Volume 1 | IJP2P Networking Journal
Submit your article : IJPTchief@gmail.com



ISAR International Journal of P2P Network and Techniques

Volume 1

S.No.

Title/Author Name

Page No.
1.

Intrusion Detection Using Honey pots in Network Security

Authors: Ahmad Shah, Manisha Dhongade

    [ Abstract ] [ cite ] [ PDF ]

    Abstract :-

    Whether you arrange an intrusion detection system (IDS), or you gather and analyse the workstation and device logs on your association, Intrusion detection is a complex business, so it can be both complex and time consuming for identifying malicious traffic in a sea of legitimate commotion. An isolated collection of systems are Honey pots, the primary function of which is to elicit mistreatment from attackers either by the use of real or simulated vulnerabilities or by weaknesses in system configurations, like easily guessed passwords. In order to be able to better understand their attacks they attract attackers and log their movement.
    Identifying malicious traffic is dead simple by using honey pots. That's because any transfer to a honey pot, after some initial quick tuning to rule out false positives, is suspicious. To alert its owner if it is touched by using a fake computer asset that exists is called a honey pot. Nobody attempting to log or should be touching it. No analysis is required to tell good traffic from bad, because all activity is illegal.
    Key word :- Honeypot, hacking, security, Types of honeypots, network, intrusion detection (ID).

    ×
    IJPT - ISAR Journals

    Ahmad Shah, Manisha Dhongade, "Intrusion Detection Using Honey pots in Network Security" Vol. 1 - Issue 1 ( Nov - Dec 2015), ISAR International Journal of P2P Network and Techniques , ISSN: 2455 - 7986 , www.internationaljournalisar.org

    ×
IJP2P01
2.

Third-Party Authentication Using Quantum Key Distribution Protocols

Authors: Kunal Mishra, Ashish Upadhyay, Prerna Gaur

    [ Abstract ] [ cite ] [ PDF ]

    Abstract :-

    By using quantum motorized systems, Quantum key distribution (QKD) promises safe key conformity. For the opportunity cryptographic infrastructures, we argue that QKD will be an important part. Without reliance on computational assumptions QKD can give long-term discretion in favor of encrypted in cycle. QKD can make use of each information-theoretically confined symmetric key verification or computationally make safe public key confirmation, it still requires validation to prevent man-in-the-middle attacks; we argue that QKD still offers stronger refuge than classical key concurrence even when it uses public key certification. Secure group announcement could began speedily by Dynamic peer group. By establishing a collaborative assembly key for a disseminated dynamic peer group that provides a elementary understanding is the foremost aspect. The third party regarding the validation part were trusted by the Participants of the etiquette. The network systems which deal with highly sensitive in sequence, such as military, hospitals, research conveniences were preferred by the planned set of rules. In superposition states for authentication and key circulation which provides high security against many attacks were our protocol utilizes polarized photons.
    Key word :- Third-Party ,Quantum Key ,Protocols .

    ×
    IJPT - ISAR Journals

    Kunal Mishra, Ashish Upadhyay, Prerna Gaur, "Third-Party Authentication Using Quantum Key Distribution Protocols" Vol. 1 - Issue 1 ( Nov - Dec 2015), ISAR International Journal of P2P Network and Techniques , ISSN: 2455 - 7986 , www.internationaljournalisar.org

    ×
IJP2P02
3.

Detecting and Preventing Sybil attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

Authors: Shrutika Gawandi, R. B. Ingle,M.R. Gurme

    [ Abstract ] [ cite ] [ PDF ]

    Abstract :-

    For secure set-up protection wireless sensor networks are highly necessary. In wireless sensor network till now a lot of researchers have predictable a choice of kinds of highly important attacks. A massive destructive attack against the sensor set-up where frequent genuine identities with fictitious identities are used for getting an banned entry into a complex is what a Sybil attack is. In wireless sensor set-up, discerning the Sybil attack, sinkhole and wormhole attack while multicasting is a fantastic job. A node which pretends its identity to other nodes is basically what a Sybil attack resources. Thereby Communicating to an banned node results in data loss and becomes risky in the set-up. The existing method Random Password association has only a scheme which just verifies the node identities by analysing the neighbours. With the objective of resolving this trouble a survey was done on a Sybil attack. For detecting, eliminating, and in due course preventing the entry of Sybil nodes in the set of connections a survey has been proposed by combine CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing).To deal with the kinds of attacks in unica sting and multicasting we suggest a scheme of assuring security for wireless sensor network.
    Key word :- Sybil attacks ,Message Authentication ,Networks Using Message Earth, Electric Wave, Earth Process, Automation.

    ×
    IJPT - ISAR Journals

    Shrutika Gawandi, R. B. Ingle,M.R. Gurme, "Detecting and Preventing Sybil attacks in Wireless Sensor Networks Using Message Authentication and Passing Method " Vol. 1 - Issue 1 ( Nov - Dec 2015), ISAR International Journal of P2P Network and Techniques , ISSN: 2455 - 7986 , www.internationaljournalisar.org

    ×
IJP2P03
4.

Network Border Patrol: Preventing Congestion Collapse and Promoting Fairness in the Network

Authors: Jasmeet Singh, Muhib A. Lambay

    [ Abstract ] [ cite ] [ PDF ]

    Abstract :-

    The Internet's outstanding scalability and robustness result in part from the end-to-end nature of Internet blocking control. End-to-end congestion control algorithm however, congestion fall down and unfairness created by applications were unable to prevent the system which is indifferent to network congestion. A novel congestion-avoidance mechanism called network border patrol (NBP) were planned and investigated to address these maladies. In order to detect and restrict unresponsive traffic flows before they enter the network, thereby preventing congestion within the network, NBP entails the exchange of feedback between routers at the borders of a network. In order to provide fair bandwidth allocations to opposing flows, NBP is complemented with the proposed enhanced core-stateless fair queuing (ECSFQ) mechanism. Both NBP and ECSFQ are compliant with the Internet philosophy of pushing difficulty toward the edges of the network whenever possible. Simulation results show that NBP effectively eliminates congestion collapse and that, when combined with ECSFQ, about max-min fair bandwidth allocations can be achieved for competing flows.
    Key word :- Sybil attacks ,Message Authentication ,Networks Using Message.

    ×
    IJPT - ISAR Journals

    Jasmeet Singh, Muhib A. Lambay , "Network Border Patrol: Preventing Congestion Collapse and Promoting Fairness in the Network" Vol. 1 - Issue 1 ( Nov - Dec 2015), ISAR International Journal of P2P Network and Techniques , ISSN: 2455 - 7986 , www.internationaljournalisar.org

    ×
IJP2P04
5.

Stabilizing BGP Routing without Harming Convergence

Authors: Farminder Singh, Harsh Sadawarti, Sukhman Sodhi

    [ Abstract ] [ cite ] [ PDF ]

    Abstract :-

    Route volatility is an main provider to data plane unreliability on the Internet and also incurs load on the control plane of routers. In this paper, we study how route option schemes can stay away from these changes in routes. Modifying route collection imply a trade-off connecting durability, digression from operators' preferred routes, and convenience of routes. We expand algorithms to lower-bound the possible points in these trade-off spaces. We also suggest a new go forward, Stable Route Selection (SRS), which uses elasticity in route selection to improve constancy without sacrifice accessibility and with a restricted amount of difference. Through large-scale recreation, a software-router performance, and emulation with real-world BGP update feeds, we put on view that SRS is a talented approach to carefully stabilize route selection.
    Key word :- BGP, Routing ,Stabilizing.

    ×
    IJPT - ISAR Journals

    Farminder Singh, Harsh Sadawarti, Sukhman Sodhi, "Stabilizing BGP Routing without Harming Convergence" Vol. 1 - Issue 1 ( Nov - Dec 2015), ISAR International Journal of P2P Network and Techniques , ISSN: 2455 - 7986 , www.internationaljournalisar.org

    ×
IJP2P05
6.

Efficient Path Selection Using Enhanced Channel Assignment Algorithm (ECAA) in Multi Hop Wireless Sensor Network"

Authors: Anitha Ganesan, S. George Joseph Edison, D. C. Joy Winnie Wise, Gopala Krishnan

    [ Abstract ] [ cite ] [ PDF ]

    Abstract :-

    A large number of web data repositories are hidden behind restrictive web interfaces, making it an important challenge to enable data analytics over these hidden web databases. Most existing techniques assume a form-like web interface which consists solely of categorical attributes (or numeric ones that can be discretized). Nonetheless, many real-world web interfaces (of hidden databases) also feature checkbox interfaces?e.g., the specification of a set of desired features, such as A/C, navigation, etc., for a car-search website like Yahoo! Autos. We find that, for the purpose of data analytics, such checkbox-represented attributes differ fundamentally from the categorical/numerical ones that were traditionally studied. In this paper, we address the problem of data analytics over hidden databases with checkbox interfaces. Extensive experiments on both synthetic and real datasets demonstrate the accuracy and efficiency of our proposed algorithms.
    Key word :- -.

    ×
    IJPT - ISAR Journals

    Anitha Ganesan, S. George Joseph Edison, D. C. Joy Winnie Wise, Gopala Krishnan "Efficient Path Selection Using Enhanced Channel Assignment Algorithm (ECAA) in Multi Hop Wireless Sensor Network" Vol. 1 - Issue 2 ( March - April 2016), ISAR International Journal of P2P Network and Techniques , ISSN: 2455 - 7986 , www.internationaljournalisar.org

    ×
IJP2P06
7.

Retrieving Deep Web Using Aggregate Queries with Check Box Interface

Authors: S.Shagitha, E.Dhilipkumar

    [ Abstract ] [ cite ] [ PDF ]

    Abstract :-

    A large number of web data repositories are hidden behind restrictive web interfaces, making it an important challenge to enable data analytics over these hidden web databases. Most existing techniques assume a form-like web interface which consists solely of categorical attributes (or numeric ones that can be discretized). Nonetheless, many real-world web interfaces (of hidden databases) also feature checkbox interfaces?e.g., the specification of a set of desired features, such as A/C, navigation, etc., for a car-search website like Yahoo! Autos. We find that, for the purpose of data analytics, such checkbox-represented attributes differ fundamentally from the categorical/numerical ones that were traditionally studied. In this paper, we address the problem of data analytics over hidden databases with checkbox interfaces. Extensive experiments on both synthetic and real datasets demonstrate the accuracy and efficiency of our proposed algorithms.
    Key word :- -.

    ×
    IJPT - ISAR Journals

    S.Shagitha, E.Dhilipkumar "Retrieving Deep Web Using Aggregate Queries with Check Box Interface" Vol. 1 - Issue 3 ( May - June 2016), ISAR International Journal of P2P Network and Techniques , ISSN: 2455 - 7986 , www.internationaljournalisar.org

    ×
IJP2P07
8.

Congestion Aware Load Balancing for Multiradio Wireless Mesh Network

Authors: A.C.Kumar, E.Dhlipkumar

    [ Abstract ] [ cite ] [ PDF ]

    Abstract :-

    By using quantum motorized systems, Quantum key distribution (QKD) promises safe key conformity. For the opportunity cryptographic infrastructures, we argue that QKD will be an important part. Without reliance on computational assumptions QKD can give long-term discretion in favor of encrypted in cycle. QKD can make use of each information-theoretically confined symmetric key verification or computationally make safe public key confirmation, it still requires validation to prevent man-in-the-middle attacks; we argue that QKD still offers stronger refuge than classical key concurrence even when it uses public key certification. Secure group announcement could began speedily by Dynamic peer group. By establishing a collaborative assembly key for a disseminated dynamic peer group that provides a elementary understanding is the foremost aspect. The third party regarding the validation part were trusted by the Participants of the etiquette. The network systems which deal with highly sensitive in sequence, such as military, hospitals, research conveniences were preferred by the planned set of rules. In superposition states for authentication and key circulation which provides high security against many attacks were our protocol utilizes polarized photons.
    Key word :- Wireless Mesh Network; multiple interfaces and multiple channels; airtime link cost metric; round trip time;congestion; load balancing. .

    ×
    IJPT - ISAR Journals

    A.C.Kumar, E.Dhlipkumar, "Congestion Aware Load Balancing for Multiradio Wireless Mesh Network" Vol. 1 - Issue 3 ( May - June 2016), ISAR International Journal of P2P Network and Techniques , ISSN: 2455 - 7986 , www.internationaljournalisar.org

    ×
IJP2P08
9.

Webpage proposal by integrating web usage and content mining

Authors: Mahalakshmi.v, A.Petrisia

    [ Abstract ] [ cite ] [ PDF ]

    Abstract :-

    Web-page recommendation plays an important role in intelligent Web systems. Useful knowledge discovery from Web usage data and satisfactory knowledge representation for effective Web-page recommendations are crucial and challenging. This paper proposes a novel method to efficiently provide better Web-page recommendation through semantic-enhancement by integrating the domain and Web usage knowledge of a website. Two new models are proposed to represent the domain knowledge. The first model uses an ontology to represent the domain knowledge. The second model uses one automatically generated semantic network to represent domain terms, Web-pages, and the relations between them. Another new model, the conceptual prediction model, is proposed to automatically generate a semantic network of the semantic Web usage knowledge, which is the integration of domain knowledge and Web usage knowledge. A number of effective queries have been developed to query about these knowledge bases. Based on these queries, a set of recommendation strategies have been proposed to generate Web-page candidates. The recommendation results have been compared with the results obtained from an advanced existing Web Usage Mining (WUM) method. The experimental results demonstrate that the proposed method produces significantly higher performance than the WU method.
    Key word :- Sybil attacks ,Message Authentication ,Networks Using Message -

    ×
    IJPT - ISAR Journals

    Mahalakshmi.v, A.Petrisia "Webpage proposal by integrating web usage and content mining " Vol. 1 - Issue 3( May - June 2015), ISAR International Journal of P2P Network and Techniques , ISSN: 2455 - 7986 , www.internationaljournalisar.org

    ×
IJP2P09
10.

Relative Performance Analysis of Reactive Routing Protocol in MANET using Varying Node Density

Authors: Monika Kartikey, Ajay Kumar Lala

    [ Abstract ] [ cite ] [ PDF ]

    Abstract :-

    In wirelessmobile ad-hoc network (MANET), path routing and selection of routing protocols are very important concepts to design any wireless network. Comparisonof the routing protocolsshows very significant role for performance evaluation. A MANET is one of the ad -hoc network that does not need centralized control, it works like distributed network and self-created. The goal of MANETs is to enhance the performance of ad-hoc network in terms of Packet Delivery Ratio (PDR), Normalized routing load (NRL), Total Dropped Packets. In this paper, the performance analysis of Ad hoc OnDemand Distance Vector(AODV) and Dynamic source routing (DSR) routing protocols implementation are carried out using NS2.34 network simulator. The performance is evaluated on the basis of common measure parameters like Packet Delivery Ratio (PDR), Normalized routing load(NRL), Total Dropped Packets for better results.
    Key word :- Mobile ad-hoc network (MANET), Routing protocols Dynamic source routing(DSR),Ad hoc On-Demand Distance Vector (AODV)and NS2. -

    ×
    IJPT - ISAR Journals

    Monika Kartikey, Ajay Kumar Lala "Relative Performance Analysis of Reactive Routing Protocol in MANET using Varying Node Density" Vol. 1 - Issue 3, ISAR International Journal of P2P Network and Techniques , ISSN: 2455 - 7986 , www.internationaljournalisar.org

    ×
IJP2P10