 90-98, 1997.

[9] M.T. Goodrich, Efficient and Secure Network Routing Algorithms, provisional patent filing, Jan. 2001.

[10] R. Perlman, “Netw ork Layer Protocols w ith Byzantine Robustness,”PhD dissertation, MIT LCS TR-429, Oct. 1988.

[11] V.N. Padmanabhan and D. Simon, “Secure Traceroute to Detect Faulty or Malicious outing,” SIGCOMM Computer Comm. Rev.,vol. 33, no. 1, pp. 77-82, 2003.

[12] I. Avramopoulos and J. Rexford, “Stealth Probing: Efficient DataPlane Security for IP Routing,” Proc. USENIX Ann. Tecnical Conf.(USENIX ’06), June 2006.

Untitled Page