{"title":"Traceback techniques against DDOS attacks: A comprehensive review","authors":"Krishan Kumar, A. L. Sangal, A. Bhandari","doi":"10.1109/ICCCT.2011.6075132","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075132","url":null,"abstract":"Distributed denial-of-service (DDoS) is a rapidly growing problem. In a typical DDOS attacks a large number of compromised hosts (Zombies) are amassed to send useless packets to jam the victim, or its Internet connection or both. The problem of identifying the attack sources is one of the hardest threats in internet security due to the similarity between the legitimate and illegitimate traffic. Firstly, it is important characteristics of the DDOS attacks that they hide their identities/origins (IP Spoofing). Secondly, the stateless nature of the IP routing where routers normally know only the next hop for the forwarding of packets rather than the complete end to end route taken by each packet make IP traceback difficult. IP traceback (the ability to trace IP packets from source to destination) is a significant step toward identifying and, thus, stopping, attackers. This Review paper evaluates and describes the effectiveness of different existing traceback methods. These methods are based on the enhanced router functions or modifications of the current protocols. Advantages and Disadvantages have also been described in existing techniques to carry out research in this problem.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115054634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for vulnerability minimization — Object oriented design perspective","authors":"A. Agrawal, R. Khan","doi":"10.1109/ICCCT.2011.6075131","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075131","url":null,"abstract":"The research on software security is still in its infancy. Moreover, the design phase of software development is much ignored. Though, enough research is done for improvement of object oriented design quality, the improvement of object oriented design security has received little attention. The unavailability of any existing framework for minimization of object oriented design vulnerability has made the task complicated and haphazard. The research proposes a metric based framework for minimization of object oriented design vulnerability. The framework minimizes vulnerability by restricting the flow of vulnerable information.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114471089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A host based intrusion detection system for DDoS attack in WLAN","authors":"Anuradha, Anita Singhrova","doi":"10.1109/ICCCT.2011.6075142","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075142","url":null,"abstract":"Intrusion detection system (IDS) plays a vital role in a computer security scheme as the number of security-breaking attempts originating inside organizations is increasing steadily. In this paper, we describe an architecture of Host based Intrusion Detection System for DoS attack in distributed WLAN (HIDS). The proposed system is an intelligent system that will detect the intrusion dynamically and periodically on estimating the intruder association respective to the current node with its neighbor nodes. It also uses the concept of Bloom filter, in which it stores destination IP address that is used to detect an intruder with misuse detection approach.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125831756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the approach of combining trust and security for securing mobile agents: Trust enhanced security","authors":"Priyanka Dadhich, Kamlesh Dutta, M. C. Govil","doi":"10.1109/ICCCT.2011.6075149","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075149","url":null,"abstract":"Mobile Agent systems employ a number of security features to address the various threats. Despite the employment of various security features by most systems, there is a lack of security standard that covers all the aspects of their operations. Due to the mobility feature in distributed systems, various security concerns like auditing, secure communication, availability, accountability becomes further complicated and hence prove to abuse and misuse. Examining the above problems and uncertainty in behavior of mobile agents, it is thought to combine security with trust. We refer it to trust enhanced security that combines trust decisions into security decisions-making processes through explicit specification and management of security-related trust relationships. Trust Management entails collecting the information necessary to establish a trust relationship and dynamically monitoring and adjusting the existing trust relationships.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125836122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposed cellular network for Indian conditions for enhancement of spectral density and reduction of power consumption & RF pollution","authors":"Sumit Katiyar, R. Jain, N. K. Agrawal","doi":"10.1109/ICCCT.2011.6075182","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075182","url":null,"abstract":"With the exponentially increasing demand for wireless communications the capacity of current cellular systems will soon become incapable of handling the growing traffic. Since radio frequencies are diminishing natural resources, there seems to be a fundamental barrier to further capacity increase. The solution can be found by using smart antenna systems. Smart or adaptive antenna arrays consist of an array of antenna elements with signal processing capability that optimizes the radiation and reception of a desired signal, dynamically. Smart antenna can place nulls in the direction of interferers via adapting adaptive updating of weights linked to each antenna element. They thus cancel out most of the co-channel interference resulting in better quality of reception and lower dropped calls. Smart antenna can also track the user within a cell via direction of arrival algorithms. This paper focuses on about the smart antenna in hierarchical cell clustering (overlay-underlay) with demand based frequency allocation techniques in cellular mobile radio networks in INDIA.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121808962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An aspect-oriented conceptual level design for semantic web based application","authors":"Abhijit Sanyal, S. Choudhury","doi":"10.1109/ICCCT.2011.6075154","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075154","url":null,"abstract":"Advanced web application design demands the concern of the customers to be used for describing the inherent semantics in an integrated way. In this paper we have proposed a graph-based aspect-oriented conceptual data model, ‘Semantic Graph Data Model’ (SGDM), for web based application. This not only offers a pictorial view with better understandability but also provides the procedure for describing the semantic resources. SGDM represents them in a structured manner with reasoning through aspect orientation. The proposed model also supports the automatic domain model development for similar business problems by effective domain-knowledge reuse. Moreover, SGDM supports the object-oriented paradigm and also flexible to represent semi-structured as well as hypertext data through a multilayered graph structure. The Product Specific Model (PSM) SQL: 2003 implementation of our proposed model SGDM is being done through GME tool.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122333881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed system protocol verification: A modal tableau based model checking approach","authors":"T. Samanta, D. Sarkar","doi":"10.1109/ICCCT.2011.6075119","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075119","url":null,"abstract":"Distributed system protocol verification has the intrinsic problem of mechanizability of intricate reasoning pattern and/or state-space explosion. The former arises in case of theorem proving approach due to the ingenuity involved in constructing a proof and the latter is encountered in model checking approach while carrying out composition of a large number of processes that constitute a typical distributed system. In the present paper, the authors have improvised a technique combining the tableau based theorem proving approach and model checking. The process has been illustrated using the example of Leader Election Protocol in synchronous rings.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126411501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clustering method based on fuzzy equivalence relation","authors":"A. Raut, G. Bamnote","doi":"10.1109/ICCCT.2011.6075209","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075209","url":null,"abstract":"Fuzzy clustering techniques are used to construct clusters with uncertain boundaries and allows that one object belongs to overlapping clusters with some membership degree. In other words, the fuzzy clustering is to consider not only the belonging status of object to the clusters, but also to consider to what degree do the object belong to the cluster. In this paper, a technique called “fuzzy hierarchical clustering” is being proposed that creates the clusters of web documents using fuzzy equivalence relation","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127923053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Gupta, Ranjana Sridhar, Jaya Chaudhary, N. Pandey, Maneesha Gupta
{"title":"Performance comparison of MCML and PFSCL gates in 0.18 μm CMOS technology","authors":"K. Gupta, Ranjana Sridhar, Jaya Chaudhary, N. Pandey, Maneesha Gupta","doi":"10.1109/ICCCT.2011.6075165","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075165","url":null,"abstract":"In this paper, the performance of two popular source coupled logic styles, namely, MOS Current Mode Logic (MCML) and Positive Feedback Source Coupled Logic (PFSCL) is investigated. A number of SPICE simulation runs have been carried out using 0.18 μm CMOS technology parameters. The PFSCL circuit show better results than the MCML circuit in terms of propagation delay and area. The effect of process variations through Monte Carlo simulations however shows lower variations in MCML circuits style.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117200489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New proxy signature scheme with message recovery using verifiable self-certified public keys","authors":"Namita Tiwari, Sahadeo Padhye","doi":"10.1109/ICCCT.2011.6075130","DOIUrl":"https://doi.org/10.1109/ICCCT.2011.6075130","url":null,"abstract":"A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former when the former is not available. In this paper, we present a new proxy signature scheme with message recovery using verifiable self-certified public key. The self-certified public key has an advantage which can withstand public key substitution attacks. Proposed scheme is secure against several active attacks and forgery attacks also. Another advantage of the proposed scheme is that the use of verifiable self-certified public key overcomes the weakness of repudiability of the self-certified public key and accomplishes the tasks of public key verification, proxy signature verification, and message recovery in a logically single step. In addition, the proposed scheme satisfies all properties of strong proxy signature and does not use secure channel in the communication between the original signer and the proxy signer.","PeriodicalId":285986,"journal":{"name":"2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114260223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}