Search Results

1 - 10 of 11 items :

  • "survivability" x
  • Information Technology x
Clear All
Rqa based approach to detect and prevent ddos attacks in voip networks

Abstract

Voice over Internet Protocol (VoIP) is a family of technologies for the transmission of voice over Internet. Voice is converted into digital signals and transmitted as data packets. The Session Initiation Protocol (SIP) is an IETF protocol for VoIP and other multimedia. SIP is an application layer protocol for creating, modifying and terminating sessions in VoIP communications. Since SIP is a more flexible and simple protocol, it is quite easy to add features to it.

Distributed Denial of Service Attack (DDoS) floods the server with numerous requests from various hosts. Hence, the legitimate clients will not be able to get their intended services. A major concern in VoIP and almost in all network domains is availability rather than data consistency. Most of the surviving techniques could prevent VoIP network only after collision. This paper proposes a Recurrence Quantification based approach to detect and prevent VoIP from a DDoS attack. This model detects the attack at an earlier stage and also helps to prevent from further attacks. In addition, this techniques enables the efficient utilization of resources. QUALNET has been used to simulate the operation of the proposed technology.

Open access
Escape-on-Sight: An Efficient and Scalable Mechanism for Escaping DDoS Attacks in Cloud Computing Environment

-Sale: Surviving Organized DDoS Attacks that Mimic Flash Crowds. - In: NSDI ’05: 2nd Symposium on Networked Systems Design & Implementation, 2005, 287-300. 12. Wang, K., C-Y Huang, S-J Lin, Y-D Lin. A Fuzzy Pattern-Based Filtering Algorithm for Botnet Detection, Computer Networks. - The International Journal of Computer and Telecommunications Networking, Vol. 55 , 2011, 3275-3286. 13. Tripathi, A., A. Mishra. Cloud Computing Security Considerations, IT Division. DOEACC Society, Gorakhpur Centre, Gorakhpur, India, 2010, IEEE

Open access
Mitigation of Distributed Denial of Service Attacks in the Cloud

. Berger. Botz-4-Sale: Surviving Organized DDo S Attacks that Mimic Flash Crowds. - In: Proc. of 2nd Symp. Networked Syst. Des. Implement, 2005, pp. 287-300. http://dl.acm.org/citation.cfm?id=1251224 21. Kaur, K., S. Vashisht. Data Separation Issues in Cloud Computing. - Int. J. Adv. Res. Eng. Technol., Vol. 1, 2013, No X, pp. 26-29. 22. Keromytis, A., V. Misra, D. Rubenstein. SOS: Secure Overlay Services. - In: Proc. of SIGCOMM, ACM, 2002, pp. 61-72. 23. Khan, A., N. Fisal, S. Hussai n. Man-in-the-Middle Attack and

Open access
Emphasis on Cloud Optimization and Security Gaps: A Literature Review

. Sudargho. Survivable Network Design under Optimal and Heuristic Interdiction Scenarios. – Journal of Global Optimization, Vol. 38 , June 2007, No 2, pp. 181-199. 62. Akgun, L., B. C. Tansel, R. K. Wood. The Multi-Terminal Maximum-Flow Network-Interdiction Problem. – European Journal of Operational Research, Vol. 211 , June 2011, No 2, pp. 241-251. 63. Marquez, J. E. R., C. M. Rocco, G. Levitin. Optimal Network Protection against Diverse Interdictor Strategies. – Reliability Engineering & System Safety, Vol. 96 , March 2011, No 3, pp. 374-382. 64

Open access
The effective management approach: integration of business, quality management and knowledge management processes

The effective management approach: integration of business, quality management and knowledge management processes

In the nowadays' dynamic environment only those organizations can survive that are able quickly react to opportunities and threats from the environment and to produce innovation ideas and turn them into products and services at a quicker pace then the competition. Therefore organizations seek different ways how to get ahead competitors. As quality management and knowledge management have proved themselves as perspective fields author of the paper proposes the integrated approach of both areas in order organizations can gain the most possible benefit from applying them. This paper shows the deeper aspects of both of these fields from the point of view of the process approach. Here is discussed the interactions of quality management, knowledge management and business processes. An elaborated organizational business and quality management process chart shows how quality management processes support the organization's management by providing information about system effectiveness, process performance, customer satisfaction and requirements. This information can be successfully used as a basis for decision-making concerning the necessary improvements and organization future goals. An integrated organizational business, quality management and knowledge management process chart demonstrates how effective management of an organization's knowledge assets can help to improve the organization's tasks in the sense of organizational performance, effectiveness and innovations. This paper is a beginning of the research toward the development of knowledge management services for quality management.

Open access
Unified Evaluation System for Audio Steganography Methods

References M. Wu, Multimedia Data Hiding. Princeton: Princeton University, Department of Electrical Engineering, 2001. B. Basile, K. Threlkeld, D. Valvano, Surviving Attacks on Information Hiding and Audio Watermarking , December 2008. [Online]. Available: http://cnx.org/content/m19003/1.1 Don H. Johnson, Signal-to-noise ratio. Scholarpedia, 2006. [Online]. Available: http://www.scholarpedia.org/article/Signal-to-noise_ratio [Accessed: Sept. 30, 2010]. http

Open access
The Onion Name System
Tor-powered Decentralized DNS for Tor Onion Services

] Michael T Goodrich, Roberto Tamassia, and Andrew Schwerin, Implementation of an authenticated dictionary with skip lists and commutative hashing, DARPA Information Survivability Conference & Exposition II, 2001. DISCEX’01. Proceedings, vol. 2, IEEE, 2001, pp. 68-82. [15] David Goulet and George Kadianakis, Random number generation during tor voting, https://gitweb.torproject.org/torspec.git/tree/proposals/250-commit-reveal-consensus.txt, 2015. [16] katmagic, Shallot, https://github.com/katmagic/Shallot, 2012. [17

Open access
Recognizing and Imitating Programmer Style: Adversaries in Program Authorship Attribution

): 12. [5] Caliskan-Islam, Aylin, Richard Harang, Andrew Liu, Arvind Narayanan, Clare Voss, Fabian Yamaguchi, and Rachel Greenstadt. “De-anonymizing programmers via code stylometry.” 24th USENIX Security Symposium (USENIX Security 15). 2015. [6] Caliskan-Islam, Aylin, Fabian Yamaguchi, Edwin Dauber, Richard Harang, Konrad Rieck, Rachel Greenstadt, and Arvind Narayanan. “When coding style survives compilation: De-anonymizing programmers from executable binaries.” arXiv preprint arXiv:1512.08546 (2015). [7] https

Open access
Dropping on the Edge: Flexibility and Traffic Confirmation in Onion Routing Protocols

and defenses. In Proceedings of ESORICS 2006 , September 2006. [50] P. Syverson, M. Reed, and D. Goldschlag. Onion Routing access configurations. In Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX 2000) , volume 1, pages 34–40. IEEE CS Press, 2000. [51] P. Syverson, G. Tsudik, M. Reed, and C. Landwehr. Towards an Analysis of Onion Routing Security. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability , pages 96–114. Springer

Open access
The Presence of the Customer and the Supplier Perspectives in Studies on Software Development Project Success

: The Dominant Dozen. Information Systems Management , 2006, vol. 23, N 4. p. 31-36. Gibbert, M., Ruigrok, W. and Wicki, B. What Passes as a Rigorous Case Study. Strategic Management Journal , 2008, vol. 29, N 13. p. 1465-1474. ISO/IEC 12207. ISO/IEC 12207:2008: Systems and Software Engineering — Software Life Cycle Processes. Geneva, Switzerland : ISO/IEC, 2008. Cusumano, M. A. The Business of Software: What Every Manager, Programmer, and Entrepreneur must Know to Thrive and Survive in

Open access