4
ZEBROS PROJECTS Office Address: No 4 / Flat No 3D, Sai Kiran Apts, First Main Road, Kasturba Nagar, Chennai-20 web: www.zebros.in e mail : [email protected] mob: 99400 98300 WAY TO YOUR GOAL SECURE COMPUTING PROJECT FINAL YEAR PROJECTS IEEE PROJECTS 2013-2014 CONTACT: 9940098300, 9500075001 E-Mail:[email protected]

To lie or to comply defending against flood attacks in disruption tolerant networks zebros ieee proj

Embed Size (px)

DESCRIPTION

Disruption Tolerant Networks (DTNs) utilize the mobility of nodes and the opportunistic contacts among nodes for data communications. Due to the limitation in network resources such as contact opportunity and buffer space, DTNs are vulnerable to flood attacks in which attackers send as many packets or packet replicas as possible to the network, in order to deplete or overuse the limited network resources. In this paper, we employ rate limiting to defend against flood attacks in DTNs, such that each node has a limit over the number of packets that it can generate in each time interval and a limit over the number of replicas that it can generate for each packet. We propose a distributed scheme to detect if a node has violated its rate limits.

Citation preview

Page 1: To lie or to comply defending against flood attacks in disruption tolerant networks zebros ieee proj

ZEBROS PROJECTS

Office Address: No 4 / Flat No 3D, Sai Kiran Apts, First Main Road, Kasturba Nagar, Chennai-20 web: www.zebros.in e mail : [email protected] mob: 99400 98300

WAY TO YOUR GOAL

SECURE COMPUTING PROJECT

FINAL YEAR PROJECTS

IEEE PROJECTS 2013-2014

CONTACT: 9940098300, 9500075001

E-Mail:[email protected]

Page 2: To lie or to comply defending against flood attacks in disruption tolerant networks zebros ieee proj

ZEBROS PROJECTS

Office Address: No 4 / Flat No 3D, Sai Kiran Apts, First Main Road, Kasturba Nagar, Chennai-20 web: www.zebros.in e mail : [email protected] mob: 99400 98300

To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks

ABSTRACT

Disruption Tolerant Networks (DTNs) utilize the mobility of nodes and the

opportunistic contacts among nodes for data communications. Due to the limitation in

network resources such as contact opportunity and buffer space, DTNs are vulnerable

to flood attacks in which attackers send as many packets or packet replicas as possible

to the network, in order to deplete or overuse the limited network resources. In this

paper, we employ rate limiting to defend against flood attacks in DTNs, such that each

node has a limit over the number of packets that it can generate in each time interval

and a limit over the number of replicas that it can generate for each packet. We propose

a distributed scheme to detect if a node has violated its rate limits. To address the

challenge that it is difficult to count all the packets or replicas sent by a node due to lack

of communication infrastructure, our detection adopts claim-carry-and check: each

node itself counts the number of packets or replicas that it has sent and claims the count

to other nodes; the receiving nodes carry the claims when they move, and cross-check if

their carried claims are inconsistent when they contact. The claim structure uses the

pigeonhole principle to guarantee that an attacker will make inconsistent claims which

may lead to detection. We provide rigorous analysis on the probability of detection, and

evaluate the effectiveness and efficiency of our scheme with extensive trace driven

simulations.

Page 3: To lie or to comply defending against flood attacks in disruption tolerant networks zebros ieee proj

ZEBROS PROJECTS

Office Address: No 4 / Flat No 3D, Sai Kiran Apts, First Main Road, Kasturba Nagar, Chennai-20 web: www.zebros.in e mail : [email protected] mob: 99400 98300

ZEBROS PROJECTS

SOFTWARE BASED HARDWARE BASED

Networking VLSI

Data Mining Mat lab

Grid Computing Robotics

Network Security Embedded

Image Processing Bio Medical

Web Applications Power Systems

Mobile Computing Power Electronics

Software Engineering Java with Embedded

Cloud Computing Android

What is IEEE?

The Institute of Electrical and Electronics Engineers or IEEE (read eye-triple-e) is Incorporated in the State of New York, United States. It was formed in 1963 by the merger of the Institute of Radio Engineers (IRE, founded 1912) and the American Institute of Electrical Engineers (AIEE, founded 1884). A membership organization comprised of engineers, scientists and students that sets standards for computers and communications. It is a nonprofit organization with more than 365,000 members in around 150 countries.

The IEEE describes itself as "the world's largest technical professional society -- promoting the development and application of electro technology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members."

Why IEEE based projects?

It grantees for standard

It assured latest solution for problems

It delivers new patented technologies at an ever-increasing pace

It access world-class technical information provided by the IEEE and cut down your

research time.

Page 4: To lie or to comply defending against flood attacks in disruption tolerant networks zebros ieee proj

ZEBROS PROJECTS

Office Address: No 4 / Flat No 3D, Sai Kiran Apts, First Main Road, Kasturba Nagar, Chennai-20 web: www.zebros.in e mail : [email protected] mob: 99400 98300

OUR FEATURES

24*7 Call Support

Project Execution through Remote System

20 Days Technical classes taken by Corporate Trainer

Unlimited Project & Technical Support through your academic

Project software Installation support

PROJECT SUPPORT

0th Review 1st Review

Abstract Existing System Disadvantages Proposed System Advantages Objective System Requirements System Architecture

Literature Survey Module List Module Description Data Flow Diagram Level DFD Module Wise DFD Problem Definition Review Document Explanation

2nd Review 3rd Review

Use case Diagram Class Diagram Collaboration Diagram Sequence Diagram Activity Diagram Testing & test cases Partial Code Screenshot for First two

module Review Document Explanation

Conclusion References Future Enhancement 65% code (Executable Format) Required Software Review Document Explanation

Final Review

Complete Code with Enhancement

Final Document (University Standard Format)

Complete Explanation for Project Concept & Code