{"title":"Link Failure Detection and Alternate Path Tracing in OpenFlow Based Ethernet Networks","authors":"V. Muthumanikandan, C. Valliyammai, S. Harish","doi":"10.1109/ICOAC.2017.8441439","DOIUrl":"https://doi.org/10.1109/ICOAC.2017.8441439","url":null,"abstract":"Software defined networking technology, centralizes and simplifies the control of network with centralized network provisioning and guaranteed content delivery. The conventional networks face link failure as its one of the major vulnerabilities that occurs within the networking topology. The paper proposes a technique to handle multiple link failure using Bidirectional Forwarding Detection(BFD). The one or more link failures occur due to slow convergence, pre-defined backup bandwidth, and loops resulting in degradation of the network performance. Widely, these failures cause paths that are not valid and reachable within wired networks. The length of every path containing an unsuccessful link is recorded and the total invalid routing time is computed. The out of reach paths record the overall range of paths that are unsuccessful during network partitioning. The multiple link failures are handled using multiple BFD sessions that are maintained by transmitting hello messages within the network. The corresponding neighbour nodes can have synchronized clock to detect failures at the same time.","PeriodicalId":329949,"journal":{"name":"2017 Ninth International Conference on Advanced Computing (ICoAC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127336089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An SLA Design with Digital Forensic Capabilities","authors":"P. Keserwani, S. G. Samaddar","doi":"10.1109/ICOAC.2017.8441460","DOIUrl":"https://doi.org/10.1109/ICOAC.2017.8441460","url":null,"abstract":"Cloud computing is getting rapid momentum as an alternative to traditional and professional Infrastructure of Information Technology due to its attractive features of getting everything in a service mode rather than in a product mode. Service mode using cloud makes the products and services cost effective. As consumers willing to pass on their tasks as services provider to cloud providers, trust factor is required especially when consumers have critical data. The Service Level Agreements (SLA) between cloud service consumers (CSCs) and cloud service providers (CSPs) play important role for building up trust between involved parties. SLA between parties is established in a satisfactory way upon agreements. Cloud computing is very dynamic in nature, hence continuous monitoring on Quality of Service (QoS) attributes as mentioned in SLA is required to be implemented dynamically. Managing SLAs is complicated due to complex nature of the cloud due to multi-tenancy and distributed resource sharing. The paper proposes a methodology for SLAs to be signed digitally and its further management in a single or multi cloud computing environment. The framework had been used in Web Service Level Agreement (WSLA) for monitoring and enforcement of SLA using Service Oriented Architecture (SOA) environment. Cloud broker agents have the capability of automatic extraction of metrics from SLAs. The use of the third party support feature to manage the digital forensics in case of requirement of any violation of SLAs suggested in the present paper and it is also solving the trust issues as demonstrated in digital forensics usage from the initiation of SLA; making the SLA naturally forensic enabled.","PeriodicalId":329949,"journal":{"name":"2017 Ninth International Conference on Advanced Computing (ICoAC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125328916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Load Balancing in Cloud Environment using Stackelberg's Approach","authors":"B. Vinayagasundaram, R. Swathy","doi":"10.1109/ICOAC.2017.8441189","DOIUrl":"https://doi.org/10.1109/ICOAC.2017.8441189","url":null,"abstract":"Cloud Computing, one of the latest standard of large scale and parallel computing, attracts more users requiring utility computing with better and fast service. Load balancing is one of the key parameters that determine a cloud data center's performance. One of the main problems with respect to load balancing is that all the physical hosts in a data center are not efficiently used resulting in an imbalance and suboptimal performance. This paper has focused on how the physical hosts for deploying requested tasks is selected based on the requirement of the request by using Stackelberg's approach. Most of the works that has been done previously in this area utilize a series of algorithms that selects the optimal host in the data center based on the intelligence that is confined to the algorithm alone and doesn't have a holistic approach that considers the unutilized resources amongst all hosts within a data center. The proposed model in this work makes a decision of which physical host must be allocated to a requestbased on the requirements of the incoming task, current load on the data center hosts, available or unused resources in the data center. The model uses First-in-First-out allocation strategy for task assignments. Simulation results compared with the existing works show that the proposed approach has decreased the failure number of task deployment events obviously, and reduced the makespan.","PeriodicalId":329949,"journal":{"name":"2017 Ninth International Conference on Advanced Computing (ICoAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128757108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Vulnerabilities Caused by WebView Exploitation in Smartphone","authors":"S. F. Hidhaya, A. Geetha","doi":"10.1109/ICOAC.2017.8441444","DOIUrl":"https://doi.org/10.1109/ICOAC.2017.8441444","url":null,"abstract":"WebView is an essential component in Smartphone platforms, which enables the Smartphone applications (apps) to embed a simple yet powerful web browser inside them. In addition, it also enables rich interactions between apps and the web pages that are loaded on the WebView. To achieve this interaction, WebView provides a number of APIs that allow code in apps to invoke and be invoked by the JavaScript code within the web pages and to intercept and modify the events that occur within the web pages. With the help of these rich features, apps can become customized browsers for their intended web applications. However, the design of WebView changes the landscape of the Web, especially from the security perspective. Two essential components of the Web's security infrastructure are the Trusted Computing Base (TCB) and the sandbox protection. These are weakened upon the usage of WebView and its associated APIs. As a result, malicious attacks can be launched either against the apps or by the apps through the usage of WebView. The objective of this work is to explore and demonstrate such malicious attacks and to build a system that performs automated static analysis on apps for detecting WebView related vulnerabilities.","PeriodicalId":329949,"journal":{"name":"2017 Ninth International Conference on Advanced Computing (ICoAC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129581373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LVCMOS based Green Data Flip Flop Design on FPGA","authors":"G. Gupta, A. Kaur, B. Pandey","doi":"10.1109/ICOAC.2017.8441192","DOIUrl":"https://doi.org/10.1109/ICOAC.2017.8441192","url":null,"abstract":"An energy and power efficient Data Flip Flop hasbeen designed on FPGA in the following paper in order to meet the energy crises across the globe. Two energy and power efficient techniques have been implemented on device in order to contribute towards Green Communication. One of the techniques is known as Frequency Scaling technique and another one is known as IO Standard Scaling. In both the techniques the total power dissipation by the device has been analyzed and then the least power consumed frequency and IO standard has been find out amongst all the tested frequencies and IOstandards. Out of all the 3 tested frequencies of 1 MHz, 1 GHz and 1 THz, it has been advised to operate the device at a frequency range of MHz as compare to GHz and THz since large amount of power can be saved by using the lower frequency range. Also the device has been tested on 4 different IOstandards of Low Voltage Complementary Metal Oxide Semiconductor (L VCMOS) logic family that are L VCMOS 15, L VCMOS 18, L VCMOS 25 and LVCMOS 33. Out of all 4 tested IOstandards it has been advised to operate the device on L VCMOS 15 since least power is consumed by this IOstandard of L VCMOS logic family as compared to the other IO standard of L VCMOS logic family. In this way by choosing the optimum operating frequency and IO standard, an energy and power efficient device can be designed.","PeriodicalId":329949,"journal":{"name":"2017 Ninth International Conference on Advanced Computing (ICoAC)","volume":"155 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130310288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Neuro-Fuzzy Inference System for Assessing the Maintainability of the Software","authors":"P.R. Therasa, P. Vivekanandan","doi":"10.1109/ICOAC.2017.8441467","DOIUrl":"https://doi.org/10.1109/ICOAC.2017.8441467","url":null,"abstract":"Measuring software maintainability at an earlier stage is a non-trivial task as it decides the software life cycle cost and customer satisfaction. Software designing is carried out using many object-oriented (OO) techniques. Among these, class modeling is one of the frequently used techniques. An enhanced Adaptive Neuro-Fuzzy Inference System (ANFIS) is proposed to assess the maintainability of the software at the design level. For measuring the maintainability, the metrics derived from the UML class diagram are used. The metrics namely coupling, and size are used as inputs for the proposed ANFIS based model. The size metric represents the structural complexity of the code whereas the coupling metrics represent the degree of interdependence between the software modules. The membership functions and the neural network parameters are determined based on the low mean square error value. The performance of the ANFIS model is evaluated using Root Mean Squared Error (RMSE), Coefficient of determination (R2) and Adj R2 techniques. Also, the performance of the proposed model is compared with Artificial Neural Network (ANN) model and the classical Fuzzy Inference System (FIS) model. The outcome of the ANFIS model reveals that it results in better performance when compared with ANN and FIS techniques.","PeriodicalId":329949,"journal":{"name":"2017 Ninth International Conference on Advanced Computing (ICoAC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121269771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Track Health Care Using Location Based QoS Web Service Recommendation System","authors":"Y. Dhas, P. Jeyanthi","doi":"10.1109/ICOAC.2017.8441191","DOIUrl":"https://doi.org/10.1109/ICOAC.2017.8441191","url":null,"abstract":"Web services are referred as an open standard (XML, SOAP, and HTTP etc.) based Web-applications that interact with other Web applications for the purpose of exchanging data. Collaborative recommender system recommends Items to the user based on the actions that other users in the same environment did in the past. Web service recommendation plays an important role for both the service providers and active users in building reliable service - oriented systems. It has become vital to resolve typical problems of recommendation system due to the increased number of Web services advertised on the Internet. Since the traditional service recommendations do not have much concern about the composite service so in this paper we use the QoS values to recommend the best service. This paper focuses on recommending healthcare, health specialists and diagnostic centers to the health-seeker. Thus for this purpose the health-seeker location is tracked via IP Address and mapped on the Google map to track down the target location. The list of health care, health specialists and diagnostic centre will be displayed based on the historic QoS values. Finally, every user has to rate the health specialists/ medical practitioners, health care and diagnostic centers to give the QoS values.","PeriodicalId":329949,"journal":{"name":"2017 Ninth International Conference on Advanced Computing (ICoAC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133870140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Access Log Anomaly Detection","authors":"Ma. Tharshini, M. Ragavinodini, R. Senthilkumar","doi":"10.1109/ICOAC.2017.8441194","DOIUrl":"https://doi.org/10.1109/ICOAC.2017.8441194","url":null,"abstract":"Maintaining network security is very important and tedious in today's world. Since web applications are not built on sound security methodology, they are the major target for the attackers. Analyzing access logs for detecting anomalous activities is a form of defense achieved in this paper. Anomaly detection is important because if the anomalies are not detected apriori, it may lead to hacking of the entire system. This paper is based on analyzing the stored access logs and detecting the anomalous events. Our experiment evaluates both static and dynamic logs. In dynamic implementation, the pattern matching approach is used to detect the anomalies from access logs. In Weka, the supervised neural network approach gives better anomaly prediction than unsupervised neural network approach for static logs. Maximum prediction accuracy is achieved in supervised neural networks by using Naive Bayes Multinomial Text Algorithm. Since the input attributes (logs) are strings, the use of Bayes classifier gives us a better accuracy rate while compared to other classifier algorithms. The proposed approach identifies the suspicious activities and serious anomalies that may be one of the way for the hackers to hack our system. Overall error rate of our supervised method is less than 10% and unsupervised method is approximately 30%.","PeriodicalId":329949,"journal":{"name":"2017 Ninth International Conference on Advanced Computing (ICoAC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128419482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Lightweight Incognito Key Exchange Mechanism for LTE-A Assisted D2D Communication","authors":"S. Baskaran, G. Raja","doi":"10.1109/ICOAC.2017.8441370","DOIUrl":"https://doi.org/10.1109/ICOAC.2017.8441370","url":null,"abstract":"Security, privacy, and availability are the crucial factors in Device-to-Device (D2D) communication. 5G is enabled with IPv6 to provide IP to the growing D2D communication and they are expected to operate over the LTE-Advanced (LTE-A) networks. With the increase in the 5G devices, there is a major security threat as any high-level device like smartphones has the ability to hack the network. The higher capability device can spoof IP of lower capability devices like household equipment to gain access into a trusted environment. Henceforth, there is a need for promising security architecture to protect a wide range of 5G devices and data. With the increase in the 5G devices, the device security and mobility management task at the core network will increase tremendously and impose huge core network overhead. Meanwhile 5G, multi-tier architecture has a stringent latency requirement which brings new security challenges due to frequent handovers and a wide range of authentication mechanisms in 5G small cells. Therefore we propose a Lightweight Incognito Key Exchange (LIKE) protocol for LTE-A supported D2D authentication and secret key sharing. Our objective is to provide a secure and user privacy ensured D2D communication that can promise a secure, low-cost and highly available D2D service for the upcoming delay and energy constrained 5G devices.","PeriodicalId":329949,"journal":{"name":"2017 Ninth International Conference on Advanced Computing (ICoAC)","volume":"92 34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128885388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kshira Sagar Sahoo, B. Sahoo, Manikanta Vankayala, Ratnakar Dash
{"title":"Detection of Control Layer DDoS Attack using Entropy metrics in SDN: An Empirical Investigation","authors":"Kshira Sagar Sahoo, B. Sahoo, Manikanta Vankayala, Ratnakar Dash","doi":"10.1109/ICOAC.2017.8441392","DOIUrl":"https://doi.org/10.1109/ICOAC.2017.8441392","url":null,"abstract":"The Software Defined Networks (SDN) and OpenFlow technologies become the emerging networking technology that supports the dynamic nature of the network functions through simplified network management. The main innovation behind SDN is the decoupling of forwarding plane and control plane. In control plane, the controller provides a pivotal point of control to distribute the policy information throughout the network through a standard protocol like OpenFlow. Despite numerous benefits, SDN security is still a matter of concern among the research communities. The Distributed Denial-of-Service (DDoS) attack have been posing a tremendous threat to the Internet since a long back. The variant of this attack is quickly becoming more and more complex. With the advancement in network technologies, on the one hand SDN become an important tool to defeat DDoS attacks, but on another hand, it becomes a victim of DDoS attacks due to the potential vulnerabilities exist across various SDN layer. Moreover, this article focuses on the DDoS threat to control plane which is the central point of SDN. The entropy-based DDoS detection method is a wildly used technique in the traditional network. For detection of DDoS attack in control layer of SDN, few works have employed entropy method. In this paper, taking the advantages of flow based nature of SDN, we proposed General Entropy (GE) based DDoS attack detection mechanism. The experimental results show that our detection mechanism can detect the attack quickly and achieve a high detection accuracy with a low false positive rate.","PeriodicalId":329949,"journal":{"name":"2017 Ninth International Conference on Advanced Computing (ICoAC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121352686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}