Professional Documents
Culture Documents
Ishan Isaa Lit Review PDF
Ishan Isaa Lit Review PDF
Subrina Sultana, Sumaiya Nasrin , Farhana Kabir Lipi , Md Afzal Hossain, Zinia Sultana and Fatima Jannat
Department of Computer Science and Engineering Military Institute of Science and Technology, Dhaka,
Bangladesh Faculty of Computer Science and Information Technology University of Malaya, Kuala
Lumpur, Malaysia
S Rajashree , Soman K S , Dr. Pritam Gajkumar Shah Research Scholar, Department of Computer Science
and Engineering, Jain University, Bangalore, India
CHAOQIN ZHANG, GUANGWU HU , GUOLONG CHEN, ARUN KUMAR SANGAIAH , PING’AN ZHANG, XIA
YAN, AND WEIJIN JIANG
In this paper we are Digital signature are Most of current The trade-off for The further
tracing the origin of the essential in today’s single packet perfect resilience to enhancement
fake packet. For this we modern worldto verify the traceback schemes packet loss is that needed for this
are using the extended sender of a document’s tend to log packets’ the sender needs to project is to limit
RIHT and MABS identify. A digital signature information on sign each packet, the number of
technology using. is represented in a routers. Here we are which incurs more routers used to
[1]Conventional block- computer as a string of implementing the computation pass information.
based multicast binarydigits. The signature Packet marking and overhead than The critical issue
authentication schemes is computer using as a set the packet logging conventional block- is of high cost due
overlook the of rules andparameters Schemes. Packet based schemes. to heavy
heterogeneity of such that the identity of marking means, the Therefore, efficient information.
receivers by letting the the person signing the rooters information signature generation Information send
sender choose the document as well as the passed in the packets is desirable at the to the client
block size, divide a originality of the data can header fields. Packet sender. consist of details
multicast stream in be verified. The signature logging means the Communication of each router. As
blocks, associate each is generated by the use of router denote the efficiency and a result of that
block with a signature, a primary key. The private number of the digest bandwidth efficiency information
and spread the effect of key is known only to the of the packet. Our is higher compared becomes larger
the signature across all user. The signature is existing [4]RIHT have to other and more routers
the packets in the block verified makes use of a some negatives. To conventional will be required
through hash graphs or public keywhich overcomes these schemes. The logging to pass data
coding algorithms. The corresponds to the private negatives we are time of routers which is
correlation among key. With every user using the MABS interface number expensive. Hence
packets makes them havinga public/private key technology. The and integrates for the
vulnerable to packet pair, this is an example of propose a hybrid IP packet logging with development and
loss, which is inherent public-keycryptography. traceback scheme hash table is launching of the
in the Internet and Public keys, which are called Hybrid IP apparently shorter project we have
wireless networks. known by everyone, canbe Traceback combining than that of other to face more
Moreover, the lack of used to verify the packet marking and schemes. In routers financial issues.
Denial of Service signature of a user. The packet logging. It interface number
resilience renders most private key, which is never uses packet marking and integrates
of them vulnerable to shared , is used in to reduce the number packet logging with
packet injection in signature generation, of routers required hash table , we only
hostile environments. whichcan only done by the for logging. Other need to get index
In this paper, we user. Digital signature are researchers have stored on the
propose a novel used to detect proposed new request packet’s
multicast unauthorizedmodifications schemes to further marking field, and
authentication to data. Also the recipient reduce the storage then with index we
protocol, namely of a digitally requirement for can just obtain the
including two schemes. signeddocument in proving router logging and to logged data from the
The basic scheme to a third party that the decrease the number hash table without
eliminates the Document was indeed of routers required any search. Since we
correlation among signed by the person who for logging, Even do not need to
packets and thus it is claimed to be signed though the marking spend time on
provides the perfect by. This is known as non field of packet in search, the path
resilience to packet repudiations because the Huffman codes, can reconstruction in our
loss, and it is also person whosigned the store a path of longer scheme is obviously
efficient in terms of document cannot length than in the faster. A fixed
latency, computation, repudiate the signature at fixed-length coding, storage requirement
and communication a later time . Digital the marking field may in packet logging
overhead due to an signature algorithms can be full before the without the need to
efficient cryptographic used in e – mails, packet reaches its refresh the logged
primitive called batch electronic fund transfer, destination. In such a tracking information.
signature, which electronic data exchange, situation, they need Also, the proposed
supports the just like anyapplications to log the packet’s scheme has zero
authentication of any that would need to assure information on the false positive and
number of packets the integrity andoriginality routers that fail to false negative rates
simultaneously. We of the data. mark on the marking in an attack-path
also present an [2]DSA field. These routers reconstruction. Apart
algorithm which ensure then pair the packet from these
that data is coming digest with the properties, our
from admin or not. marking field, and scheme can also
then they log the pair deploy a marking
into a log table. After field as a packet
logging, the routers identity to filter
clear the marking malicious traffic and
field and repeat the secure against
marking process. DoS/DDoS attacks.
When a router needs Consequently, with
to recover the high accuracy, a low
marking field of a storage requirement,
request packet using and fast
its log table, it computation, routers
computes the digest interface number
of the request packet and integrates
and searches the log packet logging with
table using hash table can serve
exhaustive search. It as an efficient and
could recover the secure scheme for
marking field by the hybrid IP traceback.
above steps. But
there are the
following two
problems in the
Huffman codes: MRT
and MORE’s
schemes. First, after
logging, if the
marking field of the
packet is still 0 on the
adjacent downstream
router, it will be
identified as a logged
router for the packet
while tracing back.
Then it will fail to find
the origin. Second,
since the digests in a
log table might have
a collision, it causes
the false positive
problem during the
path re construction.
The storage
requirement is
proportional to the
number of logged
packets.
Unfortunately, in the
flooding- based
attack, a huge
amount of attack
packets will log on
the same router.
Thus, it demands a
high storage
requirement on the
logged router
Enhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP Addresses
Fahd Al-Haidari Mohammed H. Sqalli College of Computer Science and Engineering King Fahd University
of Petroleum and Minerals (KFUPM) Dhahran 31261, KSA Email: {fahdhyd, sqalli}@kfupm.edu.sa Khaled
Salah Department of Computer Engineering Khalifa University of Science, Technology and Research
(KUSTAR) Sharjah 573, UAE Email: khaled.salah@kustar.ac.ae