Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation

Networking
Name Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation Technology NS2 Category Networking Description Evaluation of Wireless Sensor Networks (WSN) for performance evaluation is a popular research area and a wealth of literature exists in this area. Denial-of-Service (DoS) attacks are recognized as one of the most serious threats due to the resources constrained property in WSN. The Zigbee model provided in OPNET 16 is suitable for modelling WSNs. This paper presents an evaluation of the impact of DoS attacks on the performances of Wireless Sensor Networks by using the OPNET modeller. Numerical results, discussions and comparisons are provided for various simulation scenarios. The results can be of great help for optimisation studies in WSN environments under DoS attacks as well as understanding the severity and critical nodes…
Read More

Network Traffic Monitoring Using Intrusion Detection System

Networking
Name Network Traffic Monitoring Using Intrusion Detection System Technology NS2 Category Networking Description Security is a big issue for all networks in today’s enterprise environment. Many methods have been developed to secure the network infrastructure and communication over the Internet, among them the use of firewalls, encryption, and virtual private networks. Intrusion detection is a relatively new addition to such techniques. IDS protect a system from attack, misuse, and compromise. It can also monitor network activity. Network traffic monitoring and measurement is increasingly regarded as an essential function for understanding and improving the performance and security of our cyber infrastructure. IEEE Paper Yes IEEE Paper Year 2012 Contact Form [contact-form-7 id="71" title="Contact form 1"]
Read More

Analyzing Network Traffic To Detect Self-Decrypting Exploit Code

Networking
Name Analyzing Network Traffic To Detect Self-Decrypting Exploit Code Technology NS2 Category Networking Description ABSTRACT Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are also evolving. Recent techniques for evasion of exploit detection include polymorphism (code encryption) and metamorphism (code obfuscation). This paper addresses the problem of detecting in network traffic polymorphic remote exploits that are encrypted, and that self-decrypt before launching the intrusion. Such exploits pose a great challenge to existing malware detection techniques, partly due to the non-obvious starting location of the exploit code in the network payload. IEEE Paper Yes IEEE Paper Year 2013 Contact Form [contact-form-7 id="71" title="Contact form 1"]
Read More

Genetic algorithm for energy efficient QoS Multicast Routing

Networking
Name Genetic algorithm for energy efficient QoS Multicast Routing Technology NS2 Category Networking Description The consideration of energy consumption in wireless ad hoc networks prevents the problem of the network exhausting batteries, thus partitioning the entire network. Power-aware multicasting is proposed to reduce the power consumption. This letter presents an energy-efficient genetic algorithm mechanism to resolve quality of service (QoS) multicast routing problem, which is NP-complete. The proposed genetic algorithm depends on bounded end-to-end delay and minimum energy cost of the multicast tree. Simulation results show that the proposed algorithm is effective and efficient. IEEE Paper Yes IEEE Paper Year 2013 Contact Form [contact-form-7 id="71" title="Contact form 1"]
Read More

Lightweight Sybil Attack Detection in MANETs

Networking
Name Lightweight Sybil Attack Detection in MANETs Technology tcl (NS2) Category Networking Description Fully self-organized mobile ad hoc networks (MANETs) represent complex distributed systems that may also be part of a huge complex system, such as a complex system-of-systems used for crisis management operations. Due to the complex nature of MANETs and its resource constraint nodes, there has always been a need to develop lightweight security solutions. Since MANETs require a unique, distinct, and persistent identity per node in order for their security protocols to be viable, Sybil attacks pose a serious threat to such networks. A Sybil attacker can either create more than one identity on a single physical device in order to launch a coordinated attack on the network or can switch identities in order to weaken the…
Read More