Volume 1 issue 1 | IJP2P Networking Journal
Submit your article : IJPTchief@gmail.com



ISAR International Journal of P2P Network and Techniques

Volume. 1 - Issue 1

S.No.

Title/Author Name

Page No.
1.

Intrusion Detection Using Honey pots in Network Security

Authors: Ahmad Shah, Manisha Dhongade

    [ Abstract ] [ cite ] [ PDF ]

    Abstract :-

    Whether you arrange an intrusion detection system (IDS), or you gather and analyse the workstation and device logs on your association, Intrusion detection is a complex business, so it can be both complex and time consuming for identifying malicious traffic in a sea of legitimate commotion. An isolated collection of systems are Honey pots, the primary function of which is to elicit mistreatment from attackers either by the use of real or simulated vulnerabilities or by weaknesses in system configurations, like easily guessed passwords. In order to be able to better understand their attacks they attract attackers and log their movement.
    Identifying malicious traffic is dead simple by using honey pots. That's because any transfer to a honey pot, after some initial quick tuning to rule out false positives, is suspicious. To alert its owner if it is touched by using a fake computer asset that exists is called a honey pot. Nobody attempting to log or should be touching it. No analysis is required to tell good traffic from bad, because all activity is illegal.
    Key word :- Honeypot, hacking, security, Types of honeypots, network, intrusion detection (ID).

    ×
    IJPT - ISAR Journals

    Ahmad Shah, Manisha Dhongade, "Intrusion Detection Using Honey pots in Network Security" Vol. 1 - Issue 1 ( Nov - Dec 2015), ISAR International Journal of P2P Network and Techniques , ISSN: 2455 - 7986 , www.internationaljournalisar.org

    ×
1-7
2.

Third-Party Authentication Using Quantum Key Distribution Protocols

Authors: Kunal Mishra, Ashish Upadhyay, Prerna Gaur

    [ Abstract ] [ cite ] [ PDF ]

    Abstract :-

    By using quantum motorized systems, Quantum key distribution (QKD) promises safe key conformity. For the opportunity cryptographic infrastructures, we argue that QKD will be an important part. Without reliance on computational assumptions QKD can give long-term discretion in favor of encrypted in cycle. QKD can make use of each information-theoretically confined symmetric key verification or computationally make safe public key confirmation, it still requires validation to prevent man-in-the-middle attacks; we argue that QKD still offers stronger refuge than classical key concurrence even when it uses public key certification. Secure group announcement could began speedily by Dynamic peer group. By establishing a collaborative assembly key for a disseminated dynamic peer group that provides a elementary understanding is the foremost aspect. The third party regarding the validation part were trusted by the Participants of the etiquette. The network systems which deal with highly sensitive in sequence, such as military, hospitals, research conveniences were preferred by the planned set of rules. In superposition states for authentication and key circulation which provides high security against many attacks were our protocol utilizes polarized photons.
    Key word :- Third-Party ,Quantum Key ,Protocols .

    ×
    IJPT - ISAR Journals

    Kunal Mishra, Ashish Upadhyay, Prerna Gaur, "Third-Party Authentication Using Quantum Key Distribution Protocols" Vol. 1 - Issue 1 ( Nov - Dec 2015), ISAR International Journal of P2P Network and Techniques , ISSN: 2455 - 7986 , www.internationaljournalisar.org

    ×
8-12
3.

Detecting and Preventing Sybil attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

Authors: Shrutika Gawandi, R. B. Ingle,M.R. Gurme

    [ Abstract ] [ cite ] [ PDF ]

    Abstract :-

    For secure set-up protection wireless sensor networks are highly necessary. In wireless sensor network till now a lot of researchers have predictable a choice of kinds of highly important attacks. A massive destructive attack against the sensor set-up where frequent genuine identities with fictitious identities are used for getting an banned entry into a complex is what a Sybil attack is. In wireless sensor set-up, discerning the Sybil attack, sinkhole and wormhole attack while multicasting is a fantastic job. A node which pretends its identity to other nodes is basically what a Sybil attack resources. Thereby Communicating to an banned node results in data loss and becomes risky in the set-up. The existing method Random Password association has only a scheme which just verifies the node identities by analysing the neighbours. With the objective of resolving this trouble a survey was done on a Sybil attack. For detecting, eliminating, and in due course preventing the entry of Sybil nodes in the set of connections a survey has been proposed by combine CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing).To deal with the kinds of attacks in unica sting and multicasting we suggest a scheme of assuring security for wireless sensor network.
    Key word :- Sybil attacks ,Message Authentication ,Networks Using Message Earth, Electric Wave, Earth Process, Automation.

    ×
    IJPT - ISAR Journals

    Shrutika Gawandi, R. B. Ingle,M.R. Gurme, "Detecting and Preventing Sybil attacks in Wireless Sensor Networks Using Message Authentication and Passing Method " Vol. 1 - Issue 1 ( Nov - Dec 2015), ISAR International Journal of P2P Network and Techniques , ISSN: 2455 - 7986 , www.internationaljournalisar.org

    ×
13-17
4.

Network Border Patrol: Preventing Congestion Collapse and Promoting Fairness in the Network

Authors: Jasmeet Singh, Muhib A. Lambay

    [ Abstract ] [ cite ] [ PDF ]

    Abstract :-

    The Internet's outstanding scalability and robustness result in part from the end-to-end nature of Internet blocking control. End-to-end congestion control algorithm however, congestion fall down and unfairness created by applications were unable to prevent the system which is indifferent to network congestion. A novel congestion-avoidance mechanism called network border patrol (NBP) were planned and investigated to address these maladies. In order to detect and restrict unresponsive traffic flows before they enter the network, thereby preventing congestion within the network, NBP entails the exchange of feedback between routers at the borders of a network. In order to provide fair bandwidth allocations to opposing flows, NBP is complemented with the proposed enhanced core-stateless fair queuing (ECSFQ) mechanism. Both NBP and ECSFQ are compliant with the Internet philosophy of pushing difficulty toward the edges of the network whenever possible. Simulation results show that NBP effectively eliminates congestion collapse and that, when combined with ECSFQ, about max-min fair bandwidth allocations can be achieved for competing flows.
    Key word :- Sybil attacks ,Message Authentication ,Networks Using Message.

    ×
    IJPT - ISAR Journals

    Jasmeet Singh, Muhib A. Lambay , "Network Border Patrol: Preventing Congestion Collapse and Promoting Fairness in the Network" Vol. 1 - Issue 1 ( Nov - Dec 2015), ISAR International Journal of P2P Network and Techniques , ISSN: 2455 - 7986 , www.internationaljournalisar.org

    ×
18-24
5.

Stabilizing BGP Routing without Harming Convergence

Authors: Farminder Singh, Harsh Sadawarti, Sukhman Sodhi

    [ Abstract ] [ cite ] [ PDF ]

    Abstract :-

    Route volatility is an main provider to data plane unreliability on the Internet and also incurs load on the control plane of routers. In this paper, we study how route option schemes can stay away from these changes in routes. Modifying route collection imply a trade-off connecting durability, digression from operators' preferred routes, and convenience of routes. We expand algorithms to lower-bound the possible points in these trade-off spaces. We also suggest a new go forward, Stable Route Selection (SRS), which uses elasticity in route selection to improve constancy without sacrifice accessibility and with a restricted amount of difference. Through large-scale recreation, a software-router performance, and emulation with real-world BGP update feeds, we put on view that SRS is a talented approach to carefully stabilize route selection.
    Key word :- BGP, Routing ,Stabilizing.

    ×
    IJPT - ISAR Journals

    Farminder Singh, Harsh Sadawarti, Sukhman Sodhi, "Stabilizing BGP Routing without Harming Convergence" Vol. 1 - Issue 1 ( Nov - Dec 2015), ISAR International Journal of P2P Network and Techniques , ISSN: 2455 - 7986 , www.internationaljournalisar.org

    ×
25-33